Security Architect Resume Profile
OntariO
Summary
- Experienced technical and functional Sap Security Manager, Sap Security Lead, SAP Security Consultant with more than 14 years specializing in SAP security including 70 SAP projects and 10 full Global implementations and plus 20 years in IT 100 IT projects
- SAP security global design and implementations, security strategies and policy
- Methodology: ASAP, SAP User - Centered Design UCD, Centralized and DE-Centralize Business Model, 3 Tier Approach Model, Position Based Model, Task Oriented Model, RBAC Model - IDM SAP and none SAP Systems integration, BW/HR Structural Authorizations Architectural Model
- Identity Managements and RBAC: SAP IDM, Integration with SAP -IBM Tivoli, Sun Micro-systems, Oracle Identity Management, Rapid Deployment Solution RDS, CUA, RBAC - Oracle Database, Unix, Windows, Policy-Based Authorization, Business Processes, Business Policies, RBAC pattern as an extension of the Authorization pattern
- Identity Center Database, Work-flow User Interface, Monitoring User interface, Management Console, Run time Engine and Dispatcher, Event Agent, Virtual Directory Server
- Guardian, ACE, Approva Biz-Rights, Virsa, GRC 5.0-10, and SOD, SOX
- More than 8 years in Segregation of Duties and Audit Compliance Standards, Audit Compliance Standards
- Guardian- Manual Controls Environment for SOD, SOX ACE-Automatic Controls Environment for SOD, SOX, Approva Biz-Rights, Virsa, GRC5.0-10.01, Access control, Process control and Risk control, RAR, ERM, SPM, CUP, Access Risk Analysis ARA, Emergency Access Management EAM, Business Role Management BRM, Access Request Management ARM, Business Rules Management Systems, MSPM, GRC MSMP CONFIGURATION, Design and Manage Roles, Emergency Access Management, Provision and Manage Users, Analyze and Manage Risk, Managing Compliance with Access Control
- HCM - Human Capital management: Personnel Management. Organizational Management, Personnel Development, Personnel Administration, Recruitment, Benefits, Compensation Management,Time Management, Payroll, E-Recruitment, Training and Event Management, ESS/MSS more then 11 projects
- HCM Authorization and Methods of implementation: Direct role assignment User based: Roles and profiles directly assigned to User Master Records via SU01/PFCG,
- Indirect role assignment Position based - assigned to position via OM IT1001
- Structural Authorizations-assigned to position via OM IT1017, Master Data with Context authorization object P ORGINCON
- Extended integration with SAP GRC5.0-10.01 solution SAP Business Objects Access Control
- Event-driven SAP ERP HCM integration with SAP IDM and GRC5.0-10
- Solution Manager, CRM2007, Access Control Engine ACE, Business Roles Web UI, Technical Roles ABAP, Utilities: B2C Call Center and B2B Work Center, Public Sector
- Proposal preparation on client site with security analysis on real systems and real data
- Expert in use BI, BW Analysis Authorization, BeX Analyzer, BOBJ and BPC
- Log changes to analysis authorizations -and other authorization-related activities: RSUDOLOG, RSECVAL CL, RSECHIE CL, RSECUSERAUTH CL, RSECTXT CL, RSECTXT CL
- SAP ECC 6.0, ERP 6.0, Financial Accounting FI, Financial Supply Chain Management FSCM, Controlling CO, Materials Management MM, Sales and Distribution SD, Logistics Execution LE, Production Planning PP, Quality Management QM, Plant Maintenance PM, Project System PS, Human Resources HR, ERP, Enterprise Portal EP UME, XI/PI, MDM, SRM,CRM 2007, BI, BOBJ, BPC, SAP R3, Global Trade Services GTS, ESS/MSS, PSCD, TREX, SCM, PS, APO, PLM, SCM, SAP Human Resource Management Systems HRMS, MII, MES, LSO, E -Sourcing, Portal SRM, CRM, BI, MDM, MDG, HANA -S AP's in-memory computing platform designed for performing real-time analytics and developing and deploying real-time applications .
