Seek opportunity to grow and advance
my skills in the information security spce.
Not exact matches
Important factors that could cause actual results to differ materially from those reflected
in such forward - looking statements and that should be considered
in evaluating our outlook include, but are not limited to, the following: 1) our ability to continue to grow our business and execute our growth strategy, including the timing, execution, and profitability of new and maturing programs; 2) our ability to perform our obligations under our new and maturing commercial, business aircraft, and military development programs, and the related recurring production; 3) our ability to accurately estimate and manage performance, cost, and revenue under our contracts, including our ability to achieve certain cost reductions with respect to the B787 program; 4) margin pressures and the potential for additional forward losses on new and maturing programs; 5) our ability to accommodate, and the cost of accommodating, announced increases
in the build rates of certain aircraft; 6) the effect on aircraft demand and build rates of changing customer preferences for business aircraft, including the effect of global economic conditions on the business aircraft market and expanding conflicts or political unrest
in the Middle East or Asia; 7) customer cancellations or deferrals as a result of global economic uncertainty or otherwise; 8) the effect of economic conditions
in the industries and markets
in which we operate
in the U.S. and globally and any changes therein, including fluctuations
in foreign currency exchange rates; 9) the success and timely execution of key milestones such as the receipt of necessary regulatory approvals, including our ability to obtain
in a timely fashion any required regulatory or other third party approvals for the consummation of our announced acquisition of Asco, and customer adherence to their announced schedules; 10) our ability to successfully negotiate, or re-negotiate, future pricing under our supply agreements with Boeing and our other customers; 11) our ability to enter into profitable supply arrangements with additional customers; 12) the ability of all parties to satisfy their performance requirements under existing supply contracts with our two major customers, Boeing and Airbus, and other customers, and the risk of nonpayment by such customers; 13) any adverse impact on Boeing's and Airbus» production of aircraft resulting from cancellations, deferrals, or reduced orders by their customers or from labor disputes, domestic or international hostilities, or acts of terrorism; 14) any adverse impact on the demand for air travel or our operations from the outbreak of diseases or epidemic or pandemic outbreaks; 15) our ability to avoid or recover from cyber-based or other
security attacks,
information technology failures, or other disruptions; 16) returns on pension plan assets and the impact of future discount rate changes on pension obligations; 17) our ability to borrow additional funds or refinance debt, including our ability to obtain the debt to finance the purchase price for our announced acquisition of Asco on favorable terms or at all; 18) competition from commercial aerospace original equipment manufacturers and other aerostructures suppliers; 19) the effect of governmental laws, such as U.S. export control laws and U.S. and foreign anti-bribery laws such as the Foreign Corrupt Practices Act and the United Kingdom Bribery Act, and environmental laws and agency regulations, both
in the U.S. and abroad; 20) the effect of changes
in tax law, such as the effect of The Tax Cuts and Jobs Act (the «TCJA») that was enacted on December 22, 2017, and changes to the interpretations of or guidance related thereto, and the Company's ability to accurately calculate and estimate the effect of such changes; 21) any reduction
in our credit ratings; 22) our dependence on our suppliers, as well as the cost and availability of raw materials and purchased components; 23) our ability to recruit and retain a critical mass of highly -
skilled employees and our relationships with the unions representing many of our employees; 24) spending by the U.S. and other governments on defense; 25) the possibility that our cash flows and our credit facility may not be adequate for our additional capital needs or for payment of interest on, and principal of, our indebtedness; 26) our exposure under our revolving credit facility to higher interest payments should interest rates increase substantially; 27) the effectiveness of any interest rate hedging programs; 28) the effectiveness of our internal control over financial reporting; 29) the outcome or impact of ongoing or future litigation, claims, and regulatory actions; 30) exposure to potential product liability and warranty claims; 31) our ability to effectively assess, manage and integrate acquisitions that we pursue, including our ability to successfully integrate the Asco business and generate synergies and other cost savings; 32) our ability to consummate our announced acquisition of Asco
in a timely matter while avoiding any unexpected costs, charges, expenses, adverse changes to business relationships and other business disruptions for ourselves and Asco as a result of the acquisition; 33) our ability to continue selling certain receivables through our supplier financing program; 34) the risks of doing business internationally, including fluctuations
in foreign current exchange rates, impositions of tariffs or embargoes, compliance with foreign laws, and domestic and foreign government policies; and 35) our ability to complete the proposed accelerated stock repurchase plan, among other things.
