Sentences with phrase «user security training»

Aided flawless 1FW COMSEC account; aced annual equip audit; zero findings during 633d Wing inspection Implemented established JFAN security policies / procedures and ensured completion of required user security training - maintained an inspection - ready program as identified by the Advance Program Office and Wing IA inspection teams.
Under the law, firms that deal with protected health information must give end - user security training, which specifically deals with minimizing risk for firms and clients, such as providing education about what a phishing scam looks like.

Not exact matches

«It has more [monetization] than we expected; as users build their Pokémon inventory, spending money becomes needed to store, train, hatch and battle,» Macquarie Securities said in a note to clients, adding that purchases so far in Australia were not being driven by big spenders but by a large number of users.
«Our new privacy offering gives tablet users the option to have security in seconds — a must have precautionary measure when viewing private or confidential data in public spaces such as trains or coffee shops,» said Ben Rooney, Marketing Executive, Specialty Display Business at 3M.
DTC test security and ethics training materials will be posted inside the Educator Portal on the HELP tab for DTCs, District Users, and BTCs.
Due to the extremely short, 4 - month timeframe for completing the CARS program, CARs users may not receive CARS - specific security training (other than the security briefing).
FMCSA requires all users of eMCATS to receive annual security and privacy training regarding the safeguarding, security, and privacy concerns relating to information stored in eMCATS.
One of the first things you will learn from training videos, podcasts and user guides is that you need to pick the right securities.
• Firms» top IT challenges include security management (67 per cent), user adoption / lack of training (42 per cent), risk management / compliance (40 per cent) and email management (39 per cent).
This is no where near what is needed to train government agencies, law enforcement, security agencies, schools, social agencies, medical practitioners, patients, rec users and a variety of other stakeholders.
Dropbox Enterprise takes the security and management features from Dropbox Business and adds domain management tools, collaboration insights, premium integration and development support, an assigned success manager, and full deployment support and user training.
Although these machines may be commonly used without much issue by security in airports, malls, and other settings, much of the danger arises from inexperienced users who may not understand the risk or who may not receive adequate training before heading out to use them at full speed.
You'll lead all technical aspects of implementations, which includes collecting requirements, building workflows, user interfaces, security profiles, reports, training / demonstrating, handling support issues, and much more.
· Firms» top IT challenges include security management (67 %), user adoption / lack of training (42 %), risk management / compliance (40 %), and email management (39 %).
He states that we should keep utilizing hierarchal file systems for users that are trained, but to amplify other's system, security could be transformed into better by other means.
Adept at training and educating internal users on relevant cyber security procedures and preventative measures.
Essential work duties seen on a Data Security Analyst resume example are installing and maintaining security software, identifying and eliminating security breaches, providing security training to end users, and reporting to manSecurity Analyst resume example are installing and maintaining security software, identifying and eliminating security breaches, providing security training to end users, and reporting to mansecurity software, identifying and eliminating security breaches, providing security training to end users, and reporting to mansecurity breaches, providing security training to end users, and reporting to mansecurity training to end users, and reporting to management.
Provide support to departments on issues of SAP Security, including technical guidance and training, and design and implement programs for user awareness, compliance monitoring, and security comSecurity, including technical guidance and training, and design and implement programs for user awareness, compliance monitoring, and security comsecurity compliance.
Train users and promote security awareness to ensure system security and to improve server and network efficiency.
Spearhead implementation efforts of SuccessFactors Workforce Analytics, including project managing validation, configuring role - based security, expanding user base through training and outreach.
HIGHLIGHTS OF QUALIFICATIONS • Practiced in effective communication with the staff at all levels to ensure smooth running of assigned security operations • Adept at reviewing recorded data and damage reports to determine appropriate courses of action • Well versed in patrolling client's premises or facility to establish security needs and services required • Demonstrated leadership ability in emergency response situations on site • Expert user of incident command system management • Valid driver's license holder with current CPR training
Skill Highlights Tier 1 and Tier 2 technical support Deskside and remote support Asset management Operations management End - user training System security Accomplishments Designed inventory database to better manage assets and facilitate budget management.
