Saturday, July 26, 2014

Building a security awareness program on a shoestring budget

Awareness programs don't have to be complicated, expensive ventures

Implementing a security awareness program seems rather straightforward, until you actually start to implement one - factoring in things like resources and the people (users) to be trained. At that point, it can seem complicated, costly, and unnecessary. However, the process doesn't have to be a logistical and expensive nightmare, and it's certainly worth it in the long run.

Organizations both large and small have implemented awareness programs for next to nothing, and while they're not perfect, many of them are able to show measurable results. The key to these successes however, is based on understanding what it is that the organization is actually trying to accomplish.

While doing topical research for this story, CSO discovered a common thought among the experts and executives that were consulted, including some who spoke to us during two regional security conferences this summer (B-Sides Detroit and CircleCityCon).

Often, executives view security and business as two separate items, and while this point-of-view is changing, it takes effort to get some executives to commit to security and make it part of the business overall.

When this happens, tangible security needs such as license renewals, support and service contracts, firewalls and other appliances – all of those are things that executives understand. However, awareness training, to the executives at least, seems like an extended version of general security training, and there just isn't money for something like that.

At the same time, there's also a shakeup happening - thanks to a seemingly endless stream of data breaches this year that have placed several large companies in the headlines. The result of this shakeup is fear, and sometimes fear has a way of producing the budget needed to strengthen security. In some circles, this additional funding opens the door to the development of security awareness programs.

Is awareness training really needed?
Security awareness training is something that can cause a good deal of debate among experts. Some agree that it's needed; others will call it a waste of time and resources.

Dave Aitel, in a column for CSO, expressed an opinion that such training wasn't needed:

"Instead of spending time, money and human resources on trying to teach employees to be secure, companies should focus on securing the environment and segmenting the network. It's a much better corporate IT philosophy that employees should be able to click on any link, open any attachment, without risk of harming the organization.

"Because they're going to do so anyway, so you might as well plan for it. It's the job of the CSO, CISO, or IT security manager to make sure that threats are stopped before reaching an employee—and if these measures fail, that the network is properly segmented to limit the infection's spread."

However, the other side to that argument comes from Ira Winkler:

"The question to ask is whether the losses prevented by awareness training are more than the cost of the awareness program. So for example, as every successful phishing attack has a cost associated with it, if you are reducing phishing attacks by 50 percent, you are mitigating 50 percent of the potential losses...

"The original opinion also says that a sophisticated security awareness program can prevent 90-95 percent of attacks. A 90-percent-plus reduction of loss will always be a good return on security investment, especially when the cost of typical security awareness programs is minimal?"

Awareness programs are not a replacement for solid security infrastructure and policies. Nor are they a replacement for response and incident handling. They can't be. The only thing awareness does is increase the odds of recovery, and increase response times should an incident occur.

While training employees to act as monitors for Phishing attacks or emails with malicious attachments is helpful, that doesn’t mean such campaigns won't be successful. However it does mean that the security team may know about the problem sooner, and that could be the difference between preventing a disaster - or suffering through one.
Getting started:

One of the main steps to building a good security awareness program is to separate it from security training. Security awareness is not the same as security training when it comes to employees.

Security training serves to offer a structured set of rules, which is what most auditors will look for when assessing compliance. Security awareness, on the other hand, aims to modify behavior. If done right, the company's employees will become an extension of the existing security program. However, while security training can be done annually, awareness programs are a continuous process.

A living proof of concept:
Amanda Berlin works in security for a medium-sized healthcare organization in the Midwest. Over the last few months, she has created an effective awareness program almost out of thin air.

Her organization didn't have the resources to pay for external awareness development and training, but it was needed, so they had to go it alone. It's taken some time, but her efforts have resulted in a program that benefits the company, keeps the staff engaged in security related topics, and has little to no impact to the bottom line.

"So we knew the weakest element in our security were people," Berlin said in an interview with CSO.

"That's probably the weakest part of any organization. You can have IDS / IPS, massive email filtering, but stuff is still going to get through and [criminals] are still going pretext."

As mentioned, user education can go a long way to keeping outsiders off the network, but it isn't a silver bullet.

