From:                              route@monster.com

Sent:                               Monday, October 24, 2016 10:31 AM

To:                                   hg@apeironinc.com

Subject:                          Please review this candidate for: DNS Secret

 

This resume has been forwarded to you at the request of Monster User xapeix03

JOHN JORDAN 

Last updated:  09/20/16

Job Title:  no specified

Company:  Apeiron, Inc.

Rating:  Not Rated

Screening score:  no specified

Status:  Resume Received


Minnetonka, MN  55345
US

Quick View Links:

Resume Section

Summary Section

 

 

RESUME

  

Resume Headline: John_Jordan_Strat_PMSEC_17MAY16-2003.doc

Resume Value: dtqr66vg8eeqj8mr   

  

 

John Jordan, CRISC, CSIM, ITIL, ISO 27000, MCT, PMP, Six Sigma

jjordanjr@jigits.com  952-929-1800

 

SUMMARY

Certified IT Executive, Executive Architect and Master Instructor with over 24 years of experience in projects concerning Advanced Infrastructure Solutions (including Server Consolidations and Deployment/Migration Strategies), Business Intelligence, E-Commerce Integration, Project Management, Software Solutions, Security Solutions, and Training.

 

Has expertise in Auditing & Assessment, Access & Identity Management, Application, Host & Network Security, Business, Process & System Integration, Budget, ROI & TCO Analysis, Governance, Risk & Compliance (GRC), Intellectual Property/Trade Secret Protection, Physical Security Assessment & Remediation, Project Management, Risk Management, Security Architecture Strategy & Deployment, Team Building & Staff Development, Vendor & Contract Negotiations. Has exceptional aptitude for inventing, grasping and applying new concepts to increase productivity. Strong customer services skills. Also, he has demonstrated leadership abilities. Excellent track record for creating more efficient teams, improving accountability and reducing cost.

 

·   Security Architecture Strategy - Developed strategic vision of deploying security controls for organizational governance, physical, secure network (enterprise PKI, IPS/IDS), secure host, and secure application (OWASP) technologies.  Designed and deployed BCP, DR, COOP, and ensure maximum system uptime. Has the ability to look at enterprise architecture across all four domains:

§  Business Architecture: Business Requirements & Rules, Organization Structure, Mission/Vision, Business Process Design & Modeling

§  Data Architecture:  Data Integration & Architecture, Enterprise Application Integration Components, Process Alignment Information/Data, Enterprise Reporting, Content Management & Business Intelligence, Data Modeling & Quality Management

§  Application Integration: Enterprise Application Integration Components, Process Alignment, SOA (including abstraction, reusability, autonomy, statelessness & composability)

§  Technical/Infrastructure:  Server, Database, Networks, Security, Storage, Telecom, Desktop, Middleware, Other hardware

·   Auditing & Assessment - As Project Manager, Executive Architect and/or SME, wrote security plans & managed remediation projects for protection of trade secrets/intellectual property.  Created security technology roadmaps.

·   Governance, Risk & Compliance - Instituted policies and procedures to ensure compliance with PCI, Basel, CMMI, CoBIT, DFAR, DITSCAP (predecessor of DIACAP), FEMA 426, FEMA 428, FIPS (including FIPS 140-3,199, 200, etc.), FISMA, FFIEC, GIG, GLBA, GISRA, HIPAA, HITRUST, ITIL, ISO 27000, NIST 800-53, PMI, SAS-70, SSAE-16, SOX, WCO, and other IT audit requirements.

·   Project Management - Delivered projects on-time and within budget by defining & implementing a comprehensive set of changes that result in improvements to human performance, business process and technology to an organization.

·   Risk Management - Directed the planning business process around security controls to mitigate the risk to critical functions, intellectual property loss, security breaches and business disasters.

·   Industries worked include Banking/Finance, Education, Energy, Federal Government, Healthcare/Insurance, IT Consulting, Telecommunications, etc.

·   Companies worked include American Express, IBM, DuPont, Chemours, Honeywell, Sony, Wells Fargo, ITT Technical Institute, Strayer University, Alcohol, Tobacco & Firearms, Department of Defense (USDoD), Department of Treasury, NASA, Social Security Administration, State of Minnesota, Carefirst (BCBS DC & MD), Several Insurance Agencies, Accenture, Microsoft, MCI - UUNET, Americatel – Teligent.