He is
skilled in blockchain, product development, networking and
information security and worked as a Network Consulting Engineer at Cisco Systems for five years.
«It is a model because of its combination of foundational education and hands - on
skills that will allow them to be effective on day one
in solving real - world problems,» says Richard «Dickie» George, technical director of the National
Security Agency's (NSA's)
Information Assurance Directorate.
Essentially, it is important to be aware that the solution is likely to be a unique solution to the given environment and that it contains broader issues of governance, infrastructure, pay collection systems (community structure), hygiene
information,
skill in order to upkeep, community support (they must want this change or it will never work), financial
security (for initial costs and upkeep costs), etc...
Before you hire a non-lawyer representative or Social
Security disability advocate, talk to the
skilled legal professionals at The Cochran Firm Disability Lawyers for
in - depth
information about the SSDI process and your rights.
To address this, the International
Information Systems
Security Certification Consortium oversees the Certified Information Systems Security Professional certification to verify experience, skill and competency of those working in systems s
Security Certification Consortium oversees the Certified
Information Systems
Security Professional certification to verify experience, skill and competency of those working in systems s
Security Professional certification to verify experience,
skill and competency of those working
in systems
securitysecurity.
Across eight comprehensive modules, this collection will get you up to speed with the fundamentals of
information systems
security as you learn the
skills you need to pass the CISSP exam, a leading certification
in the industry.
Indorse motivates you by encouraging a «
skills economy» through Indorse Rewards, Indorse Score reputation system and paying
in tokens for helping them build the platform
in addition to improving
security and privacy for your data and
information.
It's worth reminding that Canary also integrated the Google Assistant
in some of its
security products late last year, allowing users to communicate with their Canary sensors
in order to obtain
information regarding battery life, ambient temperature, and more, though it's evident that the integration with Google's solution offers a different array of features, whereas the Canary
skill for Amazon's Alexa assistant primarily focuses on the ability to live - stream videos to compatible Amazon - made devices.
Proven expert
in Contracting Human Resources (HR)
Information Technology (IT) Sales & Marketing (S&M) and Business Development (BD)
skill sets with demonstrated emphasis
in contract management recruiting organizational planning systems design staffing management budgeting corporate planning state - of - the - art technology metrologies Cyber
Security end - user communications (interface / negotiations / consulting) and systems operatio...
To leverage my 9 + years of client - facing experience, public speaking
skills, training
skills, and expertise
in current technology trends into an IT specialist focusing on
information security.
Highlights Results - oriented Personal
security Self - directed Excellent communication
skills... Scheduled visitation for inmates Maintained
security in facility Assisted public with
information on... physical restraints to maintain the safety and
security of personnel and the general public.
Experienced
information security manager with
skills in a diverse range of
security technologies.
Strong communications
skills, with exceptional problem solving abilities and over 10 years of experience
in information security analysis.
it outlines the
skills and experience he / she has, this includes the type of
information technology
security software he / she is conversant with, the companies they have worked for and also the achievements they made
in those companies.
They have offices across the globe (Dublin, London, Paris, Berlin, Manhattan, Tokyo, Sydney) and recruit for the biggest brands
in digital marketing, advertising and retail, placing candidates with
skills including software development, project management, SEO, SEM, Google / Web Analytics, Mobile Apps development,
Information Security, Media production, Visual and Graphic Design.
This resume outlines the applicants experience
in the computer
security engineering industry, it provides the potential employer with the
skills and experience of the applicant, this includes the
information technology
security applications he / she is conversant with, the companies they one has worked for and also the achievements made
in those companies.
This resume outlines the applicants experience company internal
security matters, it provides the potential employer with the
skills and experience of the applicant, this includes the
information technology
security applications he / she is conversant with, the companies they one has worked for and also the achievements made
in those companies.
