Network Project Manager - Site Transformation Resume
New, YorK
SUMMARY:
- PRINCE2 practitioner and ITILV3 certified professional with specific focus in project Management.
- Implemented ITSM initiatives to reduce operations cost by 15%, improve ROI, reduce TCO, and eliminate system crashes.
- Provided Infrastructure technology management for leading banks like RBS, BOFA and JK Bank.
- Core area of expertise is Network Project Management pertaining to Firewalls, WAN acceleration, Intrusion detection system, Anti - virus Mechanism, Router and switches.
TECHNICAL SKILLS:
Technology and Tools: Datacenter vendors:Cyrus,IO,Equinix,C7 datacenters BMC Remedy, CA Unicenter. Windows Server platforms, MS Exchange 2003/2007/2010 , Active Directory LAN/WAN Networking/VPN Backup & Restore technologies Enterprise Vault Manager, Tivoli Storage Manager Storage technologies HP EVA / EMA, Netapps. Database Technologies Oracle 9i & 11i, MS SQL Server Firewall Checkpoint, Cisco. Intrusion Detection System Real Secure Anti Virus Mechanism Symantec, Mc cafee. SAP Enterprise package. JBOSS, Weblogic, EJBs, Crystal reports, JDK 1.6
PROFESSIONAL EXPERIENCE:
Confidential
Network project Manager - Site Transformation
Responsibilities:
- Infrastructure project Management across all phases - Inception, planning, execution, Monitoring and control.
- Vendor Management.
- Risk Management.
- Site Survey - Manage IPL and H&E.
- Preparation of BOM
- Validating Low level design.
Confidential
IT infrastructure
Responsibilities:
- Project Management of Network projects
- Risk assessment and management
- Vendor Management
- Represent change request at CAB meeting to seek approval.
- Evaluate architecture and design of solutions to meet customer criteria
- Cloud hosting and deployment
Confidential
IT Infrastructure Project Manager
Responsibilities:
- Project Assessment of the application portfolio.
- Profile existing hardware resources and prepare inventory of configuration items.
- Pre-Migration Preparation of virtualization and Private cloud.
- Checkpoint firewall installation and configuration.
- Master Risk Impact Assessment and security audit of systems.
- Migration of existing windows XP desktops to Windows 7.
- Post migration checks and review.
- Project signoff and handover to BAU.
- Commissioned the RBS Sydney Private cloud on VMware ESX3.0 Servers and added multiple workloads to seamlessly integrate with SAAS.
Confidential
IT infrastructure program Manager
Responsibilities:
- Directly responsible for delivering Release 5,2010 & Release 1,2011. Each release comprises of 10 to 15 work requests.
- The scope of work involves applications related to Payment Router, Report Router, TRIP & GHCI. My additional responsibility also involved driving the failover test, regression test & Load test for application suite.
- In my day to day responsibility I manage and guide
Confidential, New York
Associate Vice President - Service Delivery
Responsibilities:
- Create a dedicated Common Monitoring Center (CMC) to provide Operational Services and Support for the Network, Server, Database, desktop and related Infrastructure security services within Viacom.
- Provide L1 and L2 support through the Common Monitoring Center while leveraging Viacom and/or other vendor resources for L3 support.
- Significantly reduce the costs of providing business processes through the leverage of high quality talent coupled with low cost and a world class level of service.
- Accomplish through a Build-Run-Improve-Transition-Exit model that will embrace Viacom’s current processes and take benefit of Fortify’s BRITETM experience and best practices.
- Ensure complete transparency with the establishment of a joint Steering and an Operational Committee that will guide and govern all critical aspects of this Program.
- Leverage the tooling framework of Fortify to migrate activities from current vendor’s t the private cloud.
- Measure service levels and provide SLA reports quarterly.
- Analyze Viacom’s existing processes and infrastructure in the four IT functional areas within scope and recommend/implement improvements such as automation, performance improvement, etc..
Confidential
Change Manager
Responsibilities:
- Total numbes of Incidents
- Total number or % of Incidents identified as problems.
- Percentage of Incidents closed by the Helpdesk without to other levels of support
- Number and percentage of Incidents resolved remotely, without the need for a visit.
- Percentage of SLAs met.
- Approved Emergency, break fix and housekeeping change requests.
- Performed Risk analysis, mitigation and service outage analysis of change requests.
- Maintained and updated the Major event calendar that reflects significant events.
- Preparation of Release management reports based on Forward schedule of changes.
- Identified key challenges, constraints and risks from a project perspective.
Confidential
Assistant Manager
Responsibilities:
- The number of Problems and errors split by: status service impact category
- The total elapsed time on closed Problems
- The elapsed time to date on outstanding Problems
- The mean and maximum elapsed time to rectify Problems or confirm a Known Error, from the time of raising the Problem record, by impact code and by support group (including vendors)
- Any temporary resolution actions
- The expected resolution time for outstanding Problems
- The total elapsed time for closed Problems.
Confidential
IT infrastructure Project Manager
Responsibilities:
- Build and deploy the nerve center for the organization in Dubai.
- Involved in all stages of the project critical activities:
Confidential
Technical Architect
Responsibilities:
- Presenting project plan to JKB Management.
- Design of security architecture.
- Product selection, proto typing architecture and testing it.
- Implementation of architecture to enable internet banking.
- Oversee installation of Cisco Router, check point firewall, PIX firewall, ISS Intrusion Detection System.
- Real secure Intrusion detection system installation with appropriate attack signatures installed and fine tuning the same to the clients need.
- Firewall policy definition and IDS policy definition.
- Installation and configuration of appropriate service packs, security patches and fixes.
- Performing network security testing.
- Providing Status reports, stake holder meeting on a timely basis.
- Risk Assessment
- Keeping the stake holders informed about the transition of the project and making course correction as and when needed.
- Knowledge transfer of the work performed.
- Delivering the final deliverables to the client and taking sign-off.
Confidential
IT Consultant
Responsibilities:
- Handling Windows NT 4.0 systems administration on Maersknet WAN .The LAN at CG Maersk consist of Compaq Proliant 1600 servers, Dell Power edge 1300, Compaq Deskpro 4000 and IBM100 machines.
- Administering the Microsoft SNA 4.0 Server that is used to provide
- Connectivity to the ES9000 mainframe at Copenhagen Using Eicon access terminal Emulation software on each node.
- Managing the Cisco 2500 Routers and Cisco Catalyst 1600 switch in the Network.
- I was actively involved in the Year 2000 exercise held in the premises facilitating the systems and servers with the necessary patches and fixes.
- Involved in day to day tasks like ensuring smooth functioning of automated Backup of valuable user data on Lotus Domino5.0 server, SNA 4.0 server, Oracle8.0.4 server, Sql 7.0 Server.
- Installation of Operating system and application software.
- Troubleshooting any hardware and network errors on LAN and WAN.
- Administration of the MS proxy server 2.0 and firewall that renders security of the network and provides internet access to all individual desktops.
- Created Network diagram and documentation using Visio software.
- Administering the IIS Server4.0 for Intranet projects.
- Responsible for recording inventory of all Internal It Department Network Items.
- Coordinating with National and International Service Provider
- Monitored public vulnerability sites (CERT, NIPC) for latest security alerts and alerted the administrator community. Risk assessment
- Created the Agere recommended security Patch list.
- Deployment of centralized security patches management mechanism.
- Analyzed information and security policies and procedures pertained to Agere systems.
- Single point of contact between Agere and IBM global services.
- Enterprise Security Framework implementation (GSD).
Confidential
IT Engineer
Responsibilities:
- Responsible for the installation, fine-tuning, maintenance, troubleshooting of hotel management systems and computer peripherals.
- Responsible for LAN/WAN networks that spanned multiple geographical locations.
- Managed a team of 9 IT engineers that provided technical support round the clock.