In the past, prior to implementing the awareness program, Berlin's organization had to deal with various socially-based attacks. Yet, those were mostly random phone calls and faxes (fake domain renewal bills for example), so need for a scaled awareness program wasn't made abundantly clear until the company had a penetration test performed.

"We had a [penetration test] with some Phishing included, and that was what got them domain admin access. Right away, within fifteen minutes, somebody clicked and gave out their credentials, and they [the red team] were in from the outside."

It was an eye-opening experience. Other than the expected security training, related to HIPAA and other regulatory requirements, nobody in her organization had given a thought to implementing user awareness training against Phishing or similar attacks.

However, the main takeaway from that initial penetration test was that if the human element had been hardened, or at least better prepared, then the other defenses on the network would have had a better chance of keeping the attackers out.

Training out of thin air and OSINT:

For Berlin, the process of building an awareness program from scratch started with a series of conversations with her boss and the organization's education department.

The idea was to develop materials that would benefit any user. However, they had to keep the materials basic, so that the information was easily understood and the technical aspects were obtainable to anyone, no matter their personal skill set.

"[We used] things that would be really helpful for any end user, like 'Don't click on stuff' emails. We didn't get too far into it, but we used that and put it out there," Berlin explained.

After the material was shared during formal and informal staff meetings, it was time to test the employees and see what they've learned.

The first month her program ran, the targets were selected by way of available OSINT, or open source intelligence. By targeting company email addresses that were already publicly available, Berlin was starting with the same pool of potential victims that an actual criminal could, which helped her set the tone for the program's development.

Using the Social Engineer Toolkit, or SET, she created an initial campaign that consisted of an obviously suspicious email, and a simple link to a webpage she created to collect credentials.

"It was just a plain two, three line, HTML email. I wanted to try and make it as blatantly obvious that I wasn't a legitimate source. I wanted to see how good their [personal] filter was," Berlin, recalling the first email that was sent to users, explained.

The first set of emails were sent from a Gmail account created for the exercise. They contained no identifiable information, and used a basic HTML link to a local IP as the trap. Out of the initial run of a few hundred emails, Berlin said that she managed to get nearly 60 percent of the targets to enter their credentials.

The powers that be viewed the results as proof positive that something should be done about this gap in security, but the program needed to be tuned, and there needed to be a way to track the results. The process took a few months, but eventually Berlin was ready to launch her program officially.

Rewarding those who help:

While the initial test proved that an awareness program was needed, the question of who should be doing the training was the first hurdle. In fact, research showed that there were plenty of vendors available to come in and run an awareness program. However, the cost of hiring someone form the outside was steep, and would put additional pressure on an already taxed budget.

Instead, Berlin explained, the company opted to manage things internally. Moreover, some of the money that would have gone to an external training firm ($1,000) was allocated in order to establish a reward scheme for employees.

"So every time somebody reports a Phishing email, whether it be form me or the outside, they need to forward it to the help desk or call and let us know, so we can actually see the email. If it's a legitimate one, we'll go through the steps to actually block it; otherwise we'll let them know they've been entered into the drawing."

The program allows employees to report legitimate Phishing emails, as well as emails that are sent as part of the ongoing awareness training. In addition, other suspicious electronic activity may also count, such as emails with attachments that the employee didn't expect, but that is determined on a case-by-case basis.

Another interesting aspect to the program is the encouragement to report people who are attempting to access the employee's system that haven’t been authorized to do so.

The incentive scheme itself is simple and geared towards the staff's personal interests. There is a monthly drawing for a $20 gift card, followed by a quarterly drawing for a $50 gift card to either Bass Pro Shops or Red Lobster. There is also a yearly grand prize worth $400 in the form of an Amazon gift card.

The financial motivation has helped things tremendously, Berlin noted, as the number of reports focused on legitimate Phishing attacks has "skyrocketed." Even better, the stigma associated with reporting a potential problem, or admitting that an attack was successful, has plummeted to nothing.

While rewards are important, for Berlin's organization, tracking and measuring progress is the main concern. After only a short time of operation, the stats from her program are impressive. The number of successful attacks in the training program have continued to fall steadily since the program officially started.

