AWS Solution Architect, Presales solutions consultant with coding skills. Python, JavaScript, HTML CSS. Hard working
professional with over 6 years of experience working closely with account managers, acting as a technical
adviser for customers sales and solutions. Also working in collaboration with other teams such as the engineering team and the product team. Playing a pivotal role between the sales team and the engineering team. Including first
technical point of contact throughout the whole project lifecycle.DownloadCV
Experience working closely with account managers, acting as a technical adviser for customers sales and solutions. Experience working with network devices, components and technologies including IP addressing,
Routing, Routing Experience working with Firewalls, Encryption technologies, End point protection solutions, Email security solutions, Worked on several AWS projects following the AWS well architecture framework. Coding skills with programming languages such as Python, JavaScript, HTML and CSS Create an EC2 instance, SSH onto the instance, Install WordPress and all its dependencies, Creating a Serverless application that creates, reads, updates, and deletes items from a DynamoDB table. 3-tier network architecture is a structured and highly scalable framework. Designed to support We have deployed services across two availability zones within one region. With a public subnet in each AZ. These subnets have an To access our application, R53 can be used but is optional as the applications will be accessed via the application load balancer. RDS MySQL database instances is used. The Database Security Group will allow inbound traffic for Creating a private Kubernetes cluster on AWS EKS accessed via a public-facing jump server with AIM attached. Scenario: A user uploads an object to the S3 bucket, the event producer. Which publishes the message Hosted my Portofolio Website in AWS with S3 bucket, Route53, Cloudfront, and Certificate Manager.Explore MoreMY SKILLS
Presales Skills
Experince working in collaboration with the engineering team and other teams.
Completing
document such as High level design document (HLD) Solution design document or Statement of Works (SoW)Computer Networking
Protocols such as OSPF, EIGRP, and BGP. Switching, Firewalls, TCP/IP Stack, DNS, VPN, IPsec, Load-BalanceNetwork Security
Web and Application security solutions, Treat monitoring and reporting, AWS Cloud securityAWS Cloud
Using different AWS tools and services including Compute Services, Storage Services, Security Services, and database.Coding
Certifications
Projects
Some of AWS Projects Worked On
Deploying a WordPress on an EC2 Instance
and obtained the Wordpress
page. steps taken:
Create the EC2 instance and SSH Onto the instance
Install Linux Apache MySQL server and PHP stack
Install MariaDB MySQL database-server and MariaDB-client
to connect with the database Mariadb
Start the database and check the status to ensure it up and running
Install root password for the database to secure the database
Install PHP to support WordPress as it runs on PHP
Install wget unzip file
Now downloading WordPress
Remove index html
Log in to MariaDB MySQL to create the database and provide the user
access to the dataabse object and provide all privileges.Explore MoreCRUD Serveless Application With API, lambda, and DynamoDB
First, create the dynamoDB database. and then the lambda function. Follow by creating an IAM role to allow
lambda
access to the DynamoDB. Next, create the API gateway to handle the user request.
And finally, write
the lambda code to perform the CRUD operation.Explore MoreHigh Available 3 Tier Architecture
the deployment of web applications with improved security, high availability, and fault tolerance. Networking component
internet-facing load balancer to distribute incoming traffic to our web servers across both AZs. Two private subnets in each aviailability
zone for our applications and for the database instances. An Internet gateway is also configured to control incoming and outgoing
traffic. A Nat gateway for each public subnet. best practice as recommended for redundancy. The Nat gateway is created
to facilitate outgoing internet traffic for private subnets. Route table for the web applications and database subnets.
Application Components
Auto scaling group is created with a maximum of two ec2 instances to provide automatic scaling and management for both
the Web teir and
application tier instances. PHP and Apache are installed on the application servers. The latest mariaDB package.
Application Server Security Group allowing inbound permission from the Web Server Security Group.Database Components
MySQL database from the Application Server Security Group.Explore MoreThree-tier Architecture with Secure Kubernetes Cluster on Amazon EKS
These subnets have
an internet-facing load balancer to distribute traffic across the two AZs. This is deployed
across two availability zones within one region.
Two public subnets for the jump server at each AZ and 4 private
subnets. two for the application servers that have the EKS cluster and the worker nodes,
and two for the database
for future use. A Nat gateway for each public subnet, best practice as recommended for redundancy.Explore MoreEvent Driven Architecture with S3, SNS, SQS, and Lambda
to event
ingestions, the SNS topic. The SNS then filters the event and sends them to the respective
SQS queue. And finally,
it is consumed by the lambda function to perform some action on it. .Explore MoreHost a Secured & High Available Website in AWS
WAN MPLS services are delivered over fiber circuits and FTTC connections across 9 sites including DC.