Skill Highlights Systems Analysis and Design Network Security and Administration Database Development and Administration Project Management End - User Training Software Development Professional Experience Programmer / Analyst 5/1/2010 — Current Gregson Industries, Inc. — McLean, VA Conceptualize, design, implement, and manage applications in accordance with specifications and client requirements.
«Coding logic,» «quality testing and assurance,» and «end user training» are all needed for a successful career as a SAP security consultant.
I have particular expertise in network design and security, devices implementation, users training and network maintenance on a day - to - day basis.
Hardware Technician 2006 — 2010 USmax Corporation — Laguna Niguel, CA • Monitored and responded to hardware and software problems • Installed and configured network hardware and software • Provided network troubleshooting and support • Trained end - users • Administered network security • Backed up file server data
Dedicated to producing innovative systems that enable the achievement of research goals Skill Highlights Research Applications National Security Applications Project Management Programming and Coding End - User Training Software Development Professional Experience Software Engineer / Programmer III 5/1/2015 — Current The University Corporation for Atmospheric Research (UCAR)-- Boulder, CO Work in team environment to design, develop, modify, and support software systems relating to computational fluid dynamics and atmospheric modeling with emphasis on general - purpose graphical processing unit acceleration program.
Resolved hardware and software problems and provided network troubleshooting, technical support and training to end - users, as well as administered network security
Skill Highlights Systems Analysis and Design Network Security Database Development Project Management End - User Training Software Development Professional Experience Programmer / Analyst 5/1/2010 — Current Snyder Industries, Inc. — Lincoln, NE Develop, implement, and maintain application software to established standards and specifications, and modify acquired application software using tables, profiles, and vendor - supplied customization tools as requested by end - users.
Developed and staffed an information resources security program, including over 17 new security policies and an operational user guide for HR training of new employees for FERPA, HIPAA, CJIS, and TAC202 compliance.
Essential job duties highlighted on an Oracle Dba Consultant resume sample are analyzing business needs, recommending information technology solutions, creating and maintaining databases, ensuring database security and backup, and training end users.
Common duties showcased on a Cisco Network Engineer resume are creating and configuring network, identifying and solving technical issues, ensuring network security, providing technical support and training to users, and checking if the equipment is functioning properly.
IT Project Management, Consulting, Implementation or Auditing position capitalizing on professional accomplishments in IT Project Management, process efficiency and optimization, end - user technical training, hardware / software implementation, LAN administration, Help Desk management, system policies and security, infrastructure redundancy and failover, and disaster recovery / business continuity
Skills Summary * IS Security Assessments Awareness and Training * Regualations compliance including HIPPA, PCI, SOX, JSOX and ISO * Project and Task Management * Meeting Organization and Presentation * * User Education & Awareness Program * Customer Service * Data Trending & Analysis * Problem Solving * ITIL Methodology * MS Office * Critical Thinking * Written Correspondences * Technical Knowledge / Learning Ability * Chan...
Strong background in system security and user training.
PROFESSIONAL SUMMARY NAV, SAP, Ariba, & Oracle ERP - Organizational Change Management: Hands on End to End Global OCM Delivery: Pre - Implementation / Impact Assessments, Cultural Assessments, HR Capacity Analysis, Transition Planning, Business Readiness, Stakeholder Engagement & User Analysis, Communications, Training, Design & Execution, ERP Training Systems Delivery, & Security / Role Mapping Post Go Live Optimization.
Trained 150 end users on security processes, procedures and risks via the company's first security education program, which is being rolled out companywide.
