Jeff Trnka, Cissp

Jeff Trnka, Cissp Email and Phone Number

Senior Security Engineer at Credigy @ Credigy
Jeff Trnka, Cissp's Location
Duluth, Georgia, United States, United States
Jeff Trnka, Cissp's Contact Details
About Jeff Trnka, Cissp

Over 20 years of experience in the IT industry covering everything from basic PC and Server troubleshooting, to advanced networking. I am focused on security and I want to continue working in the Information Security and Network Security fields.I have worked as a Security Architect, a Security Engineer, in Security Operations, and in Helpdesk roles. I have been responsible for deploying, upgrading, or replacing critical systems such as edge firewalls, VPN endpoints, public DNS servers, and email spam/virus scanners with no unscheduled down time.Specialties:Palo Alto, Juniper, Cisco, and Netscreen firewall maintenance and administrationIdentity management with Active Directory, Cisco ACS, Cisco ISE, and RSA SecurID.SSL VPN and Site-to-Site VPN configuration and maintenanceConfiguration and maintenance of basic network services like DNS (bind), NTP, SNMP, Syslog, etc.Antivirus configuration, deployment to desktops and servers, and supportTippingPoint IPS for security and monitoringSolaris, RedHat (and it's variations) administrationNexus SwitchesPCI and SAS70 CompliancePHP scripts to automate tasks, access API data for monitoring/trending, enabling users to handle tasks on their own

Jeff Trnka, Cissp's Current Company Details
Credigy

Credigy

View
Senior Security Engineer at Credigy
Jeff Trnka, Cissp Work Experience Details
  • Credigy
    Senior Security Engineer
    Credigy Dec 2018 - Present
    Atlanta, Ga, Us
  • Fiserv
    Advisory Security Engineer
    Fiserv Jul 2016 - Dec 2018
    Milwaukee, Wisconsin, Us
    When I started at Fiserv there were no Palo Alto firewalls. At my 2-year mark Fiserv had 28 HA firewall pairs managed by an HA Panorama deployment. I built out the security layer of a new data center using Palo Alto firewalls and started the conversion process from Check Point firewalls to Palo Alto firewalls in two existing data centers. These new deployments support a project to consolidate 40+ data centers across the country into 3 primary facilities.The Palo Alto infrastructure is tied into VMware vCenter and NSX using Security Groups and tags for dynamic address groups. This allows us to deploy applications faster, and decrease our time-to-market. Fiserv had deployed just over 19,000 VMs before this consolidation project, with this automation we have already deployed over 8,000 VMs in under two years.I built a middleware PHP script that verifies Security Groups and VM IPs in NSX are in sync with the data in Panorama.I wrote a web-based application that allows our Operations personnel to manage External Dynamic Lists (EDLs) on the Palo Alto firewalls. EDLs are used for things like blacklists and whitelists. They allow policy updates without the need to commit the changes allowing us to take action faster.I wrote a web-based application that allows any user to run a check against the Palo Alto firewalls to see if a policy is in place to allow their traffic. This makes it easier for the Operations teams to validate stuff on their own and not need to engage the Engineering teams.
  • Cox Automotive Inc.
    Senior Network Engineer
    Cox Automotive Inc. Jun 2013 - Jul 2016
    Atlanta, Ga, Us
    My primary responsibilities are the Palo Alto and Juniper firewalls. I brought 90+ Palo Alto firewalls that are deployed to our auctions and core locations into our Panorama management server. I cleaned up all of the local policies and set up templates and base configurations that we use to centrally manage all of these devices. I moved our Juniper SAs (SSL VPN) from Active Directory to LDAP for back end authentication and cleaned up the group mappings allowing for easier management of user access. I cleaned up and manage the Cisco ACS 5 cluster that handles authentication for 3000+ routers, switches, firewalls, F5s, and other network equipment. I set up LDAP authentication to the Auto Trader and Manheim Active Directory servers to allow employees of both companies to be able to log in and manage all of our network gear. Worked with the team to get Firemon configured and deployed to monitor all of our firewalls across the enterprise.
  • Cox Communications
    Senior Information Security Engineer
    Cox Communications Jan 2012 - Jun 2013
    Atlanta, Ga, Us
    I worked with a team of talented individuals on Cisco ASA firewalls, Juniper SRX firewalls, Juniper SA SSL VPN devices, Netscreen firewalls, Palo Alto firewalls, and TippingPoint IDP systems. I was primarily responsible for managing our RSA Authentication Manager 7.1 platform and working on new firewall requests. I managed our internal certificate authority and I improved on and created some internal monitoring and trending tools.
  • Cox Communications
    Wireless Security Engineer (Cellular)
    Cox Communications Sep 2009 - Jan 2012
    Atlanta, Ga, Us
    Responsible for the day-to-day operation of the wireless (3G) data core for Cox Communications. This involved Juniper firewalls, Bridgewater AAA software running on Solaris 10 servers, and Starent/Cisco PDSN/HA devices. Create and manage firewall rules and point to point VPNs for vendor connectivity, running security scans on wireless data core equipment, monitoring the heath of the data core, and generating KPIs for management.I was the primary engineer in the upgrade of our Bridgewater AAA servers. The engineering group would coordinate conference calls with the vendor where they would ask questions and I would make configuration changes on the server to get things up and running. This included such things as network settings, routing, DNS, RSA integration, etc.I wrote a web-based portal (in PHP/Apache/MySQL) that allows all levels of support to view handset and aircard information allowing them to troubleshoot issues faster and get the customer up and running in less time. This portal also monitors the health of our equipment and sends e-mail notifications to the team if there are issues.
  • Rbs Worldpay, Inc.
    Information Security Engineer
    Rbs Worldpay, Inc. Oct 2004 - Sep 2009
    Cincinnati, Ohio, Us
    Perform Network Security and general networking tasks. Currently in charge of all corporate-owned domain names and IP ranges, all public DNS, VPN connectivity, File Transfer configurations, inbound junk mail scanners, and the antivirus servers responsible for server and PC antivirus. I am also responsible for all security auditing of access to network devices and critical servers on the network including real-time monitoring via Entuity's Eye of the Storm network management software and Solarwinds Network Monitoring software. I have also written custom web pages for firewall access requests, and web site requests via our proxy server. Minor firewall administration when needed, but able to manage fully if required.
  • Keane, Inc.
    Catastrophe Services And Desktop Support
    Keane, Inc. Apr 2001 - Oct 2004
    London, United Kingdom , Gb
    Set up a small office for insurance adjusters to work from following any natural or man-made disasters. This included installing and configuring network and telephone cable and hardware as well as all of the PC's, printers and desks they would be using while deployed to this specific location. Worked on the Desktop Support team assisting remote users when not deployed.
  • Radiant Systems, Inc.
    Pcs Support
    Radiant Systems, Inc. Apr 1998 - Apr 2001
    Atlanta, Georgia, Us
    Telephone tech support for Radiant's Petroleum and Convenience Store Point of Sale (PCS POS) product. The majority of the time was spent working on the Amoco support team due to the added complexity of their satellite based communication systems.