2x sites supplied and provided with 100/100Mb
resilient connection operating active/passive, terminating
into dual RSX300 Juniper routers configured with VRRP for failover mechanism in the event
of primary circuit failure.
3x sites supplied and provided with 1G/1G resilient connection operating active/passive, terminating into dual RSX300
Juniper
routers configured with VRRP for failover mechanism. 2x sites provided with 100/100Mb link as a primary links
and FTTC backup. Terminating into dual
Juniper routers configured with VRRP for failover mechanism
and a small remote site in Birmingham. Explore More
WAN MPLS services provided over resilient broadband lines across 39 stores as primary and secondary connections.
Dual Cisco routers
are provided to terminate each circuit configured with HSRP for service failover mechanism in the event
of primary circuit failure.Explore More
I Worked on a vulnerability scanning project using Qualys as a vulnerability scanning tool. Using Qualys, I scanned
all network
devices by deploying a scanner appliance across two sites, London and Manchester. The scanner
appliance was deployed as an agent.
Which is a software I installed on a server to scan the client environment.
The agent was also connected to the client Azure environment via Qualys cloud connecter to pull all the Virtual
machines for vulnerability and scanning. And, enabled single sign-on (SSO) on Azure for Azure AD joint staff.
To alow them access via SSO using a URL from Qualys
I designed an endpoint protection solution for a medium-sized business network. Considering that over 90% of attacks start by
email,
I started vy carrying out some gap analysis on their email security system and end-point protection solution. I learned that
all they
had as security controls for email security was a FortiGate Next-Generation Firewall, and a Forti-mail configured in proxy
mode.
No Sandboxing environment or a kind of threat intelligence machine learning tool. And no proper EDR solution for endpoint
protection and network monitoring.
So they were exposed to major attacks such as Zero-day Malware/attacks also called unknown
malware and Ransomware attacks as well as Web-related attacks
I redesigned their security architecture accordingly, considering their web security solution too. and, taking into account the budget.
First I tackled endpoint security by deploying a good EDR solution. I used the Crowd Strike EDR solution. Crowd Strike EDR is a
cloud-based solution and deliver Real-time detection and prevention of malicious attacks. First by, Leveraging known signatures
or indications of compromise, hashes, Ips,
domains, anything else that was seen before. Big data analysis and machine learning
algorithms to look for anything unknown
or from the behavior of activity with indicators of compromise. and, deployed five modules of
Crowd Strike EDR solutions to complete the EDR solution.
Falcon Prevents, Next Generation Antivirus modules with all its capability to identify known malware whether online or offline, including
machine
learning mechanisms for unknown malware.
Falcon Insight, the actual EDR module. Which detects incidents that have escape prevention measures and ensures
that customer has
real-time visibility into everything going on at their endpoints. Which reduces the risk of silent failure that enables
attackers to remain in the
network undetected
Device Control, enables the safe usage of USB drives or devices across the entire network, it provides
granular control to make ensure
that approved USBs are used appropriately in the network
Falcon Spotlight, a module for vulnerability management provides real-time
vulnerability assessment on the endpoints, the most critical ones
Falcon X, a threat intelligence module that brings endpoint protection to the next level by combining malware sandboxing,
malware search,
and threat intelligence into an integrated solution to provide threat analysis in a matter of seconds.
At the perimeter network, I implemented a defense in depth by adding an extra layer of security, as they already had a Fortigate NG-UTM-Firewall
and a mail proxy.
Since the Next Generation firewall IPS does not detect unknown malware, I added a Forti-Sandbox to Identify and isolate unknown
malware in real time.
To mitigate zero-day attacks and ransomware attacks. Forti-SIEM, for complete visibility into the network and 24/7 end-to-end
threat monitoring and mitigation.
And also, deployed a Web application firewall to identify and filter malicious requests. To mitigate web-related attacks
such as DDoS attacks, SQL injection,
and cross-site scripting attacks. The Forti-Sandbox is integrated with all security appliances in the network.
Everything passes through the sandbox for deep analysis.
Finally, recommended phishing email awareness training and overall corporate security awareness training to all the employees. Both technical and
non-technical staff.
Which I conducted over two weeks to different types of audiences.
07852177515
Lyboth4@gmail.com
43 Kirkham Street, London, SE18 2JS