- Development of tailored security and controls techniques in conjunction with system upgrade i.e. ERP and the design or re-engineering of business processes i.e. shared services environment
Companies worked for as SAP Security Consultant and SAP Security Lead for Global projects:
Uni- Select, Sunoco, Saudi Electricity Company, State of Georgia, Visa International, Tampa Electrical Company, SaskPower, Applied Materials, NBC Universal, Municipality of Anchorage, Saudi Aramco, General Motors, Con-Agra Foods, Becton, Dickinson and Company BD, Graphic Packaging, ConocoPhillips, Colgate, Deloitte US, Allegheny Energy, Inc., NASA, Whirlpool, Eastman, Adobe, CMC, BNSF, Chevron-Phillips, Department of Personal State of Washington, FEMSA Coca Cola Mexico and Latin Americas, JoAnne, CMC, Convergys Corp., State of Florida, Fifth Third Bank, AT T, Whirlpool, DuPont, Johnson Johnson DEMO, Pfizer, Solectron Corporation, Guidant, Lucent, Medtronic, Bridgestone Tires, PWC, CAMECO, KGH, British Columbia Government PSCD IBM ISM, IBM Internal Project, SAP America New Module RM FS Authorization Lead and SAP AG internal projects as author of security course P ADM SEC 70 for professionals
Professional Experience
Confidential
Confidential
Principal Confidential Security Architect
- Providing training preparation for next courses:
- ADM-326, ADM-940, ADM950, ADM-960,BW365, C41BB, HR940,
- BI Position Based model, CRM2007, RBAC,GRC300, P ADM SEC 70 and so on
Confidential
Confidential Security Architect
- HANA -SAP's in-memory computing platform designed for performing real-time analytic and developing and deploying real-time applications.
- EWM, CLM, ECC, BI, BW, SCM, BOBJ, BPC, EPM, HANA
- BOBJ, BW, BPC, EP, CLM, HANA new implementation
- EWM, ECC, BI- Support
Confidential
SAP Security Architect
- BW- OLAP Online Analytic Processing BW system and an OLTP Online Transaction Processing ERP system
- Analysis authorizations which include any authorization-relevant characteristics, and treat single values, intervals and hierarchy authorizations
- Navigation attributes also flagged as authorization-relevant in the attribute maintenance for characteristics
- BOBJ- Central Management Console, Security Plug-ins, Enterprise Security Model
- including objects: folders, reports, documents and principals: users, groups
- BPC- proxy user to generate SAP Net Weaver BPC roles and BPC objects in the SAP Net Weaver environment in the ZBPC and /CPMB/ name-spaces, respectively
- User authorization in BPC Administration console, Task and Member Access Profiles, Teams and assign the Profiles to the Teams, Users and assign the Users to Teams
- HANA -SAP's in-memory computing platform designed for performing real-time analytics and developing and deploying real-time applications.
- GRC 10-Access Risk Analysis ARA, Emergency Access Management EAM,
- Business Role Management BRM, Access Request Management ARM
Confidential
Lead SAP Security Application Architect-Team Manager
- Developed Business Cases, executed and initialized next projects:
- SAP's in-memory computing platform designed for performing real-time analytics and developing and deploying real-time applications .
- Risk Management and Content Life Cycle Management
- ECC, ERP 6.0, HCM, SRM, CRM, SRM, BPC, BI, BOBJ, BPC, GRC 10 Process and Access Control,
- Redesigned and rebuilt Security Policy, Business and Technical roles, Procedures
- Sap security overview: Conclusion and Recommendations,
- GRC 10 Process and Access Control
- SAP Technical Upgrade project for all landscape
- HCM Sensitive Context Of Authorization Project
- Solution Manager Business role development and role optimization project
- Nebras Security Policy and Strategy
- SAP SRM Security Optimization
- SAP BI Security Optimization
- SAP ECC Security Optimization and new strategy execution
- SAP XI/PI Security Optimization
- Nebras Billing Project
- Nebras Mobility Project
- Nebras Restructuring Project R2E
Confidential
- Sub-contractor Ask Stuffing
- Sap Security Specialist-SAP Security Application Architect
- Sap security overview: Conclusion and Recommendations,
- Redesigned and rebuilt all CRM Business and Technical roles,
- ERP, CRM, BI, BOBJ, BPC, ECC, Cut Over, Go Life
- SAP Security Consultant
- Sub-contractor Deloitte /
- HCM, BOBJ, BPC, BW, BW-BPS, SRM, ECC, PORTAL, ERP 6.0
- Go life and after Go Life Support, BOBJ re-design,
- Front End and Back End BOBJ integration with HANA
- SAP's in-memory computing platform designed for performing real-time analytic and developing and deploying real-time applications.