 

 

 

 

 

EXPERIENCE HIGHLIGHTS & ACCOMPLISHMENTS

IBM2014 - Present

Global Security Program Manager/Information Security Advisor

 

As Global Security Program Manager and Senior Information Security Advisor, provided advice and guidance of information security industry best practices to IBM and commercial accounts support teams.  Acted as chief information security officer and focal for IBM enterprise customer accounts.  Acted as executive security architect in design & deployment of advanced enterprise information security solutions of physical, infrastructure (network, server, etc.), application, and other related systems.

 

§ Acted as primary IBM security focal and liaison for global security review for assigned IBM enterprise customers.  Participated in security risk control board and set policy and guidance for corporate security of IBM customers industry based information security best practices per ISO 27002:2013.  This includes working with CISO/Global Security Organizations to develop standards and best practices across security domains.  Acted as the final escalation focal for IBM customer IT security guidance for assigned enterprise accounts.

§ Acted as program lead and primary focal for various security control and risk management departments including global corporate SOX programs, security vulnerability, government control programs (IRS, DHS, US DoD, US Dept of State, NATO, United Nations, etc.), PCI-DSS, etc., for IBM enterprise customers.

§ Acted as portfolio, program, and project manager for multiple business enterprise initiatives for IBM customers.  These initiatives include, but are limited to project workstreams concerning IT infrastructure, mobile, network hardware devices and appliances (routers, switchers, load balancers, firewalls, IDS, etc), application, virtualization, call center, IP telephony, end-user desktop deployment, data center migration/upgrades/consolidations (on & off-premise), cloud computing, multi-tier storage & SAN, and physical & facilities infrastructures. This includes working with PMO and other Global Enterprise Organizations to develop standards and best practices across enterprise domains.

§ Produced and updated detailed project plans (As Microsoft Certified Trainer, have expert skill in MS Project, MS Word, MS Excel, etc.).  Managed budgets greater than $15 million (per NDA cannot give exact dollar amounts).

Managed project teams greater than 1000 resources on a global scale (ranging six continents). 

§ Manage and architect implementations of policy, risk, vendor, incident, and compliance management, and related business process implementations utilizing RSA Archer SmartSuite framework, IBM Virtual Security Operations Center (vSOC), etc.  Utilized RSA Archer, IBM GRC tools, etc., for security risk control management, artifact gathering and repository, GRC reporting, etc., for IBM enterprise customers.

§ Managed multiple deployments and system integration of IBM Virtual Security Operations Center (vSOC) with SiteProtector, Tivoli Endpoint Manager (TEM), QRadar; Splunk, QualysGuard, Nessus, Rapid7, etc. for security vulnerability management (SVM) for IBM enterprise customers.  Managed SVM deployments for IBM assigned enterprise customers from inception to full deployment to steady-state operations.

§ Ensured effective project implementation and utilize productive reports from the creation of WBS with the use of project management system to monitor the status of all purchases, invoicing and delivery up to the closure of the project.  Prepare monthly spend estimates compiled from department forecasts which align with General Accepted Accounting Practices (GAAP).  Performed project costing related reporting to the team and management’s review on a monthly basis to ensure that expenditures are kept within the project budget. Provided cost control and planning advice to the internal project management team (and external program independent validators) as and when required.  Utilized most PM governance methods including waterfall, agile, etc.

§ Performed security audits, assessment and lead remediation efforts to implement information security best practices for enterprise critical and supporting systems for per ISO 27002:2013.  This includes deploying application, platform, system and physical security measures and controls; implemented risk management, incident, and communication plans for critical web, application, database, host server & network systems for business and technical stakeholders; aided in redundancy (server, VM and network infrastructure high availability) and contingency planning (via DR, COOP & BCP plans).  Created security plans, policies and procedures for enterprise customers.

§ Aided in the design and development of security management program for several organizations. Worked in collaboration with several vendors and subcontractors in defining, establishing, monitoring, and optimizing security and service quality and service levels of services agreed by the customer.  Oversaw projects and teams in deployment of security and service level management programs (this includes defining capacity, availability, business continuity, change, problem, incident, access & identity, security vulnerability, emergency response, organizational GRC, etc.)

