About US‎ > ‎

Professional Experience

Presione Español para leer APTC777.INFO en Español

Presione Español para leer APTC777.INFO en Español

E-mail: fjt5241@gmail.com                             
Phone (323) 356-5241
Expert State of the Art Bilingual English and Spanish Services:

·        Public Relations (English/Spanish)

·        Understanding and knowable: 
A+ Certification, Networking (Physical/Wireless)
Network Security (hardware/Software)
·        Computer technician with experience in
PC (Microsoft) and Macintosh,
open source operating systems and application programs.
·        Multimedia Programs:
Adobe (Photoshop)
Macromedia and web page design.

·        Multimedia presentations

·        Technological support and training

·        Available to adapt to any work setting with knowledge in technology implementations and developments.

·        Customer services and enthusiastic team member.

·        Dedicated to highest quality of work there fore willing to gain valuable experience.



Non-Profit Sector

Federacion de Camaras Colombhispano Amaricanas USA (FEDECAMARASUSA)

 English/Spanish Public Relations and Website Administrator 2014 to present


Technology Support :
November 2006 to present

Southeast Community Development Corporation, California

Technology Instructor: 
February 2004 to September 2004

Gateway Cities Partnership, Inc; Paramount, California

Education Sector: K-12 and higher education:

Adult School and higher Education Computer Network/Teacher Assistant: 
February 2000 to April 2005

Los Angeles School District, California

-Bell High School: February 2004 to April 2005
-Miles Elementary: February 2000 to February 2004
-Huntington Park Community Adult School: October 2000 to June 2003

Library Assistant: 
September 1998 to March 1999

North Orange County Community College:
Cypress College Library, Cypress California


Business Sector:

CPRANGELES.COM Associate
May 2013 to present

American Prestige Technology Consulting:
April 2005 to present

Independent English/Spanish Technology Services, California

SoipTelDSL: 
Fall 2007 to present

English and Spanish Technical support

Voice Over TCP Technical Support: 
November 2009 to January 2010

SpeechPhone, Lake Forest, California 


PC Technician:
November 2006 to January 2010
Kimco Torrence, California

Security Guard: 
October 2005 to November 2005
Securitas Commerce, California



Education

Graduated from Huntington Park High School 1992 to 1996

Higher Education:
Cypress College Fall 1996 to 2004: General Education and Computer Science

Occupational Safety and Health Administration
10-hour Construction Safety and Health February 2017

Slawson Southeast Occupational Center
Los Angeles Unified School District Division of Adult and Carrer Education

Mobile Electronics Technician 1: June 2017
Electronics 1: July 2017


Qualifications

Community Development of Computer Centers
EmpowerNet California: San Francisco

Office Programs: Cypress College, California

Accessible Computing: Cypress College, California

Public Relations: Cypress College, California

Bureau of Security and Investigative Services: 
Security Guard; Consumer Affairs: State of California

First Aid and CPR: Cypress College and Los Angeles School District

 Experience providing bilingual  and technical services in the Information Security Management ISO1779; 10 major areas, including business continuity planning, physical and environmental security, compliance, personnel security, asset control and security policy at Los Angeles School District, SpeechPhone, SoipTel, Email Inc, and Southeast Community Development Corporation. 

 