- GRC, Access Risk Analysis ARA, Emergency Access Management EAM,
- Business Role Management BRM, Access Request Management ARM
- Confidential
- Principal Consultant - Sap Security
- Municipality of Anchorage
- HCM PROJECT
- Structural Authorization, Indirect Assignment, Strategy, Policy
- SRM, PORTAL, BI, ECC, HCM, ESS/MSS. ERP 6.0
Confidential
Managing Consultant -
- Application Architect SAP Security
- NBC Universal - Global HCM Project
- Lead of HCM Security 36 Countries
- ESS/MSS, Portal, Eureka, ECC, HCM, XI/PI, ERP 6.0, BOBJ, BPC
- Global HCM Project for 36 countries
- SAP Security Strategy and Architecture
- BI Cognos Reconciliation
- GRC reports and BI Cognos reconciliation
- Internet Portal and BI Cognos integration
- Ldap Bi Cognos Groups and Roles
- Integration with ECC6, CRM2007
Confidential
- Sub-Contract with Canada Corp and CSI in Sap Security Field Clearance
- Project Description/Scope: Extended Warehouse Management EWM
Responsibilities/Deliverable/ Achievements:
Solution Manager, Remediation SOD segregation of duties, Re-design roles, ERP, 6.0 Approva BizRights
LEAD Confidential SECURITY
- Subcontractor from IBM ISM/MODIS
- ECC 6, BI,CRM 7, Sol Man 6, SRM 6, PORTAL 7, Tivoli IDM 4.1, ERP 6.0
- HCM Remediation Project
- Roles and Infrastructure re-design
- Migration from ECC 5 to ECC 6
- BW 3.5 migration to BI 7.0
- XI/PI, Virsa
Responsibilities/Deliverable/ Achievements
- Integration TIVOLI Identity Manager, UME and corporate LDAP
- RBAC - Role Based Access Control Model development
- Overview Role Based Access Control, Consideration of Role Based Access Control, The Role modeling challenge, Role Based Access Models Overview, Statement of the Problem
- Access Control Principles, The Implementation and Conversion Program, Migration Plan
- Implementing the Pilot Program, Role Based Access Control security AIX management overview,
- RBAC in Oracle RDMS, Role Based Access Model for SAP, Policy-Based Authorization
- Business Processes, Business Policies, The RBAC pattern as an extension of the Authorization pattern,
- Role-Based Access Control RBAC Pattern, Implementing and Modeling Roles in ITIM
- Separation of Duty in Role Based Access Control System Pattern
Confidential
Role: Team Lead Security
Competency Areas:
- SSO-Concepts Certificates, SAP Logon Tickets
- Kerberos and Public-Key Cryptography
- Business Continuity Planning
- Security Management Practice
- Security Infrastructure Architecture
- Compliance
- Enterprise SOA Security in SAP Systems
- Authorization groups functional tables, custom development authorization solutions
- Implementing and reviewing SAP Authorization Concept
- Integrating ABAP User-Management with Organizational Management
- Central User Storage Techniques
- Build Framework: Security Audit tools Change Documents SCDO
- Maxware, IDM and LDAP in a company environment
- GRC, VIRSA, Compliance Calibrator, Access Enforcer, Firefighter, Role Expert, SOX, SOD SAP UME administration and J2EE roles
- Handling PFCG check indicators, SU24, transport upload roles
- Configure and implement cryptography technologies in SAP System
Responsibilities/Deliverable/ Achievements:
- Upgrade ECC 5.0 to ECC 6.0, ERP 6.0
- Security Policy and Strategy
- BI/BW Strategy and Tactics, Analysis Authorization, BI, BOBJ, BPC
- HLD for HR - BI Dynamic Authorization Model
- Conversion from Structural Authorization to BI analysis authorization
- New GL Security, ESS, MSS
- CUA Landscape and Presentation
- CUA creation, review, and recommendation
- P ADM SEC 70 Security Course Development Author
- GRC configuration and review
- Authorization Concept Lead Consultant SAP Resource Management Field Services New SAP development Global HCM
- Security GTS design and implementation Global Trade Services
- Analysis Authorizations BI creation and implementation
- PD profiles and BI structure security and authorization design
- Structural authorization BI analysis and BI structure conversation
- Upgrade to SAP R/3 Enterprise Release 4.70
- Integration Analysis: IBM Tivoli Identity Manager, LDAP, SAML, SAP UME, Internet Portal, Biller Direct
- IBM Tivoli Access Management Integration
- CRM2007 security and design
- Dynamic CRM Authorization Model, ACE and business roles set up and IMG SPRO configuration
- ACE, Web UI and ABAP roles integration from complete UCD User Centered design SAP Methodology
- An Architectural View of SAP's Analytical CRM Capability
- CRM integration with ERP, BI
- SAP CRM module, SAP Biller Direct, SAP Exchange Interface PI/XI
- Flexible security framework that can be adapted to specific customer business partners needs
Confidential
Sr. Confidential Security Consultant Confidential
- Industry: Software Consulting Company, Government, Banking, Chemical, Retail, Pharmaceutical, Telecommunications, Manufacture
- Project Description/Scope: SAP Global security and authorization support, development and design for
- Share service multiple projects .
