GIAC Certification
GIAC Certified Information Assurance ConsultantsInformation Assurance (IA) is defined by the U.S. DoD as "development, operation, management, and enforcement of security capabilities for systems and networks." Global Information Assurance Certification (GIAC) was established in 1999 to test and certify the knowledge and experience of computer security experts in various fields of information assurance. GIAC certifications are recognized globally by industry, military and government institutions including the United States National Security Agency (NSA). GIAC certifications require candidates to complete rigorous testing to demonstrate their depth of skills in specific knowledge areas, not just general computer security knowledge. Areas covered by GIAC certifications include audit, intrusion detection, incident handling, firewalls and perimeter protection, forensics, hacker techniques, Windows and Unix operating system security, plus secure software and application coding

Progent's security consultants have earned GIAC certification in key areas of information assurance. Progent offers online information assurance services from GIAC-certified consultants and can provide onsite IA expertise in major metropolitan areas throughout the U.S. By offering affordable rates and the highest level of expertise, Progent can give small and mid-size businesses the same quality of information assurance once available only to the largest enterprises and institutions.

Areas of proven expertise available from Progent's GIAC-certified security consultants include:

Progent's GIAC-certified information assurance experts can also work with Progent's Cisco-certified CCIE network infrastructure consultants to help organizations design, deploy and operate a comprehensive security information and event management (SIEM) solutions.

Auditing Networks, Perimeters, and Systems
Progent's security consultants who have obtained the GIAC Systems and Network Auditor (GSNA) credential understand the best practices, system analysis, and forensics required to perform thorough network security audits that can uncover a wide range of known threats and vulnerabilities. Progent can also help you build appropriate countermeasures and defenses based on realistic risk assessment in order to provide ongoing protection for your information system. Specific network security auditing services offered by Progent's GIAC-certified information assurance consultants include:

  • Conduct detailed router audits
  • Test the Firewall for OS configuration, firewall configuration, and system administration
  • Test firewall policies for vulnerabilities, packet flow from all networks, and change control
  • Assess third-party software encryption, authentication, virus scanning, and URL redirection
  • Review logs and alerts from the Intrusion Detection System (IDS) and Firewall
  • Deploy router analysis tools such as Router Audit Tool (RAT), scanning tools such as Nmap, packet building tools such as -Hping2 and Nemesis, sniffers such as Wire Shark, and IDS auditing tools such as Fragroute
  • Audit wireless security including 802.11b security issues and LEAP/PEAP authentication using wireless auditing tools such as WSA, Airopeek, and Net Stumbler
  • Map your network from inside and outside your Firewall and auditing perimeter defenses
  • Perform penetration tests
  • Audit configuration of key network services such as DNS and SMTP
  • Check database security for Microsoft SQL, MySQL and Oracle
  • Identify security weaknesses for web-enabled services and applications
  • Evaluate web application architectures and infrastructures
  • Look for web-based phishing, resource exhaustion, buffer overflows, hidden form elements, and unexpected user input
  • Audit web application user sign-on and sign-off process, session tracking, and management
  • Audit Windows-based systems focusing on patch levels, network based services, local services, installed software, security configuration, group policy management, plus log aggregation, management and analysis
  • Perform event reconstruction if necessary
  • Sarbanes-Oxley and Graham-Leach-Bliley compliance
Progent offers a selection of value-priced service packages for assessing the vulnerability of your network to attack. For small organizations, Progent offers two security inventory scanning packages, an External Security Inventory Checkup for evaluating the security profile of your web-facing resources and an Internal Security Inventory Scan to determine the risk from attacks from within your firewall. For larger organizations, Progent offers variety of set-price security evaluation service packages to help verify that security policies and systems meet compliance and regulatory requirements.

Incident Handling and Response
Security professionals who have earned the GIAC Certified Incident Handler (GCIH) credential have demonstrated in-depth knowledge of the current threats to systems and networks, along with effective countermeasures. Progent's GIAC-certified security engineers have the knowledge and experience to manage incidents, understand common attack techniques and tools, defend against and respond to attacks when they occur, and detect security gaps in your environment. Additionally, Progent's GIAC-certified information assurance consultants are sensitive to legal issues associated with responding to computer attacks, including employee monitoring, working with law enforcement, and handling evidence.

Progent's incident handling experts can offer consulting assistance both on how to respond to a security incident and how to understand and foil the techniques used by hackers to penetrate your network.