Information security resume objective 1: a skilled and qualified person looking for the job position of an information security manager in a dynamic work environment wherein I would be able to pursue my goal of utilising my education and becoming a successful employee of
Information security resume objective 1: a
skilled and qualified person looking for the job position of an
information security manager in a dynamic work environment wherein I would be able to pursue my goal of utilising my education and becoming a successful employee of
information security manager
in a dynamic work environment wherein I would be able to pursue my goal of utilising my education and becoming a successful employee of a company.
This resume is shows the applicants experience
in the
security engineering industry, it outlines the
skills and experience he / she has, this includes the type of
information technology
security software he / she is conversant with, the companies they have worked for and also the achievements they made
in those companies.
They have offices across the globe (Birmingham, London, Paris, Berlin, Manhattan, Tokyo, Sydney) and recruit for the biggest brands
in digital marketing, advertising and retail, placing candidates with
skills including software development, project management, SEO, SEM, Google / Web Analytics, Mobile Apps development,
Information Security, Media production, Visual and Graphic Design.
• Strong written communication
skills • Knowledge of coding principles and current standard programming languages • Experience with chain of command style organizations • Experience with military procedures and methods of documentation • Training
in information security protocols
There are
skills shortages
in the
information, cyber
security, science and engineering sectors.
The candidate
in our principal cyber
security manager resume sample brings up his project management and system architecture design
skills as well as his abilities to manage risks, monitor alerts, and provide
information assurance.
• Highly
skilled in greeting passengers and help them check -
in • Proficient
in providing passengers with general travel
information • Customer focused approach with good attention to detail • Able to give accurate and detailed
information regarding flight schedules • Demonstrated ability to verify passenger departure documents • Thorough understanding of receiving airfreight shipments, and establishing routing, classification, rates and additional tariff charges • Comprehensive knowledge of making reservations, preparing and issuing tickets, calculating fares and issuing refunds • Complies with all
security requirements
Don'ts • Never include personal
information such as social
security number or date of birth • Do not exaggerate your qualifications or
skills • Avoid writing negative
information in your resume • Never use colored fonts
Extensive experience
in industrial electronics,
information systems, and vending including inventory control, mail routing and delivery, training, networking, data processing, teamwork, teleconferencing,
security, and customer service
skills.
Communications Functions Designer / Graphic Artist / Illustrator Central Intelligence Agency... 57 Defense
Security Service... 51 International Paper... 47 State Farm... 25 The McGraw - Hill Companies... 50 Vanguard... 69 Journalist PPL Corporation... 32, 33 Public Relations Specialist Boy Scouts of America... 49 Girl Scouts of the USA... 53 PPL Corporation... 32, 33 State Farm... 25 Technical Writer Boy Scouts of America... 49 Defense
Security Service... 51 PPL Corporation... 32, 33 Writer / Editor Central Intelligence Agency... 57 Girl Scouts of the USA... 53 PPL Corporation... 32, 33 State Farm... 25 Vanguard... 69 Computer / Technical Functions Artificial Intelligence Specialist Air Force Civilian Service... 10 The Johns Hopkins University Applied Physics Laboratory... 17 Data Processor / MIS International Paper... 47 Macy's, Inc.... 13 McKesson... 19 The McGraw - Hill Companies... 50 Database Management Specialist Bell Helicopter Textron... 30 Defense
Security Service... 51 Girl Scouts of the USA... 53 International Paper... 47 McKesson... 19 PPL Corporation... 32, 33 Job Choices: Diversity Edition National Association of Colleges and Employers Hardware Designer NAVAIR - Naval Air Systems Command... 7
Information Systems Specialist Air Force Civilian Service... 10 Central Intelligence Agency... 57 Defense
Security Service... 51 International Paper... 47 McKesson... 19 Philip Morris USA, an Altria company... 1 PPL Corporation... 32, 33 The Johns Hopkins University Applied Physics Laboratory... 17 The McGraw - Hill Companies... 50 Network Support / Data Communications Specialist Air Force Civilian Service... 10 Defense
Security Service... 51 Girl Scouts of the USA... 53 International Paper... 47 Macy's, Inc.... 13 PPL Corporation... 32, 33 State Farm... 25 The Johns Hopkins University Applied Physics Laboratory... 17 The McGraw - Hill Companies... 50 Operations Analyst Defense
Security Service... 51 International Paper... 47 NAVAIR - Naval Air Systems Command... 7 Programmer Girl Scouts of the USA... 53 International Paper... 47 Macy's, Inc.... 13 McKesson... 19 PPL Corporation... 32, 33 State Farm... 25 The McGraw - Hill Companies... 50 Vanguard... 69 Software Designer Macy's, Inc.... 13 NAVAIR - Naval Air Systems Command... 7 The McGraw - Hill Companies... 50 Vanguard... 69 79 Table of Contents for the Digital Edition of Job Choices - February 2013 - Diversity Edition Job Choices - February 2013 Diversity Edition Contents Opportunities by Employer / Website Index From Campus to Career Timeline: From Campus to Career Building the
Skills That Employers Want What Employers Want Playing Fair: Your Rights and Responsibilities as a Job Seeker 10 Tips for Using Social Media
in Your Job Search The Art of Writing Job - Search Letters Sample Letters A Step - by - Step Guide to a Winning Resume Sample Resumes Are You Demonstrating These on Your Resume?
