Career Level: Mid-Level
Career Industry: Manufacturing
Career Field: Information Technology
Degree: Associate of Applied Science
Highly motivated and skilled IT professional seeking to leverage extensive experience in Microsoft 365, Azure Services, and Intune in a challenging role. Adept in Endpoint Management, Network Support, and System Engineering, aiming to contribute to and grow with a dynamic team, utilizing strong technical expertise and a commitment to excellence in IT infrastructure and security.
Expert in Microsoft 365 and Azure Services: Demonstrated proficiency in leveraging Microsoft 365 and Azure for efficient system administration, including automation and cloud computing.
Skilled in Intune and Endpoint Management: Extensive experience in managing endpoints and deploying security policies using Microsoft Intune, ensuring high system security and efficiency.
Identity and Access Management Expertise: Demonstrated skill in managing identities and access, utilizing Single Sign-On, Multi-Factor Authentication, and identity federation to enhance security and compliance. Efficient in implementing IAM strategies to safeguard data across platforms.
Network Support Engineering Expertise: Proven track record in configuring, managing, and maintaining networks, enhancing system performance and uptime, and implementing robust network security measures.
System Support Engineering Skills: Adept in system monitoring, alerting infrastructure, and maintenance, resulting in high system reliability and near-perfect uptime.
Automation and Scripting Proficiency: Skilled in automating system administration processes using PowerShell scripting, significantly improving task completion speed and operational efficiency.
Strong Foundation in IT Infrastructure and Security: Solid background in IT infrastructure, security policies, access control mechanisms, and ensuring compliance with security standards.
Experience in Technical Support and Training: Experienced in providing technical support, troubleshooting, and training, improving user experience and system usage effectiveness.
Specialist, IT Infrastructure — Network Support
Celestica - Greater Minneapolis - St. Paul Area, MN
Aug 2022 - PresentParticipate in the development of effective network design and strategy
Provide technical support and perform maintenance
Provide technical guidance to customers and departmental staff on network issues
Perform service monitoring and reporting, with a focus on risk management and compliance
Explore new solutions, enhancements, and opportunities for continuous improvement, projects, and more
Provide network troubleshooting and effective solutions to network problems while minimizing downtime
Install and configure network equipment to update or fix hardware or software issues
Monitor computer systems to improve network performance for computer systems and networks
Lead projects and change management initiatives
IT Consultant / Systems Engineer
Olson Tech Services - Greater Minneapolis - St. Paul Area, MN
Sep 2021 - PresentUnderstanding a client's business needs.
Diagnosing IT system problems, inefficiencies, and weaknesses.
Implementing a technological solution to meet business needs.
Training staff to use the new IT system.
Producing detailed reports on the efficacy of the technology.
Information Technology Specialist
U.S . Army - Fort Snelling, MN
Jun 2019- PresentInstalls, operates and maintains computer systems and local area networks (LAN)
Performs system administration (SA) and maintains computers and servers within the computing environment (CE) and the network environment (NE)
Configured, managed, and maintained unclassified, Secret, and Top Secret networks; monitored system performance and resolved system issues, increasing uptime and response time by 20%.
Performs network administration (NA); installs, configures and maintains network equipment within the LAN
Installs, operates, and maintains commercial off the shelf (COTS) equipment (i.e. routers, switches, desktop and laptop computers)
Provides system administration to Tactical Battle Command Servers (TBC Server) in the tactical operations center (TOC)
Provides system administration and direct support for Information Dissemination and Content Staging
Performs Information Assurance (IA)
Provides the security services and attributes of availability, authentication, confidentiality, integrity and non-repudiation
Network Operations (NetOps) Service Desk Management, which includes incident and problem processing, change request processing, availability management and user interaction.
Assists in the planning, configuration, management, and monitoring of the wide area network (WAN)
Senior System Engineer
Emerson Technologies, Inc. - Greater Minneapolis - St. Paul Area, MN
Aug 2022 - PresentConfigured, managed, and maintained networks; monitored system performance and resolved network issues, increasing uptime and response time by 20%.
Automated system administration processes using PowerShell scripting, resulting in completing tasks more quickly, freeing up resources, and increasing overall efficiency by 15%.
Implemented system monitoring and alerting infrastructure to track disk space, CPU usage, memory usage, application logs, and backup status across multi-tenant servers and proactively managed system performance and capacity.
Implemented security measures to protect network operations with access control lists, patch management, and system hardening techniques.
Installed and configured network applications to ensure secure communications, data integrity, and privacy.
Implemented endpoint automation deployment process for multi-tenancy endpoint provisioning for over 20 client-specific setups, while automating the process increased overall efficiency and labor cost by 80%
Develop and implement innovative solutions to enhance network performance, scalability, and reliability, ensuring optimal system operation and customer satisfaction.
Assist in the evaluation and selection of hardware and software solutions to meet the organization's system engineering needs, ensuring compatibility, scalability, and cost-effectiveness.
System Administator
PCS Residential - Greater Minneapolis - St. Paul Area, MN
Mar 2022 - Aug 2022On-Board Employees / Off-Board Employees
Maintain Network / Server Operations
Manage Cloud Infrastructure
Manage Network Infrastructure
Facilitate and Manage IT Budget
Create Documentation / Procedures / Protocols
Manage End-Point Devices / End-Point Security
Manage Security Operations | Identity / End-Point Security
Manage VoIP Infrastructure
Upgrading, installing, and configuring application software and computer hardware.
Implemented system monitoring and alerting infrastructure to track disk space, CPU usage, memory usage, application logs, and backup status across organizations endpoints
Executed maintenance procedures and established performance baselines to detect and rectify performance issues, resulting in 99.9% system uptime.
