Web Development and Technical Administration Skills Summary

  • Efficiently managing several projects simultaneously.
  • Real world experience with the web development process.
  • Expert level disk or diskless terminal server and client imaging management.
  • Ability to effectively improvise when faced with mission critical connectivity issues.
  • Thorough understanding of and professional experience designing, developing, maintaining, optimizing, and effectively marketing web sites for small businesses.
  • Experience managing computer workstations on a domain network and efficiently troubleshooting computer hardware and software issues.
  • Expertise with Red Hat, Ubuntu, and Fedora Linux as both a workstation and a multifunctional server
  • Proficient in configuring PXE, TFTPD, and DHCP for RIS and 3Com Boot Services in Windows. LTSP in Linux.
ApplicationsWorkstation SoftwareEducation ManagementAudio ProductionVideo ProductionSecurity Auditing
  • 3Com NBX (VoIP system)
  • Network Supervisor
  • 3Com Boot Services
  • Windows Server 2003 Enterprise
  • Firstclass
  • LANDesk
  • Any VNC or RPD software
  • Symantec Ghost
  • Microsoft Office
  • Open Office
  • Adobe Creative and Master Suites
    • Photoshop
    • Captivate,
    • Flash
    • Fireworks
    • Dreamweaver
    • After Effects
    • Sound Booth
    • InDesign
  • Moodle
  • SASI and ClassXP
  • Integrade
  • Sagebrush InfoCentre
Physical recording of studio quality audio (voice and instrumental).
Mastering of audio recording for use in music production mixes.

Proficient Production Software:

  • Imageline Fruity Loops Studio
  • Steinberg Cubase and Halion
  • Guitar Pro Tablature Editor
  • Vocaloid Vocal Harmony Syntheziser
  • Amplitude, Kontact Guitar Rig, and Waves Mercury
Recording, editing, and mastering deliverable television and online commercial video advertisements.
Configuration of both public and subscription based live and on-demand streaming video.
Completed Certified Ethical Hacker exam study courses. Thoroughly familiar with Back Track Linux tools and applications.

Short Network Security Summary

  • Cracking WEP-WPA passwords
  • Network intrution detection
  • Man in the Middle network credential seizure
  • Manipulating Bluetooth signals to monitor mobile devices
  • Switched network packet sniffing, capturing, and injection
  • Rouge Wifi signal elimination and spoofing
  • Many other common and advanced network forensics and counter-hacking techniques