ANGELA JOHN OWOGOGA
IT Support Specialist-Phase 1, Lagos, Nigeria.
-
Plot 6, Block 15, Adigun Avenue, Magodo
https://www.linkedin.com/in/angela-john-a1b020231
https://twitter.com/angela_callme
https://www.upwork.com/freelancers/~-f40c9b15ab1?viewMode=1
PROFESSIONAL SUMMARY
Human Beings are outnumbered by Internet devices. I love to dig into customers problems and solve them with
modern technology.
I am a motivated and skilled individual seeking new opportunities in Customer service, through completion of the
Google IT Support Professional Certificate.
I developed skills in Customer service, Networking, Operating systems (including Windows and Linux), Systems
administration and Security. My training included hands-on practice in these areas. I'm passionate about
continuously learning in the IT field and supporting people to solve their technical problems.
EXPERIENCE
SYSTEMS ADMINISTRATOR
May 2020 - Dec 2021 | Buksway Limited , Lagos
I worked with team to configured and maintained networked computer system, including hardware, system
software, and
applications. I make sure data is stored securely and backed up regularly, diagnosing and resolving hardware,
software,
networking, and system issues. Replacing and upgrading defective or outdated components when necessary.
Monitoring system
performance to ensure everything runs smoothly and securely. Researching and recommending new approaches to
improve the
networked computer system. Providing technical support when requested. Documenting any processes which
employees need
to follow in order to successfully work within our computing system.
IT SECURITY- HASHING ALGORITHMS
Jan 2022 - Jun 2022 | Dilligent Limited
I create/Inspect key pairs, Encryption/Decryption and sign/verification using openSSL.
I explored and generate key using openssl.
I used the pairs key to encrypt and decrypt some small amount of data.
I used the pair key to sign and verify data to ensure its accuracy.
I create a text file and generate hashes using the md5sum and shasum tool.
Configuration of Network Security: Firewalls.
CUSTOMER SERVICE
Sep 2018 - Jan 2020 | Adextech company , Lagos
EDUCATION
ASSOCIATE DEGREE IN GOOGLE FUNDAMENTAL CORE INFRASTRUCTURES
Coursera , Online | Graduated in 2021 | 100% GPA
ASSOCIATE DEGREE IN MICROSOFT DEFENDER FOR CLOUD
Microsoft , Online | Graduated in 2022 | 100% GPA
ASSOCIATE DEGREE IN CYBERSECURITY
Cisco Networking Academy , Online | Graduated in 2020 | 100% GPA
BSC IN PSYCHOLOGY
Obafemi Awolowo University , Ile-Ife, Osun State, Nigeria | Graduated in 2021 | 3.8 GPA
ASSOCIATE DEGREE IN GOOGLE IT SUPPORT PROFESSIONAL CERTIFICATE
Coursera , Online | Graduated in 2022 | 100% GPA
PROJECTS
HASHING
In this project, I demonstrated hashing and hash verification using md5sum and shasum tools.
Md5sum is a hashing program that calculates and verifies 128-bit MD5 hashes. As with all hashing algorithms,
theoretically, there’s an unlimited number of files that will have any given MD5 hash. Md5sum is used to verify the
integrity of files.
Similarly, shasum is an encryption program that calculates and verifies SHA hashes. It’s also commonly used to verify
the integrity of files.
I created a text file and generate hashes using the md5sum and shasum tools.
After generate the hash digests, I inspect the resulting files.
I verify the hash using the md5sum and shasum tools.
I modify the text file and compared the results to the original hash to observe how the digest changes and how the
hash verification process fails.
CREATING/INSPECTING KEY PAIR, ENCRYPTING/DECRYPTING AND SIGN/VERIFY USING OPENSSL
I generated RSA private and public key pairs using the OpenSSL utility.
OpenSSL is a commercial-grade utility toolkit for Transport Layer Security (TLS) and Secure Sockets Layer (SSL)
protocols. It’s also a general-purpose cryptography library. OpenSSL is licensed under an Apache-style license, which
means that you’re free to get it and use it for commercial and non-commercial purposes (subject to some simple
license conditions).
OpenSSL - I explored what generating key pairs looks like using OpenSSL.
Encrypt and decrypt - I used the key pair to encrypt and decrypt some small amount of data.
Verify - I used the key pair to sign and verify data to ensure its accuracy.
TCPDUMP
Tcpdump is the premier network analysis tool for information security and networking professionals. Tcpdump will
help you display network traffic in a way that’s easier to analyze and troubleshoot.
Command basics - I used tcpdump and some of its flags do, as well as interpret the output.
Packet captures - I practiced saving packet captures to files, and reading them back.
UTILIZATION OF ACTIVE DIRECTORY
Applied a global policy with Active Directory
Created groups and managing accounts with Active Directory
Active Directory is a core tool for System Administrators that need to manage Windows machines. Active Directory
allows to manage users, groups, machines, and the policies that apply to all of them in a centralized fashion.
In this the project, I interact with Active Directory, use it to add users and groups, edit users memberships as well as
create a new group policy object (GPO).
CERTIFICATIONS
CERTIFICATIONS
MICROSOFT DEFENDER FOR CLOUD
GOOGLE FUNDAMENTAL CORE INFRASTRUCTURES
CYBERSECURITY
PSYCHOLOGY
GOOGLE IT SUPPORT PROFESSIONAL CERTIFICATE
https://www.coursera.org/user/f5d3f471c495d9ee092caa601033c2a1
SKILLS
IT SECURITY
CUSTOMER SERVICE
SYSTEMS ADMINISTRATOR
TROUBLESHOOTING
OPERATING SYSTEMS
HASHING
NETWORK SECURITY
REMOTE CONNECTION AND VIRTUAL MACHINES
INNOVATIVE AND SKILLED IN CREATIVE THINKING
TEAMWORK/ABILITY TO WORK COLLABORATIVELY
STRONG COMMUNICATION SKILLS INITIATIVE
TECHNICAL SUPPORT SPECIALIST, LEVEL 1
IT HELP DESK TECHNICIAN
COMPUTER SUPPORT
IT ASSISTANT
MICROSOFT OFFICE