Dedicated IT professional with a solid background in providing technical support and managing IT infrastructure. Proven ability to resolve end-user issues promptly and effectively, ensuring high levels of customer satisfaction. Solid understanding of information security concepts (e.g., vulnerability, threat, asset, risk, Common Vulnerability Scoring System, and disaster recovery,)