§ Provided guidance and advice for security management per information technology industry best practices to ensure compliance with Basel, CMMI, CoBIT, DFAR, DITSCAP (predecessor of DIACAP), FEMA 426, FEMA 428, FIPS (including FIPS 140-3,199, 200, etc.), FISMA, GIG, GLBA, GISRA, HIPAA, HITRUST, ITIL, ITAR, ISO 27000, NIST 800-53, PMI, PCI, SAS-70, SSAE-16, SOX, WCO, and other governance risk compliance requirements.

§ Acted as an ITAR Certified Program Manager for an IBM enterprise customer account (International Traffic in Arms Regulations (ITAR) is a federal government regulations for transportation of military equipment that is directly monitored by the US Dept of State and indirectly monitored by several of federal and international government agencies (including US DoD, NATO, United Nations, etc.).  All businesses, equipment and personnel that work within an ITAR compliance area of a company must be certified per federal requirements).  As ITAR Certified Program Manager, directly oversaw all ITAR compliance activity of assigned IBM enterprise account.  Directly overseeing design, deployment, migrations and upgrades of various systems (organizational, physical, network, host infrastructure, application, database, etc.) for ITAR compliance for enterprise customer.

§ Lead matrixed teams of architects, project managers, system engineers, developers and technologists to successfully deliver significant change in a large-scale globalized enterprise environment.  This includes crafting RACI for governance initiatives, hosting status meetings, setting agendas, and providing meeting minutes, perform process discovery and documentation, issue resolution and problem solving; plan, forecast, allocate resources, and conduct performance measurement and scheduling, while integrating the results into ongoing operations.

§ Provided reporting and decision support for senior leadership (senior directors, VP and above, C-level executives, board of directors, etc.) concerning security and operational risk.

§ Deliverables included, but were not limited to documented security management, service management and other operational risk compliance structure including:

-          Coordinate documentation and definition of all services (standard offerings as well as “exceptions”), identification of application, business & system owners, service targets and related changes for threat incident and emergency response plans for enterprise customers.

-          Coordinate efforts to mature existing processes (incident, change), and start on processes we need (request, problem, configuration management, continuous improvement).  Set up process in moving processes from CMMI level 1 (infancy process maturity) to CMMI level 5 (dynamic automation process maturity).

-          Coordinate the documentation of work processes (how we do it), tools, and methodologies.  Coordinate the identification of timing/estimates/expected completion times.  Identify metrics to measure service delivery.

-          Meet with key stakeholders either weekly or monthly (depending on LOB) to identify, monitor and craft recommendations for security risk management issues.  Designed and implemented remediation activities.

-          Generate a list of process owners and coordinate the definition of KPIs for each process.

-          Help identify gaps in service and advice on methods to close gaps.

-          Ensured timely artifact collection and maintenance of compliance activity.

 

 

Jigits, LLC2010 - Present

Program Manager/Chief Consultant

Managed an information technology service provider company.  Coordinated with corporate executives, 3rd party vendors, and governmental entities on improving service processes and quality for lean manufacturing and project delivery.

-Client – Honeywell

·   Acted as a Sr. Program Manager and Scrum Master for the development and deployment of systems supporting confidential premier product line.  These Support systems include mobile, hardware device, manufacturing, IT infrastructure, API and monitoring, information worker collaboration, application, virtualization, and multi-tier storage & SAN solutions.

·   Accomplishments includes streamlining delivery of major infrastructure systems including storage area network solution which was originally slated for over one year timeline delivery to within one month.  Also designed and deployed QA/UAT multi-environment, QA staging and PROD data center virtualization environment solutions that were originally slated for over multi-year timeline delivery to within two months under extreme project constraints.  Save organization millions of dollars in project delivery.  Managed multiple projects & workflows simultaneously.

·   Managed creation and deployment of public, private & hybrid clouds for multi-tier application system. Managed release paths for system integration and updates of multiple data centers for global inter, intra, & extranet operations.  Crafted solutions for high availability system solutions.

·   Oversaw large infrastructure & application development, complex projects that have interactions with several groups/channels and have extensive experience in cross-matrix projects. Built strong project teams and keep them motivated under extreme project constraints.

