Summary
Overview
Work History
Education
Skills
Additional Information
Accomplishments
Affiliations
Interests
Timeline
Generic
Pietersen JN

Pietersen JN

IT Management
Cape Town

Summary

Organized and dependable candidate successful at managing multiple priorities with a positive attitude. Willingness to take on added responsibilities to meet team goals.


Ambitiously committed to formulating innovative solutions to challenges while optimizing processes. Polished in developing and implementing security plans and procedures and developing strategies to respond and recover from security breaches. Logical and analytical leader familiar with security tools and technologies.


Watchful professional offering comprehensive, hands-on experience identifying, investigating and responding to information security alerts. Expertise in searching through data-sets to detect threats and anomalies and administering metrics to maintain security processes and controls. Focused on helping businesses safeguard sensitive data from hackers and cyber-criminals.


Results-driven IT professional with notable success in planning, analysis and implementation of security initiatives. Strengths in providing comprehensive network design and security frameworks.


Computer security professional with 23 years of progressive experience in Information Technology & Cybersecurity with proficiency in online security . Demonstrated skill identifying business risks and compliance issues and designing proactive solutions. Background designing and implementing layered network security approaches.

research, planning, execution and maintenance.


Information Security Specialist with passion for aligning security architecture plans and processes with security standards and business goals. Extensive experience developing and testing security framework for cloud-based software. Versed in robust network defense strategies.

Overview

31
31
years of professional experience
7
7
years of post-secondary education
2
2
Languages

Work History

Senior Cyber Security Specialist

Cyber Watchdogs (Pty) Ltd
Cape Town
05.2006 - Current
  • Monitored confidential company data and mitigated hacking through network systems updates.
  • Researched and developed new computer forensic tools.
  • Developed plans to safeguard computer files against modification, destruction, or disclosure.
  • Reviewed violations of computer security procedures and developed mitigation plans.
  • Performed risk analyses to identify appropriate security countermeasures.
  • Monitored use of data files and regulated access to protect secure information.
  • Recommend improvements in security systems and procedures.
  • Encrypted data and erected firewalls to protect confidential information.
  • Monitored computer virus reports to determine when to update virus protection systems.
  • Conducted security audits to identify vulnerabilities.
  • Delivered services to customer locations within specific timeframes.
  • Adaptable and proficient in learning new concepts quickly and efficiently.
  • Self-motivated and strong sense of personal responsibility.
  • Organized and detail-oriented and strong work ethic.
  • Demonstrated leadership skills in managing projects from concept to completion.
  • Demonstrated strong organizational and time management skills while managing multiple projects.
  • Educated and trained users on information security policies and procedures.
  • Implemented security measures to reduce threats and damage related to cyber attacks.
  • Analyzed network traffic and system logs to detect malicious activities.
  • Investigated and resolved incidents of unauthorized access to sensitive information.
  • Executed penetration testing to identify security weaknesses and develop disaster recovery plans.
  • Drafted security reports and metrics to track security performance and strategize improvements.
  • Developed, tested and implemented security policies, plans and procedures for organizational protection.
  • Engineered, maintained and repaired security systems and programmable logic controls.
  • Worked with other teams to enforce security of applications and systems.
  • Administered and monitored firewalls, intrusion detection systems and anti-virus software to detect risks.
  • Designed, installed and configured email encryption gateways with data loss prevention.
  • Liaised with third parties to respond to security events and understand threat landscape.
  • Performed network troubleshooting to isolate and diagnose common problems.
  • Worked with business partners to balance requirements, security and risk reduction.
  • Traveled to client sites to perform onsite testing.
  • Created frameworks by designing and developing technical solutions.
  • Created policies and procedures for emerging security technologies and proposals.

IT Manager

North West Development Corporation
Mafikeng
02.2003 - 04.2006
  • Oversaw IT department operations and training.
  • Managed network and system performance, conducting troubleshooting, security patching, and maintenance.
  • Customized and repaired technology based on staff requests.
  • Coordinated IT operations activities to deliver smooth flow of daily business needs.
  • Guided organizational technology strategy and roadmaps.
  • Developed and implemented measures and procedures to protect IT systems from cyber threats and data breaches.
  • Conferred with executives to advise and plan for short-term and long-term IT system upgrade needs.
  • Updated customers and senior leaders on progress and roadblocks.
  • Assisted in development of long-term strategies to grow department and resources.
  • Demonstrated familiarity with latest hardware, software and networking technology.
  • Interacted and negotiated with vendors, outsourcers and contractors to secure products and services.
  • Oversaw daily performance of computer systems and immediately responded issues to keep network up and running.
  • Collaborated with other departments to help meet IT needs and properly integrate and secure systems.
  • Led technology selection and rollout, focusing on organizational planning and supplier service-level agreements.
  • Built, repaired and installed computer-related hardware based on deployment procedures.
  • Communicated with executive team and CEO to maximize development efficiencies and resolve technology issues.
  • Created and terminated user's accounts from start to finish in business applications.
  • Oversaw development and implementation of improvements to support network operations.
  • Identified computer hardware and network system issues, performing troubleshooting techniques for remediation.
  • Managed life cycle replacement of hardware and software.
  • Analyzed network security and current infrastructure, assessing areas in need of improvement.
  • Coordinated secure system access of users to various department systems and platforms.
  • Implemented and maintained technology and software budget.
  • Liaised with other departments to minimize network interruptions and possible downtimes.
  • Led technical upgrade projects for clients by working and coordinating with consultants and developers for integrations.

