Hello! I'm Shamil
Accomplished and service-focused professional with sharp technical acumen and 15+ years’ success in IT support and systems administration. Skilled in maintaining IT resources, analyzing helpdesk operations, and providing overarching technical support. Proven ability to respond to user help requests pertaining to software, or hardware issues. Trilingual in English, Chechen, and Russian. Currently enrolled in a cybersecurity certification course and planning on taking several CompTIA certifications in hopes of landing a junior cybersecurity role when I graduate.


Shamil Khalidov
Cybersecurity freelancer
Email:
Address:
Brooklyn, NY
ZIP 11238
EXPERIENCE
2017-Present
Freelance IT Professional
Provide top-quality technology services ranging from visual identity/branding and web and graphic design to video editing and PC troubleshooting. Help clients navigate hardware, software, and operating systems and troubleshoot network issues
2011-2017
NGO "DOVERIE"
IT Support Manager &
Digital Security Trainer
Spearheaded IT support functionalities and coordinated all routine activities of support staff while constantly striving for efficiency and service success. Oversaw all aspects of computer maintenance, video conferencing, system troubleshooting, documentation, and data backup
2003 - 2011
System Administrator
MINISTRY OF HOUSING
Spearheaded IT support functionalities and coordinated all routine activities of support staff while constantly striving for efficiency and service success. Oversaw all aspects of computer maintenance, video conferencing, system troubleshooting, documentation, and data backup
EDUCATION
2021 -2022
Master's Degree
NYU UNIVERSITY
Cybersecurity Professional Program
2004 -2009
CHECHEN STATE UNIVERSITY
Bachelo's Degree
Master’s Degree, Applied Mathematics & Informatics
SKILLS

Cloud Security AWS
Network Security
Computer Networking
Linux Security
Microsoft Security
Cyber Infrastructure & Technology
Ethical Hacking
Virtualization

EXPERTISE
NETWORK SECURITY
Set up several machines: client, host, and threat; established connection and engaged in communication through network requests and emails. Configured firewall using pfSense. Imitate a threat to extract info and intercept traffic-utilizing Wireshark
NETWORK CONFIGURATION
Devised network Topology plan and where to assign the IP address. Built VLANs, trunks, and routers to allow multiple stream communication. Arranged switches to communicate with port security and routers to work with OSPF
PENETRATION TEST
Network Scanning by using NMAP. Deployed OPA attack. Make a reverse shell to remote control the host computer. Used Metasploit tool to set the Trojan that used for user privilege escalation test