In January: 985 emails were sent to employees; and out of those, 53 percent of the targets actually clicked the Phishing link. Of those who clicked the link, 36 percent of them entered credentials and 11 percent of all the targets reported the attack.

In February: 893 emails were sent out, resulting in a click rate of 47 percent. Again, of those that clicked, 11 percent of them gave out credentials and 11 percent reported it.

The test in March didn't go as well. There were 1,095 emails were sent, but only three percent of the targets clicked the link. Of those that clicked, none of them entered credentials. In fact, everyone who clicked the link in March also reported the email.

"In March I think the reason that I had such a low rate of participation in general was due to the all around subject/theme of the Phish," Berlin said, when asked about the stats.

"We had a large push for the March of Dimes that month and it seems like every other email was about another donation opportunity, or bake sale of some sort. We think that the majority of them were just deleted along with the rest of them, or filtered out as noise."

April was another interesting month. There was no opportunity to enter credentials this time around, as the goal was to target clicks. Anyone who clicked on the email was directed to a "You've been hacked!" message.

During this test, two percent of the 1,111 emails sent resulted in a click, and 25 percent of those who got the message reported it.

While Berlin's awareness program clearly has changed user behavior, as well as improved the overall security posture for her organization, that doesn’t mean that it's foolproof. There's plenty of room to grow, and the program itself is in a constant state of tuning.

For example, there are plans to improve tracking, and make the process easier to manage. Currently, the tracking process is manual, so the goal is to have it completely automated. There are also plans to increase the program to include mobile devices directly, as many of the providers within the organization rely on tablets in their day-to-day routine.

Awareness is only part of the battle:
Security awareness programs are only one piece of a larger security puzzle. By the time a Phishing email reaches a user, parts of the security chain have failed (anti-Spam) and the weakest-link in the chain now has an active role in defense.

If the users are trained, or to use a stronger term, conditioned to spot random abnormalities, there is a greater chance that a passive Phishing attack will fail. But no one is perfect, and targeted Phishing attacks will succeed eventually.

This is why users should be encouraged to report not only the attempt, but any failures as well – without the fear of punishment. This engagement will help lower the time it takes to address the incident, and in some cases, it could actually prevent an incident from exploding into a monumental disaster.

Users are often snickered at for trading their passwords for candy during social engineering experiments. However, this willingness to do a task that takes little effort in exchange for something of value works both ways.

The user who will trade access for sugar is also someone that can be trained to spot attacks for gift cards, and financially, that's affordable when compared to the cost of mitigating a data breach.


Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Wednesday, July 16, 2014

Superclass: 14 of the world’s best living programmers

It seems like there are lots of programmers out there these days, and lots of really good programmers. But which ones are the very best? Even though, there’s no way to really say who the best living programmer is, that hasn’t stopped developers from frequently kicking the topic around. ITworld has solicited input and scoured coder discussion forums to see if there was any consensus and, as it turned out, a handful of names did frequently get mentioned in these discussions. Based on that input, here are 14 people commonly cited as the world’s best living programmer.

Jon Skeet
Main claim to fame: Legendary Stack Overflow contributor
Credentials: Google engineer and author of C# in Depth. Holds highest reputation score of all time on Stack Overflow, answering, on average, more than 425 questions per month.
Quotes: “Jon Skeet doesn't need a debugger, he just stares down the bug until the code confesses” Steven A. Lowe
“When Jon Skeet's code fails to compile the compiler apologises.” Anonymous
“Jon Skeet's code doesn't follow a coding convention. It is the coding convention.”