Core Competencies IT Project Management • Desktop Architecture • Security Assessment • End - User Training • System Upgrades • SDLC Processes • Risk Management • Database Management • Technology Deployments & Enhancements • Client Relations • Vendor Management • Bidding & Negotiations • Process Improvement Budget Management • Resource Management • Systems Development • Life Cycle • Team Leadership Conflict Resolution • Mentor / Negotiator • Technical Writing • Innovative • Problem Solving
Superior Nurses Training, CNA certification — 2012 Professional Training: 2011: Information Assurance Awareness 2011: Personally Identifiable Information (PPI) 2011: Command Training Team Indoctrination 2011: Customer Service and Interpersonal Communications 2010: Command Career Counselor 2009: Journeyman Instructor Course 2008: Duty Operations Officer 2008: Communications Security User 2008: Track Data Coordinator 2007: Introduction to Tactical Datalink 2007: Team Leader 2007: Navy Security Force Sentry 2006: Work Center Supervisor Leadership Course 2006: Navy Pride and Professionalism 2005: Theater Battle Management Core System Administrator Joint Air Component Commander Afloat Computer Application Course 2005: JADOCS Basic User Training 2005: Unit Operations Specialist 2005: Operations Security 2004: Global Command and Control Database Manager 2009: Video Teleconference 2004: Microsoft PowerPoint 2002: Personal Responsibility and Values Honors / Awards
Core Competencies IT Support • Server Maintenance • Installations • Network Connections • Project Management Configuration Management & Administration • Control Systems • Subversion • PVCS Version Manager • PVCS Dimensions • Scripting Build • Log Analysis • Software Development Technology Deployments & Enhancements • Network Security and Reliability • Client Relations • Vendor Management • Negotiations Network Design & Maintenance • Administrative Management • Operations Management • Project Life Cycle Program Analysis • Design & Development Testing • Implementation • User Training of Software Applications
Information Technology (IT) Director — Duties & Responsibilities Manage IT department, customer service technicians, client / staff training, and a multimillion dollar budget Set and strictly adhere to departmental budgets and timelines ensuring timely and cost effective operations Responsible for 150 servers in a VM / SAN environment, Cisco network, and MAN connection between offices Maintain 4 9's uptime on all IT services and attain 100 % SLA compliance with clarification of SOW terms Successfully manage multiple building moves and build outs with zero IT downtime Oversee PBX to Cisco Unified Communications change, VMWare / SAN implementation, and hosting of 20 ASP clients Create and implement complete helpdesk department and remote resolution of client issues Negotiate and administer contracts and partnerships with vendors, service providers, and other parties Configure, troubleshoot, and support 300 + corporate workstations ensuring efficient, effective, and secure operations Oversee remote network access, VPN support, and phone support for remote executives Install, configure, troubleshoot, and support multiple Windows and SQL servers Design and implement enterprise disaster recovery systems, processes, and policies Plan and develop of LAN / WAN hardware and software requirements, updates, and related equipment Facilitate customer contracts / billing, technical support, and end - user training Train large staffs ensuring they understand the brand and adhere to corporate policies and procedures Collaborate with department managers to identify and address security concerns through IT Security policies Author reports concerning IT department operations, suggested hardware / software updates, and other pertinent data Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technicasecurity concerns through IT Security policies Author reports concerning IT department operations, suggested hardware / software updates, and other pertinent data Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technicaSecurity policies Author reports concerning IT department operations, suggested hardware / software updates, and other pertinent data Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technical skills
Smartronix (CA & MD) 08/2004 — 12/2008 S6 Information Systems Coordinator • Serve as Section Chief and Contract Lead at the MCNOSC providing overall support for the MCNOSC IT Systems • Manage the network, servers, switches, applications, and information and infrastructure security • Utilize DoD applications for network scanning and remediation of the classified and unclassified networks • Develop plans, procedures, and policies to directly support and defend the MCNOSC Network from security threats • Oversee the MCNOSC's PKI (public key infrastructure) and integration with the MCNOSC services with the coordination of recovery strategies with the Alternate Network Operations and Security Center (AltNOSC) • Determine minimum processing requirements for recovery site and provide guidance for recovering infrastructure processing • Provide technical input to the Contingency of Operations (COOP) Plan ensuring all activities, resources and procedures required to recover critical IT infrastructure processing are accurate • Manage the day to day support of the MCNOSC Infrastructure, supervising a team of IT service contractors • Perform complex repairs, upgrades, hardware configuration, and end user training • Serve as project manager for the transition and deployment