* Bachelor's degree
in management
information systems, computer science, or a related field * At least five years experience
in the field, and at least one year experience
in a supervisory role * Excellent written and verbal communication
skills and leadership abilities * Detail - oriented and conscientious worker * Experience
in information security preferred
You can reiterate your
security skills and knowledge
in one sentence and provide the reader with your contact
information.
RESPONSIBILITIES: Answer phones
in professional and courteous manner and direct calls to the appropriate associate Retrieve messages from voicemail and forward to appropriate department Open and sort incoming mail Sort and process outgoing mail using Pitney Bowes postage machine Greet visitors and welcomes visitors and notifies company employee about the arrival Maintains
security by following visitor policy, monitoring guestbook and issuing visitor badges Maintains a safe and clean reception area Support guests and event management with catering, hotel and travel bookings Orders office supplies and maintain supply cabinet Update
information in various spreadsheets Update slides on site monitor Provides general office support with a variety of clerical activities and related tasks REQUIRED EXPERIENCE: 2 - 4 years Receptionist experience preferred Excellent communication
skills; written and verbal Attention to detail, accuracy and consistent quality Computer
skills in Microsoft Office (Word, Excel, Power Point), SAP preferred Able to use established guidelines to perform job function Demonstrate ability to manage time, complete detailed task and handle multiple tasks simultaneously EDUCATION: Accredited High School Diploma / GED WORK HOURS: 1st Shift Full - Time
SUMMARY OF QUALIFICATIONS • Over 2 years of experience
in event planning and fundraising • Highly skilled in assisting special events staff in all aspects of special event harmonization • In - depth knowledge of placing telephone calls to employ and keep hold of volunteers • Hands - on experience in supporting the data management requirements of the special events employees • Proven record of attending special event planning sessions to hold up planning, execution and responsibilities setting • Able to serve as a production assistant at assigned events • Demonstrated ability to make presentations in PowerPoint • Proven ability to provide administrative support as assigned • Able to make sure the privacy and security of proprietary information • Comprehensive knowledge of working with volunteers and in handling the logistics of special even
in event planning and fundraising • Highly
skilled in assisting special events staff in all aspects of special event harmonization • In - depth knowledge of placing telephone calls to employ and keep hold of volunteers • Hands - on experience in supporting the data management requirements of the special events employees • Proven record of attending special event planning sessions to hold up planning, execution and responsibilities setting • Able to serve as a production assistant at assigned events • Demonstrated ability to make presentations in PowerPoint • Proven ability to provide administrative support as assigned • Able to make sure the privacy and security of proprietary information • Comprehensive knowledge of working with volunteers and in handling the logistics of special even
in assisting special events staff
in all aspects of special event harmonization • In - depth knowledge of placing telephone calls to employ and keep hold of volunteers • Hands - on experience in supporting the data management requirements of the special events employees • Proven record of attending special event planning sessions to hold up planning, execution and responsibilities setting • Able to serve as a production assistant at assigned events • Demonstrated ability to make presentations in PowerPoint • Proven ability to provide administrative support as assigned • Able to make sure the privacy and security of proprietary information • Comprehensive knowledge of working with volunteers and in handling the logistics of special even
in all aspects of special event harmonization •
In - depth knowledge of placing telephone calls to employ and keep hold of volunteers • Hands - on experience in supporting the data management requirements of the special events employees • Proven record of attending special event planning sessions to hold up planning, execution and responsibilities setting • Able to serve as a production assistant at assigned events • Demonstrated ability to make presentations in PowerPoint • Proven ability to provide administrative support as assigned • Able to make sure the privacy and security of proprietary information • Comprehensive knowledge of working with volunteers and in handling the logistics of special even
