I approach each challenge with the same enthusiasm, desire to learn, and positive attitude you would expect to find in any star of the industry. It is this, combined with my strong skill set and experience, that I think would make me a valuable addition to any company. Be sure to browse through my CV site, so that you get a better idea of what I can offer you.
My Professional Profile
Throughout the progression of my career, I have been relied upon as a leader and mentor, able to coordinate multidiscipline teams toward the completion of highly influential engineering and SDLC projects, while drawing upon a decorated background in data center oversight, customer support, networking, hardware, software, telephony, and IT security. I have a decorated history of success creating elaborate project roadmaps best suited to the needs of valued client companies, their respected consumers, and legal regulatory requirements.
Your company is certain to gain from my history of experience in data center oversight, customer support, networking, hardware, software, telephony, and IT security.
MY ROLES & RESPONSIBILITIES
Founder and CEO Hostin.com
January 1995 - Current
Currently helping small and medium-sized business with computer system needs around Cybersecurity and disaster recovery. Responsible for leading and overseeing all aspects of the Disaster Recovery and Business Continuity program. Demonstrating competency in the planning, development, program execution, maintenance, and testing of Enterprise Business Continuity and Disaster Recovery Management programs. Knowledgeable on contemporary topics, such as the importance of cybersecurity and hybrid implementations that cross-cloud solutions with on-premise solutions. The ability to move the organization forward and deliver on tasks on time is essential. Accountable for Windows server systems, shared storage, backups, virtualization technology, and additional application systems that support the infrastructure and overall production environment. Responsibilities on these systems include support, maintenance, and research & development to ensure continual operation. Stabilization of a new environment may consist of all corporate infrastructure and infrastructure services, including operations, networking, unified communications, telecommunications, servers, storage, database, service desk, desktop engineering, and end-user computing. The end state for most of these services is the utilization of a virtual private Cloud. Responsibilities Lead stabilization and reliability of a newly developed environment, including Office 365, network monitoring, and many other infrastructure issues. Responsible for driving strategic transformation initiatives. Guiding future state architecture, including; roadmap development, business case development, current assets and capabilities discovery, gap analysis, program planning, and execution.
DIRECTOR OF INFORMATION TECHNOLOGY, DIRECTOR OF OPERATIONS, AND DIRECTOR OF COMPLIANCE
DECEMBER 2017 - OCTOBER 2019
The Director IT Operations and Security will manage all aspects of IT Operations as well as the security and compliance program for PCI. This role will also lead all efforts regarding enterprise information systems that support development, infrastructure, operations, and business. The Director IT Operations and Security also supports the CIO to ensure successful implementation of information security strategies, IT controls, and systems analysis of policy and procedures for Tempoe. This person coordinates assigned activities with other departments, outside agencies and vendors; and provides a high level of customer service through daily interactions with all areas and levels. This position oversees the Service Desk, Application Support, Network and Systems Operations and Database.
CHIEF TECHNOLOGY OFFICER
MAY 2014 - NOVEMBER 2017
As CTO of Sub Ink in Shawnee, I have managed several simultaneous projects to upgrade Sub Ink’s failing server hardware to state-of-the-art technology. This included conceiving, and leading a series of projects bringing in the latest in telemarketing technologies to appeal to consumers in the modern age, while also defining the roadmap for server shutdowns to minimize costly downtime in a 24x7x365 call center environment.
DIRECTOR OF INFORMATION TECHNOLOGY
JUNE 2007 - SEPTEMBER 2014
I demonstrated my expertise in B2B negotiation with BA Services, liaising with telecommunications companies to identify and secure ideal providers for a $500K annual reduction in contract expenses for predictive dialing, short duration calls and cell phone traffic and at the same time led a diverse team of 30 staff toward the transition of this 24x7x365 payday loan call center organization to a state-of-the-art infrastructure.
My proactivity as Director of I.T. with BA Services allowed me to evaluate prototypes of a new revolutionary Cisco UCS computing platform. We implemented the new technology prior to market release, as one of the first non-Fortune 500 companies to use this new compute platform.
CERTIFIED INFORMATION SECURITY MANAGER
Certified Information Security Manager (CISM) is a certification for information security managers awarded by ISACA (formerly the Information Systems Audit and Control Association).
The intent of the certification is to provide a common body of knowledge for information security management. The CISM focuses on information risk management as the basis of information security. It also includes material on broader issues such as how to govern information security as well as on practical issues such as developing and managing an information security program and managing incidents.
The point of view in the certification is that of widely accepted cross-industry best practices, where information security gets its justification from business needs. The implementation includes information security as an autonomous function inside wider corporate governance.
CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL
The CISSP curriculum covers subject matter in a variety of Information Security topics. The CISSP examination is based on what (ISC)² terms the Common Body of Knowledge (or CBK). According to (ISC)², "the CISSP CBK is a taxonomy – a collection of topics relevant to information security professionals around the world. The CISSP CBK establishes a common framework of information security terms and principles that allow information security professionals worldwide to discuss, debate and resolve matters pertaining to the profession with a common understanding
MICROSOFT CERTIFIED TRAINER
Microsoft Certified Trainers (MCTs) are the premier technical and instructional experts in Microsoft technologies. Join this exclusive group of Microsoft technical training professionals and reap the benefits of MCT training certification and membership, including access to the complete library of official Microsoft training and certification products; substantial discounts on exams, books, and Microsoft products; readiness resources and access to a members-only online community; and invitations to exclusive events and programs.
Have questions? Drop me a line and let me give you the answers.
"Do not go where the path may lead. Instead, go where there is no path and leave a trail"