Responding to a Security Incident
Progent's information assurance consultants can help you plan and implement a precise step-by-step procedure for responding to successful network attacks or to physical incidents such as fires, floods and crime. By putting in place a proven and well-defined methodology for incident handling, your company will be able to get systems and services back online as quickly and securely as possible. The step-by-step incident response model recommended and supported by Progent covers these phases:

  • In the Preparation Phase, you create a set of tools to use as an incident response Jump Kit, identify the core team of responders, and deploy appropriate instrumentation for your site and system
  • In the Identification Phase you report signs of an incident, take the first steps to control it, and establish a chain of custody so that no relevant information or evidence is lost or unreported
  • In the Containment Phase you implement predetermined video and audio documentation strategies, execute containment and quarantine procedures, pull the network cable and switch if required, and identify and isolate the Trust Model
  • In the Eradication Phase you evaluate whether a backup is compromised, totally rebuild the Operating System if required, and if necessary move to a new architecture
  • In the Recovery Phase you determination who makes the decision to return to production, monitor the system, and prepare for increase in attacks
  • For Special Incidents such as espionage, inappropriate use, or sexual harassment, take appropriate actions determined by the type of incident
  • In the Incident Record Keeping Phase you complete legally acceptable pre-built forms to document and report the incident
  • In the Incident Follow-Up Phase you conduct a lessons-learned meeting and define appropriate changes in process for the future
Understanding and Defeating Hacker Techniques
Networks invariably expose substantial amounts of information that can assist potential attackers. In addition to looking for information leakage, attackers also run scans of systems to find security gaps such as weak DMZ systems and firewalls or unsecured wireless LANs. Popular hacking techniques include inverse scanning, blind scans, and bounce scans that obscure their source. Attackers also try to understand and manipulate firewall rule sets and evade Intrusion Detection Systems. Progent's information assurance consultants who hold the GIAC Certified Incident Handler credential can help you understand contemporary hacking techniques in detail so you can take appropriate countermeasures to protect your network. Some of the hacking techniques that Progent can help you understand and defend against include:
  • Network-level Attacks such as session hijacking (from Telnet to SSL and SSH), person-in-the-middle attacks, and passive sniffing
  • Gathering and Parsing Packets via active sniffing through ARP cache poisoning and DNS injection, DNS cache poisoning to redirect traffic on the Internet, using Netcat for backdoors and Nasty Relays, and IP Address spoofing
  • Operating System and Application-Level Attacks utilizing buffer overflows, the MetaSploit Exploitation Framework, the Perl Exploit Library, and format string attacks to exploit vulnerabilities in Windows
  • Netcat-based Attacks for transferring files, creating backdoors, shell shoveling, setting up relays to obscure the source of an attack, and launching replay attacks
  • Password Cracking with L0phtCrack and John the Ripper
  • Web Application Attacks for account harvesting, SQL Injection to manipulate back-end databases, session cloning to grab other Users' web sessions, and cross-site scripting
  • Denial of Service Attacks involving distributed Denial of Service, pulsing zombies and reflected attacks, Local Denial of Service, SYN floods and smurf attacks using spoofed broadcast ping messages
  • Maintaining Unauthorized Access by creating backdoors using QAZ and Tini, using application-level Trojan Horse Backdoor suites such as VNC and SubSeven, using rootkits to substitute binary executables with malware, and using kernel-level rootkits such as Adore and KIS to compromise the operating system
  • Covering the Attacker's Tracks via file and directory camouflage and hiding, log file editing, accounting entry editing of UTMP, WTMP, and Shell Histories, establishing covert channels over HTTP, ICMP, TCP and other protocols, and hiding data in images, music, binaries, or other file types
Intrusion Detection and Traffic Analysis
Progent's information assurance consultants who have been awarded the GIAC Certified Intrusion Analyst (GCIA) credential are familiar with the arsenal of scans, reconnaissance techniques, and network exploits used by the attack community and can help your company with comprehensive intrusion detection and traffic analysis to make sure your network information remains protected. Progent's security professionals have an expert understanding of the workings of TCP/IP, methods of network traffic analysis, and troubleshooting all types of networking complaints from routing problems to firewall and critical server issues. Intrusion detection and traffic analysis techniques and issues familiar to Progent's GIAC-certified security consultants include:
  • In-depth understanding of the TCP/IP Communication Model
  • Fragmentation
  • Core Internet protocols such as Internet Control Message Protocol (ICMP)
  • Stimulus and Response
  • Microsoft Networking and Security
  • Domain Name System (DNS)
  • Routing
  • The IPsec (Internet Protocol Security) suite of Internet security protocols
  • Use of the TCPdump tool to examine Datagram Fields
  • Analysis of TCPdump Output
  • Using the Snort network intrusion detection system
  • Traffic patterns and analysis
  • Interoperability and standards in intrusion detection
  • Passive analysis techniques
  • Identifying crafted packets
  • In-depth protocols analysis
  • Advanced Analysis Profiling Techniques
  • Reducing false-positives
  • Identifying Denial-of-Service activity
  • IDS/IPS architecture and implementation techniques
  • Event correlation and common attack techniques
Web Application Security
The GIAC Web Application Security (GWAS) credential focuses on the latest tools and techniques used in designing and testing web applications that deliver data reliably to authorized users while protecting your information from unauthorized ones. Progent's GWAS-certified consultants have hands-on experience using current tools to detect and prevent cross-site scripting (XSS), and SQL Injection as well as an in-depth understanding of authentication and session management systems and their weaknesses and how they are best defended. Progent can help you ensure that your web applications are securely designed and thoroughly tested before they are released to your production environment or used by your clients. Technical areas where Progent's information assurance consultants can provide expertise for web application development and testing include:
  • Securing web application architectures and infrastructures
  • Cryptography
  • Authentication
  • Access control
  • Session mechanism
  • Web application logging
  • Input issues and validation
  • SQL injection due to incorrect escape character filtering, type handling, etc.
  • Cross-Site Scripting
  • Phishing attacks for unauthorized information gathering such as name and password harvesting
  • HTTP Response Splitting
  • Cross-Site Request Forgery
  • Resource exhaustion
  • Buffer overflows
  • Hidden form elements
  • Unexpected user input
  • User sign-on and sign-off process
  • Session tracking and management
  • GET vs. POST
  • Improper Server Logic
  • Web Browser Security
  • Server-side Techniques for Protecting Sensitive Data
Reverse Engineering Malware
Progent's information assurance consultants who have earned the GIAC Reverse Engineering Malware (GREM) credential have the skill to guard organizations against malicious software by reverse engineering malware code that attacks widely deployed platforms such as Microsoft operating systems and browsers. By performing in-depth analysis of the mechanisms used by malicious code to carry out attacks, GREM-certified consultants can help organizations to defend against future threats. Services available from Progent's GREM-certified information assurance experts include:
  • Analyze malicious document files
  • Analyze the techniques used by malware attacks to prevent malicious software from being scrutinized
  • Analyze web-based malware
  • Examine static Windows malware code in x86 assembly language
  • Analyze complex malicious scripts in web browsers
  • In-depth analysis malware executables
  • Utilize memory forensics techniques to analyze threats
  • Deploy debuggers, disassemblers, sniffers, and other tools to analyze malware behavior
  • Reverse engineer Windows malware code at the x86 assembly level
Security Information and Event Management (SIEM) Solutions
Security information and event management (SIEM) solutions combine SIM (Security Information Management) and SEM (Security Event Management) functions to enable comprehensive analysis of security alerts generated by network appliances and applications. Appliances can include firewalls, routers, intrusion detection systems (IDS), intrusion prevention systems (IPS) and other security hardware. The massive amounts of information created by these devices can be managed by SIEM software products, available from vendors like SolarWinds, ManageEngine, and many others. SIEM software collects logs from multiple devices, normalizes the log messages into a common data format, correlates logs and events from various systems and applications, aggregates the data to remove duplicate event records, and produces reports that allow organizations to comply with regulatory requirements for monitoring and reporting security incidents.

