We provide IT Staff Augmentation Services!

Senior Technical Writer Consultant Resume Profile

2.00/5 (Submit Your Rating)

Wayne, PA

Objective:

Highlymotivatedself-starting technical writerwith 26 years of writing, business analysis, security, system administrationand project managementexperienceseeks challengingassignmentin cutting-edge environment.Extensiveknowledgeof pharmaceutical, financial/insurance, telecommunications, publishing, and internet development industries,includingcompliance and standards. Works wellunder pressure, aloneor with team.Passionateabout technology,social media, and privacy.

Skills:

OperatingSystems

AIX

MS-DOS

BSD UNIX 4.2, NetBSD, FreeBSD

Pyramid OS

HP/UX

Solaris and SUN OS

IBM OS/2

UNIX System V

Linux various

UnixWare

Macintosh System 8, 9, 10/Panther

Windows NT/2000/XP/Vista/7/8

ProgrammingLanguages

Basic

cgi/bin, perl, Python

C

HTML, DHTML, CSS, RSS, XML

C

Java, Javascript, J

Database Technologies

Informix

Oracle

Ingres

Paradox for Windows

Lotus Notes and Domino

SharePoint 2007, 2010, 2013

Microsoft Access

SQL Server

MySQL

Sybase

Project Tools

Adobe Acrobat Professional

F5

OnBase

Adobe Exchange

FrameMaker

pic, cip, tbl, eqn, mm

Adobe Illustrator

Livelink

PVCS

Adobe Photoshop

MacDraw Pro

QuarkXPress

Airwatch

Micrografix Designer

RoboHELP

Authorware

Microsoft Access

RoboHTML

awk, nawk, sed, make

Microsoft Excel

SCCS

Corel Draw

Microsoft PowerPoint

SnagIt

Corel PhotoPaint

Microsoft Project

ToolBook

Crystal Reports

Microsoft SharePoint

ViewDirect

cshell, kshell, shell, tshell

Microsoft Word

Vignette

ed, vi, emacs

MobileIron

Visio Technical

Doc-to-Help

nroff, troff

Visual Interdev

Documentum

Office 365

WordPerfect

Experience:

Confidential

Senior Technical Writer Consultant

  • Conducting, documenting and project managing several critical multi-day workshops to identify high-availability HA and disaster recovery DR current state and gaps.
  • Live-transcribing fast paced multi-person sessions 5-25 attendees, employees, management, vendors and consultants , then condensing into synopsis, action items, questions for SMEs.
  • Reviewing workshop deliverables with management obtaining buy-in on action items and next steps.
  • Extrapolating workshop documentation into project plans for HA and DR gap remediation projects.

Confidential

Technical Writer Consultant

  • Creating electronic and paper documentation and training materials to support mobile and BYOD users, including live video capture of training sessions, wiki design and updating.
  • Creating documentation and training materials for pilot usage of Windows 8 tablets and iPad devices, requesting users to go laptop-free for 1-3 days to establish pain points and preferences, and gathering/analyzing program feedback.
  • Administering 40,000 mobile devices in use at Janssen worldwide, including iPad, Win8 tablets, phones and other devices users connect with BYOD .
  • Whitelisting, testing, managing access and application pushes using F5 and Airwatch MDM tools.
  • Designing and maintaining SharePoint database of F5 whitelist items, including electronic signoffs and approvals for information security purposes.
  • Creating and maintaining mobile device loaner program for IT and management users.

Confidential

Technical Writer

  • Interfacing with business clients and external companies to evaluate and translate their needs into technical requirements documentation.
  • Creating and revising enhancement requirements documentation for external partner systems.Testing system enhancements with technical teams, business users, and partners as needed.
  • Designing report requirements, quality checking, and calculating and revising quarterly service level metrics, including Crystal Reports, advanced Excel functions, and Access database use.
  • Recommending appropriate connectivity solutions between clients and third party companies.
  • Troubleshooting access problems across functional teams, complex networks and applications, including root cause analysis, user testing, global trouble calls, and escalation/resolution procedures beyond standard help desk capabilities. Determining and documenting root cause analysis for serious multi-day systems problems.
  • Maintaining external partner company database, including auditing data for completeness and performing database reviews on biannual basis with business sponsors.
  • Reviewing and answering questions submitted to external partner and information security email groups.
  • Coordinating and attending project and network meetings that may include third party company members.Coordinating quarterly service delivery team reviews and other audits.
  • Key member of security awareness core and roadshow teams, audio cast teams, various web sites and internal social media projects for external partner services and security awareness.

We'd love your feedback!