Candidatii eJobs pot alege daca CVul lor este: CONFIDENTIAL, PUBLIC sau daca este disponibil doar clientilor eJobs. CVul de pe acesta pagina este public (fara date de contact insa). CVul Public ii ofera candidatului mai multe oportunitati de a fi gasit si contactat de potentiali angajatori. CVurile disponibile doar clientilor eJobs au un format mai complex, contin mai multe informatii si sunt mult mai detaliate.
Candidatii eJobs isi pot schimba in orice moment disponibilitatea CVului.

Daca sunteti firma si doriti sa contactati candidatul de mai jos, trimiteti-ne aceasta cerere la Contact@ejobsgroup.ro, alaturi de linkul catre aceasta pagina.

Unul din Relationship Managerii eJobs o sa va contacteze in maxim 24 de ore si o sa va ofere datele de contact DOAR dupa ce candidatul isi exprima acordul in acest sens.




Curriculum Vitae

informatii personale

 

M 30.11.1976

Permis conducere:  Cat.B, Data obtinerii:01.11.1994

Stagiu militar: da

obiectiv

 

Doresc sa fac parte dintr-o echipa in care sa-mi pot pune in valoare, cunostintele, calitatile, experienta dar si sa-mi perfectionez abilitatile pe care le am. Experienta cumulata: Peste 10 ani experienta in industria IT lucrand ca programator, inginer de system, administrator de retea (retele de dimensiuni medii, pana la 23 de noduri sau puncte de prezenta, sute de servere), consultant IT, security advisor sau manager IT (buget administrat 100.000 Euro anual).

Salariu: nespecificat

Tip job: Part time, Full time

Departament: Vanzari, Publicitate, Telecomunicatii, Achizitii, Inginerie, IT Software, IT Hardware, Financiar / Contabilitate, Banci, Service / Reparatii

Oras de lucru: Bucuresti

Nivel Cariera: Senior-Level (> 5 ani)

Disponibil: oricand

experienta profesionala

 

01.11.2010 - prezent

Departament: it software

Titlu Job: integrator, linux system administrator, security supervisor, administrator linux, supervizor securitate

Responsabilitati:

Administrate communication infrastructure (VPN, firewalls) and servers: Oracle database servers, AIX and linux servers, backups and restore procedures, online services of card (Visa Mastercard) processing 3D Secure linux servers (acs, mpi, database), Internal and external services (mx, dns, firewalls, routers), implement security services (IDS), file integrity (Osiris), alerting (Ossec), services & infrastructure supervising (cacti, snmp, nagios)

As Infrastructure Engineer:
Good knowledge of CDN and origin (live and VOD streams) concept
Good knowledge of centralized monitoring techniques and tools (Nagios/Icinga)
Good knowledge on ELK Stack (Beats (Filebeat), Logstash (log collector), Elasticsearch (search engine), Kibana (as GUI)
Very good knowledge on Amazon S3 (creating automation scripts used for editing and/or handling objects)
Good Knowledge of Amazon Web Services (creating upload forms – standalone or integrated into nginx - used for uploads automation into s3.amazonaws.com cloud, aws.amazon.com)
Good knowledge on Amazon aws-cli (command line interface)

As security supervisor:
Solid understanding of information security principles and best practices
Good knowledge of cryptographic devices - HSM (Hardware Security Modules) from Safenet (Luna, Protect Gold)
Good knowledge of File integrity monitoring (FIM): osiris, ossec, samhain (yule), tripwire
Good knowledge of Intrusion detection system (IDS)/intrusion prevention system (IPS): IBM Proventia Management SiteProtector (IPS for Linux, IPS for Windows, Web Application Security, Network Security), IBM Qradar (collecting logs and correlates it to give alerts – sms, emails, reports), Mandiant (to detect malicious activity), Splunk, Snort, Suricata
Good knowledge in vulnerability detection, management and penetration testing using: Metasploit, Nessus, Qualys, Nmap
Familiar with software, vulnerability assessment, vulnerability management, penetration testing and security architectures
Good knowledge at building and compiling applications, kernel patching, module compiling and loading, manipulating different compilers (gcc, g++, cc, etc)

As devops:
Understanding of Yocto principles, building images, cmake, make
Good knowledge at building and compiling applications, kernel patching, module compiling and loading, manipulating different compilers (gcc, g++, cc, etc)
- Created mechanism (start, monitor, resume, auto-restart, speed test, backup) or rewriting manifest files content (URL rewrite inside it) residing on remote storage device - OBS (IBM Cloud Object Based Storage). Over 11 million of assets processed, each asset with 8 different bitrates, over 20 manifest files inside - entire job took 7 months with success rate of 100%
- For the same content (over 11 million of assets) created mechanism to dynamically parse each manifest file, detect and remove only standalone audio stream
- Created and integrated 2 plugins for Nagios:
a) channel bitrate upload sync plugin: Tested on hundreds of servers, thousands of channels - live streams. For each broadcast channel, it will monitor video streams and check dynamically for all available bitrates, if all segments are in sync - no more than 2 index offset is allowed. Will trigger alarms (warning for 2 segments) and critical (for 3 or more segments)
b) check write on OBS (IBM Cloud Object Based Storage) plugin: it will check remotely if read and write operation is allowed on remote OBS server and trigger alarms in case OBS storage does not allow write operation.