In - depth knowledge of placing telephone calls to employ and keep hold of volunteers • Hands - on experience
in supporting the data management requirements of the special events employees • Proven record of attending special event planning sessions to hold up planning, execution and responsibilities setting • Able to serve as a production assistant at assigned events • Demonstrated ability to make presentations in PowerPoint • Proven ability to provide administrative support as assigned • Able to make sure the privacy and security of proprietary information • Comprehensive knowledge of working with volunteers and in handling the logistics of special even
in supporting the data management requirements of the special events employees • Proven record of attending special event planning sessions to hold up planning, execution and responsibilities setting • Able to serve as a production assistant at assigned events • Demonstrated ability to make presentations
in PowerPoint • Proven ability to provide administrative support as assigned • Able to make sure the privacy and security of proprietary information • Comprehensive knowledge of working with volunteers and in handling the logistics of special even
in PowerPoint • Proven ability to provide administrative support as assigned • Able to make sure the privacy and
security of proprietary
information • Comprehensive knowledge of working with volunteers and
in handling the logistics of special even
in handling the logistics of special events
Information security analyst resume objective 4: Looking for a position in the information security department of a leading company that would provide me with an opportunity for making a strong contribution by expanding and utilizing upon my already acquired skills, education, capabilities and e
Information security analyst resume objective 4: Looking for a position
in the
information security department of a leading company that would provide me with an opportunity for making a strong contribution by expanding and utilizing upon my already acquired skills, education, capabilities and e
information security department of a leading company that would provide me with an opportunity for making a strong contribution by expanding and utilizing upon my already acquired
skills, education, capabilities and experiences.
• Demonstrated expertise
in securing premises and performing patrolling duties, aimed at ensuring community and premises safety • Track record of monitoring surveillance equipment and following up on nefarious or suspicious activities • Focused on preventing losses and damages by «keeping an eye open» at all times and recording and following up on abnormal occurrences • Proficient
in coordinating
information security compliance activities and implementing
security policies and procedures • Documented success
in performing
information security risk analysis aimed at deriving data for
security processes • Demonstrated good judgement and problem - solving
skills to deal with
security issues of variable natures within standardized situations • Adept at physically controlling violent or unruly individuals along with the ability to subdue individuals after running
in pursuit •
Skilled in coordinating and implementing disaster recovery programs and managing
security incident responses • Familiar with conducting armed stationary, foot and vehicle patrols, targeted at deterring criminal activity, misconduct and breach of community rules • Knowledge of initiating and monitoring informal investigations of
security infractions and violations
Results - driven
Information Security Specialist with 7 years of combined work experience in information Security and Information Technology, seeking a challenging position with a progressive company for continuous career development where my skills and experiences can be further fully utilized in achieving the goals and objectives of the or
Information Security Specialist with 7 years of combined work experience
in information Security and Information Technology, seeking a challenging position with a progressive company for continuous career development where my skills and experiences can be further fully utilized in achieving the goals and objectives of the or
information Security and
Information Technology, seeking a challenging position with a progressive company for continuous career development where my skills and experiences can be further fully utilized in achieving the goals and objectives of the or
Information Technology, seeking a challenging position with a progressive company for continuous career development where my
skills and experiences can be further fully utilized
in achieving the goals and objectives of the organization.