- Application and Software: ECC, ERP 6.0SAP R3 4.7 Enterprise, Visio, Microsoft Project, SAP CRM, SRM, BW, BI 7.0, Portal, XI, ESS/MSS, HCM
- Operation System: Windows XP
Responsibilities/Deliverable:
- Security based on industry standards
- Confidential framework for SAP HR Global security and authorization support and implementations.
- Development of tailored security and controls techniques in conjunction with system implementations i.e. ERP and the design or re-engineering of business processes i.e. shared services environment
Achievements
- Completed SAP Global security and authorization HR support for 11 Global companies
- Completed SAP Global implementation for leading global provider of electronics manufacturing services EMS and integrated supply chain solutions
- Virsa and Upgrade to GRC 5.0
Confidential
Senior Security Consultant
- Industry: Software Consulting Company, Public Sector, and Government
- Project Description/Scope: SAP framework for security and authorization design for Public Sector.
- Application and Software:SAP ERP 6.0, SAP R3 4.7 Enterprise, Visio, Microsoft Project, SAP CRM, SAP Biller Direct,
- BW, Portal, XI, SAP FI, CO, MM, PP, SM, PSCD and others
- Operation System: Windows XP
- Project Development: ASAP/Value SAP, Security and Authorization
- Responsibilities/Deliverable: ASAP methodology/User Centered Designed
- Role definition depends on HR positions
- Conversion from as is to to be business processes
- Assignment of Authorization Groups to Tables TDDATA, VD DATA
- Authorization groups and tables trace from applications
- Access Control- Authorization Groups SM30, TBRG table
- Role design ABAP and JAVA sites for XI
- Security Strategy for web Methods Integration Platform
- Role design, development and assignment PFCG, SU01
- Authorization Groups-Report-types programs SA38, SE38, AUTHORITY CHECK
- Document Types in design and configuration processes T003
- Check indicators SU24, SU25, SE93, and SE97
- Authorization checks by assigning reports to authorization classes RSCSAUTH
- Tables for relationship for Tcode, Roles and users Agr Users, Agr Texts, Agr Tcodes, and TSCT
- Developed CUA for all systems from XI
- Sensitive Transactions Analysis objects level matrix
- Segregation of Duty matrix objects level matrix
- Role design and security policy strategy
- Achievements: Completed Security and authorization design for Public Sector project.
- Senior SAP Security Consultant
- Canada Customs and Revenue Agency - Confidential
Role: Senior SAP Security Consultant
Responsibilities/Deliverable:
- Re-Design SAP security and authorization
- Analyze current situation
- Role selection multidimensional matrix
- Role definition depends on HR position
- Re-designed and re-built security roles PFCG
Confidential
Confidential SECURITY ADVISOR
- Industry: Financial, Chemical
- Project Description/Scope: SAP audit Automatic Control Environment
- Application and Software: SAP R3 4.7 Enterprise, Visio, Microsoft Project, ACE-Automatic Controls
- Environment, Guardian- Manual Controls Environment
- Operation System: Windows 2000, Unix, and Oracle
- Project Development:
- ASAP/Value SAP, Security and Authorization, SOX, SOD- Segregation of Duties
- Test, STA-Sensitive Transaction Analysis
- Responsibilities/Deliverable: SOX, SOD Analysis and advice
- Assessment of the SAP control environment to identify internal control deficiencies and recommend
- improvements
- SAP Audit ACE
- Business Processes- As is -Transactions -objects-authorizations field's Analysis, best practice and
- recommendations
- Sensitive Transaction Analysis objects level matrix
- Segregation of Duty matrix objects level matrix
- Operational Control and Computer Operations Analysis
- Physical Security and Security Polices
- Completed assessment of the SAP control environment to identify internal control deficiencies and
- Recommended improvements.
