Security Management

  • created organization security policies
  • implemented audit policies of corporate IT resources usage
  • implement Internet usage restrictions policies via proxy servers
  • designed and configured firewall ACLs
  • deployed security software products of various vendors such as Microsoft, GFI, Symantec, TrendMicro, Kaspersky and others