Gennady Korotkevich
Main claim to fame: Competitive programming prodigy
Credentials: Youngest participant ever (age 11) and 6 time gold medalist (2007-2012) in the International Olympiad in Informatics. Part of the winning team at the ACM International Collegiate Programming Contest in 2013 and winner of the 2014 Facebook Hacker Cup. At the time of this writing, ranked first by Codeforces (handle: Tourist) and second among algorithm competitors by TopCoder.
Quotes: “A programming prodigy!” Prateek Joshi
“Gennady is definitely amazing, and visible example of why I have a large development team in Belarus.” Chris HowardLinus Torvalds

Main claim to fame: Creator of Linux
Credentials: Created the Linux kernel and Git, an open source version control system. Winner of numerous awards and honors, including the EFF Pioneer Award in 1998, the British Computer Society’s Lovelace Medal in 2000, the Millenium Technology Prize in 2012 and the IEEE Computer Society’s Computer Pioneer Award in 2014. Also inducted into the Computer History Museum’s Hall of Fellows in 2008 and the Internet Hall of Fame in 2012.
Quote: “He's pretty darn good.” Alok Tripathy

Jeff Dean
Main claim to fame: The brains behind Google search indexing
Credentials: Helped to design and implement many of Google’s large-scale distributed systems, including website crawling, indexing and searching, AdSense, MapReduce, BigTable and Spanner. Elected to the National Academy of Engineering in 2009. 2012 winner of the ACM’s SIGOPS Mark Weiser Award and the ACM-Infosys Foundation Award in the Computing Sciences.
Quotes: “... for bringing breakthroughs in data mining( GFS, Map and Reduce, Big Table ).” Natu Lauchande
“... conceived, built, and deployed MapReduce and BigTable, among a bazillion other things” Erik Goldman

John Carmack
Main claim to fame: Creator of Doom
Credentials: Cofounded id Software and created such influential FPS games as Wolfenstein 3D, Doom and Quake. Pioneered such ground-breaking computer graphic techniques adaptive tile refresh, binary space partitioning and surface caching. Inducted into the Academy of Interactive Arts and Sciences Hall of Fame in 2001 and given a lifetime achievement award by the Game Developers Choice Awards in 2010.
Quotes: “... Wolfenstein 3D, Doom and Quake were revolutionary at the time and have influenced a generation of game designers.” dniblock
“He can write basically anything in a weekend....” Greg Naughton
“He is the Mozart of computer coding….” Chris Morris

Richard Stallman
Main claim to fame: Creator of Emacs
Credentials: Founded the GNU Project and created many of its core tools, such as Emacs, GCC, GDB and GNU Make. Also founded the Free Software Foundation. Winner of the ACM's Grace Murray Hopper Award in 1990 and the EFF's Pioneer Award in 1998.
Quotes: “... there was the time when he single-handedly outcoded several of the best Lisp hackers around, in the Symbolics vs LMI fight.” Srinivasan Krishnan
“I might disagree on many things with the great man, but he is still one of the most important programmers, alive or dead” Marko Poutiainen

Petr Mitrechev
Main claim to fame: One of the top competitive programmers of all time
Credentials: Two-time gold medal winner in the International Olympiad in Informatics (2000, 2002). In 2006, won the Google Code Jam and was also the TopCoder Open Algorithm champion. Also, two-time winner of the Facebook Hacker Cup (2011, 2013). At the time of this writing, the top ranked algorithm competitor on TopCoder (handle: Petr) and ranked fifth by Codeforces
Quote: “He is an idol in competitive programming even here in India…” Kavish Dwivedi

Fabrice Bellard
Main claim to fame: Creator of QEMU
Credentials: Created a variety of well-known open-source software programs, including QEMU, a platform for hardware emulation and virtualization, FFmpeg (for handling multimedia data), the Tiny C Compiler and LZEXE, an executable file compressor. Winner of the Obfuscated C Code Contest in 2000 and 2001 and the Google-O'Reilly Open Source Award in 2011. Former world record holder for calculating the most number of digits in Pi.
Quotes: “I find Fabrice Bellard's work remarkable and impressive.” raphinou
“Fabrice Bellard is the most productive programmer in the world....” Pavan Yara
“Hes like the Nikola Tesla of sofware engineering.” Michael Valladolid

Doug Cutting
Main claim to fame: Creator of Lucene
Credentials: Developed the Lucene search engine, as well as Nutch, a web crawler, and Hadoop, a set of tools for distributed processing of large data sets. A strong proponent of open-source (Lucene, Nutch and Hadoop are all open-source). Currently a director of the Apache Software Foundation.
Quotes: “... he is the same guy who has written an exceptional search framework(lucene/solr) and opened the big-data gateway to the world(hadoop).” Rajesh Rao
“His creation/work on Lucene and Hadoop (among other projects) has created a tremendous amount of wealth and employment for folks in the world….” Amit Nithianandan

