Aksh S.

Aksh S. Email and Phone Number

President at Sphinx Solutions, Inc. @ Sphinx Solutions Inc.
herndon, virginia, united states
Aksh S.'s Location
Washington, District of Columbia, United States, United States
About Aksh S.

Sphinx exemplifies what the power of a vision coupled with consistent hard work can create in this great country. I personally thank our past and present clients for trusting me and my colleagues with their mission critical technological problems – and for giving us the opportunity to achieve success together.Specialties: information security, network engineering, systems administration, systems engineering

Aksh S.'s Current Company Details
Sphinx Solutions Inc.

Sphinx Solutions Inc.

View
President at Sphinx Solutions, Inc.
herndon, virginia, united states
Employees:
22
Aksh S. Work Experience Details
  • Sphinx Solutions Inc.
    President
    Sphinx Solutions Inc. Aug 2007 - Present
    Washington, Dc
    Sphinx has earned respect from our partners due to the high performing personnel that deliver on each contract. Our consultants spearhead all of our projects with a team spirit that is built on previous successes and top level experience. They are the type of performers that don’t back down from tough problems. They’re the team that gets excited, not frightened, about implementing security solutions on over $2bn worth of a client’s assets.
  • Booz Allen Hamilton
    Senior System Security Engineer
    Booz Allen Hamilton Feb 2007 - Apr 2009
    -Build new large scale IT environments from the ground up to verify and conduct vulnerability testing of tools and programs, to include operational validation and verification.-Provide on-call 24x7 operational support to client via pager in case of emergency.-Configure and install Windows and Linux servers on time sensitive projects.-Managed Fedora Linux servers for continued support to system applications being used overseas.-Maintain messaging systems (Lotus Notes) to properly manage/analyze traffic (IP validation via Wireshark) and troubleshoot new version releases. -Travel to client sites and provide feedback on server design and development.-Develop detailed documents, briefings and reports of technical system security findings.-Passed a FTK Forensics certification program to investigate and report on suspect media. -Ensure proper technical directions are consistent with project goals and inline with the master project schedule created.-Plan and organize meetings to discuss current security technical findings and provide solutions to meet future business security goals.
  • Department Of State
    Information System Security Officer
    Department Of State Jun 2005 - Feb 2007
    -Led customers as the security representative for system vulnerabilities in IT equipment deployed on LAN/WAN networks.-Brief at INFOSEC forum on biometrics technologies effectively conveying technical information to a non-technical audience of 200 people.-Reverse Engineering experience in testing an experimental operating system to confirm functionality and take advantage of potential security vulnerabilities. -Verify proper encryption techniques and custom tools were being used to properly deploy various computer systems on the secure network.-Tested and configured AV/VTC equipment to ensure information security practices and protocols were properly configured.-Deployed various network wide applications to test performance and confirm system security.-Redesigned network infrastructure to improve efficiency and reliability and to incorporate a new firewall
  • Department Of State
    Systems Administrator
    Department Of State Feb 2004 - Jun 2005
    -Developed new security plan and procedure document for new VTC hardware being deployed on a classified network.-Tested, analyzed and installed servers based on specific customer requirements.-Maintained Microsoft servers (Windows 2000/2003), with strong skills of adding, modifying, deleting entries within Active Directory. -Troubleshot servers on level tier 2-3 and ensure continued system backups and updates. -Developed and deployed communication packages based on specific customer requirements.-Conducted customer surveys for each project and trained non-technical clients to best use server infrastructure.-Traveled both domestically and internationally for fast breaking and timely support to operational servers.-Researched emerging technologies to further provide better service and support.-Mentored new employees while they learn network infrastructure and protocols.
  • Symantec
    Information Security Specialist
    Symantec Aug 2003 - Feb 2004
    -Configured and maintained all new Intrusion Detection Systems (NID and HID) and firewalls delivered to the customer: Network Security 7100 and Gateway Security 1600/5600 series.-Built a lab to test newfound security vulnerabilities (SecurityFocus/CERT), and to confirm protection against reported exploits-Used network analysis and scripting tools to detect vulnerabilities on a network (Ethereal, Snort, Netstumbler, Windump, and shell script).-Responded to information security threats detected on New York State agencies’ networks, and compiled reports of threats (with accompanying incident analysis) for said agencies.

