Dynamic and energetic hands on leader with a proven ability to direct quality programs, and deliver enterprise projects. Able to train, lead, and motivate effective cross-functional teams. Exceptional presentation and communication skills. A strategic planner adept at getting in the dirt, assessing the technology needs of the business and developing workable roadmaps for delivering creative solutions. Proven track record of positioning IT and Security as a business partner whose seat at the table is essential to driving winning objectives. Recognized as an organizational thought leader and subject matter expert. Demonstrated history of continuous improvement across the people, process, technology triad. An established proficiency in IT governance, policy creation, and standards implementation.
Renegotiated and consolidated contracts, services, and vendor engagements, saving $1.2 million over 5 years
Maximized limited resources by corralling scattered technologies to tried-and-true, education-friendly platforms and standards
Spearheaded centralized technology procurement, leveraging state-sponsored cooperative product and service contracts, yielding 6-figure savings in under 24 months
Led transformation of virtual learning by expanding seven classrooms across three centers to over 40 adaptable learning environments in six disparate locations
Directed, architected, and engineered a complete LAN and WAN overhaul, interconnecting rural sites and campus buildings using SD-WAN mesh topology, standardized hardware, and new fiber in many locations for a significant boost in performance, scalability, and security
Introduced directory services, IAM, and SSO, delivering transparent management and a seamless user experience across dozens of XaaS apps and services
Instituted disciplined ITSM through trouble ticketing, service request submission, end-user visibility, self-service options, and executive reporting
Revitalized lagging LMS system (Blackboard) to peak performance; led platform upgrade to full SaaS experience
Hardened dozens of technology resources according to strict information security practices, including firewalls, operating systems, privileged accounts, on-prem software, SaaS applications, retention systems, access control systems, video surveillance, etc
Authored or co-authored hundreds of pages of previously unavailable documentation
Revitalized communication and collaboration by replacing VoIP system, updating handsets, introducing chat, remote office, smart voice apps, video integration, and streamlined call routing, engineered to favor person-to-person interaction
Introduced and directed high-quality video streaming services at academic and sporting events, expanding local-only attendance to global visibility
Led million-dollar video surveillance and access control project, successfully replacing 6 disconnected security systems with Verkada, a unified, fully integrated physical security platform empowering minimal staff with maximum visibility
Served as the Technology Committee Chair, as a key contributor on the Executive Council, as well as a member of various other administrative committees and project teams
Professional IT consulting services include: • Recommend cost-effective technical solutions to mitigate risk and improve productivity • Implement, administer, and troubleshoot various platforms, technologies, products, and services • Perform vulnerability, productivity, and efficiency assessments on client’s focus areas • Prepare audit reports and provide recommended remediation strategies/solutions • Serve as technical expert and provide ongoing optimization and problem-solving support • Report emerging trends and provide recommendations for improvements and upgrades • Install and configure hardware, software, and peripheral equipment for system users • Oversee installation, implementation, configuration, and support of network components • Develop and implement policy, programs, and guidelines • Raise awareness and perform training on various technologies and best practices
Having been the leading IT Security SME in the organization, I was tasked with creating its first IT Security Department and Program, and placed at its head. The primary duties of this role were as follows: • Advise senior management on cost/benefit analysis of information security programs, policies, processes, systems, and elements • Acquire and manage the necessary resources, including leadership support, financial resources, and key security personnel • Manage departmental, interdepartmental, and enterprise projects through full life-cycle • Communicate the value and promote the visibility of IT security throughout all levels of the organization • Continuously validate the organization against policies/guidelines/procedures/regulations/laws to ensure compliance with regulatory bodies including: PCI-DSS, GLBA, FTC, and CFPB • Lead and align IT priorities with the security strategy • Monitor and evaluate the effectiveness of the enterprise’s security safeguards to ensure they provide the intended level of protection • Author, implement and oversee IT and IT Security standards, guidelines, policies, processes, and best practices. • Oversee the information security training and awareness program • Track audit findings and recommendations to ensure appropriate mitigation actions are taken • Establish, implement, and manage an effective cross-functional incident response team (IRT) • Establish and maintain a secure SDLC practice in collaboration with in-house development • Implement a standards-based (ITIL and COBIT) approach to IT service management
This role was a hybrid between the leadership and technical job ladders and required a high-level adaptability to a rapidly changing and ambiguous environment. Responsibilities ranged from day-to-day operations to consulting on enterprise projects to management and oversight of subordinate roles such as junior administrators and analysts. • Provided senior-level subject-matter expertise and support on all security services, both information and physical • Acted in an advisory capacity on all current and future security technologies, strategies, procurements, and decisions • Aided in the architecture of security directives in congruence with the enterprise security strategy • Provide operational management on technology products and services ranging from Active Directory to SIEM to SSO • Helped to write policies, procedures, and best practices, and training on such was not uncommon
This position required a broad and deep technical knowledge on many platforms, products, services, technologies, systems, hardware, and software. Responsibilities included: • Acting service owner and SME on: Active Directory, SharePoint, Group Policy, Microsoft Exchange, Windows Server, Solarwinds, MDM, RBAC, Telecommunications, VMWare, NAC, Endpoint, many more • Configure and optimize network hubs, routers, and switches • Patch network vulnerabilities to ensure information is safeguarded against outside parties • Test and maintain network infrastructure including software and hardware devices • Check server availability, functionality, integrity, and efficiency • Design group policies and access control lists • Install server fixes, updates, and enhancements • Monitor and maintain server configuration and maintenance • Diagnose and resolve internally reported system incidents • Design, implement, monitor, and maintain physical security hardware, software, and systems