As Integrator:
- Integrated Safenet HSM on linux environment (RedHat) and with Apache httpd server (hacking Safenet abuild source code, recompile and hack Apache, integrate it with web application firewall using mod security)
- Integrated Safenet LunaPCIe HSM with jboss-7.1.1 webserver. Rewrite Integration guide received from Safenet which contain wrong instructions and has a lot of missing information. Received officially thanks from Safenet for my development work. A new Integration Guide, has been released by Safenet according to my work and notes.
- Creating procedures about how to store and manage SSL certificates using Safenet HSM
- Deal with generation process of SSL certificates and prepare CSR (certificates signing request) to be sent to CA (Startcom, Visa, Mastercard)
- advanced command line debug skills (lynx, curl, openssl, apachectl, tcpdump, vmstat, iostat, top, iotop, iozone, ab)
- implement https on Varnish Cache servers and integrate it to work with Origin servers as backend (VOD and live streams) as well as CDN/MDN layer as fronted

01.05.2007 - 31.10.2010

Departament: telecomunicatii

Titlu Job: consultant it, network engineer / system administrator

Responsabilitati:

Responsabilitati: Construirea, managementul si administrarea infrastructurii de comunicatii (4 tunele VPN/ipsec cu Nec-USA si Philips-Olanda), serviciilor LAN (file server, ftp server, etc) si a serviciilor externe (mx, dns, ftp, firewalls, routers), traffic shaping (ingress/egress folosind IMQ).
Referinte: implementarea a doua legaturi redundante pentru asigurarea unui uptime ridicat (solutie full BGP) si asigurarea unuei comunicatii stabile intre locatia din Bucuresti si cele ale partenerilor aflati in afara tarii, QOS pentru cumunicatiile VOIP via VPN, implementarea unui server PPTP vpn folosit de catre utilizatorii mobili, implemmentarea unei solutii de inventariere automata a echipamentelor si programelor din retea (nr de statii, licente software, tipul sistemelor de operare, etc)
Se poate pune la dispozitia celor interesati o recomandare din partea actionariatului companiei.
bonuri de masa

01.06.2005 - 31.10.2007

Departament: it hardware

Titlu Job: it manager / it consultant /network and system administrator

Responsabilitati:

Administrarea unei retele nationale de computere (16 puncte de prezenta Relad in marile orase din tara plus 4 puncte de prezenta in Bucuresti, legate in VPN), mx, dns, ftp, firewalls plus citeva sute de statii client (win9x, 2k, xp). Toate serviciile de retea sunt "*nix based"!

Serviciile de retea si politica de securitate au fost rescrise de la zero in mai putin de 6 luni, fara ca circuitul de productie sa fie intrerupt! In Ianuarie 2006 a fost finalizat si implementat mecanismul de backup al legaturilor de date (vpn) cu cele 20 de locatii Relad din tara si Bucuresti. La sfirsitul lunii Septembrie 2006 a fost finalizat proiectul de asigurare a conexiunilor redundante (balans automat) a legaturilor de date in sediul central din Bucuresti - rutare dinamica folosind protocolul BGP - fiind garantat accesul in SAP (ERP) 24/24. In prezent, se afla in curs de implementare partea de telefonie VOIP.

In afara sarcinilor de ordin tehnic, activitatea desfasurata necesita efort sustinut in coordonarea echipelor IT din cele 20 de sucursale/puncte de lucru, abilitati in negocierea contractelor incheiate cu furnizorii de echipamente si servicii si supervizarea derularii acestora, participarea la diverse meetinguri pe teme cu carater tehnico-economic.

masina, telefon, bonuri de masa, prime
Buget administrat: peste 100.000Eur anual

15.03.2004 - 20.05.2005

Departament: functii publice

Titlu Job: consilier - cabinet secretar de stat (atributii - manager it)

Responsabilitati:

Servicii specifice activitatii ANCEX implementate intr-un mediu non eterogen (1 server Solaris, pina la 40 de statii (Windows), 30 de statii Macintosh (MacOsx), 7 routere linux, 7 retele interne legate prin VPN (ssl-vpn), 1 server linux (mail - useri virtuali - SQL based, pop, imap, pop-ssl, imap-ssl, smtp-auth with SSL or TLS, web (http, https, virtuals (name based or IP based), ftp - using TLS AUTH, avind ca backed un SGBD - SQL based), firewalls, monitorizare servicii si trafic retea, servere proxy, servere fisere, servere printing, dezvoltarea/programarea tool-urilor (GUI) de administrare (PHP, SQL based), etc.