SECURITY POLICY

·        Information security policy

·        Information security policy document

·        Review and evaluation

·        Organizational

SECURITY

·        Information security infrastructure

·        Management information security forum Information security coordination

·        Allocation of information security responsibilities

·        Authorization process for information processing facilities

·        Specialist information security advice

·        Co-operation between organizations

·        Independent review of information security

·        Security of third party access

·        Identification of risks from third party access

·        Security requirements in third party contracts

·        Outsourcing

·        Security requirements in outsourcing contracts

ASSET CLASSIFICATION AND CONTROL

·        Accountability of assets

·        Inventory of assets

·        Information classification

·        Classification guidelines

·        Information labelling and handling

PERSONNEL SECURITY

·        Security in job definition and Resourcing

·        Including security in job responsibilities

·        Personnel screening and policy

·        Confidentiality agreements

·        Terms and conditions of employment

·        User training

·        Information security education and training

·        Responding to security incidents and malfunctions

·        Reporting security incident

·        Reporting security weaknesses

·        Reporting software malfunctions

·        Learning from incidents

·        Disciplinary process

PHYSICAL AND ENVIRONMENTAL SECURITY

·        Secure Area

·        Physical Security Perimeter

·        Physical entry Controls

·        Securing Offices, rooms and facilities

·        Working in Secure Areas

·        Isolated delivery and loading areas

·        Equipment Security

·        Equipment siting protection

·        Power Supplies

·        Cabling Security

·        Equipment Maintenance

·        Securing of equipment off-premises

·        Secure disposal or re-use of equipment

·        General Controls

·        Clear Desk and clear screen policy

·        Removal of property

COMMUNICATIONS AND OPERATIONS MANAGEMENT

·        Operational Procedure and responsibilities

·        Documented Operating procedures

·        Operational Change Control

·        Incident management procedures

·        Segregation of duties

·        Separation of development and operational facilities

·        External facilities management System planning and acceptance
Capacity Planning

·        System acceptance

·        Protection against malicious software

·        Control against malicious software

·        Housekeeping

·        Information back-up

·        Operator logs

·        Fault Logging

·        Network Management

·        Network Controls

·        Media handling and Security

·        Management of removable computer media

·        Disposal of Media

·        Information handling procedures

·        Security of system documentation

·        Exchange of Information and software

·        Information and software exchange agreement

·        Security of Media in transit

·        Electronic Commerce security

·        Security of Electronic email

·        Security of Electronic office systems

·        Publicly available systems

·        Other forms of information exchange

 

ACCESS CONTROL

·        Business Requirements for Access Control

·        Access Control Policy

·        User Access Management

·        User Registration

·        Privilege Management

·        User Password Management

·        Review of user access rights

·        User Responsibilities

·        Password use

·        Unattended user equipment

·        Network Access Control

·        Policy on use of network services

·        Enforced path

·        User authentication for external connections

·        Node Authentication

·        Remote diagnostic port protection

·        Segregation in networks

·        Network connection protocols

·        Network routing control

·        Security of network services

·        Operating system access control

·        Automatic terminal identification

·        Terminal log-on procedures

·        User identification and authorization

·        Password management system

·        Use of system utilities

·        Duress alarm to safeguard users

·        Terminal time-out

·        Limitation of connection time

·        Application Access Control

·        Information access restriction

·        Sensitive system isolation

·        Monitoring system access and use

·        Event logging

·        Monitoring system use

·        Clock synchronization

·        Mobile computing and teleworking

·        Mobile computing

·        Teleworking

SYSTEM DEVELOPMENT AND MAINTENANCE

·        Security requirements of systems

·        Security requirements analysis and specification

·        Security in application systems

·        Input data validation

·        Control of internal processing

·        Message authentication

·        Output data validation

·        Cryptographic

·        Policy on use of cryptographic controls

·        Encryption

·        Digital Signatures

·        Non-repudiation services

·        Key management

·        Security of system files

·        Control of operational software

·        Protection of system test data

·        Access Control to program source library]

·        Security in development and support process

·        Change control procedures

·        Technical review of operating system changes

·        Technical review of operating system changes

·        Covert channels and Trojan code

·        Outsourced software development

BUSINESS CONTINUITY MANAGEMENT

·        Aspects of Business Continuity Management

·        Business continuity management process

·        Business continuity and impact analysis

·        Writing and implementing continuity plan

·        Business continuity planning framework

·        Testing, maintaining and re-assessing business continuity plan

COMPLIANCE

·        Compliance with legal requirements

·        Identification of applicable legislation.

·        Intellectual property rights (IPR)

·        Safeguarding of organizational records

·        Data protection and privacy of personal information

·        Prevention of misuse of information processing facility.

·        Regulation of cryptographic controls

·        Collection of evidence

·        Reviews of Security Policy and technical compliance

·        Compliance with security policy

·        Technical compliance checking

·        System audit considerations

·        System audit controls

·        Protection of system audit tools


Professional References:
 

 
 
 
 
 










Comments