¥ Extensive knowledge of budgetary and financial procedures and processes ¥ Solid understanding of the Federal
Information Security Management Act ¥ Superb staff recruitment and retention skills ¥ Profound knowledge of information assurance strategies to manage risks ¥ Adaptable to new technologies and proficient in the use of financial software ¥ Ability to work well in fast - paced environments ¥ Excellent written and verbal communicat
Information Security Management Act ¥ Superb staff recruitment and retention
skills ¥ Profound knowledge of
information assurance strategies to manage risks ¥ Adaptable to new technologies and proficient in the use of financial software ¥ Ability to work well in fast - paced environments ¥ Excellent written and verbal communicat
information assurance strategies to manage risks ¥ Adaptable to new technologies and proficient
in the use of financial software ¥ Ability to work well
in fast - paced environments ¥ Excellent written and verbal communications
skills
Adebola is a British Standard Institute certified lead auditor with certifications
in ISO 9001, ISO 14001, ISO 27001, and OHSAS 18001 seeking position where I can leverage my cybersecurity and problem - solving
skill to develop, implement, monitor and support
information system
security programs
in areas of vulnerability assessment, penetration testing and managing or deploying identity management solutions.
Experienced
information technology specialist with advanced
skill in managing and architecting network infrastructure systems and
security.
Job
Information (Announcement number, title, series and grade of job for which applying) Personal
Information (Full name, mailing address w / zip code, day and evening phone numbers w / area code, social
security #, country of citizenship, veteran's preference, reinstatement eligibility, highest Federal civilian grade held) Education (High school: name, city, and state, date of diploma or GED, Colleges or universities: name, city and state, majors, type and year of any degrees received) Work Experience (Job title, duties and accomplishments, employer's name and address, supervisor's name and phone number, starting and ending dates, hours per week, salary, indicate whether we may contact your current supervisor) Other Qualifications (Job - related training courses,
skills, certificates and licenses, honors, awards and special accomplishments; for example, publications, memberships
in professional or honor societies, leadership activities, public speaking and performance awards)
Knowledge of pharmacy terminology; basic drug
information *; quality control procedures; state & federal laws, rules & regulations regarding duties of qualified pharmacy technician, prescription or drug order processing procedures, drug record keeping requirements *, patient confidentiality,
security requirements & storage requirements;
Skill in computer operation & keyboarding; operation of pharmacy equipment (e.g., packaging machine, fax, printer) *.
To continuing to utilizing my
skills in Computer Operations, and to extend my knowledge
in the area of
Information Security (Classroom, Mentoring with other subject experts and online courses)
in becoming more proficiency.
I have worked numerously with
skilled IT professionals
in achieving the
security goals of
information systems.
SUMMARY A highly
skilled computer science graduate student with about 3 years of experience
in vulnerability research & assessment, passionate about application
security and with extensive knowledge of programming and oracle certified professional Java programmer looking for an entry - level opportunity
in the field of
information security in a renowned organization.
Business - minded
security professional and IT Security and Audit Specialist with strong skills in with strong experience in: Information Security, IT Audit and Controls Reviews, IT Governance, Security Controls Design and Review, Application Security, and Regulatory Compliance, Cloud Security and Analysis, Project Management, Business Continuity / Disaster Recovery Planning, Vulnerability Scans, Regulatory Compliance, Pol
security professional and IT
Security and Audit Specialist with strong skills in with strong experience in: Information Security, IT Audit and Controls Reviews, IT Governance, Security Controls Design and Review, Application Security, and Regulatory Compliance, Cloud Security and Analysis, Project Management, Business Continuity / Disaster Recovery Planning, Vulnerability Scans, Regulatory Compliance, Pol
Security and Audit Specialist with strong
skills in with strong experience
in:
Information Security, IT Audit and Controls Reviews, IT Governance, Security Controls Design and Review, Application Security, and Regulatory Compliance, Cloud Security and Analysis, Project Management, Business Continuity / Disaster Recovery Planning, Vulnerability Scans, Regulatory Compliance, Pol
Security, IT Audit and Controls Reviews, IT Governance,
Security Controls Design and Review, Application Security, and Regulatory Compliance, Cloud Security and Analysis, Project Management, Business Continuity / Disaster Recovery Planning, Vulnerability Scans, Regulatory Compliance, Pol
Security Controls Design and Review, Application
Security, and Regulatory Compliance, Cloud Security and Analysis, Project Management, Business Continuity / Disaster Recovery Planning, Vulnerability Scans, Regulatory Compliance, Pol
Security, and Regulatory Compliance, Cloud
Security and Analysis, Project Management, Business Continuity / Disaster Recovery Planning, Vulnerability Scans, Regulatory Compliance, Pol
Security and Analysis, Project Management, Business Continuity / Disaster Recovery Planning, Vulnerability Scans, Regulatory Compliance, Policy D...