Aksh S. Skills

Writing Policy Writing Technical Equipment Mac Os New York City Cisco Nexus Consulting Top Secret Windows Server Internet Backbone Customer Requirements Infrastructure Token Ring Netbios Dreamweaver Windows System Applications Conveying Vulnerability Matlab Beverage Oracle Database Penetration Testing Samba Briefings Mentoring Incident Handling Customer Service Training Infopath Wins Uzbekistan Rack Minitab Nfs Non Technical Monster Security Appliances Network Security Windows Xp Dynamics Information Security Management Customer Support Assessment Organizational Structure Travel Salary Wan Gateway Changing Environments Tier 2 Management Design Vulnerability Assessment O&m Ability To Learn Quickly Outsourcing Security Route Short Resume Maintenance And Repair Information Assurance Programming Languages Integration Data Backup Routers Mysql Lan Wan System Architecture Visual C++ It Service Management Av Routing It Strategy Nis Auditing Wage Cabletron Data Storage Information Systems Source Sharepoint Linux Cissp Silicon Valley Adobe Human Resources Systems Engineering Data Center Antivirus Circuit Analysis Websphere Messaging Networking Languages Troubleshooting System Legal Writing Business Services Frontpage English Weblogic Switches Validation Wireshark Windows 2000 Snort Dell Workstations Tcp/ip Reports Vulnerability Management Red Hat Linux Internet Protocols Verifying Nat Removing Norton Ghost Ethernet Mclean Visual Basic Microsoft Office Enterprise Architecture Fedora Testing Encryption Security+ Training Disaster Recovery Customer Service Cisco Ios Audience Network Services Modifying Solaris Brewery Network Architecture Image Software Troubleshooting Scripting Vpn Documentation Contact Information Part Time Research Emerging Technologies Nmap Microsoft Operational Support Vmware Analysis It Management Hardware Written Contact Info Shell Scripting Advertising Agency Systems Design Ftk Information Technology Computer Forensics Information Security Punjabi Autocad C 24x7 Dns Configurations Fix Protocol Operating Systems Network Infrastructure Nessus Applications Controllers On Call Intel Mail Server Communication Home Schedules Tcp System Administration Customer Needs Communication Protocols Active Speech Software Packaging Usability Operations Logic Programming Dell Computers Customer Surveys Snmp Symantec Breaking Technical Information Network Engineering Network Administration System Performance Polygraph Permissions Technical Support Security Clearance Actionscript Project Planning Project Sql Unix Data Migration Written Communication Dod Servers Cloud Computing Hardware Infrastructure Spss Dhcp Media Country Domain Controller Internal Audit Firewalls Network Performance Distribution Vlan Conflicts International Shell Intelligence Code Cisco Technologies Sybase Ems Active Directory Intrusion Detection Itil Lotus Notes Computer Network Operations Microsoft Exchange Changing Environment New York Reverse Engineering Government Computer Security Alternate Sci Clearance Public Sector Windows Vista Iis Software Sas Windows Nt Oracle Compliance Virtualization Microsoft Servers Profiles Accompaniment Business Continuity Netstumbler Program Management Knowledge Base Network Communications Vtc Hardware Support Administration Client/server Spoke Deployed Hid New Equipment Directions Broad Experience Meetings Biometrics System Deployment Logging Architecture Hindi Sponsorship

Aksh S. Education Details

Frequently Asked Questions about Aksh S.

What company does Aksh S. work for?

Aksh S. works for Sphinx Solutions Inc.

What is Aksh S.'s role at the current company?

Aksh S.'s current role is President at Sphinx Solutions, Inc. .

What is Aksh S.'s email address?

Aksh S.'s email address is ak****@****ion.com

What is Aksh S.'s direct phone number?

Aksh S.'s direct phone number is +120280*****

What schools did Aksh S. attend?

Aksh S. attended Rochester Institute Of Technology.

What are some of Aksh S.'s interests?

Aksh S. has interest in Groupon, Mit Technology Review, Dc Inno, Inc, Community, Mantova Corse, Sports League, Sev Jaunasse, Charity Organization, Michele Rossi.

What skills is Aksh S. known for?

Aksh S. has skills like Writing, Policy Writing, Technical Equipment, Mac Os, New York City, Cisco Nexus, Consulting, Top Secret, Windows Server, Internet Backbone, Customer Requirements, Infrastructure.

Who are Aksh S.'s colleagues?

Aksh S.'s colleagues are Ms. Euronne Toogood, M A S, Karim Motaweh, Kevin Baker, Kristen Smith, Joey A., Reggie Upshaw.

Not the Aksh S. you were looking for?

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.