- created organization security policies
- implemented audit policies of corporate IT resources usage
- implement Internet usage restrictions policies via proxy servers
- designed and configured firewall ACLs
- deployed security software products of various vendors such as Microsoft, GFI, Symantec, TrendMicro, Kaspersky and others