Progent's certified security experts and Cisco CCIE network infrastructure consultants can help you plan, deploy, tune, manage and troubleshoot your SIEM ecosystem so you can meet the security and compliance standards that apply to your business or institution.

Additional Industry Certifications Earned by Progent's Security Engineers
In addition to providing the assistance of security experts with GIAC Global Information Assurance Certification credentials, Progent also offers the expertise of CISM-certified security management consultants, CISSP-certified cybersecurity experts, CISSP-ISSAP-certified security architecture professionals, CISA-certified information system security auditing specialists, and CRISC-certified risk management consultants.

If you're trying to find computer security help, phone Progent at 800-993-9400 or visit Contact Progent.



An index of content::

  • After Hours Edmonton Remote Workforce Cybersecurity Solutions Consulting Services Alberta Edmonton Teleworkers Consultants in Edmonton - Network Security Solutions Consulting
  • Best Internet Access Consultancy Comcast Business Class Cable Internet Professionals
  • Birmingham Work at Home Employees Data Protection Technology Consultants Birmingham Alabama Birmingham Offsite Workforce Backup/Recovery Systems Consultants
  • BlackBerry BES Installer Akron Ohio RIM BlackBerry Software Consulting Akron, OH
  • BlackBerry Desktop Manager Network Support Technician Austin Texas BlackBerry BES Online Support Services
  • BlackBerry Enterprise Server IT Consultant 24-7 BlackBerry Synchronization Computer Consultancy Firms Rochester, Monroe County, U.S.A.
  • GIAC Information Assurance Firewall Setup
  • BlackBerry Redirector Information Technology Consulting Group Montgomery Alabama BlackBerry Enterprise Server Software Support Montgomery

  • CRISC Certified Risk and Information Systems Control Manager Consulting Services
    Consultant Services CRISC Certified Risk and Information Systems Control Systems Engineer

    Progent offers the services of a CRISC-certified risk management expert to assist you to design and deploy an enterprise risk management (ERM) solution following best practices identified by CRISC and geared to align with your organization's risk tolerance, business objectives, and IT budget.

  • BlackBerry Redirector Migration Companies BlackBerry BES Server Networking Organization

  • Consulting for Service Providers Online Consulting
    IT Services for Service Providers Computer Consultant

    Progent's Support for IT Service Firms lets you use Progent's information technology engineers while retaining your own service brand as a transparent arm of your network services staff.

  • CISA Certified Security Expert Miami Beach Help Center Miami Beach Support Company

  • 24x7 Microsoft Windows 8.1 Upgrade Small Business Server Support
    Windows 8.1 Backup and Restore Integration Support

    Windows 8.1 is engineered to power devices ranging from smart phones and tablets to engineering workstations. An abundance of new and improved capabilities, such as touch screen support and iconic live tiles GUI, offer a wide range of benefits for organizations who understand how to put them to work. Progent's Windows experts can help get your business up the learning curve with Microsoft Windows 8.1 and show you how to derive significant business advantage from the operating system's many new and enhanced technologies.

  • Computer Support Windows Server 2019 Ottawa Experts Windows 2019 Server
  • Consultants VMware Site Recovery Manager and NetApp VMware vCloud Director vCD Specialists
  • Consulting Experts for Computer Support Companies near me in Shreveport - Transparent Short-Term Support Team Expansion Shreveport Consulting for Shreveport Network Support Organizations

  • Exchange Server 2016 Migration Consultant
    Exchange Server 2016 Migration Planning Integration

    Progent can assist your business in all phases of your migration to Microsoft Exchange Server 2016 such as designing HA system topology for a local, Microsoft cloud connected or hybrid deployment; server and CAL licensing compliance for Exchange 2016 Server and Windows Server 2012 R2+; migrating mailboxes; Hyper-V strategy; specifying storage requirements for your VMs, mailbox databases and logs; setting up hardware load balancing for high-availability CAS services; planning, setting up and validating Exchange and Windows Servers and DAG groups; setting up collaboration with SharePoint; updating your firewall; creating SSL certs; providing client remediation with Office 2010 or greater or Microsoft Office 365; and setting up Outlook on the web (formerly Outlook Web App).

  • Cybersecurity Consultancies Firewall 24x7 Firewall Cybersecurity Firms
  • Cybersecurity Organization GIAC Certified Information Assurance
  • Durham Ransomware Remediation Services 24/7 Durham Crypto Recovery Durham County North Carolina
  • Dynamics GP-Great Plains Reseller near Denver - Reporting Support Services Denver Mile High City Dynamics GP (Great Plains) Denver Vender - Migration Support Denver Aurora , United States
  • Folsom Networking Firms Arden Networking Company
  • Freelancing Jobs Compensation for Cisco Consultants Home Based Microsoft Consulting Part-Time Jobs
  • Grand Rapids NotPetya Crypto-Ransomware Identification and Restoration Glendale Grand Rapids 24x7 CryptoLocker Recovery Experts Glendale, CA

  • Support Outsourcing Office SharePoint Server 2010
    Microsoft Office SharePoint Server 2019 Consulting

    Progent's Microsoft-certified experts can show you how to evaluate the economic justification for implementing SharePoint 2007, advise you on the most sensible version of Microsoft SharePoint for your circumstances, offer setup and integration services, assist you to set up MS SQL Server as a back-end database, improve your network infrastructure, integrate your off-the-shelf and custom application software to work with SharePoint Server 2007, design a comprehensive security plan that incorporates portal solutions, and provide maintenance and Help Desk services.