Configured maintenance updates, patches, and provided server security promptly to ensure system reliability and security.
Install and upgrade computer components and software, manage virtual servers, and integrate automation processes conducted regularly and consistently across the servers to meet the organization’s security compliance standards.
End-User Computing Engineer
Vanco, Inc. - Greater Minneapolis - St. Paul Area, MN
Dec 2021 - Mar 2022Developed and maintained automated scripts to install Windows-based operating systems on desktops and laptops and configured them with remote desktop connection and mobile device management software.
Developed macOS Zero-Touch Deployment solutions to automate device provisioning which resulted in reducing the manual configuring time by 30% and increased deployment process rate by 40%.
Developed Windows AutoPilot Deployment solutions to automate device provisioning which resulted in reducing manual configuring time by 80% and increased deployment process rate by 60%.
Managed 400 End-Points by deploying security policies, patching, and vulnerability assessments with Microsoft Intune and Jamf.
Collaborate with IT team to implement and maintain end-user hardware and software solutions that meet business needs and improve efficiency.
Technical Support Specialist
UnitedHealth Group, Inc. - Greater Minneapolis - St. Paul Area, MN
Jun 2021 - Nov 2021Install and configure computer systems and applications within the company.
Respond to customer inquiries and assist in troubleshooting and resolving challenges.
Actively update, maintain, and monitor all aspects of computer networks.
Maintain a working log detailing all required system updates, as well as the date of completion.
Organize and file documentation about warranties and instructional guides for computer hardware.
Assist management in creating training materials for computer troubleshooting and usage Reduced customer wait times by 40%, and resolved technical issues with approximately 95% accuracy.
York TSI
AUG 2016 - AUG 2018
Created and maintained website
Examined and analyzed site traffic
Regulated and manage access rights of different users on website
Created and modified appearance and setting of site
Tested website to see if there are any parts that are difficult to use
Fixed links that didn't work and pictures that weren't appearing properly
Kept user privacy enforced
Our Lady of Grace Catholic School
MAR 2013 - JUL 2014
Piloted 1:1 Laptop / iPad Program
Image Laptops / iPads (Student, Teacher, and Admin)
Assisted in Re-Deployment of new 1:1 Laptop / iPad Program
Researched and presented technology to technology board
Created School Mobile Application
Boy Scout Troop 102
APR 2012 - JUL 2014
Created and maintained website
Examined and analyzed site traffic
Regulated and manage access rights of different users on website
Created and modified appearance and setting of site
Tested website to see if there are any parts that are difficult to use
Fixed links that didn't work and pictures that weren't appearing properly
Kept user privacy enforced
Dunwoody College of Technology
Associate of Applied Science, Computer Networking System
Learning Outcomes:
PowerShell Scripting
Installing & Configuring Domain Controllers
Create and Manage Active Directory (AD) Users, Groups, Organizational Units (OU), and Computers
Implementing Server Storage, Data Deduplication, and Failover Cluster
Configure Service Authentication & Account Policies
Install, Configure, and Manage Certificate Services
Install and Configure Active Directory Federation Services (ADFS)
Setup & Configure Advanced Threat Analysis
Setup, Configure, and Analyze Security Auditing
Configure and Deploy Routers and Switches
Configure, Setup, and Deploy VLANs
Configure NAT / DHCP
Setup & Configure Network Redundancy / Fail-overs
Install, Configure, and Maintain Enterprise Email Services (SQL/Exchange/SharePoint)
Deploy Enterprise Services including Site Security, Database Connectivity, Site Administration & Monitoring
Setup / Deploy Linux & RedHat for client-servers and web hosting serversÂ
U.S. Army Cyber Center of Excellence
Professional Certificate, Computer Networking Systems and Information Security / Assurance
Learning Outcomes:
Installing & Configuring Domain Controllers
Create and Manage Active Directory (AD) Users, Groups, Organizational Units (OU), and Computers
Implementing Server Storage, Data Deduplication, and Failover Cluster
Configure Service Authentication & Account Policies
Install, Configure, and Manage Certificate Services
Install and Configure Active Directory Federation Services (ADFS)
Setup & Configure Advanced Threat Analysis
Setup, Configure, and Analyze Security Auditing
Configure and Deploy Routers and Switches
Configure, Setup, and Deploy VLANs
Configure NAT / DHCP
Network Support Engineering
System Support Engineering
IT Infrastructure and Security
System Monitoring and Alerting Infrastructure
Hardware and Software Solutions Evaluation and Selection
Maintenance Updates, Patches, and Server Security
Application Software and Computer Hardware Upgrading, Installing, and Configuring
Virtual Servers Management and Automation Processes Integration
Network Administration (LAN and WAN)
Local Area Network (LAN) Configuration Management and Monitoring
Server Administration
Firewall Management
Microsoft 365 and Azure Services
Google Workspace Administration & Management
Automation and Scripting (PowerShell)
Microsoft 365 Administration
Azure Administration
Cloud Computing
IT Infrastructure Management
Intune and Endpoint Management
Security Measures (Access Control Lists, Patch Management, System Hardening)
Endpoint Automation Deployment
macOS Zero-Touch Deployment Solutions
Windows AutoPilot Deployment Solutions
Microsoft Intune and Jamf for Endpoint Management
Conditional Access Policies
Mobile Device Management (MDM)
Identity & Access Management
Email Security
System Monitoring
Network Configuration
Access Control
Intune Management
Endpoint Security
Security Policies
Mobile Application Management (MAM)
Multi-Factor Authentication
Patch Management
Adaptability and Flexibility: Able to adjust quickly to different working environments and changing industry demands.
Client Service Orientation: Skilled in understanding and meeting the needs of clients across various sectors.
Problem-Solving: Proficient in thinking critically and providing solutions under pressure.
Communication Skills: Clear and effective communication, both written and verbal, for diverse professional settings.
Teamwork and Collaboration: Able to work well in a team and understand various group dynamics.
Project Management: Competent in organizing, planning, and executing projects efficiently.
Emotional Intelligence: Capable of understanding and managing personal emotions and recognizing those of others.
Attention to Detail: Ensuring accuracy and quality in all tasks, especially important in financial and technical roles.
Resilience and Stress Management: Maintaining composure and effectiveness under pressure.
Cultural Competency: Understanding and respecting diverse backgrounds and perspectives.
Microsoft 365 and Azure Services
Google Workspace Administration & Management
Automation and Scripting (PowerShell)
Microsoft 365 Administration
Azure Administration
Single Sign-On (SSO) Implementation
Cloud Computing
IT Infrastructure Management
JUL 2024 - PRESENT
Focused on ensuring comprehensive cybersecurity compliance with GCC-High, NIST, FIMSA, and CMMC standards across the organization. The primary goal was to align security practices and policies with these stringent frameworks to protect sensitive information and meet regulatory requirements.
Key Achievements:
Compliance Planning and Strategy: Led the planning and execution of cybersecurity compliance initiatives across GCC-High, NIST, FIMSA, and CMMC frameworks. Developed a comprehensive compliance strategy that aligned with organizational goals, regulatory requirements, and industry standards, ensuring all security measures were integrated into the organization’s IT infrastructure.
Security Framework Implementation: Directed the implementation of security controls and policies in accordance with GCC-High, NIST, CMMC, and FIMSA requirements. Ensured that all systems and processes met the stringent security and compliance standards, including data protection, access controls, and incident response protocols.
Risk Assessment and Mitigation: Conducted thorough risk assessments to identify vulnerabilities and gaps in the current security posture. Developed and executed risk mitigation strategies to address identified issues, enhancing the organization’s overall security posture and resilience against potential threats.
Compliance Monitoring and Reporting: Established robust monitoring systems to track compliance with GCC-High, NIST, CMMC, and FIMSA standards. Implemented regular reporting mechanisms to provide visibility into compliance status, address any deviations, and ensure continuous adherence to regulatory requirements.
Documentation and Audit Preparation: Created detailed documentation and evidence to support compliance efforts. Prepared for and managed external audits and assessments, ensuring that all necessary documentation and processes were in place to demonstrate compliance with GCC-High, NIST, CMMC, and FIMSA standards.
Training and Awareness: Delivered targeted training programs to staff on cybersecurity best practices and compliance requirements. Developed educational materials and conducted workshops to increase awareness and understanding of GCC-High, NIST, CMMC, and FIMSA compliance within the organization.
Incident Response and Management: Implemented incident response procedures and management protocols to address security breaches and compliance violations effectively. Coordinated response efforts to ensure swift resolution and minimal impact on organizational operations.
Stakeholder Communication: Maintained regular communication with stakeholders, including management and IT teams, to provide updates on compliance progress, address any concerns, and ensure alignment with organizational objectives and regulatory requirements.
JUL 2024 - PRESENT
Led the implementation of Microsoft Privileged Identity Management (PIM) to enhance security, control privileged access, and reduce the risk of unauthorized access.
Key Achievements:
PIM Strategy Development: Developed a PIM strategy to secure privileged roles in Azure AD and Microsoft 365, minimizing standing admin privileges and shifting to just-in-time (JIT) access to reduce risks.
Policy and Role Management: Configured PIM policies to grant high-level access only when necessary and for a limited time. Set up approval workflows, multi-factor authentication (MFA), and notifications to monitor elevated access.
Just-in-Time Access: Implemented JIT access for Azure AD and Microsoft 365 roles, allowing users to request privileges only when needed. Reduced the number of standing admins, lowering risks of misuse or compromised credentials.
Role-Based Access Control (RBAC): Established RBAC policies to ensure access was granted based on specific roles, supporting the principle of least privilege.
Auditing and Monitoring: Configured auditing and alerts within PIM to track access requests and activities. Set up automated alerts for abnormal activity to ensure real-time monitoring of privileged roles.
Training and Awareness: Delivered training for IT teams on using PIM, including requesting, approving, and managing access. Educated users on the importance of limiting privileged accounts for better security.
Compliance and Reporting: Enabled reporting to track role activations and access, ensuring compliance with regulations and internal policies. Provided auditors with logs detailing privileged access activities.
Improved Security: Strengthened security by reducing permanent privileged accounts, increasing visibility into access requests, and ensuring only authorized personnel accessed sensitive resources.
JUL 2024 - PRESENT
Led the successful implementation of Duo Security for multi-factor authentication (MFA) and endpoint security across 300+ workstations, enhancing security and operational efficiency.
Key Achievements:
Standardized Endpoint Security: Configured and deployed MFA across all workstations, ensuring consistent security policies and zero-trust authentication throughout the organization.
Custom Scripts & Automation: Developed automation workflows for the deployment of Duo Security, streamlining administrative tasks such as user enrollment and security key provisioning.
Advanced Security Policy Configuration: Configured fine-tuned security policies including role-based access controls (RBAC), session monitoring, and IP restrictions, minimizing risk and ensuring compliance with security standards.
Privacy & Compliance Controls: Implemented Duo’s Privacy Preferences Policy Control (PPPC) to manage application access to sensitive device data, bolstering user privacy and security.
Technical Testing & Quality Assurance: Performed comprehensive testing of MFA configurations, ensuring that authentication workflows functioned reliably across diverse devices and networks.
Ongoing Support & Training: Provided continuous technical support and end-user training, ensuring smooth adoption of the Duo platform and effective utilization of its features.
Improved Efficiency: Streamlined onboarding by automating repetitive tasks, reducing the need for manual intervention in MFA management, and speeding up the deployment of security configurations.
Security Posture Enhancements: Strengthened security through robust policy enforcement, continuous monitoring, and regular audit configurations, resulting in enhanced data protection.
Documentation: Created comprehensive user guides and administrator documentation to assist with ongoing security management and issue resolution.
JUL 2024 - PRESENT
Led the implementation of Microsoft Endpoint Privilege Management (EPM) to enhance endpoint security by managing user privileges and reducing risks associated with excessive administrative rights for a client.
Key Achievements:
EPM Strategy: Developed a strategy focusing on just-in-time (JIT) elevation of privileges, ensuring users received only the necessary access to perform tasks without full-time admin rights.
Policy Creation: Configured policies to manage temporary privilege elevation for specific tasks. Implemented approval workflows to ensure elevated rights were granted only when needed, reducing the attack surface.
Role-Based Privilege Management: Assigned privileges based on job roles, supporting the principle of least privilege and limiting access to essential functions only.
Application Elevation Control: Enabled certain applications to run with elevated privileges while maintaining standard user accounts. This reduced the need for full-time admin accounts, improving security without disrupting productivity.
Auditing and Monitoring: Configured EPM to log and monitor privilege requests and activities on endpoints. Set up alerts for unusual escalations, ensuring real-time monitoring.
User Training: Trained IT staff and users on managing elevated privileges. Developed guides to help employees navigate the EPM process effectively.
Security and Compliance: Aligned privilege management activities with security best practices and compliance regulations. Enforced time-limited privileges to reduce unauthorized access risks.
Improved Security: Enhanced endpoint security by minimizing permanent admin accounts and controlling privilege escalations, reducing the likelihood of malware installation through unnecessary admin access.
JUL 2024 - PRESENT
Led the implementation of Microsoft Purview Data Loss Prevention (DLP) to enhance data security, prevent unauthorized sharing, and ensure regulatory compliance for a client.
Key Achievements:
DLP Strategy Design: Developed a DLP strategy aligned with security goals to safeguard sensitive data such as PII, financial records, and intellectual property.
Policy Creation: Designed and implemented DLP policies targeting critical data types like SSNs, bank details, credit card information, and proprietary data. Configured policies to prevent unauthorized sharing via email, cloud storage, and collaboration platforms.
Role-Based Access Control (RBAC): Implemented RBAC to ensure only authorized personnel could access and share sensitive information, reducing risks from insider threats and unauthorized access.
Email and File Scanning: Enabled DLP across Microsoft 365 services (Outlook, OneDrive), automatically scanning emails and files for sensitive data. Configured alerts and actions to block or restrict data sharing based on policies.
Data Classification and Labeling: Used Purview’s classification and labeling to categorize data by sensitivity. Applied labels like “Confidential” to enforce DLP rules for specific data sets.
Incident Response and Monitoring: Set up DLP reporting and alert mechanisms to detect and respond to potential data breaches. Provided IT teams with real-time insights into DLP incidents for timely responses to data sharing violations.
User Education: Delivered training to educate employees on DLP policies, best practices for handling sensitive data, and the importance of data security.
Compliance Alignment: Ensured DLP policies met regulatory requirements such as GDPR and HIPAA, reducing the risk of compliance violations.
Improved Data Security: Strengthened security posture by preventing data leaks and improving the monitoring of sensitive information, reducing the likelihood of accidental or intentional data loss.
This DLP implementation enhanced the organization’s ability to protect and manage sensitive information within Microsoft 365.
JUL 2024 - PRESENT
Led the implementation of Google Workspace DLP to protect sensitive information, prevent unauthorized data sharing, and ensure regulatory compliance standards for a client.
Key Achievements:
DLP Strategy Development: Designed a DLP strategy to safeguard sensitive data such as PII, financial records, and intellectual property.
Policy Creation and Configuration: Developed DLP policies to monitor and control data sharing of sensitive information, including Social Security Numbers, credit card details, and confidential business data. Applied policies across Gmail, Google Drive, and other Workspace apps.
Data Classification and Labeling: Implemented data classification to tag and label sensitive data, automatically applying DLP rules to block or restrict unauthorized access or sharing.
Real-Time Monitoring: Enabled real-time monitoring of emails and files, alerting IT teams when sensitive data was detected, allowing timely intervention.
Email and Drive DLP Rules: Set up DLP rules to prevent sharing of sensitive data through Gmail and Drive. Applied automated actions such as blocking downloads or restricting file sharing.
Regulatory Compliance: Ensured DLP policies aligned with GDPR, HIPAA, and other data protection standards, mitigating the risk of data breaches and ensuring compliance.
User Training and Awareness: Conducted training to educate employees on DLP policies, best practices for handling sensitive data, and the importance of data security.
Incident Response and Reporting: Set up reporting mechanisms to detect and address potential data loss incidents, providing IT teams with actionable insights for managing data security events.
Improved Data Security: Strengthened the security posture by reducing the risk of data leaks and ensuring consistent monitoring of sensitive data across Google Workspace.
This DLP implementation enhanced the organization’s ability to protect and manage sensitive information within Google Workspace.
AUG 2024 - SEP 2024
Led the successful migration of on-premises SharePoint to SharePoint Online, enhancing collaboration, accessibility, and security for a client.
Key Achievements:
Migration Planning and Assessment: Assessed the existing on-prem SharePoint environment, identifying site structures, document libraries, and workflows for migration. Developed a detailed plan with timelines and risk mitigation strategies.
Data Cleanup and Preparation: Collaborated with stakeholders to clean and organize content, eliminating redundant files. Ensured proper tagging and classification to streamline migration and improve post-migration content management.
Tool Selection and Execution: Selected tools such as SharePoint Migration Tool (SPMT) and third-party solutions to ensure seamless migration. Migrated content, document libraries, and metadata while maintaining data integrity and minimizing disruption.
Custom Workflows and Applications: Worked with teams to migrate custom workflows, applications, and features. Rebuilt or adapted workflows for compatibility with SharePoint Online, ensuring continued functionality.
Security and Compliance: Ensured the migration met security and compliance standards, leveraging SharePoint Online’s enhanced features like DLP, encryption, and access control. Implemented role-based permissions to protect sensitive data.
Post-Migration Testing and Validation: Conducted testing to validate data, permissions, and workflows were correctly migrated. Addressed discrepancies and ensured a smooth user experience.
User Training and Support: Provided training and documentation to educate employees on SharePoint Online, new collaboration tools, and best practices. Offered ongoing support to ensure a smooth transition.
Improved Collaboration and Productivity: Enhanced collaboration by enabling remote access to SharePoint from any device. Integrated SharePoint Online with Microsoft 365 apps like Teams and OneDrive to boost productivity.
APR 2024 - JUL 2024
As the project lead for a digital transformation initiative, I successfully migrated 100,000+ files from an on-premise storage system to Google Drive. This critical project ensured a seamless transition to cloud storage while re-aligning the company’s Role-Based Access Control (RBAC) to enhance security and collaboration.
Key Achievements:
Comprehensive Data Migration: Oversaw the transfer of over 100,000 files, ensuring data integrity, proper formatting, and minimal disruption to ongoing operations with all documentation, project blueprints, and business-critical files securely moved to Google Drive.
RBAC Realignment: Led the implementation of the organization’s RBAC policies to match the new cloud-based environment, ensuring that all employees had the appropriate access levels based on their roles. This included defining and assigning granular permissions to protect sensitive construction and financial data while allowing seamless collaboration across departments and project teams.
Security & Compliance: Implemented security protocols such as data encryption, regular auditing, and access restrictions to ensure that the migrated data adhered to industry standards and compliance requirements.
Ongoing Support & Training: Provided user training sessions to ensure all employees understood the new Google Drive system and RBAC model. Offered ongoing technical support to resolve data access issues quickly.
Comprehensive Documentation: Developed detailed documentation and procedures for IT administrators and end-users, covering data access controls, file recovery, and user role management.
Results: Successfully completed the migration with zero data loss and no operational downtime. The realignment of RBAC improved the security of sensitive documents and boosted collaboration efficiency across the company’s departments, project sites, and remote teams.
FEB 2023 - JUL 2024
The successful integration of Duo Multi-Factor Authentication with Windows Login bolstered our organization's security defenses, mitigated the risk of unauthorized access, and safeguarded sensitive data and resources for 5+ organizations in various industries including Finance, Education, Insurance, and Department of Defense (DoD). This accomplishment showcased my expertise in implementing robust security solutions and demonstrated my commitment to protecting organizational assets from evolving threats.
Key Achievements:
Integration Leadership: Spearheaded the implementation of Duo MFA and Windows Login integration, aligning with the organization's objective to enhance security. Collaborated with cross-functional teams, including IT, security, and compliance, to ensure a seamless integration process.
Secure User Authentication: Configured Duo MFA as the second factor of authentication for Windows Login. Implemented additional authentication methods, such as push notifications, one-time passcodes, or biometric verification, to augment traditional username and password authentication. This robust MFA approach significantly reduced the risk of unauthorized access and strengthened user authentication processes.
Streamlined User Experience: Optimized the Duo MFA and Windows Login integration to prioritize a seamless user experience. Implemented workflows that minimized friction and provided intuitive authentication prompts, ensuring a smooth and efficient login process for employees and authorized users.
Centralized Access Management: Integrated Duo MFA and Windows Login with centralized identity and access management systems, such as Active Directory or Azure Active Directory. This centralized approach streamlined user access control, ensuring consistent MFA enforcement across all Windows systems and resources.
Conditional Access Policies: Leveraged Duo's conditional access capabilities to create policies tailored to different user roles and risk profiles. Implemented dynamic MFA enforcement based on contextual factors, such as device trust, location, or network, further enhancing security while minimizing disruption for low-risk scenarios.
Monitoring and Auditing: Configured logging and monitoring features within Duo MFA to capture detailed authentication and access events for Windows Login. This facilitated proactive detection of suspicious activities, enabled swift response to potential security incidents, and supported compliance with regulatory requirements.
User Training and Support: Conducted comprehensive training sessions to educate employees and users on the importance of MFA and how to use Duo MFA effectively with Windows Login. Provided ongoing technical support, troubleshooting, and guidance, ensuring a smooth transition and maximum adoption of the enhanced security measures.
OCT 2023- MAR 2024
The successful transition of 5 organization's workstation environments from Active Directory to Microsoft Intune stands as a pivotal achievement in modernizing our IT infrastructure and enhancing device management. This project was a cornerstone in my career, showcasing my capability to navigate complex migrations and leverage advanced technology solutions.
Key Achievements:
Migration Planning and Execution: Spearheaded the planning and execution of the migration from Active Directory to Microsoft Intune. This included a thorough analysis of the current environment, identification of potential challenges, and development of a tailored migration strategy that ensured a smooth transition with minimal impact on daily operations.
Device Enrollment and Configuration: Efficiently managed the enrollment of devices into Microsoft Intune, ensuring each workstation was correctly configured, compliant with security policies, and ready for use without significant downtime.
Security and Compliance: Enhanced security measures by utilizing Microsoft Intune’s advanced management features, including conditional access policies, application protection, and data loss prevention. Ensured the new environment adhered to industry standards and organizational security requirements.
Performance and User Experience: Monitored and optimized the performance of workstations under Microsoft Intune management. Focused on delivering a seamless user experience while ensuring devices remained fast, responsive, and reliable.
Cost Management and Efficiency: Oversaw the budget for the migration project, ensuring costs were kept within the forecasted range. Leveraged Microsoft Intune’s reporting and analytics tools to identify areas for cost savings and efficiency improvements.
Training and Support: Developed and delivered comprehensive training sessions for end-users and IT staff, ensuring a smooth adaptation to the new system. Provided ongoing support to address any issues and to ensure users could leverage the full potential of their workstations.
Monitoring and Maintenance: Established robust monitoring and maintenance protocols for the ongoing management of the workstation environment. This included regular health checks, performance monitoring, and the deployment of updates to ensure optimal operation and security.
Stakeholder Engagement: Maintained open lines of communication with all stakeholders throughout the migration process. Regularly updated management and team members on progress, addressed concerns, and aligned the migration with broader business objectives.
OCT 2022 - FEB 2024
The successful migration of 3 clients organization's data to Azure Files marked a significant milestone in enhancing their storage capabilities and operational efficiency. This project was pivotal in my career, demonstrating my ability to manage complex migrations and optimize cloud storage solutions.
Key Achievements:
Migration Planning and Strategy: Led the planning phase of the Azure Files migration, ensuring alignment with organizational goals and IT infrastructure. Developed a comprehensive migration strategy that minimized downtime and data loss risks.
Data Transfer and Integration: Managed the efficient transfer of large datasets to Azure Files. Ensured seamless integration with existing systems and applications, preserving data integrity and accessibility throughout the migration process.
Security and Compliance: Implemented robust security measures in Azure Files, including encryption, access controls, and network security configurations. Ensured compliance with industry standards and organizational data protection policies.
Performance Optimization: Fine-tuned Azure Files settings to optimize performance and scalability. Addressed specific organizational needs such as high availability, disaster recovery, and rapid data access.
Cost Management: Effectively managed the budget for the migration project. Utilized Azure cost management tools to monitor and optimize storage costs, achieving a balance between performance and expenditure.
User Training and Documentation: Provided comprehensive training to staff on using Azure Files. Created detailed documentation and guides to facilitate user adoption and efficient utilization of the new storage solution.
Monitoring and Maintenance: Set up monitoring systems to track the performance and health of Azure Files. Established maintenance routines to ensure ongoing efficiency and reliability of the storage service.
Stakeholder Engagement: Regularly communicated with stakeholders, including management and IT teams, to provide updates, gather feedback, and align the project with business objectives.
JUN 2023 - OCT 2023
Successfully implemented and configured macOS and iOS devices using Jamf, optimizing device management, security, and user experience across the organization. Key achievements include:
Key Achievements:
Jamf Infrastructure Deployment: Deployed Jamf Pro for centralized macOS and iOS management, integrating with Apple Business Manager (ABM) to enable zero-touch deployment and automated enrollment.
Standardized Configurations: Configured and deployed standardized settings across all devices, ensuring consistent policies, restrictions, and security controls organization-wide.
Automated Enrollment: Leveraged ABM to automate enrollment of macOS and iOS devices, ensuring they were pre-configured with security settings, Wi-Fi credentials, and organizational policies out of the box.
Custom Scripts and Automation: Developed scripts and workflows to automate tasks like device configuration, software deployment, and patch management, reducing manual intervention and improving efficiency.
App Deployment and Management: Automated app deployment, ensuring timely installation and updates. Enabled Self Service for employees to easily access pre-approved apps.
PPPC Implementation: Implemented Privacy Preferences Policy Control (PPPC) to manage app permissions and control access to sensitive features, enhancing macOS device security.
Security Enforcement: Enforced security measures like FileVault encryption, passcode policies, and remote wipe to meet compliance and safeguard devices.
Testing and Validation: Conducted rigorous testing to ensure system stability, validating configurations, scripts, and workflows for reliable performance.
Training and Documentation: Provided training to IT staff and users, along with comprehensive documentation, to support smooth adoption and efficient device management.
Increased Efficiency and Reduced Downtime: Streamlined deployment, automated updates, and reduced manual tasks, improving system reliability and reducing downtime.
AUG 2022 - AUG 2022
Led the successful integration of Single Sign-On (SSO) across all PCS Residential applications, boosting security and streamlining user authentication.
Key achievements include:
Comprehensive SSO Integration: Implemented SSO using OAuth across the entire technology stack, enhancing user experience by consolidating login processes and eliminating multiple credentials.
SAML Integration: Adopted Security Assertion Markup Language (SAML) into the organization's tenant, ensuring centralized identity management and strengthening security with reduced reliance on password-based authentication.
Security Enhancements: Reduced attack surfaces by minimizing weak password use and phishing risks, while implementing session management and token expiration policies for heightened security.
Automation & Custom Scripts: Developed workflows to automate onboarding and provisioning of SSO-enabled applications, reducing administrative overhead and ensuring consistency.
Role-Based Access Control (RBAC): Integrated RBAC with SSO, ensuring appropriate access levels were assigned based on user roles, enhancing compliance and security.
Testing & Quality Assurance: Conducted comprehensive testing of SSO and SAML configurations, ensuring system reliability under high load across multiple platforms.
User Training & Documentation: Delivered training and created thorough documentation, ensuring smooth adoption of the new SSO environment and efficient user authentication management.
Results: Enhanced security, streamlined login processes, and improved user experience with reduced authentication-related issues.
JUL 2022 - JUL 2022
Developed and implemented a fully automated onboarding and offboarding process for PCS Residential, optimizing user provisioning and access control across SaaS applications and resources.
Key achievements include:
Automated Onboarding Workflow: Created a system that automatically assigned SaaS application permissions and access to resources based on an employee’s department and job title, eliminating manual provisioning and ensuring consistent access levels from day one.
RBAC Integration: Implemented role-based access control (RBAC) to provide the necessary tools and resources based on role, department, and seniority, ensuring proper access to key applications, shared drives, and project-specific resources.
HR System Integration: Linked the onboarding process with the HR system, provisioning new hires with correct permissions as soon as their data was entered. Offboarding automatically revoked access upon employee departure.
Custom Automation Scripts: Developed scripts to automate account creation, license assignment, and group membership for SaaS applications, ensuring correct permissions without IT intervention.
Automated Offboarding: Implemented workflows that deactivated accounts and revoked permissions upon offboarding, reducing security risks by ensuring immediate removal of access to critical resources.
Testing & Validation: Conducted thorough testing to ensure access permissions were accurately assigned or revoked in response to changes in employee status.
Efficiency & Security Gains: Reduced onboarding and offboarding times by up to 75%, increasing efficiency while enforcing consistent security measures to protect company data.
Documentation & Training: Created documentation for IT administrators and HR teams, offering training to ensure smooth operation and management of the system.
JUL 2022 - JUL 2022
Led the implementation of a digital signage and video conferencing solution using Aericast, enhancing communication and collaboration across the organization.
Key achievements include:
Aericast Deployment: Implemented Aericast digital signage across office locations to display real-time metrics, announcements, and critical information, ensuring centralized management of up-to-date content for all employees.
Conference Room Integration: Integrated Microsoft Teams Rooms into conference rooms to support seamless video conferencing, enabling effective collaboration with both on-site and remote participants through high-quality video and audio setups.
Custom Display Configuration: Configured custom displays for different areas, showcasing relevant content. General areas displayed metrics and company updates, while conference rooms featured interactive controls and digital signage during meetings.
Automation & Scheduling: Set up content automation and scheduling, allowing dynamic updates based on time or events, reducing manual intervention while ensuring relevant and timely content display.
User-Friendly Integration: Integrated digital signage with existing tools, providing a simple interface for non-technical users and easy management for IT admins. This ensured streamlined content management across the organization.
Testing & Validation: Performed extensive testing to ensure reliability of displays and flawless video conferencing functionality, minimizing disruptions during important meetings.
Training & Documentation: Delivered training for employees and IT staff, and developed comprehensive documentation covering content management, troubleshooting, and system maintenance.
Improved Collaboration & Information Sharing: Boosted collaboration through video conferencing and increased transparency via real-time digital signage, resulting in better decision-making and higher employee engagement.
MAY 2022 - JUL 2022
Led the development and implementation of Windows AutoPilot and Company Portal to streamline device deployment and management, enhancing operational efficiency and security.Â
Key achievements include:
AutoPilot Configuration: Configured Windows AutoPilot profiles to automate Windows 10/11 deployment, ensuring proper configurations, policies, and security settings from the start.
Customized Enrollment Profiles: Created tailored enrollment profiles for departments, delivering pre-configured devices, reducing setup time, and maintaining consistent settings across the organization.
Azure AD Integration: Integrated AutoPilot with Azure Active Directory (AD) and Microsoft Endpoint Manager, enabling secure, cloud-based device enrollment into Azure AD and Intune.
Automated Policy & App Deployment: Automated deployment of security policies, applications, and updates via AutoPilot, ensuring compliance with corporate standards without manual intervention.
Company Portal Implementation: Configured Company Portal to allow employees to access and install approved apps, enabling self-service app management and reducing IT dependency.
Zero-Touch Deployment: Implemented zero-touch deployment for Windows devices, minimizing human intervention, securing the supply chain, and protecting devices during setup.
Testing & Validation: Conducted thorough testing of AutoPilot configurations to ensure reliable provisioning, correct settings, and security measures, including network stability stress tests.
Training & Documentation: Trained IT administrators on AutoPilot management and device lifecycle tasks. Developed documentation for deployment, troubleshooting, and onboarding.
Efficiency & Security Gains: Reduced device setup times by up to 75%, streamlining provisioning in distributed environments while enhancing security.
Ongoing Support: Provided ongoing support, ensuring AutoPilot scalability and security compliance as new devices were introduced.
JUN 2022 - JUN 2022
Successfully implemented FreshService ITSM to streamline IT operations, enhance service delivery, and improve project management efficiency.
Key achievements include:
ITSM Platform Deployment: Led the deployment and configuration of FreshService as the central IT service management platform, ensuring a smooth transition with minimal disruption to operations.
Ticketing System Setup: Configured FreshService to manage and prioritize IT support requests, creating custom categories, automating assignments, and providing user-friendly portals for employees to submit and track issues.
Workflow Automation: Developed automated workflows for key IT processes like incident, change management, and request fulfillment, reducing manual intervention, streamlining resolutions, and ensuring adherence to procedures.
SLA Management: Established service level agreements (SLAs) for various service categories, ensuring tickets were addressed within predefined timeframes. Configured automated escalations and notifications to prevent SLA breaches and maintain service standards.
Project Management Integration: Integrated project management features, enabling the IT team to manage timelines, assign tasks, track progress, and manage resources efficiently, improving collaboration and transparency.
Custom Reporting & Analytics: Configured reports and dashboards to provide real-time insights into IT performance, ticket resolution times, SLA compliance, and workload distribution, helping identify bottlenecks and improve support effectiveness.
