Mohammed Jawad Loya

Security Operations Team Lead

Mohammed Jawad Loya is a qualified professional, working in Unisys main office of which is in 3536. on the position of Information Security Analyst from 2011. Mohammed has earned professional experience in more than seven positions at different companies. Mohammed Jawad Loya went to the University of Maryland and received education to 2006. El Segundo, California is the area, where this professional was lastly known to be living. This professional's phone and email are easily accessed through SoftwareOfficial on demand.
Name variants:
Mohammed Loya
Last updated Jun 09, 2024

Contact Information

Last Update
Jul 4, 2022
Email
lo**@saic.com, mo**@unisys.com, ja**@yahoo.com
Location
El Segundo, CA
Company

Workplace

Unisys
Information Security Analyst

Blue Bell, PA

Industry

Information Technology and Services, Information Systems And Services, Computer Maintenance/Repair, Computer Systems Design

Work History

Information Security Analyst

801 Lakeview Dr SUITE 100, Blue Bell, PA
May 2011 — Oct 2014

Information Security Analyst

44425 Airport Rd SUITE 250, California, MD 20619
Oct 2010 — May 2011

Network Engineer

Jun 2007 — Oct 2010

Network Administrator

12820 Wisteria Dr, Germantown, MD 20874
Apr 2006 — Jun 2007

Network Administrator

9900 Belward Campus Dr, Rockville, MD 20850
May 2005 — Apr 2006

Network Administrator

9000 Rockville Pike, Bethesda, MD 20892
Apr 2003 — Apr 2005

Security Operations Team Lead

12010 Sunset Hills Rd, Reston, VA 20190

Occupations

Executive
Team Leader
Security
IT Professional
Information Security Analyst
Information Technology Specialist
Operations Manager
IT Analyst
IT Specialist

Skills

Writing
Cards
Windows Server
Help Desk Support
Blades
Ids
Patch Management
Internet Backbone
Network Monitoring Tools
Sccm
Restore
Infrastructure
Big Picture
Dreamweaver
Windows
Dell Openmanage
Community
Vulnerability
Novell
Samba
Sata
Finance
Security Controls
Information System
Linux Server
San
Cost Effective
Rack
Centos
Instruct
Work Ethic
Csam
Mailbox
Compliance Procedures
Continuous Monitoring
Windows Xp
Ssh
Nih
Assessment
Detection
Beyond Compare
Wan
Management
Loading
Pc
Hardening
Comptia
Security
Desktop Computers
Sha
Information Assurance
Microsoft Cluster
Integration
Data Backup
Checking
Routers
Analyzer
Vmware Server
Group Policy
Lung
Auditing
Coordinated
Information Systems
Monitors
Gigabit
Source
Sharepoint
Accounting
Blood
Linux
Baseline
Algorithms
Cissp
Web Content
Trees
Migrating
Outages
Networking
Local Area Network
Troubleshooting
System
Cluster
Business Services
Cell
Trade Unions
Tier Ii
Switches
Wireshark
Utilization
Radio Access Network
Sage Act
Windows 2000
Reports
Tcp/Ip
County
It Documentation
Internet Protocols
Verifying
Inventory
Connecting
Norton Ghost
Cooperative
Testing
Bmc Remedy
Disk
Policy
Federal Agencies
Disaster Recovery
Status Reports
Solaris
Institutes
Image
Solution
Scripting
Symantec Security
Vmware Infrastructure
Virus
Scheduling
Documentation
Vpn
Research
Remote Access
Appeals
System Monitoring
Emerging Technologies
Reporting
Hearings
Locating
Shares
Microsoft
Msi
Asa
Pix
Vmware
Guides
Analysis
Hardware
Wsus
Enterasys
Whatsup
Advertising Agency
Bash
Medical Research
Information Technology
Inactive
Packet
Notification
Information Security
Precise
Yahoo
Backup Exec
Cisco Call Manager
Management System
Configurations
Controllers
Fix Protocol
Operating Systems
Network Infrastructure
Nessus
Applications
On Call
Chassis
Detail
Ips
Advertising
Business Operations
Active
Mailboxes
Batch Files
Suite
Snmp
Dell Computers
Admin Studio
Repository
Maps
Credit
Checks
Network Administration
Permissions
Technical Support
Data Logging
Project
Thunderbird
Rollout
Delivers
Catalyst Switches
Supports
Fisma
Mechanism
Catalyst
Data Migration
Laptops
Servers
Dhcp
Zenworks
Websites
Simple
Tape Storage
Firewalls
Regulations
Distribution
International
Not For Profit
Application Testing
Art
Rotation
Purchasing
Cisco Technologies
Fdcc
Google Groups
Executive Management
Active Directory
Intrusion Detection
Cables
Itil
Switch
High Quality
Trust
Ossec
Interfaces
Network Connectivity
Microsoft Exchange
Reviews
Gold
Administering
Stat
Intruder
Computer Security
Harris
Connectivity
Desktop Environment
Nist
Ports
Visio
Software
Windows Nt
Concerts
Compliance
Outlook
Microsoft Servers
Phase
Emc
Stig
Network Communications
Agents
Weaknesses
Tracing
Telephony
Console
Vault
Commerce
Scanners
Firmware
Syncsort Backup Express
Wmi
Meetings
Technical Implementation
Suse
Nist 800 53
Vulnerability Scanning
Web Pages

FAQs about Mohammed Jawad Loya

What's the profession of Mohammed Jawad Loya?

This professional's job is Security Operations Team Lead

What are the main profession of This professional?

These person's professions are Executive and Team Leader

Where does Mohammed Jawad Loya currently live?

El Segundo, California is the place where Mohammed Jawad Loya lives

What is the professional's email?

The expert's email is lo**@saic.com and mo**@unisys.com.

How many companies did Mohammed Jawad Loya work at?

Mohammed Jawad Loya worked at seven jobs.

What education does Mohammed Jawad Loya have?

Mohammed studied at the University of Maryland to 2006.

Are there any professional industries Mohammed Jawad Loya works in?

This person works in Information Technology And Services industry.

Are there any special skills Mohammed Jawad Loya has?

Mohammed Jawad Loya has skills in the following areas: Writing, Cards, Windows Server, Help Desk Support, Blades, Ids, Patch Management, Internet Backbone, Network Monitoring Tools, Sccm, Restore, and Infrastructure.
Login