Impacting business profitability, productivity, and competitive performance through skillful alignment of technical resources with enterprise mission is one of the many ways I served an instrumental role in the success of past employers. As an innovative IT Operations & Cyber Security Consultant with more than 16 years of combined experience in the Defense, Hospitality, financial, and technology services industries, I have led and planned IT Security infrastructures, software product development and deployments, and strategic operations. I offer extensive experience leading start-up software companies and delivering high quality technology solutions on-time and on-budget.
• Responsible to plan, coordinate, direct, and design IT-related activities of the organization, as well as provide administrative direction and support for daily operational activities of the IT department
• Work closely with decision makers, Owners, Stack Holders in other departments to identify, recommend, develop, implement, and support cost-effective technology solutions for all aspects of the organization
• Lead IT Department operational and strategic planning, including fostering innovation, planning projects, and organizing and negotiating the allocation of resources
• Benchmark, analyze, report on, and make recommendations for the improvement and growth of the IT infrastructure and IT systems
• Manage financial aspects of the IT Department, including purchasing, budgeting, and budget review. Develop business case justifications and cost/benefit analyses for IT spending and initiatives
• Develop and implement all IT policies and procedures, including those for architecture, security, disaster recovery, standards, purchasing, and service provision. Negotiate and administer vendor, outsource, and consultant contracts and service agreements
• Assessed client needs and developed a customized security plan that included the latest technology, tools, and techniques
• Conducted penetration testing on client’s company network to identify vulnerabilities in system’s security controls
• Performed vulnerability scans against client networks using Nessus and OpenVAS tools to identify potential weaknesses within the network infrastructure that could be exploited by hackers or malware such as viruses or Trojans.
• Created detailed documentation of all findings for management review and approval
• Developed training program for employees on how to recognize phishing emails and other cyber threats
• Developed an incident response plan for the company in case of a data breach or other cyber-related emergency.
• Lead two teams of developers having 5 to 6 developers in each team.
• Ensured team members stayed on task.
• Assigned coding tasks to various team members.
• Regularly monitored work and cut problem members before issues became large.
• Directed team meetings to check on progress and plan code directions.
• Designed, developed, documented, refined and maintained web applications in Microsoft-centric environment for different departments.
• Built and maintained web-based applications for intranet using C# and Java.
• Conducted a thorough needs analysis by surveying internal and external stakeholders.
Develop Complex Database driven applications through which clients easily developed multi dimensions / pivot reports at their end, data gathered from different marketing surveys. Improved functioning of databases, communication systems, storage area networks and server configurations.
Developed UML use case diagrams using Rational Rose. Analyzed and debugged production issues in .NET applications and implemented fixes and conducted handover sessions to provide system setting, source code review, configuration and Special instructions.