Networking Technologies

I am proficient in a range of networking technologies, including DNS, DHCP, TCP/IP, and Unified Threat Management.

Firewall Management

My expertise in firewall management spans various platforms such as Fortinet, Sonicwall, and Cisco. I specialize in creating firewall policies, advanced routing, P2S and S2S VPNs, web filtering, application control, SSL inspection, and IDS/IPS.

Cloud Computing

I have hands-on experience with Azure Cloud, excelling in designing and implementing network solutions. My approach involves understanding customer requirements, exploring alternative solutions, discovery services, and meticulous planning to minimize downtime during implementation.

Linux Servers

Familiar with various Linux distributions, including NixOS, Gentoo, Ubuntu, and CentOS, I leverage Linux for my home appliances and solutions.

VPN Configurations

Proficient in all types of VPN configurations, I ensure secure and efficient setups through granular phase2 encryption domains, high-level encryption algorithms, and firewall policies allowing only necessary traffic through the VPN.

Switching and Routing

My switching management skills include setting up VLANs, trunking, link aggregation, and port security, primarily on Cisco and Meraki devices. In router management, I handle static routing, policy routing, dynamic routing using BGP and OSPF, and the setup of BGP route maps and route filters.

Network Design

I play a significant role in network design for projects, particularly in migrations from on-premises environments to the cloud and in enhancing redundancy for office connectivity.

Monitoring and Management Tools

I utilize various tools for network monitoring and management, including PRTG, Solarwinds, Zabbix, Cacti, and Netdata.

Collaboration Tools

Familiar with collaboration tools such as Microsoft Teams and GitHub, I integrate versioning into play for effective collaboration.

Network Security

My approach to ensuring network security involves a granular, zero-trust model. I implement firewall policies and web security profiles with meticulous attention to detail, allowing clients to choose preferences while providing recommendations.

Stay Informed

I stay informed about the latest security protocols and best practices by actively reading news and subscribing to RSS feeds regarding CVEs.

Documentation

Thorough and detailed documentation is a cornerstone of my work. I create low-level network diagrams and written documents to ensure comprehensive documentation for continued support in the ever-evolving IT landscape.

Importance of Documentation

In the context of network solutions, documentation is paramount. It serves as a foundational resource for continued support, aids in troubleshooting, and ensures security compliance in an increasingly complex IT environment.