- Completed SOD and SOX analysis and recommended improvements
Confidential
Project Lead
- Industry: Oil, Health Care, and Hospitals
- Project Description/Scope: Medical Designated Facilities System involved 105 hospitals, clinics, and
- remote area designated facilities across the country
- Application and Software: SAP R3 4.7, Visio, Microsoft Project Manager, BW 3.5, and Internet Portal
- 6.0, SRM, APO, SRM, HR
- Operation System: Windows XP
- Project Development: ASAP/Value SAP, IS-H and IS-H Med, Security and Authorization, Documentum
Role: Project Technical Lead of Medical Designated Facilities
Responsibilities/Deliverables:
- SAP User - Centered Design
- Gave guidance and control to the project and project organization
- Flexible framework, which can be adapted to specific customer needs
- Increase productivity by provision of templates, tools, and examples
- Completed Business Blueprinting
- Industry-Specific Components for Hospitals IS-H, IS-H MED
- Roles and security strategy design for: SAP R3
- Customer Relationship Management CRM includes the methodologies, strategies, software, and web-based capabilities that help an enterprise organize and manage customer relationships.
- Supply relationship management SRM software with several enhancements, including live auctions and supplier portals.
- Advanced Planner Optimizer APO provides up-to-date information about a company's current
- inventory and triggers orders for more supplies when a certain quantity of customer orders have been placed and processed. Authorization of APO users has to specify in the BW system
- Different scenarios for Single Sign-On to SAP Systems
- Defined on high level design which method of Single Sign-On SSO you use with a SAP System
- Application and Software: SAP R3 4.7, Visio, Microsoft Project Manager, BW 3.5, and Internet Portal 6.0,
- Operation System: Windows XP
- Project Development: ASAP/Value SAP, IS-H and IS-H Med, Security and Authorization, Documentum
- Defined quality assurance checkpoints and formats of deliverables
- Guided customer staff in implementation tasks with clearly defined rules and responsibilities
- Supported consultants in the various functional areas to work in a similar way within a project team
- Detailed design phase of the project
- Captured the detailed scope and requirements for:
- Business processes
- Master data
- Organization structures, Hospitals structures
- Development work
- Produced a blueprint to describe how the business intends to run its business using the SAP R/3 system:
- Established the development system:
- Provided Team Training, Business Process Master List, Development Master List DML
- Business Blueprint Document, Configuration Approach Document
- Landscape Strategy, Rollout Strategy, Change Management Document Strategy
- Development System Environment, BB Management Summary
- Patient Management, Eligibility Check, Contract Management
- Basic Data flow modeling, Data selection matrix
Confidential
Senior Analyst Confidential Security Analyst
Confidential
Role: Senior SAP Analyst/SAP Security Analyst
Responsibilities/Deliverables: ASAP/Value SAP
- Evaluation of business processes
- Design high-level strategy for SAP Security Architecture
- SAP-Security and Authorization
- SAP profile Generator PFCG
- SAP module concept
- SAP Hierarchy Concept
- SAP Technical Structure and promote to Production Strategy
- Security Control Tools
- Organizational Management
- Structural Authorization
- Business conception model of structural authorization
- Security upgrades using SU25 and Profile Generator PFCG
- Review and correction of sensitive authorizations s tabu dis, s rfc, etc., including creation and
- assignment of custom authorization groups for sensitive tables
- Evaluation and recommendation of SAP menu vs. user menus
- Resolve issues arising from testing using system traces and dumps
- PD and PA Switches OOPS, OOAC
- Conversion of manual profiles and implementation of role based security, including IM department
- Evaluated and used SAP standard roles as templates for custom roles
- Review critical and sensitive authorizations, implement improvements to meet audit requirements
- Post Go Live support to resolve all security-related issues
- Evaluation of Central User Administration CUA
- Maintenance of HR organizational structure to administer and control user access, including time delimited access e.g. temporary assignments to positions
- Basic HR configuration e.g. create Evaluation Paths for reporting purposes
- Comprehensive knowledge exchange and documentation of Security and HR functions, including use of PPOMW, Expert functions PO10, PO13, etc.