  • Information Technology Consulting SonicWall TZ300 Firewall Auditing SonicWall NSA 9650 Firewall

  • Emergency Infor SyteLine CloudSuite Financial Analysis Consultant Services
    Engineers Infor CloudSuite

    Infor CloudSuite Industrial, formerly known as SyteLine, is an ERP platform that embodies more than a quarter century of background assisting manufacturing and distribution organizations to manage complex supply chains and streamline critical business processes to bring products to market quickly and meet customer schedules dependably. Progent can provide the skills of an ERP consultant with over two decades of experience working with the Infor CloudSuite Industrial/SyteLine platform. Progent can provide remote or on-premises consulting that spans from occasional advice to solution design and project management. Sample consulting services available from Progent for Infor CloudSuite Industrial include implementation, upgrades, process improvement, customization, CPQ, web site integration, troubleshooting, data conversion, Excel and SQL integration, disaster recovery planning, and database administration.

  • Consulting Services Network Traffic Analysis
  • Integration Specialist Cisco Pleasanton, CA Pleasanton, Alameda County 24x7 Cisco Network Support Companies
  • Jundiaí-Indaiatuba Computer Networking CISA Certified Security Expert Jundiaí-Indaiatuba Service Provider
  • Memphis Remote Workers Collaboration Systems Assistance Memphis, TN Memphis Teleworkers Collaboration Solutions Consulting Memphis Tennessee, United States
  • Microsoft Expert Exchange Server 2010 Upgrade Setup and Support Exchange Server 2010 Upgrade Professionals

  • IT Consultant Exchange 2013 Disaster Recovery
    Exchange 2013 Upgrade Consulting

    Exchange 2013 incorporates major enhancements to the functionality of Microsoft Exchange Server 2010 and delivers important innovations as well as a revamped structure. These improvements favorably impact key areas like ease of administration, availability, security and compliance, operational costs, collaboration, extensibility, throughput, cross-version interoperability, and productivity. Progent's Microsoft-certified Exchange 2013 consulting professionals can help you understand the potential business benefits of migrating to Exchange 2013, create a cost-effective validation and deployment strategy, and educate your IT staff to maintain your Exchange 2013 environment. Progent also offers ongoing remote consulting and management for Microsoft Exchange Server 2013.

  • Microsoft Windows Server 2019 Computer Setup Beverly Hills-Bel Air, CA Windows Server 2012 R2 IT Specialists Beverly Hills-Westwood, CA

  • Amazon Web Services integration Designer
    Microsoft Certified Expert Amazon AWS cloud services integration Programming Firms

    Progent can provide affordable remote consulting to help companies to access Amazon Web Services (AWS) cloud services such as Elastic Compute Cloud (EC2) for virtual server hosting, Amazon Simple Storage Service (Amazon S3), and Glacier. Progent can assist you with every phase of Amazon AWS migration and troubleshooting including requirements analysis, preparedness assessment, system design, testing, deployment, centralized administration, performance tuning, licensing management, backup/restore solutions, and security and compliance.

  • Microsoft and Cisco Certified New Orleans Remote Technical Support New Orleans Network Repair Service
  • Nebraska Security Security Company Security Firewall Support Omaha, Lincoln, Bellevue, NE

  • Dynamics GP BizTalk Adapter Engineer
    Consulting Services Dynamics GP Web Services

    Progent's expertise delivering Microsoft .NET support and SQL Server help, and Progent's application development experience with Microsoft VBasic, XML, and other developer tools enable Progent to design custom line-of-business programs and eCommerce environments that operate seamlessly with Dynamics GP/Great Plains Software. Progent's Microsoft Dynamics GP/Great Plains reporting consultants can show you how to design reports that allow you to analyze your business more effectively, turning uncooked information into useful understanding of your business.