Donald Knuth
Main claim to fame: Author of The Art of Computer Programming
Credentials: Wrote the definitive book on the theory of programming. Created the TeX digital typesetting system. First winner of the ACM’s Grace Murray Hopper Award in 1971. Winner of the ACM’s A. M. Turing Award in 1974, the National Medal of Science in 1979 and the IEEE’s John von Neumann Medal in 1995. Named a Fellow at the Computer History Museum in 1998.
Quote: “There is only one large computer program I have used in which there are to a decent approximation 0 bugs: Don Knuth's TeX.” Jaap Weel

Anders Hejlsberg
Main claim to fame: Creator of Turbo Pascal
Credentials: The original author of what became Turbo Pascal, one of the most popular Pascal compilers and the first integrated development environment. Later, led the building of Delphi, Turbo Pascal’s successor. Chief designer and architect of C#. Winner of Dr. Dobb's Excellence in Programming Award in 2001.
Quote: “I revere this guy - he created the development tools that were my favourite through three key periods along my path to becoming a professional software engineer.” Stefan Kiryazov

Ken Thompson
Main claim to fame: Creator of Unix
Credentials: Co-creator, along with Dennis Ritchie, of Unix. Creator of B programming language, the UTF-8 character encoding scheme, ed text editor and co-developer of the Go programming language. Co-winner (along with Ritchie) of the A.M. Turing Award in 1983, IEEE Computer Pioneer Award in 1994 and the National Medal of Technology in 1998. Inducted as a fellow of the Computer History Museum in 1997.
Quote: “... probably the most accomplished programmer ever. Unix kernel, Unix tools, world-champion chess program Belle, Plan 9, Go Language.” Pete Prokopowicz

Adam D'Angelo
Main claim to fame: Co-founder of Quora
Credentials: As an engineer at Facebook, built initial infrastructure for its news feed. Went on to become CTO and VP of engineering at Facebook, before leaving to co-found Quora. Eighth place finisher at the USA Computing Olympiad as a high school student in 2001. Member of California Institute of Technology’s silver medal winning team at the ACM International Collegiate Programming Contest in 2004. Finalist in the Algorithm Coding Competition of Topcoder Collegiate Challenge in 2005.
Quotes: “An "All-Rounder" Programmer.” Anonymous
"For every good thing I make he has like six." Mark Zuckerberg

Sanjay Ghemawat
Main claim to fame: Key Google architect
Credentials: Helped to design and implement some of Google’s large distributed systems, including MapReduce, BigTable, Spanner and Google File System. Created Unix’s ical calendaring system. Elected to the National Academy of Engineering in 2009. Winner of the ACM-Infosys Foundation Award in the Computing Sciences in 2012.
Quote: “Jeff Dean's wingman.” Ahmet Alp Balkan

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Sunday, July 6, 2014

Sample Resume Career Objectives – Best Sample CV Objectives

The importance of including a career objective on your CV (Curriculum Vitae) cannot be overstated. This is a short statement, two or three lines long which sums up your goals and helps employers to decide whether or not you are suitable for their company. This is the first thing employers come across when reading your resume or CV, and can make the difference between them reading the rest of it and throwing it away, so make sure you take your time and think of a powerful and effective opening statement which sums you up perfectly.