Training & Documentation: Delivered training for IT staff on managing tickets, workflows, and projects within FreshService, while developing user guides and admin documentation to ensure proper system use.
Improved Efficiency & User Experience: Reduced manual tasks, improved resolution times, and provided clear project visibility. SLAs ensured consistent service, boosting user satisfaction and trust in IT operations.
FEB 2022 - MAR 2022
Successful Plan / Design / Develop / Deploy / Integration of Apple Jamf Automated Device Enrollment, Provisioning, Deployment, and Patching transformed our device management landscape, resulting in increased efficiency, improved security, and scalable operations. This accomplishment highlighted my expertise in leveraging Apple device management technologies and showcased my ability to drive positive organizational change through technology integration and process optimization.
Key Achievements:
Integration Leadership: Spearheaded the implementation of Apple Jamf's Automated Device Enrollment, Provisioning, Deployment, and Patching solutions, aligning with the organization's goal to streamline device management. Collaborated with cross-functional teams, including IT, security, and operations, to ensure a seamless integration process.
Automated Device Enrollment: Designed and implemented an automated device enrollment process using Apple Jamf. Simplified the onboarding experience for Apple devices by enabling seamless enrollment into the organization's device management system, eliminating the need for manual setup and configuration.
Streamlined Device Provisioning and Deployment: Optimized the provisioning and deployment workflows by leveraging Apple Jamf's capabilities. Configured pre-defined settings, applications, and security policies for devices, ensuring consistent configurations across the organization and reducing the time and effort required for device setup.
Patch Management: Implemented robust patch management processes using Apple Jamf. Automated the distribution and installation of software updates, security patches, and bug fixes to Apple devices, ensuring devices were up to date and protected against vulnerabilities.
Enhanced Security and Compliance: Implemented security policies and configurations through Apple Jamf to ensure devices adhered to organizational security standards and compliance requirements. Strengthened security measures by remotely enforcing encryption, password policies, and data protection settings on enrolled devices.
Scalable Device Management: Streamlined device management operations by leveraging Apple Jamf's scalable architecture. Implemented policies and configurations that enabled IT administrators to manage and monitor a large number of Apple devices efficiently, supporting the organization's growth and device expansion.
User Training and Support: Conducted comprehensive training sessions to educate users on the benefits and features of Apple Jamf. Provided ongoing technical support, troubleshooting, and guidance to ensure a smooth transition to the new device management processes and tools.
DEC 2021 - FEB 2022
The successful integration of Windows AutoPilot transformed our device provisioning and deployment workflows, resulting in increased efficiency, improved user experience, and streamlined IT operations. This accomplishment demonstrated my expertise in leveraging cutting-edge technologies and showcased my ability to drive positive organizational change through technology integration and process optimization.
Key Achievements:
Integration Leadership: Spearheaded the implementation of Windows AutoPilot, aligning with the organization's objective to modernize device management and streamline provisioning workflows. Collaborated with cross-functional teams, including IT, security, and operations, to ensure a smooth and successful integration.
Simplified Device Provisioning: Designed and implemented an automated device provisioning process using Windows AutoPilot. Streamlined the setup and configuration of new devices by eliminating the need for manual imaging and reducing the time and effort required for device setup.
Remote Device Management: Leveraged the cloud-based management capabilities of Windows AutoPilot to enable remote device management. Implemented policies and configurations that allowed IT administrators to remotely manage and update devices, ensuring consistent security measures and software updates across the organization.
Enhanced User Experience: Optimized the end-user experience by preconfiguring devices with organization-specific settings, applications, and security policies through Windows AutoPilot. This ensured that devices were ready for immediate use, minimizing the time and complexity of onboarding new employees or replacing existing devices.
Streamlined IT Operations: Simplified IT operations by reducing the manual intervention required for device provisioning. With Windows AutoPilot, device setup and configuration were automated, freeing up IT resources to focus on more strategic initiatives and minimizing the potential for human error.
User Training and Support: Conducted comprehensive training sessions to educate users on the benefits and features of Windows AutoPilot. Provided ongoing technical support, troubleshooting, and guidance to ensure a smooth transition to the new provisioning and deployment processes.
JAN 2022 - MAR 2022
Implemented, designed, and deployed Zoom and Microsoft Teams Rooms with Logitech Scribe boards, advanced cameras, and hardware to enhance video conferencing, collaboration, and communication across the organization.
Key achievements include:
Room Design & Equipment Selection: Led the design, selecting Logitech Scribe boards, video conferencing cameras, microphones, and displays to ensure high-quality audio and video for small and large meeting spaces.
System Integration: Integrated Zoom and Teams Rooms with existing collaboration platforms, enabling seamless internal and external meetings. Logitech Scribe captured and shared whiteboard content, enhancing remote engagement.
Custom Room Configurations: Designed room-specific configurations, optimizing audio, video, and lighting. Logitech cameras with smart tracking ensured clear visuals for in-person and remote attendees. Established one-touch join for simple meeting starts.
Network Optimization & Security: Collaborated with network teams to optimize bandwidth for lag-free conferencing. Implemented encryption and role-based access control to secure communications.
User Training & Adoption: Delivered training for users and IT staff on operating Zoom, Teams Rooms, and Logitech equipment. Developed guides to support system adoption and ease of use.
Testing & Validation: Conducted testing to ensure reliability, including video clarity, audio quality, and system stability. Addressed technical challenges to ensure a smooth user experience.
Improved Collaboration & Efficiency: Enhanced collaboration between in-office and remote employees, reducing technical issues and increasing productivity.
Ongoing Support: Provided continuous support, including updates and troubleshooting to ensure the long-term reliability of Zoom, Teams Rooms, and Logitech systems.