Systems Analyst/investigative Technical Writer/trainer/tester Resume
3.00/5 (Submit Your Rating)
Fort Belvoir, VirginiA
SUMMARY:
To utilize my education and experience in analysis and documentation that allows me to be able to understand the requirements of a company and being able to communicate them effectively and efficiently to the Confidential Law Enforcement and Intelligence community of users.
COMPUTER PROFICIENCY APPLICATIONS:
- MCE Certified
- A++ Certified
- Network Certified
- Palantir
- Analyst Notebook
- I2G Investigative Management Database
- Ground Line of Communication Tracker (GLOC)
- JWICS
WORK EXPERIENCE:
Confidential, Fort Belvoir, Virginia
Systems Analyst/Investigative Technical Writer/Trainer/Tester
Responsibilities:
- Attend design meetings with the development team to gather technical system requirements; to include Program Manager, Project Manager, System Engineers, and Developers that utilize Oracle 10g moving to 11g with Oracle Application Express (OAE)
- Attend requirement meetings with the client for system functionalities and capabilities; to include the J6 IT shop for system capabilities, J2 Intel Unit Chief, and J3 Operations Officer
- Define and document requirements; technical and system design requirements
- Develop Design Documents along with Use Cases based off of requirements
- Interview end users for knowledge of how each utilizes the system; i.e. Agents, Intel Analysts, Attorneys, Unit Chiefs, and Data Entry from Army, Navy, Air Force, Marines, FBI, and Secret Service
- Effectively and efficiently communicate technical requirements with developers versus end users
- Coordinate monthly meeting for the Configuration Control Board (CCB)
- Classify documents per specific in theater Security Classification Guidance
Technical Writer
Confidential
Responsibilities:
- Create the User Manual for the Investigative Informational Management System for multiple users
- Document Meeting Minutes
- Attend briefings for high level visitors; to include the Three Start General of Afghanistan Theater of Operation (ATO), the MP Provost Marshal of CID, the G3 of CIDC, officers from all branches of the military, and the Intelligence community for demonstration of system functionality
- Create Help Files throughout the system
Trainer
Confidential
Responsibilities:
- Lead Instructional Trainer and Writer/Trainer with the Confidential Criminal Investigation Task Force (CITF) case management database, deploying agents, analysts, and attorneys into ATO
- Assistant Facilitator and Coordinator of a three week SME training course tailored to deploying agents, analysts, and linguists
- Lead Trainer for the global database rollout of the Criminal Investigation Task Force to Federal, state, local, and tribal law enforcement agencies; a Share Point based portal system
- Provide training efforts of CITF including demonstration, classroom, and on the job training
- Develop document - teaching procedures for trainers, encompassing user manuals, and quick reference guides
- Performs security classification assistance for the Chief of Intel
Tester
Confidential
Responsibilities:
- Test the system in a Confidential development environment based on multiple user scenarios
- Providing documented feedback of all pass/fail situations
- Test the system in a SIPR testing environment before the live build into SIPR production
- Disseminating version Release Notes to users in the US and to users down-range
- Informing users at Headquarters and down-range when the system will be unavailable for updates or system outages
- I documented the processes along the way using the technical writer’s tool Snag IT, CamTasia, Visual Source Safe, Requirements Trace ability Database, Bug Tracker, and RoboHelp which allowed me to create Help Files, a user’s Guide, and test scripts for the users. With the aid of Visual Source Safe I was able to keep my tasks in a versioning environment to capture the changes and progress along the way.
Confidential, Washington, DC
Technical Writer
Responsibilities:
- Create User Manual for the Investigative Informational Management System for multiple users
- Document Meeting Minutes
- Attend weekly meeting with upper management to identify requirements and document them for future developer usage
- Create Help Files throughout the system
- I documented the processes along the way using the technical writer’s tools Snag IT, Carn Tasia, and RoboHelp which allowed me to create help files, a user’s guide, and test scripts for the users. With the aid of Visual Source Safe I was able to keep my tasks in a versioning environment to capture the changes and progress along the way. In addition to documenting and aiding users in understanding how I2MS can improve their work, I also assisted the lead developers in Richmond with numerous administrative duties which included: bi-weekly reports to the client indicating the progress of the project, bi-weekly risk assessment issues, meeting minutes, and requested employee hours
Confidential
Information Management Specialist
Responsibilities:
- Processed highly sensitive cable traffic for the Confidential in Warsaw, Poland, worldwide posts abroad and Washington, DC
- Designed, evaluated, and implemented automated systems that provide daily use to users such as the Ambassador and the DCM
- Disseminated cable information on Government-wide initiatives to Federal agencies; a team member in a “one-stop” reference point for all information systems and telecommunication needs
- Responsible for the day-to-day opening and closing procedures for the IPC COMSEC custodian
- A team member in providing troubleshooting and workforce planning and diversity for management automated decision-support systems for multiple customers; and active member of State Department Confidential group