Seeking to secure a position as Linux Admin, VMware Engineer, PowerShell Programmer, and QA / QC Systems
Security Analyst with
Information Technology Industries where I can utilize my Computer Systems experience, Computer Engineering education, and interpersonal
skills in a demanding high - tech environment, I am mostly interested working with implementation and integration of new technologies.
Skills Microsoft Certified Technology Specialist (MCTS) Certificate Comptia
Security +... St Altus, OK 73521 Coursework
in Information Technology and Computer Applications Student government
Information Technology (IT) Director — Duties & Responsibilities Manage IT department, customer service technicians, client / staff training, and a multimillion dollar budget Set and strictly adhere to departmental budgets and timelines ensuring timely and cost effective operations Responsible for 150 servers
in a VM / SAN environment, Cisco network, and MAN connection between offices Maintain 4 9's uptime on all IT services and attain 100 % SLA compliance with clarification of SOW terms Successfully manage multiple building moves and build outs with zero IT downtime Oversee PBX to Cisco Unified Communications change, VMWare / SAN implementation, and hosting of 20 ASP clients Create and implement complete helpdesk department and remote resolution of client issues Negotiate and administer contracts and partnerships with vendors, service providers, and other parties Configure, troubleshoot, and support 300 + corporate workstations ensuring efficient, effective, and secure operations Oversee remote network access, VPN support, and phone support for remote executives Install, configure, troubleshoot, and support multiple Windows and SQL servers Design and implement enterprise disaster recovery systems, processes, and policies Plan and develop of LAN / WAN hardware and software requirements, updates, and related equipment Facilitate customer contracts / billing, technical support, and end - user training Train large staffs ensuring they understand the brand and adhere to corporate policies and procedures Collaborate with department managers to identify and address
security concerns through IT Security policies Author reports concerning IT department operations, suggested hardware / software updates, and other pertinent data Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technica
security concerns through IT
Security policies Author reports concerning IT department operations, suggested hardware / software updates, and other pertinent data Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technica
Security policies Author reports concerning IT department operations, suggested hardware / software updates, and other pertinent data Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence
in team leadership, customer service, and technical
skills
Information Technology Security Manager — Duties & Responsibilities Manage IT security, customer service technicians, assets and finances, and client training Responsible for ensuring that multiple IT groups meet finance, audit, and compliance requirements Serve as primary point of contact for customer contracts, technical support, and end - user training Utilize interpersonal and technical skills as liaison between clients, technicians, and subcontractors Train large staffs ensuring they understand the brand and adhere to corporate policies and procedures Oversee the implementation of asset management processes and procedures Coordinate activities with desktop leads to ensure SOX compliance Validate asset information, manage defect reports, and submit correct action recommendations Design and implement enterprise - wide security protocols, mainframe / pc policies, & software / hardware packages Collaborate with department managers to identify and address security concerns through IT Security policies Reduce corporate information ricks through implementation of sensitive document control processes Utilize RACF and Windows / LAN measures to greatly improve user, administrator, and application security Establish and oversee regular system security audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and techn
Information Technology
Security Manager — Duties & Responsibilities Manage IT security, customer service technicians, assets and finances, and client training Responsible for ensuring that multiple IT groups meet finance, audit, and compliance requirements Serve as primary point of contact for customer contracts, technical support, and end - user training Utilize interpersonal and technical skills as liaison between clients, technicians, and subcontractors Train large staffs ensuring they understand the brand and adhere to corporate policies and procedures Oversee the implementation of asset management processes and procedures Coordinate activities with desktop leads to ensure SOX compliance Validate asset information, manage defect reports, and submit correct action recommendations Design and implement enterprise - wide security protocols, mainframe / pc policies, & software / hardware packages Collaborate with department managers to identify and address security concerns through IT Security policies Reduce corporate information ricks through implementation of sensitive document control processes Utilize RACF and Windows / LAN measures to greatly improve user, administrator, and application security Establish and oversee regular system security audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technica
Security Manager — Duties & Responsibilities Manage IT
