Zoey Jiang

Zoey Jiang

Followers of Zoey Jiang12 followers
location of Zoey JiangSeattle, Washington, United States

Connect with Zoey Jiang to Send Message

Connect

Connect with Zoey Jiang to Send Message

Connect
  • Timeline

  • About me

    IT Project Manager

  • Education

    • Chongqing University

      2005 - 2009
      Bachelor's degree Computer Software Engineering 3.89/4.0 GPA IELTS 6.5

      Activities and Societies: Computer society, Finance Society Courses included: 1.Software Project Management2.Database Principle and Design, Foundation of Program Design, 3.Foundation of Information System, 4.Discrete Mathematics, Web Development Technology, 5.Principle of Operating system, 6.Data Structure and Algorithm, 7.Introduction to Software Engineering

    • University of Toronto

      2010 - 2012
      MSc Cyber Security Computer science 3.91/4.0 GPA IELTS 7.0

      Activities and Societies: Ork Chinese Students Association) Table tennis Club, Tennis Club, Badminton Club Courses included: 1. Identity、Trust、Reputation and their Applications2. ryptography Theory and Applications3. Networks and Communications Security: Threats、Attacks and Countermeasures4. Malware and Other Malfeasance5. Cyber Security Research Skills6. Widers Aspects of Cyber Security7. Rigour in Secure System Development & Assessment8. Forensic Analysis of Cyber Incidents9. ndependent Study Module - Cyber Security Individual Project

  • Experience

    • Alibaba Group

      Apr 2012 - Oct 2019

      • Responsible for helpdesk related work。• support for the national office intranet user operating system, including troubleshooting, • installation and configuration, • responsible for the connection of network requirements, technology selection, • network planning and implementation of each branch and subsidiary.• Responsible for monitoring and maintaining the company's intranet, • and providing services to ensure its normal operation. • Responsible for network architecture design and optimization. • Troubleshooting, summarizing problems, • and writing operation and maintenance automation scripts. Responsible for the establishment and maintenance of internal services. (AD Domain Controller, DNS, Group Policy, Shared Folders, NAS, Authentication, Access Compliance, Proxy, Crawler, VPN, etc.) Show less • Manage/configure database servers/clients including SQL Server 2008R2/2012, Oracle 10g/11g and MySQL on Windows, Linux and OS.• Design/review logical and physical database structure and conduct database installation, configuration and security control.• Automate database routine backup/restore and data migration using SSIS and SQL Agent.• Perform database tuning including indexes creation, SQL queries optimization, memory/disk management, tempdb isolation.• Perform database monitoring/maintenance using tools including Windows Performance Monitor, SQL Profiler and SQL Sentry.• Design data warehouse to assist reporting, including building and deploying cube using SSAS.• Manage disaster recovery database server by database replication and transaction log shipping.• Co-operate with and provide technical support to project teams and associates. Show less

      • Senior Software Engineer

        May 2015 - Oct 2019
      • Database Administrator

        Apr 2013 - May 2015
      • Operations Engineer Assistant

        Apr 2012 - Apr 2013
    • BCJobs

      Mar 2020 - Oct 2022
      Manager, Cybersecurity Architecture and Compliance (WorkSafeBC)

      and enterprise security architecture for the organization.• Develop a mature DevSec Ops practice and Identity & Access management practice.• Lead, review and implement security best practices and controls within a Microsoft Azure cloud environment and establish base line security controls.• Commissioning risk assessments and vulnerability investigations of security controls to ensure compliance.• Provide operational support for IT Risk Management including monitoring and reporting of current IT risks. Supporting the Enterprise Security Governance Committee.• Investigate unauthorized system access and intrusion, when requested by Labour Relations (HR) or the Investigations Division; and provide internal consultation services on security issues.• Organize and participate in cybersecurity awareness program to improve WorkSafe BC staff awareness of security issues and practices.• Participate in the development of standard vendor contract language and terms and conditions in relation to security policies and practices. Show less

    • CVE Technologies Group, Inc.

      Apr 2023 - now
      IT Project Manager

      • Directs the installation and maintenance of hardware, software and telecommunications equipment in the company's data centers.• Maximize the efficiency and effectiveness of technology delivery and support. Identify opportunities to reduce costs and improve service levels.• Analyze, select and modify application software, install network hardware and software, and database management and integrity.• Assist senior management in establishing long-term technology goals and objectives for the company.• Review reports on progress, work trends and issues.• Ensures highly responsive technical support is provided to employees and identifies service gaps.• Reviews reports on progress, work trends, and issues.• Ensures highly responsive technical support is provided to employees and service gaps are identified. Communicate departmental progress and issues to executive level management.• Represents the interests of the company at multiple levels and performs other job duties as assigned.• Maintains network and system security, utilizing monitoring tools and support services. Install, configure and maintain the Fortinet security stack including Fortigate, Forticlient, Fortitoken, Fortisandbox and FortiAuthenticator.• Troubleshoot complex issues with Windows/Mac technologies and servers and systems, perform network address assignment, DHCP configuration and route management.Perform information security risk assessments of projects, new technologies, it assets, applications and vendors, and implement and monitor the effectiveness of it security controls. Prevent leakage of sensitive information to unauthorized individuals. Show less

  • Licenses & Certifications