IT Consultant

Synergy Accounting
Johannesburg
10.1999 - 02.2003
  • Troubleshot Software and Hardware issues to achieve architecture compatibility.
  • Coordinated efficient large-scale software deployments.
  • Conducted research on network products, services, protocols and standards for network procurement and development efforts.
  • Collaborated with fellow engineers to evaluate software and hardware interfaces.
  • Made recommendations and performed upgrades, assisting businesses in technology planning aligned with growth projections.
  • Inspected equipment, assessed functionality and optimized controls.
  • Recommended and installed upgrades and helped businesses to plan for technology to match growth.
  • Implemented and managed operating systems and software, security systems and intrusion detection systems.

Operations Manager

Dynamic Security Technologies
Johannesburg
04.1995 - 11.1999
  • Established positive and effective communication among unit staff and organization leadership, reducing miscommunications, and missed deadlines.
  • Set, enforced, and optimized internal policies to maintain responsiveness to demands.
  • Identified and resolved unauthorized, unsafe, or ineffective practices.
  • Implemented process improvement to shape organizational culture, optimize procedures for higher efficiency and help company evolve and grow.
  • Introduced new methods, practices, and systems to reduce turnaround time.
  • Negotiated contracts with vendors and suppliers to obtain best pricing and terms.
  • Directed initiatives to improve work environment, company culture or overall business strategy.
  • Developed and implemented strategies to maximize customer satisfaction.
  • Supervised operations staff and kept employees compliant with company policies and procedures.
  • Developed systems and procedures to improve operational quality and team efficiency.
  • Analyzed and reported on key performance metrics to senior management.
  • Developed and maintained relationships with external vendors and suppliers.
  • Led hiring, onboarding and training of new hires to fulfill business requirements.
  • Scheduled employees for shifts, taking into account customer traffic and employee strengths.
  • Reduced budgetary expenditures by effectively negotiating contracts for more advantageous terms.
  • Reported issues to higher management with great detail.
  • Cultivated and strengthened lasting client relationships using strong issue resolution and dynamic communication skills.
  • Trained new employees on proper protocols and customer service standards.
  • Tracked employee attendance and punctuality, addressing repeat problems quickly to prevent long-term habits.
  • Trained and guided team members to maintain high productivity and performance metrics.
  • Handled problematic customers and clients to assist lower-level employees and maintain excellent customer service.
  • Interacted well with customers to build connections and nurture relationships.
  • Mitigated business risks by working closely with staff members and assessing performance.

Police Constable

South African Police Service
Johannesburg
04.1992 - 03.1995
  • Defence sector in Johannesburg/Diepkloof, South Africa
  • Managed crime scenes to protect personnel and preserve evidence.
  • Led shift briefings to inform officers of properties to check and individuals of note in local areas.
  • Confronted and resolved emergency and non-emergency situations.
  • Apprehended suspects, read Miranda Rights, and transported offenders to jail.
  • Protected life and property through enforcement of regulations and laws.
  • Talked regularly with citizens to establish rapport and become familiar presence in area.
  • Patrolled assigned areas to prevent and detect roadway crimes.
  • Delivered expert courtroom testimony to support criminal cases.
  • Led undercover sting operations to target perpetrators of vice crimes.
  • Responded immediately to reports of automobile accidents and criminal activity, calling for additional support as necessary.
  • Prepared and submitted incident reports regarding police activities and investigations.
  • Performed general patrol services and provided traffic control.
  • Booked suspects into custody by processing mug shots and fingerprints.