·   Took full responsibility for keeping project cost and schedule on track.  Utilize project management tools/techniques (e.g. PERT charts, critical path method, earned value) to track and manage project costs and schedules.  Implemented, Agile, SCRUM, Six-Sigma, Waterfall, ITIL and other best practice frameworks.  Managed multiple global teams spanning continents NA, SA & EMEA.

·   Hardware/Software include but limited to:  SAP, MS Azure, VMware, vCloud Public, Private & Hybrid, Cisco UCS Nexus Switches, Cisco UCS Servers, HP & Compaq Server, Cisco ASA Firewalls, Cisco ACE load balancers, Cisco CSS load balancers, EMC VNX SAN, Dell Equalogic SAN, Windows Server 2008, 2008 R2 & 2012, SQL Server 2008, 2008 R2, 2012, IIS, 3Scale, Opower, Jmeter, JIRA, .NET, Openstack, Red Hat Linux, Microsoft Voice Recognition products, Wi-Fi product, thermostats, mobile OS, .NET, API., energy monitoring, etc.

-Client – Wells Fargo

·   Acted as an Operational Risk Consultant/ Information Security Auditor for Wells Fargo Security & Risk Team.  Lead and conducted information security reviews & assessments and aided drafting security remediation plans for technical, managerial, and operational functions of WF business partners and various 3rd party vendors throughout the United States.  Produced risk assessment reports for strategic security and business risk planning and analysis for compliance with internal policies and the Office of the Comptroller of the Currency (OCC) regulations.

·   Performed detailed technical audits of multi-tier web-based applications, network architecture, and DMZ designs. Performed operational risk assessment and communicate relevant information to senior management.

·   Instituted policies and procedures to ensure compliance with PCI-DSS 2.0, Basel (I & II), CMMI, CoBIT, FEMA 426, FEMA 428, FIPS, FISMA, FFIEC, HIPAA, HITRUST, GLBA, ITIL, ISO 17799, ISO 27000, ISO 27001, SAS-70, SSAE-16, BS 17779, NIST 800-53, PMI, SOX, WCO, and other governance, risk and control frameworks.

·   Hardware/Software include but limited to:  Windows, Unix, Linux, Mainframe, .NET, Java, Oracle, SQL Server, VMWare, STAMP, various security tools including NMAP, Ethereal, Snort, Splunk, Appscan, Fortify, Nessus, dig, CA Spectrum, Tivoli, InterMapper, OPNET, Trustwave, Solarwinds, NetIQ, HP Openview, Tclmon, Syslogs, various Microsoft tools (Network Monitor, Event Logs, Sysinternals, etc.), WhatsUpGold, PRTG, KACE, Spiceworks, etc.

-Client – Microsoft

·   Acted as Sr. Program Manager, Speaker, Technical Writer and Subject Matter Expert (SME) for Microsoft learning solutions throughout the United States and Canada.  Projects include project full-lifecycle (from initiation to closing) of official courseware design & development of Infrastructure Optimization (IO), Windows Server 2000, 2003 2008, SQL Server 2000 & 2005, Group Policy, Active Directory and IT security best practices. 

 

 

 

IBM(American Express Account)2005-2009

Principal Consultant (System Administrator, Architect & Project Manager roles)

Served as Project Lead for several programs and projects and collaborated with top-level executive and key stakeholders on IT security, application development, network infrastructure, cloud computing, server consolidations, data center migrations, server steady-state operations, EMC SAN migration, CDN deployment, virtualization, disaster recovery, executive reporting, and Windows OS migration. Performed high level system engineering and system support for multi-tiered web distributed applications for over 25,000 + servers. Functioned as a key member of the IT security, mid-range optimization, server support and business continuity/disaster recovery committees.

§ Managed several infrastructure and security projects values of $1M+ via a matrixed team.  Challenged by tight deadlines and steep budget cuts.  Stepped into several roles including release manager and lead system administrator throughout the SLDC project lifecycle. Acted as the key project enabler and achieved high level of customer satisfaction.

§ Primary technical POC for Global Steady State Intel Services (GLSSIS) disaster recovery (DR) and business continuity for American Express global server environment. 

§ Provided technical consultation on several IBM enterprise accounts including the Xcel Energy account.