Realizari:

Am participat la mai multe intilniri si seminarii internationale - Oxford, Haga, Viena, Berlin avind o contributie activa la dezvoltarea programelor in care Romania era implicata (membra a mai multor organizatii internationale avind ca scop combaterea terorismului, a armelor si tehnologiilor cu dubla utilizare, etc).

In afara sarcinilor de ordin tehnic, am organizat procedurile de achizitii publice pentru echipamentele de tehnica de calcul si instalatia de sonorizare ANCEX.

Pe plan intern: absolut toate serviciile au fost configurate de la zero - majoritatea acestora nici macar nu existau. Am gasit un haos total in care nimeni nu stia apropape nimic despre echipamentele hardware (data de provenienta, configuratie, garantie) cit si despre programele software instalate (licente, kituri, acte de provenienta, etc) ...specific institutiilor de stat .... Munca a fost una titanica si au fost necesare peste 7 luni de zile pentru a normaliza situatia.

01.06.2003 - 31.03.2004

Departament: telecomunicatii

Titlu Job: linux system administrator / web developer

Responsabilitati:

Reprezentant pentru Romania a canalelor Tv (FoxKids, Extreme Sports, Travell, Sky News)

Firewalls - Internet Access - Security, DNS, Squid, WEB Servers (apache, mysql and php), E-mail Servers, Spam and Antivirus Filters, FTP Servers; - Elaborarea procedurilor de backup; - Dezvoltarea de programe (sau scripturi) pentru uz intern; - Intretinerea serviciilor de web hosting; - Administrarea baze de date (mysql) - Network design and troubleshooting (tcp/ip,ipsec,cifs,nfs,dns,smtp,pop3,imap,ssl) - Helpdesk pentru utilizatorii.
Persoana de contact Marius Girlea. Pentru contact vezi http://www.inner.ro

01.08.2002 - 15.03.2004

Departament: it software

Titlu Job: web developer / consultant vanzari

Responsabilitati:

Activitatea principala a fost de a dezvolta un server de aplicatii dedicat comertului electronic (de tip magazin virtual), capabil sa genereze si sa gazduiasca mai multe magazine virtuale, complet configurabil prin intermediul unui browser web, care pentru administrare si configurare nu necesita cunostinte de programare. Este lucrat in PHP avind in spate o baza de date Sql - inglobeaza constiinte si din alte domenii de activitare: networking, grafica web si contabilitate.

01.11.2000 - 01.08.2002

Departament: educatie / training / arte

Titlu Job: trainer

Responsabilitati:

Pregatirea cursantilor in vederea configurarii si administrarii unui retele non-eterogene, utilizind platforma Linux(Unix) pentru partea de configurare servere si servicii retea iar platforma Windows (9x, W2k) pentru statiile client.

Realizari:

Au fost configurate urmatoarele servere: web - apache, dns - bind, mail - qmail, samba, ftp - proftpd, proxy - squid, fax - hylafax si au fost prezentate citeva solutii de backup folosind rsync si nfs.

Pentru securizarea retelei a fost configurat un "firewall de strangulare" si un "firewall de tip bastion" folosind reguli ipchains

studii

 

Facultati:

1995 - 1995 Facultate: telecomunicatii la Facultatea de Electronica si Telecomunicatii - Bucuresti din Bucuresti. Facultatea de Electronica si Telecomunicatii Bucuresti

Premii

Certificari
Mar 2017: linux RHCE certification 2017
valid RHCE certification
Aug 2016: linux RHCSA certification 2016
valid RHCSA certification
Oct 2006 - Oct 2007: Cisco CCNA certification
Cisco CCNA certification (640-801)
Hobby-uri
Lasere

aptitudini

 

Limbi straine(Scris,Vorbit,Citit):



Pagini: 1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20 

E timpul pentru un browser mai bun

De la 1 octombrie 2019, te informăm că site-ul eJobs.ro nu va mai putea fi accesat prin browser-ul Internet Explorer din cauza funcționalităților reduse ale acestuia. Accesează-ne cu încredere folosind unul dintre browserele mai moderne: Google Chrome, Mozilla Firefox, Safari sau Edge.

Am înțeles
close