Insightful Information Technology Manager with 15 years of IT leadership experience including oversight of infrastructure, application support and security services. Dedicated to customer satisfaction with focused delivery of technical solutions. Proven leader in directing operations, maintenance and support of complex systems. Develops creative business solutions, leveraging diverse methodologies and delivering engineering solutions for leading organizations. Highly adept in request for proposal development, technology needs assessments and staff training.
• Spearheaded digital transformation initiatives for a diverse clientele, analyzing their IT infrastructure and recommending tailored solutions to streamline operations and enhance efficiency.
• Conducted in-depth cybersecurity assessments for medium-sized enterprises, identifying vulnerabilities and designing robust defense mechanisms to safeguard against potential cyber threats.
• Advised clients on IT infrastructure upgrades and optimizations, conducting thorough assessments of existing systems and proposing cost-effective solutions to improve performance and scalability.
• Collaborated with cross-functional teams to develop customized software solutions tailored to client's specific business needs, ensuring seamless integration and user adoption.
• Provided ongoing technical support and troubleshooting for clients, resolving complex issues promptly to minimize downtime and optimize productivity.
• Delivered comprehensive training sessions for end-users on new technologies and software applications, empowering them to leverage tools effectively and maximize ROI.
• Assisted senior consultants in conducting research and analysis on industry trends and emerging technologies, contributing valuable insights to client projects.
• Supported the development and testing of prototype software solutions, gaining hands-on experience with programming languages and development frameworks.
• Participated in client meetings and presentations, helping to communicate technical concepts clearly and concisely to non-technical stakeholders.
• Contributed to the creation of project documentation, including requirements specifications, technical design documents, and user manuals, ensuring clarity and accuracy throughout the project lifecycle.
• Managed a team of 3 employees, supervising, training, and professional growth of employees.
• Completed paperwork, recognizing discrepancies and promptly addressing them for resolution.
• Resolved conflicts and negotiated mutually beneficial agreements between parties.
• Managed on-site evaluations, internal audits, and customer surveys.
• Oversaw daily operations to ensure high levels of productivity.
• Demonstrated respect, friendliness, and willingness to help wherever needed
• Supervised work of contracted employees to keep them on task for timely completion.
• Actively listened to customers' requests, confirming full understanding before addressing concerns.
• Developed and maintained courteous and effective working relationships. Developed team communications and information for meetings.
• Led projects and analyzed data to identify opportunities for improvement.
• Used critical thinking to break down problems. evaluate solutions and make decisions.
• Developed and maintained incident response protocols to mitigate damage and liability during security breaches.
• Created cybersecurity best practice communications to educate staff against known threats and potential attack vectors.
• Collaborated with third-party payment card industry (PCI) compliance partners.
• Designed company-wide policies to align operations with Center for Internet Security (CIS) standards.
• Directed in-house cyber security auditing program to detect flaws and weaknesses. Selected and installed company security solutions.
• Monitored the Use of data files and regulated access to protect secure information.
• Encrypted data and erected firewalls to protect confidential information.
• Monitored computer virus reports determining when to update virus protection systems.
• Developed plans to safeguard computer files against modification, destruction, or disclosure.
• Performed risk analyses to identify appropriate security countermeasures.
• Reviewed violations of computer security procedures and developed mitigation plans.
• Conducted security audits to identify vulnerabilities.
• Recommend improvements in security systems and procedures.
• Proposed technical feasibility solutions for new system designs and suggested options for performance improvement of technical components.
• Configured new systems and protocols according to strict company guidelines and employee preferences.
• Implemented firewalls, two-factor authentication, and antivirus software for networks supporting 1 to 60 users.
• Provided system acceptance reviews for installed systems, verifying compliance with applicable performance metrics and compatibility expectations.
• Supported informal and formal test events such as load file stability events and other customer-driven activities.
• Completed technical reviews of existing systems and suggested updates or changes.
• Coached telecommuting employees on the best methods to handle network problems at locations.
• Implemented new network infrastructure at Teselta with a cost of $275,000 in 25 days.