§ Managed project logistics & activities, resource management, risk assessment & mitigation, and project tracking and reporting to key stakeholders and upper management of IBM and American Express.  Aided in defining key performance goal (KPG), key performance indicators (KPI), service level agreements (SLA), etc. for several programs, projects and operational teams.  Created work breakdown structures (WBS) and maintained critical path for project completion.  Created customized solutions that quickly identify & address major vulnerabilities, measure & maintain compliance efforts to reduce those vulnerabilities, lower the tremendous cost of meeting countless mandates, created controls, gain clear visibility into vulnerabilities (lower ROI) and measure compliance status.

§ Lead matrixed teams of architects, system engineers, developers and technologists to successfully deliver significant change in a large-scale globalized enterprise environment.  Ensure the infrastructure adheres to the requirements for availability, stability, and efficiency.  Utilized IT framework and governance best practices including standards from Agile, SCRUM, RUP, SDLC, PMI, CMMI, ISO 20000, ISO 27001, Zachman, ITIL, CoBIT, MSF, MOF, Six Sigma, TOGAF, Kimball Data Warehousing, etc.  Aided in providing forecasting and resource allocation with regard to IT projects. Player/Coach contributions at all levels in IT environment. Coordinated project deployments with vendor partners for smooth deployments and ongoing operations. Worked with multiple vendors for program transformation and project streamlining.

§ Provided technical documentation utilizing Microsoft Word, Project, Visio, PowerPoint, etc.

§ Collaborated with business units in designing and deploying customized business applications.  This includes setting up designing, deploying and maintaining application frameworks and their built-in services, API’s including J2EE, COM+, Jboss, Openstack, .NET, etc.; general application security API’s and protocols: GSS-API, MS CryptoAPI, PAM, Kerberos, DCE Security Service, SSL/TLS, SAML, S/MIME, PKCS API’s, or others; built-in functions and services of application infrastructure components: Oracle, DB2/UDB, MS IIS, MS BizTalk Server, Hyperion, Cognos, Microstrategy, Oracle Financials, MS Integration Server, SharePoint, IBM WebSphere, iPlanet Directory, MS Active Directory, Citrix, TomCat, Apache, IIS, SQL Server, Sun LDAP, IBM MQ Series, MSMQ, MS Exchange, etc.; Utilized storage management utilities including; Tivoli Storage Manager (TSM), Tivoli Storage Productivity Center (TPC), EMC PowerPath, Symantec Veritas, etc., server/client operating systems including Windows XP, 2000, 2003, & 2008; AIX, Solaris, Red Hat Linux, z/OS, AS/400, VMWare, Platespin, etc.; network infrastructure and security functionality including Cisco (via AT&T) switches, routers, firewalls, LB, IDS/IPS, SEM/SIEM, VPN’s, etc.; incident response including creation of tiger CERT  teams; aiding setting up patch management, configuration management, physical security.

 

 

DPRA2003-2004

Security Architect/Project Manager

§ Project managed the design and deployment of CFAST 2.0.  Also, collaborated in the design and architect of CFAST version 2.0 (CFAST is the war planning and deployment ERP application currently used by the US military and NATO).  Created security controls, policies, standard operating procedures (SOP) and systems for multiple applications that exceed compliance standards for both corporate and NSA and US DOD standards. Performed security risk analysis and assessment, risk planning and implementation, and risk mitigation and monitoring of various systems for US DOD and NSA compliance for DITSCAP and DCAA reviews. Develop action plans and/or recommend alternate solutions to resolve exceptions to standard operating procedures.

§ Architect and deployed CFAST v2.0 as a high-level security cloud that further secured CFAST V2 within the SIPRNET.  This included creating intrusion detection (IDS, honeypots, firewalls, etc.), disaster recovery strategies, risk management, security audits, etc., methodologies and controls.  Utilized Network Sniffing and Vulnerability Assessment and Penetration Technologies (Network General Sniffer, Ethereal, OPNET, SNORT, Nmap, Nessus, etc.), PKI; Encryption; Digital Certificates and their use, Anti-Virus; Anti-Spyware; VPNs; SSL; IPSec, TCP/IP; DNS; DHCP; LDAP; Active Directory, Multi-Factor Authentication Mechanisms, IP Packet Routing & Switching; IP Packet Analysis, Edge Firewalls, Application Layer, Stateful Packet Inspection, and WAF.