security, customer service technicians, assets and finances, and client training Responsible for ensuring that multiple IT groups meet finance, audit, and compliance requirements Serve as primary point of contact for customer contracts, technical support, and end - user training Utilize interpersonal and technical skills as liaison between clients, technicians, and subcontractors Train large staffs ensuring they understand the brand and adhere to corporate policies and procedures Oversee the implementation of asset management processes and procedures Coordinate activities with desktop leads to ensure SOX compliance Validate asset information, manage defect reports, and submit correct action recommendations Design and implement enterprise - wide security protocols, mainframe / pc policies, & software / hardware packages Collaborate with department managers to identify and address security concerns through IT Security policies Reduce corporate information ricks through implementation of sensitive document control processes Utilize RACF and Windows / LAN measures to greatly improve user, administrator, and application security Establish and oversee regular system security audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technica
security, customer service technicians, assets and finances, and client training Responsible for ensuring that multiple IT groups meet finance, audit, and compliance requirements Serve as primary point of contact for customer contracts, technical support, and end - user training Utilize interpersonal and technical
skills as liaison between clients, technicians, and subcontractors Train large staffs ensuring they understand the brand and adhere to corporate policies and procedures Oversee the implementation of asset management processes and procedures Coordinate activities with desktop leads to ensure SOX compliance Validate asset
information, manage defect reports, and submit correct action recommendations Design and implement enterprise - wide security protocols, mainframe / pc policies, & software / hardware packages Collaborate with department managers to identify and address security concerns through IT Security policies Reduce corporate information ricks through implementation of sensitive document control processes Utilize RACF and Windows / LAN measures to greatly improve user, administrator, and application security Establish and oversee regular system security audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and techn
information, manage defect reports, and submit correct action recommendations Design and implement enterprise - wide
security protocols, mainframe / pc policies, & software / hardware packages Collaborate with department managers to identify and address security concerns through IT Security policies Reduce corporate information ricks through implementation of sensitive document control processes Utilize RACF and Windows / LAN measures to greatly improve user, administrator, and application security Establish and oversee regular system security audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technica
security protocols, mainframe / pc policies, & software / hardware packages Collaborate with department managers to identify and address
security concerns through IT Security policies Reduce corporate information ricks through implementation of sensitive document control processes Utilize RACF and Windows / LAN measures to greatly improve user, administrator, and application security Establish and oversee regular system security audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technica
security concerns through IT
Security policies Reduce corporate information ricks through implementation of sensitive document control processes Utilize RACF and Windows / LAN measures to greatly improve user, administrator, and application security Establish and oversee regular system security audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technica
Security policies Reduce corporate
information ricks through implementation of sensitive document control processes Utilize RACF and Windows / LAN measures to greatly improve user, administrator, and application security Establish and oversee regular system security audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and techn
information ricks through implementation of sensitive document control processes Utilize RACF and Windows / LAN measures to greatly improve user, administrator, and application
security Establish and oversee regular system security audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technica
security Establish and oversee regular system
security audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technica
security audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence
in team leadership, customer service, and technical
skills
Administrative Assistant — Duties & Responsibilities Provide administrative support services across a variety of highly technical fields Represent company brand with poise, integrity, and positivity Coordinate reappointment and re-credentialing process for allied healthcare providers Oversee applications, primary source verification, and outstanding
information retrieval Perform legal research and writing on a variety of medical compliance topics utilizing LexisNexis Direct the layout, print, and distribution process for forty medical publications Strictly adhere to all department budgets and project timelines Manage calendars, travel arrangements, and complete itineraries for senior leadership Handle accounts receivable, accounts payable, QuickBooks, billing, and reimbursements Responsible for tracking and replenishing office supplies and
information technology hardware Create presentations, charts, and reports regarding organizational structure, workflow, and efficiency Direct logistical aspects of company events including venue, registration, A / V, and refreshments Implement new electronic recordkeeping software to streamline processes and enhance
security Study internal literature to become an expert on products and services Develop and strengthen relationships with outside vendors, partners, customers, and community leaders Train new team members ensuring they understand the brand and adhere to company policies and procedures Encourage high customer retention by maintaining friendly, supportive contact with existing clients
Skilled in Microsoft products, Visio, Lotus Notes, GroupWise, C++, HTML, Oracle, VBA, and VB.NET