If you’re stuck for ideas, why not take a look at some of the career objective examples below which are tailored to suit people seeking jobs in ICT, computing as hardware technicians, network administrators, Wireless LAN experts, software engineers, Cisco, CCNA, CCNP, CCIE career jobs, CompTIA A+, Network+, Security+ jobs as well as Microsoft MCSA, MCSE and MCDBA jobs.
  • To excel in my chosen field in a job that both challenges and inspires me, while pushing me to work to the best of my abilities and produce the highest quality work that I am capable of.
  • To work in an environment which encourages me to succeed and grow professionally where I can utilize my skills and knowledge appropriately.
  • To surround myself with motivated, skilled professionals in a job with opportunities for career development and advancement with hard work and dedication.
  • To fulfill my dream of becoming a successful computer hardware and networking engineer and have a job which challenges me every day.
  • To enhance my professional skills, capabilities and knowledge in an organization which recognizes the value of hard work and trusts me with responsibilities and challenges.
  • To secure an entry level position in a professional company where I can learn and develop my skills whilst assisting the company in their professional efforts to the best of my abilities with a devoted and trustworthy attitude.
  • To obtain a position in a large global company that will utilize my knowledge of computing and engineering and allow me the freedom to work with other like-minded individuals in a dynamic, inspiring environment.
  • To continue my already established career with a reputable company and contribute my outstanding skills of honesty, team-work and extremely thorough research skills.
  • To work towards a job within an organization where I am in a position of responsibility, and am able to use my skills and experience to commit myself to achieving organizational goals and targets efficiently and successfully.
  • To be a professional and dedicated employee in a company that I can provide with my extensive technical skills and experience.
  • As a recent graduate, I am seeking a role which allows me to continue learning and perfecting my skills as I provide high-quality work, and encourages me to flourish as a network technician.
  • I am looking for a challenging job with a rapidly growing organization that can provide me with a range of goals and job objectives within a contemporary and economical business setting.
  • I strive for continuous progress in everything I do, both personally and professionally, and so am keen to secure role which allows me to enhance and develop my all-round skills and abilities.
  • To build my career in a leading corporate environment dealing with cutting-edge equipment and technological developments that will allow me to utilize my self-motivated and honest nature.
  • I am seeking a job which supports my professional self-development and allows me to forward the aims of the company by providing key skills and work to complete organizational goals and targets.
  • I am interested in becoming a part of a respected and established company which allows me the freedom and responsibility to contribute to challenging and tricky projects and tasks.
  • To share and integrate my knowledge and skills with a small, independent company where I could have job satisfaction and accomplish my goal of becoming a successful and skilled hardware engineer.
  • To utilize my personal and professional qualities in a multi-national organization which gives me opportunities to demonstrate my competency and allow me a steadily paced rate of professional growth and development.
  • To work in a competitive and energetic setting that requires a high level of self-motivation and commitment, allowing me to effectively manage my own professional development and contribute my skills successfully.
  • To be challenged and motivated by my job and colleagues, and to work alongside a team which places high value on strong technical skills and analytically ability.
  • To be part of a mutually beneficial relationship with an organization where I can show my talent and skill in an atmosphere of growth and trust.
  • I am seeking a career change, and would like a job which allows me to use my extensive transferable skills and real world knowledge while providing me with the opportunity to perfect my technical skills.
  • I always endeavor to be the best at what I do, and so am seeking a position within a company with high focus on professional growth and career advancement through hard work and extensive professional experience.
  • I am a hard-working and committed individual with a strong focus on achieving personal goals and succeeding in a professional and challenging business environment.
  • To work hard and enhance my professional skills and working capacities with full determination and continue my aim of becoming a successful computer engineer for a growing company.
  • To work in a company which provides a challenging environment of excellence for me to display and use my skills and talents to add to the company’s goals and research.
  • To pursue a rewarding and challenging position within a company that provides a high level of professional satisfaction and the opportunity to succeed in my goals.
  • To gain a secure position in the world of computing as part of an enthusiastic and hard-working team of skilled individuals, that allows me to improve and develop my career over time.
  • To contribute to an organization in a creative and innovative way in order to become a key player in the company and feel satisfied with my perseverance and commitment to ICT.
  • To be involved in a dedicated and rewarding professional relationship with a large company on a part-time basis while I complete my Masters Degree in Computing.
  • To be a motivated and skills oriented employee in a long-term position with a respected and established company where I can display my skills and knowledge to ensure an environment of growth and productivity.
  • After over a decade of experience in various related roles, I am now seeking to gain a managerial position where I can utilize my gained skills and acquired knowledge, both technical and interpersonal.
  • My knowledge of comprehensive technical skills and hard-working attitude make me an excellent choice for a position in an up and coming organization which seeks to expand and grow with the help of dedicated employees.
  • In my first job I will be a dedicated and professional member of any team, with plenty of learned skills, problem-solving experience and a keen to learn attitude.
  • I am seeking an entry-level position in a vibrant and interesting organisation that will encourage me to enhance my creative and technical knowledge, and allow me to learn and use innovative new skills and concepts.
  • To carry out my role in an efficient and cost-effective way and do everything in my power to provide supreme quality workmanship and a suitable level of professional ability.
  • To be a highly motivated and well-educated member of a certified company where I can be a part of a close-knit team to contribute towards the overall expansion and development of the organization while also working on my own professional advancement.
  • Although my experience is primarily in other sectors, I hope that transitioning to a job in computing will provide me with the opportunity to enrich my existing knowledge and acquire new experiences using my excellent management skills.
  • I am a knowledgeable and experience expert in my field who is seeking a fast-paced, challenging role that will provide the opportunity for further advancement to managerial and supervisory positions.
  • To apply my learned knowledge and skills to real-world situations in a demanding environment and be a valuable team member in order to contribute efficient and important skills to the workplace I am in.
  • To utilize my technical skills and provide a professional service to customers by applying and honing my knowledge and working in a challenging and motivating working environment.
  • To utilise my seven years of experience in the field of hardware engineering to pursue a long-term position with a company on the forefront of computing innovation and invention, with particular focus on graphics and video operation and development.
  • To work for a large and well established organisation and display my experience and relevant skills in IT service desk management and development.
  • To be a successful and stimulated employee who meets and exceeds productivity targets with the overall aim of aiding my organisation in its professional growth and expansion.
  • To be a proactive team member in a small business environment where I can work as part of a welcoming and skilled group of workers, allowing me to learn from and be further inspired
  • by the people around me at all times.
  • To join a company in a full time capacity in the field of network development and engineering which will allow me to demonstrate my skills and knowledge of creative system design and application development.
  • To be an enthusiastic and committed employee with an eye for detail and a hard-working attitude, in an inspiring and innovative development team.
  • To join an expanding and successful company as a C++ software engineer and utilize my personal and professional skills and meet company objectives in a timely and efficient manner.
  • To be a member of a company with an exciting and multidisciplinary purpose where I will be a crucial part of developing software and applications and demonstrating my team-work skills and self-motivation.
  • To work in a growing sector as a successful and experienced individual with a position that aids professional development and provides learning and development opportunities.
  • To fulfill my goal of becoming a successful software engineer as part of the telecoms sector in a globally renowned organization with a competitive and motivating environment.
  • To seek a long-term career in computing with a company which I can provide with my large set of skills and receive support and professional benefits from.
  • To use my education, interpersonal and technical skills and experience to be a valuable team member in a part-time capacity whilst pursing my Undergraduate degree in MSC Computing at a world renowned university.
  • To develop and create effective IT solutions in a stable yet challenging workplace setting which encourages me to build strong business relationships with customers and clients.
  • To work in a diverse and rewarding atmosphere that is full of creative opportunities and allows me to use my skills for the mutual development of the company and myself.
  • To utilize my strong work ethic and hard-working nature in the area of hardware engineering and provide my skills and experience to a company which strives to support its employee’s personal and professional growth.
  • To make use of my extensive experience in LAN and WAN network engineering to work in a multidisciplinary, customer-focused company with a focus on innovation and excellence.
  • To develop and continuously learn more about my chosen field for a high-energy and enthusiastic company that values academic, technical, analytically and interpersonal skills.
  • To secure a position with a company that will utilize my passion for computer engineering and help me to create a positive working environment for myself and my colleagues
  • To join a successful, high-tech company who I can bring skills in application design and a breadth of technical skills in order to create and deliver high quality technical solutions.
  • To be a part of a senior software development team with a high level of responsibility and independence to match my extensive industry experience and high-quality work ethic.
    To utilize the skills learned throughout my degree in order to join a success oriented environment where job satisfaction and professional development are awarded a high level of attention.
  • To provide rewarding and high quality services as part of a team of highly motivated individuals with a range of essential skills and attributes in order to ensure a high level of personal and professional development.


Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com