§ Implemented security frameworks standards from PMI, ISO 9000 & 17799 (pre-cursor of ISO 27000/27001), ITIL, CMMI, MSF, Six Sigma, etc.  Utilized federal information security governance including DITSCAP (predecessor of DIACAP), NIST 800.53, various FIPS (FIPS 140, FIPS 199, FIPS 200), FFIEC, FISMA, DoD Global Information Grid (GIG), etc.

§ Managed the design and deployment of disaster recovery and business continuity plans for various US DoD and NATO data sites throughout the world.

 

 

ITT Technical Institute2002 -2003

Adjunct Professor

Taught courses in Windows OS, Active Directory, Networking, Infrastructure, Security, etc., as the subject matter for preparing student for real-world experiences in a university environment. 

 

Strayer University2000 -2002

Adjunct Professor

Taught courses pertaining to computer technologies. Produced courseware and customized training techniques as product deliverables.  Created course syllabus, outline, labs, testing materials, etc. for students for various certification training (MCSE, MCDBA, Network +, etc.) as well as real-world preparation in a university environment.  Taught courseware for risk management and disaster recovery.

 

EDUCATION & TEACHING EXPERIENCE

Bachelor’s Degree – B.S., Electrical Engineering, (Concentration in Digital Logic and Design), Howard University, Washington, DC (1996)

 

Adjunct Professorships at ITT Technical Institute & Strayer University.  Taught for several organizations throughout the United States and Canada

CERTIFICATIONS

Project Management Professional(PMP)

Project Management Certification CompTIA Project +(Project +)

Six Sigma Black Belt(Six Sigma Black Belt)

Information Technology Infrastructure Library Foundations(ITILF)

Microsoft Operations Framework(MOF)

Certified Information Security Manager(CISM)

Certified in Risk and Information Systems Control(CRISC)

Information Security Foundations based on ISO 27000 (ISO 27000)

Information Technology Infrastructure Library Accredited Trainer

Microsoft Operations Framework Accredited Trainer

ISO 27000 Accredited Trainer

Microsoft Certified Trainer(MCT)

Microsoft Certified System Engineer (MCSE: Windows NT, 2000, 2003)

Microsoft Certified System Administrator(MCSA: Windows 2000, 2003)

Microsoft Certified Database Administrator(MCDBA: SQL Server 7.0, 2000)

Microsoft Certified Professional + Internet(MCP+I)

Microsoft Certified Technology Specialist(MSTS)

Microsoft Certified Professional(MCP)

Microsoft Certified Internet Technology Professional: Database Administrator    (MCITP: DBA SQL Server 2005)

Microsoft Certified Internet Technology Professional: Enterprise Administrator (MCITP: EA Windows 2008)

Microsoft Certified Internet Technology Professional: Server Administrator        (MCITP: SA Windows 2008)

Citrix Certified Administrator(CCA)

Cisco Sales Expert for Account Managers – Enterprise Edition(CSE)

Certified Internet Webmaster Certified Instructor(CIW CI)

Certified Internet Webmaster(CIW)

VMware Certified Associate – Cloud(VCA-Cloud)

ITAR Certified Program Manager(ITAR)

 

COMPUTER EXPERIENCE

 

IT Processes & Frameworks – Agile, Integrated Methodology Software Development, Prototyping, Spiral, Waterfall, Incremental, Rapid Application Development (RAD), Object Oriented Development (OOD), Top-down, Unified Process (UP), Rational Unified Process (RUP), ISO 12207, Six Sigma, DMAIC, DMADV, FMEA, QFD, SIPOC, Governance, Risk, Compliance (GRC), TOGAF, CoBIT, Ralph Kimball Data Warehousing, DITSCAP, NIACAP, ISO 17779, ISO 27000, ISO 27001, ISO 27002, ITIL, PMI, Microsoft Operations Framework (MOF), Microsoft Solutions Framework (MSF), Microsoft Infrastructure Optimization, CMMI, DFAR, FAR, HIPAA, ISO 20000, Sarbanes-Oxley (SOX), NIST SP 800-53, FEMA 426, FEMA 428, SDLC, Performance Tuning, Physical Database Design,  Redbrick, Data Modeling, Data Warehousing, RACF, Cryptography, Enterprise Security methodologies, SAN Design, Training Documentation Methodologies (more IT processes & frameworks than listed here)

