We provide IT Staff Augmentation Services!

Interim Manager Resume Profile

5.00/5 (Submit Your Rating)

HIGHLIGHTS OF QUALIFICATIONS

  • 25 successful years' experience in Information Technology, Security Operations and Employee/Customer Relations
  • Strong communication and interpersonal skills while working with others on a one-on-one basis and in a group
  • Highly effective analytical and organizational qualities, system and application support
  • Ensures customer information security needs are defined and met
  • Committed to accuracy and quality.

PROFESSIONAL TRAINING

EPIC Security Coordinator Certified, ITIL Certified, TSO/ISPF, MVS/JES2, JCL, Excel, Microsoft Outlook, JCL for Programmers, Configuration Interpretation and Basic of OS/390 RACF, Visual Basic 6.0, Network , Customer Communication Skills for IT Professionals, Fundamentals of Information Security.

TECHNICAL SKILLS:

System and or Languages: OS/390, MVS, Windows 9X/2K/NT, XP, NT Server, 2000 Server, GE Centricity, Sequoia EMR /PIE, Medhost, VPN, Citrix/Mirage, Active Directory, Novell/Groupwise, MAK Med Administration Check , RACF, MVS/JCL, Jobtrac, CA-1, Infopac, IMS, CICS, JES2, TSO/ISPF, CLIST, VTAM/NCP. Microsoft Office, LAN/WAN, Microsoft Office, Sailpoint, NetIQ, EPIC

PROFESSIONAL EXPERIENCE

Confidential

IT Security and Assurance Analyst /Interim Manager

  • Excellent troubleshooting application and desktop issues.
  • Conduct meetings to gather information for business requirements.
  • Make and design changes to all systems that Provisioning Services maintains.
  • Grant and maintain data integrity for all internal and external applications.
  • Provide knowledge and assistance in the handling of routine and ad hoc report requests.
  • Coordinate and provide summary reports for management.
  • Perform monitoring of user access to application and file servers in accordance with safeguarding requirements.
  • Conduct and recertify Audit reviews all user access excellent with Excel
  • Consult with Audit and/or management regarding audit issues, assist in determining solutions, where applicable, and implement the desired solution.
  • Grant and remove user security access on an as needed basis with authorization from managers and directors.
  • Strong knowledge base regarding information security and an excellent understanding of the issues and challenges associated with mainframe, network and distributed processing security technologies.
  • Analyze user requirements for access to data in new or modified systems, determine the changes needed, and implement required changes.
  • Communicate unresolved network security exposures, misuse or noncompliance situations to Data Security Management.
  • Review, maintenance and implementation of security policies, standards and procedures documentation.
  • Maintain and administer information security for a large community of distributed users provide operation systems and application security.
  • Author and implement security policies and procedures.
  • Maintain computer system access reports to identify possible security violations.
  • Maintain access to securable network resources.
  • Provide on-call, 7x24, support to manage critical problems.
  • Establish user logon IDs and assign/reset passwords.

Confidential

Support Center Operator

  • To deliver an excellent customer experience in order to retain and resolve customer concerns through phone calls, voicemail, and email
  • Handle inbound customer calls and make outbound follow up calls during scheduled hours, providing an excellent customer experience at all times.
  • Achieve productivity related target objectives-Log all customer troubleshooting in ticketing system.
  • Keep updated on all developments and changes, taking ownership to obtain and learn all information provided via print and the intranet.
  • Use all proprietary databases, web and telephony tool effectively, reporting faults to manager as soon as they occur.
  • Discuss call monitoring feedback with supervisor in order to improve performance.
  • Actively support, at all times, company policy and best practices in the area of security, with special emphasis on the protection of sensitive customer information.
  • Provide leadership on a day-to-day basis, supporting the supervisor
  • Provide additional support to the supervisor including administrative tasks, special projects, coaching new hires, and report analysis as needed.

Confidential

Identity Access Management Analyst

  • Defining, developing, implementing and assuring security policies
  • Processes, tools and architectures that encompass Logical controls
  • Network security controls, Physical controls
  • Risk Management
  • Security incident and issue management
  • Security integrity advisory processes
  • Security status checking
  • ID administration on Novell, NT, and Active Directory
  • ID administration adds, modifies and deletes of user accounts on the listed platforms

Confidential

Data Security Administrator

  • Grant and remove user security access on an as needed basis with authorization from managers and directors.
  • Strong knowledge base regarding information security and an excellent understanding of the issues and challenges associated with mainframe, network and distributed processing security technologies.
  • Analyze user requirements for access to data in new or modified systems, determine the changes needed, and implement required changes.
  • Communicate unresolved network security exposures, misuse or noncompliance situations to Data Security Management.
  • Ensure that resource owners/users are aware of security policies for securable network resources.
  • Consult with Audit and/or management regarding audit issues, assist in determining solutions and, where applicable, implement the desired solution.
  • Review, maintenance and implementation of security policies, standards and procedures documentation.
  • Maintain and administer information security for over 15,000 mainframe and distributed users provide operation systems and application security.
  • Author and implement security policies and procedures.
  • Maintain computer system access reports to identify possible security violations.
  • Maintain access to securable network resources.
  • Provide on-call, 7x24, support to manage critical problems.
  • Establish user logon IDs and assign/reset passwords.

Confidential

Lead Computer Operator

  • Performed extensive monitoring, problem resolution and escalation for computer operating systems, applications, and hardware.
  • Monitored data communication links and transmissions including response to system requests and messages
  • Reviewed and monitored production schedules and notified support staff of problems.
  • Executed system shutdown/restart to refresh operating system and perform maintenance.
  • Maintained and executed backup and recovery procedures of operating system and applications.
  • Ensured the availability of magnetic tapes, data storage disks, tape silos and printers for processing purposes.
  • Performed computer housekeeping functions including recording of computer running time, completed runs, down time, scheduled maintenance, equipment inventories and operational irregularities
  • Reviewed, maintained, and implemented computer operations procedures and training materials.
  • Developed and implemented training program for new computer operations staff.
  • Ensured all shift responsibilities were performed according to operational schedule.
  • Supervised the output and distribution of computer information to users and system managers.

Confidential

Computer Operator

Confidential

Computer Operator

Confidential

Sr. Computer Operator

We'd love your feedback!