Welcome to Taniform University Consultants and Technologies (TUC Technologies)

TRAINING PLATFORMS AND INSTITUTIONS

San Francisco State University, San Francisco, California, in Partnership with World Education : Coursework in Computer Network Administration, With Labs,  810 hrs for 12 months, validated; Licensed as Computer Network Administrator; CompTIA Network administrator (CompTIA Network+ and Practice Lab, 810 Hours/12 CEU)

 

 Coursework for Certified Ethical Hacker (CEH) plus practice labs; Certified Ethical Hacker (Length: 90 hours / 12 months/8 CEU); CEH

 

Licensed as CompTIA Security Plus, and Certified Information and Systems Auditor (CISA); CISSP, CISM, CAP, CPA

Taniform Higher Institute of Learning

OBJECTIVES

We are dedicated and certified Information Systems Auditors with a strong background in auditing, risk management, and information security.  We are  seeking challenging roles, where we can leverage our CISA certification and expertise to contribute to the organization’s security and compliance objectives, including Third Party Risk Management (TPRM)—-COSO, SOC, FedRAMP, COBIT, ISO 27000 suite, SOX, PCI-DSS, HIPAA, FISMA, Gramm Leach Bliley Act, HITECH, HITRUST, NIST standards. NIST frameworks, JIRA, SIEM, SOAR, SCAP, SharePoint, etc.

 

We are dedicated and certified CompTIA Security+ professionals with 11 years of experience in cybersecurity. Seeking a challenging position to apply our skills in securing IT systems and networks.

 

We are dynamic and certified CompTIA Network+ professionals with 11  years of experience in designing, implementing, and managing robust network infrastructures. Seeking a challenging role to contribute technical expertise to enhance network performance and reliability.

lightbulb, bulb, light-1875247.jpg

Department of Computer Engineering and Security. TUC Technologies, Antioch

offices, business, computer-1181385.jpg

-Thanks to our  professional input, in the following roles and responsibilities, we accomplished excellently:

Risk Management, Audit, Assessment; Evaluation; Network Security, Web Site encryption, Ethical Hacking; Cloud experience in IBM, Azure, AWS, Oracle, Salesforce, Alibaba, Google.

 

-Information System Security Officer (ISSO); Governance Risk and Compliance (GRC);  Third Party Risk Management (COSO, PCI, COBIT, SOX, Fedramp, Gramm Leach Bliley Act, HIPAA, FISMA, HITRUST, HITECH, FIPS, RMF, SOC , ISO 27000 Series, NIST frameworks, NIST standards, etc.)

Data Analysts: risk management, audit, and network security at Taniform University Consultants and Technologies, LLC, Antioch, California

-We commit to the following obligations, dutifully and successfully, stacking recognitions for triumphs.

– We conduct comprehensive information systems audits to ensure compliance with industry standards and regulatory requirements.

-We identify and assess risks, vulnerabilities, and control weaknesses in IT systems.

– We develop and implement audit plans, testing procedures, and risk mitigation strategies.

– We collaborate with cross-functional teams to address security issues and improve overall information systems governance.

– We produce detailed audit reports, documenting findings, recommendations, and remediation plans.

 

– We lead IT audit engagements, evaluating the effectiveness of internal controls and information security measures.

-We assist in the development and enhancement of IT policies and procedures.

– We conduct vulnerability assessments and provide recommendations for improving security postures.

– We collaborate with IT and business stakeholders to implement risk mitigation measures.

  We accomplish practical work in Computer Technology Information Association and Security Plus; CISA (CompTIA Security Plus); bootcamp

Omero on AWS & Seller accounts (Amazon.com)

shop, amazon, mobile-1908580.jpg

We engage in an open source, image data management platform designed and modeled to support the biological/medical research community including digital pathology and cellular biology domains to provide easy ways of accessing, sharing, and working with various biological data, including epidemiologic data. This project included histopathology, epidemiology, high content screening, electron microscopy, and even non-image genotype data. By deploying this open source tool on AWS, allows you access to your image data in a secure central repository with the added benefit of Cloud elasticity. We worked with and taught trainees a  tutorial to walk clients through considerations for imaging research and using Omero on AWS.

CERTIFIED INFORMATION SYSTEMS AUDITING

Skills:

We work on the following:

-IT Governance;

-Information Systems Auditing;

-Security Policies and Procedures;

-Risk Management;

-Communication and Collaboration;

-Compliance Management;

-Security Policies and Procedures;

-Vulnerability Assessment; 

-Internal Controls

 

Professional Experience:

Cybersecurity Analysts

We collaborate with cross-functional teams to address security concerns and ensure compliance with industry standards; We monitor and analyze security alerts to identify potential threats and vulnerabilities; We conduct regular security assessments and implement measures to strengthen the overall security posture

IT SECURITY SPECIALISTS

We implement and monitor security policies and procedures to ensure data confidentiality and integrity; We manage and maintain firewall configurations to safeguard the organization’s network; We conduct penetration testing and vulnerability assessments to identify and address security weaknesses. All were successful.

 

Skills:

Our skills incorporate Encryption Technologies; Network Security; Threat Detection and Analysis; Security Policy Development; Compliance and Auditing; Incident Response; Firewall Management; Risk Management; Security Awareness Training; and Vulnerability Assessment.

 

Technical Proficiency:

Our Security Tools: Wireshark, Nmap, Metasploit; Operating Systems: Windows, Linux, Unix; Our Certifications: CompTIA Security+, CISA, and CompTIA Network+, CISSP, CAP, CPAM CISM

NETWORK ENGINEERING

We conduct  regular network audits to identify and address performance bottlenecks; We configure and maintain routers, switches, and firewalls to ensure seamless network connectivity; and we design and implement network architectures to support organizational requirements. All were great achievements.

IT Support Specialist

We collaborate with cross-functional teams to implement network upgrades and improvements;.We provide technical support for end-users, troubleshooting network issues, and resolving connectivity problems; We  monitor network performance and implement necessary adjustments to optimize efficiency. All were great achievements.

 

Skills:

We also excel in these roles and responsibilities: TCP/IP, DNS, DHCP; Network Design and Implementation; Routing and Switching; LAN/WAN Configuration; Troubleshooting and Problem Resolution; Network Security; VLANs and Subnetting; Wireless Networking; Network Monitoring and Analysis; Cisco IOS.

Technical Proficiency:

Our Network Devices are: Cisco routers and switches, Juniper devices; Operating Systems: Windows, Linux, Unix; Protocols: TCP/IP, SNMP, HTTP, DNS; Certifications: CompTIA Security+, CISA, CompTIA Network+, CEH, CAP, CISSP, CPA

Working Languages: Proficient in English, French, German, Italian and Spanish

We can recommend you for United States security clearance

Our Professional Memberships:

– Member, ISACA (Information Systems Audit and Control Association)