 

Platforms  Windows OS 3.x-7, Windows Server NT-2012, Windows Home Server, Windows Small Business Server, Windows Essentials, Windows CE, Windows Mobile, Windows Phone, WinPE, Novell Netware, Open Enterprise Server, RedHat, Caldera, Linux, OpenSUSE, Xenix, UnixWare, SCO OpenServer, Chrome OS, Android, JavaFX Mobile, Cisco IOS, IOS-XR,  IronWare, System V, BSD, GNU/Linux, HP-UX, VMS, Domain/OS, , OSE AIX, NeXTSTEP, Mach, FreeBSD, POSIX, VxWorks, Symbian OS, Palm OS, OS/360, OS/VS, OS/390, x/OS, DOS/360, OpenSolaris, OS/2, VMware, VMWare ESX, Solaris, SunOS,  Mac OS (more platform experience than listed here)

 

Hardware - IBM, Macintosh, EMC, EMC Clariion, EMC Symmetrix, HBA, SAN, tiered storage, tape, Dell, HP, Sun,  iMacs, PowerPCs, iBook, PowerBook, Macintosh, G3, G4, Cisco Switches & Routers Series 2000/ 3000/4000/5000/6000/7000/8000/9000/10000/11000/12000, various Alpha, Intel, Motorola processors, Token Ring, Ethernet, Fibre-Channel, various routers, hubs, switches, 3Com, RAID, various servers & workstations, clustering technologies, (Microsoft, Solaris, RedHat, Symantec/VERITAS, EMC, (more hardware experience than listed here)                   

 

Protocols/Interfaces -, LDAP, Active Directory, TCP/IP, IPX/SPX, POP3, PKI, NTLM, SSL, IPSec, EDI, SOAP, XML, HTML, SHTML, Metadata, JDBC, WAP, WML, VPN,  AppleTalk/Local Talk, NetBIOS, NetBEUI, SMTP, DHCP, SNMP, frame relay, HTTP, ARP, SAP, RIP, ISDN, ODBC, IEEE 488.3, IEEE 802.x, NTLM, SSL, IPSec, OSPF, X.25, UDP, NAT, X.400, X.500, ICA, RDP,  A3L, NFS, WTLS, HTTPS,  (more protocols and interfaces than mentioned here)

 

Software – SQL Server, Internet Information Server (IIS), Visual Studio, BizTalk, SMS, ISA Server, Exchange Server, SharePoint Developer, SharePoint Office, SharePoint Portal Server, Live Communication Server, MS Lync Server, MS Speech Server, Project Server 2003/2007/2010, Citrix, Tivoli, HP Openview, Altiris, ActiveWorks, Middleware, WebMethods, MQ Series, LANsurveyor, Symantec, VERITAS, EMC, Hyperion, DataStage, Informatica, BEA WebLogic, DB2, IMS DBA, Sybase, Access, COGNOS, Crystal Reports, ERWIN, ETL, Qwest Suite, MS Expressions, MS FrontPage, Domino, Lotus Notes, Novell GroupWise, LoadRunner, Rational Requisite Pro, Rational Team Test, Test Director, WinRunner, Apache Web Server, Remedy, Clarify, PowerPath, Invista, Metasolv, Telecordia (Bellcore) software, ActiveWorks (Active Adapters), BEA Weblogic, Siebel, JRUN, HP Openview, Telecom Business Solutions (TBS), Clarify, Hyperion, EMS XPSurf, Qcom, Netg, Manta, Bellcore, , Computer Based Training (CBT), Cognos, ERWin, Microstrategy, Infomatica, Ultimus, Siebel, Vertex Quantum, Myrrdin Powerlease, Informix, SATAN, Troux, Sybase, DataStage, FoxPro, MySQL, Visual FoxPro, MS BPOS, MS Azure, Iona Orbix, Microsoft MSMQ Server, MS Integration Server, IBM WebSphere, iPlanet Directory, MS Active Directory, IBM MQ Series, various security software, knowledge of all Microsoft products (more software experience than listed here.

1



Additional Info

BACK TO TOP

 

Current Career Level:

Executive (SVP, VP, Department Head, etc)

 

 

Target Company:

Company Size: