{"id":155,"date":"2023-01-19T21:16:40","date_gmt":"2023-01-19T21:16:40","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=155"},"modified":"2024-02-01T18:46:57","modified_gmt":"2024-02-01T18:46:57","slug":"experience","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cyse201sna\/experience\/","title":{"rendered":"Experience"},"content":{"rendered":"<p><span style=\"font-weight: 400\"><b>Old Dominion University Information Technology Services<\/b><\/span><\/p>\n<p><span style=\"font-weight: 400\">IT Networks Process and Services Specialist<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Monitoring and overseeing the implementation and maintenance of network infrastructure including routers, switches, firewalls, and other networking devices.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Implementing and maintaining security measures, which includes access controls, intrusion detection\/prevention systems, and security policies to protect against unauthorized access and cyber threats.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Provisioning and configuring network services such as DNS, VLAN, DHCP, and VPNs along with monitoring network performance and resolving issues to ensure optimal network operation.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Maintaining accurate documentation of network configurations, topology, and changes along with troubleshooting technical issues when needed.<\/span><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Old Dominion University Information Technology Services IT Networks Process and Services Specialist Monitoring and overseeing the implementation and maintenance of network infrastructure including routers, switches, firewalls, and other networking devices.\u00a0 Implementing and maintaining security measures, which includes access controls, intrusion detection\/prevention systems, and security policies to protect against unauthorized access and cyber threats.\u00a0 Provisioning and&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cyse201sna\/experience\/\">Read More<\/a><\/div>\n","protected":false},"author":25959,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201sna\/wp-json\/wp\/v2\/pages\/155"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201sna\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201sna\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201sna\/wp-json\/wp\/v2\/users\/25959"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201sna\/wp-json\/wp\/v2\/comments?post=155"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/cyse201sna\/wp-json\/wp\/v2\/pages\/155\/revisions"}],"predecessor-version":[{"id":338,"href":"https:\/\/sites.wp.odu.edu\/cyse201sna\/wp-json\/wp\/v2\/pages\/155\/revisions\/338"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201sna\/wp-json\/wp\/v2\/media?parent=155"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}