- Profile Generator PFCG and related functions
- IS H prototype
- Established detailed security upgrade plan, strategy and dual maintenance procedures
- Created of new 4.6C authorization objects and values
- Evaluated customized matrix of Authorization groups - tables, users - groups
- Used of HR structural transactions e.g. PPSC to maintain workflow position to position assignments
- Customized HR to allow activity group assignment in PPOMW
- Created of HR security authorization objects for structural authorizations based on Info Type and allowed functions / activities e.g. Help Desk staff were only allowed to display structural assignments, not change users assigned to positions, etc.
- Created Organizational Plan PPOM OLD, Personal Master Record PA40, User I.D SU01, SU10,
- Info type 105 PA30, Structural Authorization Profiles OOSP, Info type 1017 PO10, Assigned Info type 1017 PO13, Assigned Structural Authorization Profiles to User I.D SE38, Setup Regular security PFCG
- Cleaned up and optimized security Roles
- Established security testing procedures and tools
- Worked on procedures and applications of dual-maintenance of security changes
- Worked to build strategy and implemented structural authorization
- Built and evaluated up to 5 different IS H prototypes
Senior Systems Analyst
Confidential
- Conversion migration from Assembler 370 3, 5 millions lines of cod to C/C mainframe and PC environment was using Visual Age C for TPF. My responsibilities involve directing the Process and Technology Deployment PTD . PTD supports the Shared Services Organization in the evaluation, acquisition, and roll out of software tools and development methodologies.
- Responsibilities also involve object oriented OO mentoring the teams Over 500 people engaged in OO development using UML based tools for analysis and design. Advising development teams on how to effectively utilize tools for OO structuring team oriented development. Also need to participate in the development of guidelines and other forms of support documentation such as guides in setting up their environment and instruction manuals.
- Designed a critical Visa International application for TPF CVV-Card Verification Value, Functional Messages, and Address Verification Value Carried out initial system study and design and involved in full phase of development. The project contains over 3 million lines of code. Worked as software architect and consultant for project VISA NEW GENERATION
- Application and software: Rational Rose, Visual Age C/C, Extra For TPF, NFS Maestro Solo, MS
- Exchange/MS Outlook, MS Internet Mail, MS Office and MS Excel
- Operation System: Window NT4.0, AIX UNIX 4.2, MVS, VM, TPF VPARS
- Hardware: IBM mainframe, PC workstation
- Project Development: Large system, locking critical Visa applications
Confidential
Senior Embedded Programmer Analyst
- Designed air traffic Control System for Cuba drivers for fire wire backup of air traffic system, radar
- simulator, Air traffic Control Simulator client and telecommunication server, TCP/IP, SMTP, Voice Communication Systems, DSP's SIEMENC, MOTOROLA MPC7450, i960, INTEL, EMULEX, PEB, drivers, these entailing the development of deferent models to forecast the effects of alternative sector and route geometry's, the establishment of a lab to house simulation models and the reams of data they employ and the development of a internationally recognized process for airspace
- Designed Small Computer Systems Interface SCSI, back up systems for Air traffic Control SCSI-3 technologies disk array applications, Hot-Swap support. Worked as software architect for low level software and hardware development
- Designed 3 functional areas: Interfacing, Switching and Conferencing, Supervision and Control
- Designed the program for main component of architecture a Peripheral Component Interconnect adapter card
- It performs the Switching/Conferencing, Supervision and Control. It communicates with the Interface Shelf for reception of Signaling and Supervisory signal, voice, and data
- Application and Software: C/C compiler for Linux, Hardware and Software Configuration, Assembler, C/C, and, Java 2.0, Vi editor
- Operation System: Linux Caldera, Slack ware, Red Hat 4.1-6.1, Turbo Linux, UNIX, Windows NT, Windows 98, Qunix
- Hardware: PC server/workstation, oscilloscopes
- Project Development: Air traffic control systems, Air traffic control simulator, backup systems, firewire
- drivers, Linux drivers PCI, ISA, Firewire, touch screen drivers
Senior Programmer Analyst
Alternative Resources Corporation and Subsidiaries/National Grocery -
Confidential
- Designed, programmed, tested, and documented set of batch applications to check information in the database
- Designed, programmed, tested, and documented the interface application between two warehouse systems.
