I am not Figaro, but I'm definitely a factotum who loves solving problems in many fields, Challenge me.
/About
I am a highly skilled Information Technology (IT) and Cybersecurity professional with over a decade of experience. I have a proven track record of providing effective and secure solutions to complex problems. My expertise covers a wide range of technologies and tools, and I am capable of successfully executing projects from conception to completion. I thrive on challenges and actively seek out new problems to solve.
Outside of my professional life, I have a passion for cooking and enjoy listening to music. When I'm not immersed in the world of computers or Italian culinary delights, I find joy in working with wood or welding. Safety is always a priority for me, and I ensure that I use the appropriate tools and equipment to protect both myself and my assets.
Overall, my extensive experience, problem-solving mindset, and commitment to safety make me a valuable resource in the IT and Cybersecurity field.
Welcome to Benjo Lo Cicero's Resume
Vulnerability and Compliance Management:
Qualys Vulnerability Management (VMDR); Qualys Web Application Scanning (WAS); Qualys Policy Compliance.
/Tools
Privileged Access Management (PAM):
Delinea Privileged Access Management.
Data Security:
McAfee MVISION; McAfee ePO; McAfee DLP; McAfee ENS; McAfee VSE; McAfee Rogue System Detection; McAfee DXL.
Infrastructure-as-a-Service (IaaS):
Microsoft Azure; Amazon Web Services (AWS).
Software-as-a-Service (SaaS):
Microsoft 365; Google Workspace.
Scripting:
PowerShell; VMware PowerCLI; Bash.
Virtualization Infrastructures:
VMware vSphere vCenter 4.x/5.x/6.x; VMware vCloud Director 5.x; VMware vRealize Automation 7.x; Microsoft System Center Virtual Machine Manager.
Data Backup and Recovery:
Veeam Backup & Replication; Backup Exec; NetBackup; HP Data Protector; AOMEI Backupper.
Bare-Metal Hypervisors:
VMware vSphere ESXi; Microsoft Hyper-V; Proxmox.
Virtual Desktop Infrastructures:
VMware Horizon 7-8; Citrix XenApp/XenDesktop 6.x/7.x; Microsoft TS/WVD; Oracle VirtualBox; VMware Workstation & Fusion.
Data Storage:
Kaminario K2; Brocade Switch Fiber Channel; EMC AX4/VNX; NetApp FAS; Dell PowerVault.
IT Infrastructure Management:
Dell EMC DPACK/Live Optics; Dell EMC OpenManage; Cisco Works; Kiwi Cat tools; Kiwi Sys Log;
Microsoft Enterprise Products:
Exchange; ISA/WAF; Azure Active Directory; AD RMS; Azure RMS; SQL; SharePoint.
Mobile Device Management (MDM):
MobileIron (now Ivanti); Google MDM.
IT Service Mnanagement (ITSM):
ServiceNow; SysAid.
Office Productivity Applications:
Microsoft Office 2010/2013/2016/2019/365; LibreOffice.
Operating System Deployment:
Acronis Snap Deploy/True Image; Ghost Corporate edition
Operating Systems:
Microsoft OS Server and Client; macOS; Linux Red Hat/CentOS/Ubuntu.
CI/CD:
Jenkins; Nexus Chocolatey repository; Visual SVN Server; IncrediBuild; Atlassian Jira/Confluence; Microsoft Windows Hardware Lab Kit (HLK).
Network Equipment:
Cisco routers and Catalyst switches; Dell EMC switches.
Servers/Workstations/Portable Devices:
Dell EMC; HP; IBM/Lenovo; Apple MacBookPro/MacPro/MacMini.
Network Monitoring:
WhastUp; MRTG; NetData.
Network Security Controls:
Open VPN; pfSense; CheckPoint NG v. R55/R60/R62; Safe@Office; Cisco ASA 55xx.
Patch Management:
Qualys Patch Management; Ninite Pro.
/Experience
December 2023 — NOW
Seeking an Information Security role to leverage expertise in security, infrastructure, and CI/CD. Aim to improve Cyber Security posture, and enable business growth / Home
September 2023 — NOW
Practical Network Preparation Tester (PNPT) and Certificate of Cloud Security Knowledge (CCSKv4) exams preparation / Home
July 2021 — August 2023
Senior Vulnerability Analyst / Corning
March 2016 — February 2021
R&D/QA Senior Lab Manager / McAfee
March 2012 — March 2016
R&D/QA Lab Manager / McAfee
May 2008 — March 2012
IT Services Manager / Corning Optical Communications
(January 2011 Corning Optical Communications acquired MobileAccess Networks)
May 2008 — January 2011
IT Services Manager / MobileAccess Networks
December 2006 — April 2008
System Manager / Informatica
/Professional Certifications
2024 - Certificate of Cloud Security Knowledge v.4 (CCSKv4) - Cloud Security Alliance (CSA)
2022 - Certified Cloud Security Professional (CCSP) - International Information System Security Certification Consortium (ISC2)
2021 - Qualys Certified Specialist - Qualys
2021 - Certified Information Systems Security Professional (CISSP) - ISC2
2011 - VMware Certified Professional 4 - Data Center Virtualization (VCP4-DCV) - VMware
2011 - Certified Etichal Hacker v6 (CEHv6)* - Ec-Council (*expired)
20xx - Microsoft Certified Systems Engineer (MCSE) - Microsoft
20xx - Computer Network Manager - John Bryce Training Center
/Certificates of Completion
2024 - Cortex XDR: Main Components - PaloAlto Networks
2024 - Certificate of Cloud Security Knowledge v.4 (CCSKv4) - CSA
2024 - Common Vulnerability Scoring System v4.0 (CVSS v4.0) - Forum of Incident Response and Security Teams, Inc. (FIRST)
2022 - Privilege Access Manager Foundations - Delinea
2022 - Certified Cloud Security Professional (CCSP) Exam Preparation - LinkedIn Learning
2021 - Vulnerability Management Detection & Response - Qualys
2021 - Vulnerability Management - Qualys
2021 - Global IT Asset Inventory and Management - Qualys
2021 - Scanning Strategies and Best Practices - Qualys
2021 - Reporting Strategies and Best Practices - Qualys
2021 - Cloud Agent - Qualys
2021 - Container Security - Qualys
2021 - Certified Information Systems Security Professional (CISSP) Exam Preparation - helena-sec.com
2015 - VMware vSphere: Install, Configure, Manage [V6] - VMware
2014 - EMC VNX Storage System - EMC
2013 - VMware vSphere: Optimize and Scale [V5.1] - VMware
2011 - VMware vSphere: Install, Configure, Manage [V4.1] - VMware
2011 - Prepare for the Certified Ethical Hacker v6 (CEHv6)* Exam - Ec-Council
20xx - Interconnecting Cisco Networking Devices - Cisco
20xx - Computer Network Manager - John Bryce Training Center
/Skills
Asset Security and tools (DLP, Asset management tools) | Communication and Network Security | Privileged Access Management | Identification and authentication tools | Authorization mechanisms tools | Vulnerability and Patch Management tools | Data Storage | Data Backup | Data Recovery | Access Control tools | Network Infrastructure Security | Security Information tools | Event Management tools | Scrum Agile methodologies and tools (Jira/Confluence) | DevOps practices and tools (Jenkins, Virtualization and Cloud Technologies) | Cloud Security | Scripting language