Senior Technical Writer Consultant Resume Profile
Wayne, PA
Objective:
Highlymotivatedself-starting technical writerwith 26 years of writing, business analysis, security, system administrationand project managementexperienceseeks challengingassignmentin cutting-edge environment.Extensiveknowledgeof pharmaceutical, financial/insurance, telecommunications, publishing, and internet development industries,includingcompliance and standards. Works wellunder pressure, aloneor with team.Passionateabout technology,social media, and privacy.
Skills:
OperatingSystems | ||
AIX | MS-DOS | |
BSD UNIX 4.2, NetBSD, FreeBSD | Pyramid OS | |
HP/UX | Solaris and SUN OS | |
IBM OS/2 | UNIX System V | |
Linux various | UnixWare | |
Macintosh System 8, 9, 10/Panther | Windows NT/2000/XP/Vista/7/8 | |
ProgrammingLanguages | ||
Basic | cgi/bin, perl, Python | |
C | HTML, DHTML, CSS, RSS, XML | |
C | Java, Javascript, J | |
Database Technologies | ||
Informix | Oracle | |
Ingres | Paradox for Windows | |
Lotus Notes and Domino | SharePoint 2007, 2010, 2013 | |
Microsoft Access | SQL Server | |
MySQL | Sybase | |
Project Tools | ||
Adobe Acrobat Professional | F5 | OnBase |
Adobe Exchange | FrameMaker | pic, cip, tbl, eqn, mm |
Adobe Illustrator | Livelink | PVCS |
Adobe Photoshop | MacDraw Pro | QuarkXPress |
Airwatch | Micrografix Designer | RoboHELP |
Authorware | Microsoft Access | RoboHTML |
awk, nawk, sed, make | Microsoft Excel | SCCS |
Corel Draw | Microsoft PowerPoint | SnagIt |
Corel PhotoPaint | Microsoft Project | ToolBook |
Crystal Reports | Microsoft SharePoint | ViewDirect |
cshell, kshell, shell, tshell | Microsoft Word | Vignette |
ed, vi, emacs | MobileIron | Visio Technical |
Doc-to-Help | nroff, troff | Visual Interdev |
Documentum | Office 365 | WordPerfect |
Experience:
Confidential
Senior Technical Writer Consultant
- Conducting, documenting and project managing several critical multi-day workshops to identify high-availability HA and disaster recovery DR current state and gaps.
- Live-transcribing fast paced multi-person sessions 5-25 attendees, employees, management, vendors and consultants , then condensing into synopsis, action items, questions for SMEs.
- Reviewing workshop deliverables with management obtaining buy-in on action items and next steps.
- Extrapolating workshop documentation into project plans for HA and DR gap remediation projects.
Confidential
Technical Writer Consultant
- Creating electronic and paper documentation and training materials to support mobile and BYOD users, including live video capture of training sessions, wiki design and updating.
- Creating documentation and training materials for pilot usage of Windows 8 tablets and iPad devices, requesting users to go laptop-free for 1-3 days to establish pain points and preferences, and gathering/analyzing program feedback.
- Administering 40,000 mobile devices in use at Janssen worldwide, including iPad, Win8 tablets, phones and other devices users connect with BYOD .
- Whitelisting, testing, managing access and application pushes using F5 and Airwatch MDM tools.
- Designing and maintaining SharePoint database of F5 whitelist items, including electronic signoffs and approvals for information security purposes.
- Creating and maintaining mobile device loaner program for IT and management users.
Confidential
Technical Writer
- Interfacing with business clients and external companies to evaluate and translate their needs into technical requirements documentation.
- Creating and revising enhancement requirements documentation for external partner systems.Testing system enhancements with technical teams, business users, and partners as needed.
- Designing report requirements, quality checking, and calculating and revising quarterly service level metrics, including Crystal Reports, advanced Excel functions, and Access database use.
- Recommending appropriate connectivity solutions between clients and third party companies.
- Troubleshooting access problems across functional teams, complex networks and applications, including root cause analysis, user testing, global trouble calls, and escalation/resolution procedures beyond standard help desk capabilities. Determining and documenting root cause analysis for serious multi-day systems problems.
- Maintaining external partner company database, including auditing data for completeness and performing database reviews on biannual basis with business sponsors.
- Reviewing and answering questions submitted to external partner and information security email groups.
- Coordinating and attending project and network meetings that may include third party company members.Coordinating quarterly service delivery team reviews and other audits.
- Key member of security awareness core and roadshow teams, audio cast teams, various web sites and internal social media projects for external partner services and security awareness.