IT for as long as it has been around has been about availability at all costs. Nearly every ticket at its core was asking to make something available which was not available. Networks, data, printers, you name it; it was about making something available. Availability at all costs. Security only if it doesn’t impeded our ability to make this thing available. This was passable in the 90’s when hacking was rare, but in current times there are Nation State Hackers, Hacktivists and just plain bad people with an internet connection. No longer can you openly share the name of your first pet, the name of your childhood best friend or a list of cars from oldest to newest which you have owned. Yet people still share this information not knowing what they’ve risked. When I say “from availability 1st to security 1st” I’m not suggesting we compromise on availability. I’m suggesting that the ingredient list to a “Good Solution” must begin with the question “Is it secure?”Think of a Good Solution like an established meal with established ingredients. What are those ingredients? Those ingredients are:
Private Sector
-
Vulnerability Remediation SpecialistPrivate SectorGrapevine, Tx, Us
-
Vulnerability Remediation AnalystPrivate Sector Mar 2024 - Jul 2024RemoteIn this role I have been responsible for identification and remediation of vulnerabilities within Windows. I have worked using Logs, SCCM, Right Click Tools to identify and remediate vulnerabilities. Additionally I have used Tenable Nessus to understand severity and best practice in remediation of vulnerabilities. After understanding and gaining experience with frequent vulnerabilities I began using PowerShell scripting to automate much of the remediation process. Lastly, I used SCCM and my… Show more In this role I have been responsible for identification and remediation of vulnerabilities within Windows. I have worked using Logs, SCCM, Right Click Tools to identify and remediate vulnerabilities. Additionally I have used Tenable Nessus to understand severity and best practice in remediation of vulnerabilities. After understanding and gaining experience with frequent vulnerabilities I began using PowerShell scripting to automate much of the remediation process. Lastly, I used SCCM and my understanding of how it works to find issues within the configuration of SCCM which resulted in some vulnerabilities not being auto remediated. After identifying these issues multiple vulnerabilities were automatically remediated from SCCM directly. Show less
-
It Technical AnalystPk-12 School Jul 2022 - Dec 2023Dfw, TexasCybersecurity Skills requirements: OpenVAS NMAP Inventory Management 2FA (configuring 2FA for end users in Google Admin Console) Vulnerability Assessment (CISA reports, other Cybersecurity reports) Vulnerability detection and remediation (CVE and KEV look-ups, OS Patching, Etc.)Other IT Skills I use: JAMF School Addigy JAMF Pro Google Workspace Google Admin Console BASH Scripting (Also… Show more Cybersecurity Skills requirements: OpenVAS NMAP Inventory Management 2FA (configuring 2FA for end users in Google Admin Console) Vulnerability Assessment (CISA reports, other Cybersecurity reports) Vulnerability detection and remediation (CVE and KEV look-ups, OS Patching, Etc.)Other IT Skills I use: JAMF School Addigy JAMF Pro Google Workspace Google Admin Console BASH Scripting (Also ZSH) Logging info Reading logs Assessing and creating/updating procedures Working with vendors to solve issues as detected PC Repair and diagnostics MacBook Air, Pro; iMac, Mac Mini hardware diagnostics MacOS Diagnostics Apple School Manager Apple TV Diagnostic Windows 10 / 11, Microsoft Server 2019 / 2022 Linux (Ubuntu Desktop & Fedora Workstation) Basic Help-desk skills Remote Management Layer 1 & Layer 2 troubleshoot VLAN LAN Cisco Meraki Switches and Firewall Some Layer 3 Troubleshooting Projector Diagnostic Chromebook diagnostic and repair Chrome OS Chrome Browser Etc. Show less
-
Interem Director Of ItPk-12 School Aug 2023 - Oct 2023DfwWork with Administration to: • Collaborate with leadership to identify and prioritize technology initiatives which enhance teaching, learning, and operational efficiency progressing to completion simultaneously with minimal direction • Use my high aptitude for problem solving and the ability to make strategic decisions which align with the organizations objectives • Purchase devices needed for urgent tasks • Create, and alter procedures and protocols to maximize… Show more Work with Administration to: • Collaborate with leadership to identify and prioritize technology initiatives which enhance teaching, learning, and operational efficiency progressing to completion simultaneously with minimal direction • Use my high aptitude for problem solving and the ability to make strategic decisions which align with the organizations objectives • Purchase devices needed for urgent tasks • Create, and alter procedures and protocols to maximize efficiency across the organization as it pertains to technical duties • Stay current with Cybersecurity best practices and implement necessary measures to prevent data breachesWork with non Admin employees to: • Delegate tasks to those who are capable ◦ Provide adequate training when needed for the up-skilling necessary to complete new tasks • Provide training and support for teachers and staff on effective technology integration • Quickly develop learning materials for business processes which were unnecessarily IT’s responsibility ◦ Assign ownership of this task to correct business department and offer support during the on-boarding of new responsibilitiesAdditional duties as needed including: • Enterprise Networking, including: ◦ installation, maintenance, support and diagnostics of TCP/IP networks, managing IT equipment and service vendors. • Strong analytical and logical problem solving skills including: ◦ identify technical problems, resolve technical problems • Proficient with Windows, MacOS, iOS, and Chrome OS • Leveraging my experience with system development, complex project management, knowledge of Cisco and other networking hardware, Internet/intranets, and LAN/WAN network architecting • Exceptional communication and interpersonal skills for effective collaboration with diverse stakeholders, employees, & others • Leadership and mentoring of those in my circle of influence, both direct and indirect Show less
-
Technical Support SpecialistPublic School System, Washinton State Dec 2020 - Jun 2022Washington, United StatesTier 1 tech supports for a medium sized school district1:1 devices for teachers and studentsSole tech support for multiple schoolsOS updates (MacOS)Basic device troubleshooting
-
Computer TechnicianPrivate Repair Shop Nov 2020 - Jan 2021Washington, United StatesDiagnose and repair Windows PCs and MacsBuild custom order PCs
-
Technology ConsultantBig Box Retail Sep 2018 - Nov 2020Washington, United StatesUnderstand and diagnose customer technology needsSuggest accurate solutions-even if solution is free
-
Freelance ItSelf Employed Jan 2011 - Dec 2019Washington, United StatesData Back Up Data Back up and Restore Basic Linux-Ubuntu Basic Electrical diagrams -
Manager-ContractStart Up Jan 2018 - Mar 2018Washington, United StatesBuild up the foundation of a repair facility, produce training materials for new hires and train new hires.Build up shipping and receiving department, produce training materials and train new hires.
-
Tech Dept ManagerBig Box Retailer Jan 2005 - Mar 2011Washington, United States
Frequently Asked Questions about Jonathan Barker
What company does Jonathan Barker work for?
Jonathan Barker works for Private Sector
What is Jonathan Barker's role at the current company?
Jonathan Barker's current role is Vulnerability Remediation Specialist.
Not the Jonathan Barker you were looking for?
-
Jonathan Barker
Fairfax, Ca4yahoo.com, hotmail.com, hotmail.com, thomvest.com17 +165078XXXXX
-
1strangcorp.com
-
3projekt202.com, freshtilledsoil.com, gmail.com
-
Jonathan Barker
Student At The Eller College Of Management At The University Of ArizonaPark City, Ut -
Jonathan Barker
Austin, Texas Metropolitan Area4atlassian.com, bazaarvoice.com, menlosecurity.com, atlassian.com3 +141570XXXXX
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial