I approach each challenge with the same enthusiasm, desire to learn, and positive attitude you would expect to find in any star of the industry. It is this, combined with my strong skill set and experience, that I think would make me a valuable addition to any company. Be sure to browse through my CV site, so that you get a better idea of what I can offer you.
My Professional Profile
Throughout the progression of my career, I have been relied upon as a leader and mentor, able to coordinate multidiscipline teams toward the completion of highly influential engineering and SDLC projects, while drawing upon a decorated background in data center oversight, customer support, networking, hardware, software, telephony, and IT security. I have a decorated history of success creating elaborate project roadmaps best suited to the needs of valued client companies, their respected consumers, and legal regulatory requirements.
Your company is certain to gain from my history of experience in data center oversight, customer support, networking, hardware, software, telephony, and IT security.
MY ROLES & RESPONSIBILITIES
DIRECTOR OF INFORMATION TECHNOLOGY, DIRECTOR OF OPERATIONS, AND DIRECTOR OF COMPLIANCE
DECEMBER 2017 - CURRENT
The Director IT Operations and Security will manage all aspects of IT Operations as well as the security and compliance program for PCI. This role will also lead all efforts regarding enterprise information systems that support development, infrastructure, operations, and business. The Director IT Operations and Security also supports the CIO to ensure successful implementation of information security strategies, IT controls, and systems analysis of policy and procedures for Tempoe. This person coordinates assigned activities with other departments, outside agencies and vendors; and provides a high level of customer service through daily interactions with all areas and levels. This position oversees the Service Desk, Application Support, Network and Systems Operations and Database.
CHIEF TECHNOLOGY OFFICER
MAY 2014 - NOVEMBER 2017
As CTO of Subscription Ink in Shawnee, I have managed several simultaneous projects to upgrade Subscription Ink’s failing server hardware to state-of-the-art technology. This included conceiving, and leading a series of projects bringing in the latest in telemarketing technologies to appeal to consumers in the modern age, while also defining the roadmap for server shutdowns to minimize costly downtime in a 24x7x365 call center environment.
DIRECTOR OF INFORMATION TECHNOLOGY
JUNE 2007 - SEPTEMBER 2014
I demonstrated my expertise in B2B negotiation with AMG Services, liaising with telecommunications companies to identify and secure ideal providers for a $500K annual reduction in contract expenses for predictive dialing, short duration calls and cell phone traffic and at the same time led a diverse team of 30 staff toward the transition of this 24x7x365 payday loan call center organization to a state-of-the-art infrastructure.
My proactivity as Director of I.T. with AMG Services allowed me to evaluate prototypes of a new revolutionary Cisco UCS computing platform. We implemented the new technology prior to market release, as one of the first non-Fortune 500 companies to use this new compute platform.
CERTIFIED INFORMATION SECURITY MANAGER
Certified Information Security Manager (CISM) is a certification for information security managers awarded by ISACA (formerly the Information Systems Audit and Control Association).
The intent of the certification is to provide a common body of knowledge for information security management. The CISM focuses on information risk management as the basis of information security. It also includes material on broader issues such as how to govern information security as well as on practical issues such as developing and managing an information security program and managing incidents.
The point of view in the certification is that of widely accepted cross-industry best practices, where information security gets its justification from business needs. The implementation includes information security as an autonomous function inside wider corporate governance.
CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL
The CISSP curriculum covers subject matter in a variety of Information Security topics. The CISSP examination is based on what (ISC)² terms the Common Body of Knowledge (or CBK). According to (ISC)², "the CISSP CBK is a taxonomy – a collection of topics relevant to information security professionals around the world. The CISSP CBK establishes a common framework of information security terms and principles that allow information security professionals worldwide to discuss, debate and resolve matters pertaining to the profession with a common understanding
MICROSOFT CERTIFIED TRAINER
Microsoft Certified Trainers (MCTs) are the premier technical and instructional experts in Microsoft technologies. Join this exclusive group of Microsoft technical training professionals and reap the benefits of MCT training certification and membership, including access to the complete library of official Microsoft training and certification products; substantial discounts on exams, books, and Microsoft products; readiness resources and access to a members-only online community; and invitations to exclusive events and programs.
Have questions? Drop me a line and let me give you the answers.
"Do not go where the path may lead. Instead, go where there is no path and leave a trail"