Education

Cloud Data Security - Cyber Security

University of Minnesota
US
08.2023 - Current

Certified Ethical Hacking - Cyber Security

Infosec For Training And Consulting
Udemy
11.2017 - 12.2017

Certified Information Systems Security Professional (CISSP) - Cyber Security

InfoSec For Training And Consulting
Udemy
02.2009 - 02.2009

ITIL Foundations - Information Technology

New Horizons
Gauteng
02.2009 - 02.2009

Windows Network & O/S Essentials - Information Technology

Torque IT
Gauteng
09.2001 - 10.2001

BackupExec 8.6 For Windows NT/2000 - Information Technology

Veritas
Gauteng
07.2001 - 07.2001

Microsoft Certified Professional - Information Technology

New Horizons
Gauteng
11.1998 - 11.1998

Networking Essentials - Information Technology

Training Connection
Gauteng
07.1998 - 07.1998

A+ - Information Technology

Training Connection
Gauteng
04.1998 - 04.1998

Basic Training - Law Enforcement

South African Police Service
Gauteng
06.1992 - 12.1992

Grade 12/Matric -

Vorentoe High School
Gauteng
01.1986 - 11.1991

Skills

Developing security plans

undefined

Additional Information

  • Code C1 with PrDP
  • Code A
  • Category R Skipper

Accomplishments

I was contracted to design and secure the infrastructure during the development of the payment processing applications hosted on Azure with Hardware Security Modules on AWS.

  • Backup & Disaster Management
  • Security Operations Centers (SOC)
  • Security Incident & Event Management (SIEM)
  • Vulnerability Assessments
  • Penetration Testing
  • Deployment of Security Policies & Protocols
  • Deployment of Security Operations Center & Security Incident & Event Management
  • Continuous monitoring of assets hosted on Azure & AWS

Subcontracted as a Technical Consultant to audit infrastructure stability for Petzetakis Africa.

  • Auditing and reporting of current infrastructure
  • 1st and 2nd Level Support for
  • Microsoft Exchange
  • Blackberry Enterprise
  • ISA Server
  • Active Directory
  • LAN & WAN
  • ERP
  • Windows Server 2003 & 2008
  • VPN
  • Websense
  • Sharepoint Server
  • Edge Server
  • Symantec BackupExec
  • Stabalisation of existing infrastructure
  • Design of to-be infrastructure
  • Develop backup policy and implementation
  • Design of Disaster Recovery and Business Continuity Solution Supplier & vendor management
  • Software Licensing
  • Virtualisation
  • WAN Optimisation and Application Acceleration (Riverbed & Replify)
  • Development and enforcement of Policies and Procedures
  • Reducing licensing cost with R1m per annum
  • Reducing internet usage by 5000 hours
  • Reducing physical server farm from 14 to 6 servers
  • Reducing downtime by 40%
  • Reducing WAN usage by 68%
  • Reducing support staff by 60%

Contracted by Department of Defense to design secure infrastructure for global access to military information.

  • Trained end users on proper security protocol to minimize cybersecurity attacks.
  • Educated management on how to minimize risk of cybersecurity attacks.
  • Developed and implemented security procedures to achieve.
  • Performed comprehensive investigations of security breaches and implemented appropriate solutions.
  • Implemented system recovery procedures to minimize loss of in the event of attack.

Affiliations

  • Microsoft
  • AT&T
  • EC Council
  • Qualys
  • Watchguard
  • CyberShark
  • Rapid7
  • Webroot
  • RSA
  • Tenable
  • IBM
  • F5
  • ESET

Interests

Travelling

Outdoors

Sport

Timeline

Cloud Data Security - Cyber Security

University of Minnesota
08.2023 - Current

Certified Ethical Hacking - Cyber Security

Infosec For Training And Consulting
11.2017 - 12.2017

Certified Information Systems Security Professional (CISSP) - Cyber Security

InfoSec For Training And Consulting
02.2009 - 02.2009

ITIL Foundations - Information Technology

New Horizons
02.2009 - 02.2009

Senior Cyber Security Specialist

Cyber Watchdogs (Pty) Ltd
05.2006 - Current

IT Manager

North West Development Corporation
02.2003 - 04.2006

Windows Network & O/S Essentials - Information Technology

Torque IT
09.2001 - 10.2001

BackupExec 8.6 For Windows NT/2000 - Information Technology

Veritas
07.2001 - 07.2001

IT Consultant

Synergy Accounting
10.1999 - 02.2003

Microsoft Certified Professional - Information Technology

New Horizons
11.1998 - 11.1998

Networking Essentials - Information Technology

Training Connection
07.1998 - 07.1998

A+ - Information Technology

Training Connection
04.1998 - 04.1998

Operations Manager

Dynamic Security Technologies
04.1995 - 11.1999

Basic Training - Law Enforcement

South African Police Service
06.1992 - 12.1992

Police Constable

South African Police Service
04.1992 - 03.1995

Grade 12/Matric -

Vorentoe High School
01.1986 - 11.1991
Pietersen JNIT Management