ABOUT

Convergence Networks Security Nanotech

Kevin has been in Information Technology for over  24 years, starting out after completing his degree in Management Information Systems and Political Science. The adventure began in banking, investment banking and startups, pharma, private school, VAR with specialization in telecom, mortgage M&A and now consulting.

Technology is changing – the way we live and think seems to be impacted by the innovation that is continuously being pushed out – not only impacting the Business entities, but also changing our lifestyle. In a Post Covid world, entities have seen that remote work is an option, and changes have impacted commercial property.

Though innovations may be pushing the envelope and our lives may be in flux – some things do not change…

One person I admire is Warren Wiersbe, who was quoted as saying

“Methods are many,

Principles are few.

Methods always change,

Principles never do.”

I have worked with a major brokerage firm and a municipality over the last 3 years for a merger and acquisition of a trading firm. I am currently engaged in as a Juniper SME and  a Security Operations Engineer, and working with SMB’s on open source implementations. The projects  I have been working on include Juniper SRX5800 Upgrades, Training, and Cleanup, Junos Space, SkyATP, as well as Linux implementations pertinent to SOC implementation and a Root CA implementation. VPN solutions from Pulse Secure, Fortinet and OpenVPN, load-balancing CVE mitigation for Netscalers and F5 APM, Security implementations of baseline server templates for Linux Centos and Ubuntu CIS Standardization, and deployment of a HSM/Root/Subordinate/CRL/OCSP for an enterprise PKI. The diversity of firewall from Cisco, Juniper, Fortinet, and PFSENSE, as well as the changing dynamic of remote work, and flight from major cities is pushing for more hybrid cloud and remote accessible office locations to be implemented, instructed and managed. Best practices is ongoing, and in regards to both Private and Public Sector clients, the advent of AI and focused APT, will require adaptations to insure everyone is protected, and critical information is protected.

The Below Image is my current workspace, not inclusive of the VMWARE/10GB Network I have to support it. In addition to Assessments, Intrusions and Incidents, the remediation for Security takes planning and coordination to complete across the Enterprise and any organization, no matter how large or small.

The background of a Systems Engineer, Network Engineer, Firewall Engineer and Security Engineer has given me a better understanding on how to leverage technology and apply recommended best practices to build, maintain and harden the Security Apparatus of various organizations.