  • Offsite Workforce Lubbock Consultants - Set up Expertise Offsite Workforce Consultants - Lubbock - Connectivity Solutions Consultants Lubbock County Texas
  • Online Troubleshooting Exchange Server 2013 Petaluma Petaluma, CA 24-Hour Exchange Server 2010 Onsite and Remote Support
  • Onsite Technical Support Windows Server 2016 PowerShell Windows Server 2016 High Availability Technology Consulting Services

  • Exchange 2010 Upgrade Consult
    Exchange Migration Specialist

    Progent's Microsoft-certified network engineers can help your organization to determine the value of Microsoft Exchange 2010 for your business and can assist your IT staff to plan and implement an efficient migration to Exchange 2010 from Exchange Server 2003 or Microsoft Exchange 2007 Server that will provide quick ROI by increasing your workers' efficiency, cutting the expense of hardware and service, simplifying management, and consolidating your key communications platforms.

  • Network Intrusion Detection Computer Security
  • Ottawa, Ontario Work at Home Employees Assistance - Ottawa - Management Solutions Assistance Ottawa Offsite Workforce Management Systems Consulting Experts
  • Phone Support Cisco Morgan Hill, CA Morgan Hill Santa Clara County Cisco Computer Consulting Company
  • ProSight Email Security Consultant Services Email Link Protection Specialists

  • ProSight Remote Network Infrastructure Troubleshooting Network Consultants
    Emergency Network Performance Troubleshooting Online Troubleshooting

    ProSight WAN Watch is a network infrastructure monitoring and management service that makes it easy and inexpensive for small and mid-sized organizations to diagram, track, reconfigure and debug their networking hardware such as routers and switches, firewalls, and load balancers as well as servers, printers, client computers and other devices. Incorporating cutting-edge RMM technology, WAN Watch makes sure that network diagrams are always current, captures and displays the configuration of virtually all devices connected to your network, monitors performance, and generates notices when potential issues are detected. By automating complex management and troubleshooting processes, WAN Watch can cut hours off common chores like network mapping, reconfiguring your network, finding appliances that need important updates, or isolating performance problems.

  • ProSight Private Cloud Services Consulting ProSight Virtual Server Private Cloud Hosting Professionals
  • Redhat Linux Technology Consulting Mandriva Linux Consultancy
  • Service Part-time CIO Microsoft CRM Support and Integration
  • Urgent Security Information and Event Management Engineers
  • SharePoint 2010 IT Consulting Pittsburgh, PA, United States 24/7 SharePoint Server 2010 Integration Services Pittsburgh Pennsylvania
  • Small Business 100 AP Technology Consulting Remote Consulting Small Business WAP150
  • Support Microsoft SharePoint Server 2010 Sioux Falls, SD Sioux Falls Emergency SharePoint Server 2019 Remote Troubleshooting
  • Teleworkers Allentown Consulting Services - Management Solutions Consulting and Support Services Allentown Work at Home Employees Guidance near Allentown - Management Tools Assistance Allentown, Lehigh County
  • Teleworkers Consultants in Morgan Hill - Video Conferencing Systems Consulting Gilroy CA Morgan Hill California Offsite Workforce Morgan Hill Consulting Services - Voice/Video Conferencing Systems Consulting Experts

  • Microsoft Teams work from home Consultant
    Technology Professional Microsoft Teams firewall

    Progent can assist your business to plan a migration to Teams from Skype for Business or Lync Server and install, administer, and debug a cloud or hybrid implementation of Microsoft Teams. Progent can help you to connect Teams with Microsoft 365 apps, Exchange Online, SharePoint Online, and your PBX.

  • Teleworkers Consulting Services near Manhattan Beach - Infrastructure Consultants At Home Workers Assistance near me in Manhattan Beach - Infrastructure Expertise Manhattan Beach-Inglewood
  • Toronto 24-7 Toronto Work at Home Employees Collaboration Technology Consulting and Support Services Remote Workforce Toronto Consulting Experts - Collaboration Systems Assistance Toronto, ON
  • Unified CM Network Engineer Unified Mobility Network Engineer
  • GIAC Security and Compliance Test Consulting
  • WatchGuard XTM Firewall Compliance Auditor Firewall Support WatchGuard Firebox T-Series Firewall
  • Windows 7 Upgrade Network Engineer Microsoft Windows 7 Evaluation Network Engineer
  • Windows Server 2012 R2 Network Consulting Leeds, Great Britain Administration Windows 2008 Server York
  • Specialists Security Incident Response

  • © 2002-2021 Progent Corporation. All rights reserved.