Jeff Trnka, Cissp Skills

Firewalls Network Security Security Vpn Dns Cisco Technologies Technical Support System Deployment Troubleshooting Information Security Routing Network Administration Linux Active Directory Pci Dss Juniper Wireless Ip Computer Security Disaster Recovery Cissp Tcp/ip Intrusion Detection Penetration Testing Vulnerability Assessment System Administration Ids Maintenance And Repair Information Security Management Virtual Private Network Rsa Securid Ips Netscreen Redhat Computer Forensics Lan Wan Dhcp Wireless Networking Mysql Apache Php Centos Cisco Systems Products Junos Screenos Ssh Palo Alto Networks Data Center Cisco Ise Servers Backtrack Tippingpoint Ips

Jeff Trnka, Cissp Education Details

  • Usaf Technical School
    Usaf Technical School
    Computer Communications Systems Controller

Frequently Asked Questions about Jeff Trnka, Cissp

What company does Jeff Trnka, Cissp work for?

Jeff Trnka, Cissp works for Credigy

What is Jeff Trnka, Cissp's role at the current company?

Jeff Trnka, Cissp's current role is Senior Security Engineer at Credigy.

What is Jeff Trnka, Cissp's email address?

Jeff Trnka, Cissp's email address is jt****@****ail.com

What is Jeff Trnka, Cissp's direct phone number?

Jeff Trnka, Cissp's direct phone number is +140426*****

What schools did Jeff Trnka, Cissp attend?

Jeff Trnka, Cissp attended Usaf Technical School.

What skills is Jeff Trnka, Cissp known for?

Jeff Trnka, Cissp has skills like Firewalls, Network Security, Security, Vpn, Dns, Cisco Technologies, Technical Support, System Deployment, Troubleshooting, Information Security, Routing, Network Administration.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.