- Environment: Application and software: Oracle 7, C, Pro C/C, PL/SQL, OOP methods, MS Exchange/ MS Outlook, MS Internet Mail, MS Office 98 and MS Excel. Operation System: AIX UNIX 4.2, Window NT4.0 server/workstation, Windows 95. Hardware: PC server/workstation
- Project Development: Real time warehouse system
Senior Research Officer
Confidential
- Collect, research, inventory and provide feedback on Year 2000. Compliance information on the
- following City's assets: Hardware components
- Packaged software
- Commercially available customizable software solutions
- Process control components
- Visual Basic, Access
- Application and components support.
- Environment: Applications and Software: MS Visual Basic V5 Enterprise SP3,
- Access 97 MS Exchange/Outlook, MS Internet Mail, MS Office 98
- Operating System: Window NT4.0 server/workstation, Windows 95
- Project Development: Marketing application, multi-user, and real time.
- Local servers and several mainframe host machines
Confidential
Field Service Engineer
- Serving public computers: Ministries of Transportation, Health, management Board
- Secretariat and private organizations Lipton's, The Bay, Sears, Alcan
- Heavy customer contact
- Repair of complex computer systems
- Repair to Component Level assembler language, schematics and oscilloscope
- Environment: Application and software: Assembler, Test programs
- Operating System: OS 390, Windows 3.1, 95, Window NT4.0 server/workstation, Windows 95, UNIX, OS/400
- Hardware: IBM mainframe, IBM LAN Server, AS400
- Project development: Real time system analysis and decisions for complex systems
Confidential
Director of IT Technology
- Managed information systems and their associated hardware
- Specified, designed, and implemented customized information system solutions.
- Design, implementation and maintenance of the Inventory Management System Application for storing, searching, retrieving information about buildings belong to municipal property.
- Participated in analysis, design evaluation, development, testing and implementation of Application systems
- Designed at High-level all steps of Application systems Architecture
- Environment: Application and Software: Borland C/C, Assembler, Embedded Systems, PL/1
- Operating System and Platform: OS 7.0, OS Real Time, UNIX, MVS, and DOS
- Hardware: Mainframes, PC, and Hybrids
Confidential
Technical Lead
- Carried out component level troubleshooting, program and micro-program using Assembler testing
- Designed and implemented of several packages for different aspects of the maintenance and usage of telecommunication equipment Systems architecture for all levels software and hardware .
- Evaluated projects to develop time, cost, and completion estimates
- Conducted Analysis of systems specifications and estimation, developed block diagrams and flow-charts, conversion and systems implementation plans, prepared system and programming documentation.
- Created decision logic tables in which all new software was tested.
- Tested software for system compliance and accuracy recommend system enhancements.
- Participated in development of information systems, databases and hardware drivers
- Environment: Application and Software: Borland C/C, Assembler, Embedded Systems, PL/1
- Operating System and Platform: OS 7.0, OS Real Time, UNIX, MVS, and DOS.
- Hardware: Mainframes, PC, hybrids, Data Transmission Multiplexers, SNA Network, a hard disk interface for a hard drive, a tape drive interface for a tape drive.
Confidential
Technical Team Lead
- Installed and tested data transmission multiplexor.
- Troubleshoot and resolve system problems.
- Designed software tools for DOS
- Created installation documents
- Channels I/O simulation and programming
- Designed channels simulators
- Designed for all level systems access to Data transmission multiplexor Systems Architecture witch
- combines software and hardware from low level to high
- Environment: Application and Software: Assembler Embedded Systems, PL/1
- Operating System and Platform: OS 7.0, MVS, and DOS
- Hardware: Mainframes, Data Transmission Multiplexers, SNA Network, a hard disk interface for a hard drive, a tape drive interface for a tape drive