Interim Manager Resume Profile
HIGHLIGHTS OF QUALIFICATIONS
- 25 successful years' experience in Information Technology, Security Operations and Employee/Customer Relations
- Strong communication and interpersonal skills while working with others on a one-on-one basis and in a group
- Highly effective analytical and organizational qualities, system and application support
- Ensures customer information security needs are defined and met
- Committed to accuracy and quality.
PROFESSIONAL TRAINING
EPIC Security Coordinator Certified, ITIL Certified, TSO/ISPF, MVS/JES2, JCL, Excel, Microsoft Outlook, JCL for Programmers, Configuration Interpretation and Basic of OS/390 RACF, Visual Basic 6.0, Network , Customer Communication Skills for IT Professionals, Fundamentals of Information Security.
TECHNICAL SKILLS:
System and or Languages: OS/390, MVS, Windows 9X/2K/NT, XP, NT Server, 2000 Server, GE Centricity, Sequoia EMR /PIE, Medhost, VPN, Citrix/Mirage, Active Directory, Novell/Groupwise, MAK Med Administration Check , RACF, MVS/JCL, Jobtrac, CA-1, Infopac, IMS, CICS, JES2, TSO/ISPF, CLIST, VTAM/NCP. Microsoft Office, LAN/WAN, Microsoft Office, Sailpoint, NetIQ, EPIC
PROFESSIONAL EXPERIENCE
Confidential
IT Security and Assurance Analyst /Interim Manager
- Excellent troubleshooting application and desktop issues.
- Conduct meetings to gather information for business requirements.
- Make and design changes to all systems that Provisioning Services maintains.
- Grant and maintain data integrity for all internal and external applications.
- Provide knowledge and assistance in the handling of routine and ad hoc report requests.
- Coordinate and provide summary reports for management.
- Perform monitoring of user access to application and file servers in accordance with safeguarding requirements.
- Conduct and recertify Audit reviews all user access excellent with Excel
- Consult with Audit and/or management regarding audit issues, assist in determining solutions, where applicable, and implement the desired solution.
- Grant and remove user security access on an as needed basis with authorization from managers and directors.
- Strong knowledge base regarding information security and an excellent understanding of the issues and challenges associated with mainframe, network and distributed processing security technologies.
- Analyze user requirements for access to data in new or modified systems, determine the changes needed, and implement required changes.
- Communicate unresolved network security exposures, misuse or noncompliance situations to Data Security Management.
- Review, maintenance and implementation of security policies, standards and procedures documentation.
- Maintain and administer information security for a large community of distributed users provide operation systems and application security.
- Author and implement security policies and procedures.
- Maintain computer system access reports to identify possible security violations.
- Maintain access to securable network resources.
- Provide on-call, 7x24, support to manage critical problems.
- Establish user logon IDs and assign/reset passwords.
Confidential
Support Center Operator
- To deliver an excellent customer experience in order to retain and resolve customer concerns through phone calls, voicemail, and email
- Handle inbound customer calls and make outbound follow up calls during scheduled hours, providing an excellent customer experience at all times.
- Achieve productivity related target objectives-Log all customer troubleshooting in ticketing system.
- Keep updated on all developments and changes, taking ownership to obtain and learn all information provided via print and the intranet.
- Use all proprietary databases, web and telephony tool effectively, reporting faults to manager as soon as they occur.
- Discuss call monitoring feedback with supervisor in order to improve performance.
- Actively support, at all times, company policy and best practices in the area of security, with special emphasis on the protection of sensitive customer information.
- Provide leadership on a day-to-day basis, supporting the supervisor
- Provide additional support to the supervisor including administrative tasks, special projects, coaching new hires, and report analysis as needed.
Confidential
Identity Access Management Analyst
- Defining, developing, implementing and assuring security policies
- Processes, tools and architectures that encompass Logical controls
- Network security controls, Physical controls
- Risk Management
- Security incident and issue management
- Security integrity advisory processes
- Security status checking
- ID administration on Novell, NT, and Active Directory
- ID administration adds, modifies and deletes of user accounts on the listed platforms
Confidential
Data Security Administrator
- Grant and remove user security access on an as needed basis with authorization from managers and directors.
- Strong knowledge base regarding information security and an excellent understanding of the issues and challenges associated with mainframe, network and distributed processing security technologies.
- Analyze user requirements for access to data in new or modified systems, determine the changes needed, and implement required changes.
- Communicate unresolved network security exposures, misuse or noncompliance situations to Data Security Management.
- Ensure that resource owners/users are aware of security policies for securable network resources.
- Consult with Audit and/or management regarding audit issues, assist in determining solutions and, where applicable, implement the desired solution.
- Review, maintenance and implementation of security policies, standards and procedures documentation.
- Maintain and administer information security for over 15,000 mainframe and distributed users provide operation systems and application security.
- Author and implement security policies and procedures.
- Maintain computer system access reports to identify possible security violations.
- Maintain access to securable network resources.
- Provide on-call, 7x24, support to manage critical problems.
- Establish user logon IDs and assign/reset passwords.
Confidential
Lead Computer Operator
- Performed extensive monitoring, problem resolution and escalation for computer operating systems, applications, and hardware.
- Monitored data communication links and transmissions including response to system requests and messages
- Reviewed and monitored production schedules and notified support staff of problems.
- Executed system shutdown/restart to refresh operating system and perform maintenance.
- Maintained and executed backup and recovery procedures of operating system and applications.
- Ensured the availability of magnetic tapes, data storage disks, tape silos and printers for processing purposes.
- Performed computer housekeeping functions including recording of computer running time, completed runs, down time, scheduled maintenance, equipment inventories and operational irregularities
- Reviewed, maintained, and implemented computer operations procedures and training materials.
- Developed and implemented training program for new computer operations staff.
- Ensured all shift responsibilities were performed according to operational schedule.
- Supervised the output and distribution of computer information to users and system managers.
Confidential
Computer Operator
Confidential
Computer Operator
Confidential
Sr. Computer Operator