of the MCNOSC's NMCI plan • Oversee the planning and build out of the network and MCNOSC's new Headquarters and Operations Center • Coordinate with local contractors to ensure timely delivery of the network • Design and coordinate the build out of the MCNOSC Internal Data Center, Server Room, and Testing Lab • Coordinate the movement to the MCNOSC's newly built Operations Center and Head Quarters • Install cabling, servers, racks, environmental controls, a / v systems, and other technical equipment • Develop the MCNOSC IT Lifecycle management for the LAN and other IT devices • Serve as project manager for the MCCDC (Marine Corps Combat Development Center) Studies and Analysis Division and the MCCLL (Marine Corps Center for Lessons security • Utilize DoD applications for network scanning and remediation of the classified and unclassified networks • Develop plans, procedures, and policies to directly support and defend the MCNOSC Network from security threats • Oversee the MCNOSC's PKI (public key infrastructure) and integration with the MCNOSC services with the coordination of recovery strategies with the Alternate Network Operations and Security Center (AltNOSC) • Determine minimum processing requirements for recovery site and provide guidance for recovering infrastructure processing • Provide technical input to the Contingency of Operations (COOP) Plan ensuring all activities, resources and procedures required to recover critical IT infrastructure processing are accurate • Manage the day to day support of the MCNOSC Infrastructure, supervising a team of IT service contractors • Perform complex repairs, upgrades, hardware configuration, and end user training • Serve as project manager for the transition and deployment of the MCNOSC's NMCI plan • Oversee the planning and build out of the network and MCNOSC's new Headquarters and Operations Center • Coordinate with local contractors to ensure timely delivery of the network • Design and coordinate the build out of the MCNOSC Internal Data Center, Server Room, and Testing Lab • Coordinate the movement to the MCNOSC's newly built Operations Center and Head Quarters • Install cabling, servers, racks, environmental controls, a / v systems, and other technical equipment • Develop the MCNOSC IT Lifecycle management for the LAN and other IT devices • Serve as project manager for the MCCDC (Marine Corps Combat Development Center) Studies and Analysis Division and the MCCLL (Marine Corps Center for Lessons security threats • Oversee the MCNOSC's PKI (public key infrastructure) and integration with the MCNOSC services with the coordination of recovery strategies with the Alternate Network Operations and Security Center (AltNOSC) • Determine minimum processing requirements for recovery site and provide guidance for recovering infrastructure processing • Provide technical input to the Contingency of Operations (COOP) Plan ensuring all activities, resources and procedures required to recover critical IT infrastructure processing are accurate • Manage the day to day support of the MCNOSC Infrastructure, supervising a team of IT service contractors • Perform complex repairs, upgrades, hardware configuration, and end user training • Serve as project manager for the transition and deployment of the MCNOSC's NMCI plan • Oversee the planning and build out of the network and MCNOSC's new Headquarters and Operations Center • Coordinate with local contractors to ensure timely delivery of the network • Design and coordinate the build out of the MCNOSC Internal Data Center, Server Room, and Testing Lab • Coordinate the movement to the MCNOSC's newly built Operations Center and Head Quarters • Install cabling, servers, racks, environmental controls, a / v systems, and other technical equipment • Develop the MCNOSC IT Lifecycle management for the LAN and other IT devices • Serve as project manager for the MCCDC (Marine Corps Combat Development Center) Studies and Analysis Division and the MCCLL (Marine Corps Center for Lessons Security Center (AltNOSC) • Determine minimum processing requirements for recovery site and provide guidance for recovering infrastructure processing • Provide technical input to the Contingency of Operations (COOP) Plan ensuring all activities, resources and procedures required to recover critical IT infrastructure processing are accurate • Manage the day to day support of the MCNOSC Infrastructure, supervising a team of IT service contractors • Perform complex repairs, upgrades, hardware configuration, and end user training • Serve as project manager for the transition and deployment of the MCNOSC's NMCI plan • Oversee the planning and build out of the network and MCNOSC's new Headquarters and Operations Center • Coordinate with local contractors to ensure timely delivery of the network • Design and coordinate the build out of the MCNOSC Internal Data Center, Server Room, and Testing Lab • Coordinate the movement to the MCNOSC's newly built Operations Center and Head Quarters • Install cabling, servers, racks, environmental controls, a / v systems, and other technical equipment • Develop the MCNOSC IT Lifecycle management for the LAN and other IT devices • Serve as project manager for the MCCDC (Marine Corps Combat Development Center) Studies and Analysis Division and the MCCLL (Marine Corps Center for Lessons Learned)
Information Technology Security Manager — Duties & Responsibilities Manage IT security, customer service technicians, assets and finances, and client training Responsible for ensuring that multiple IT groups meet finance, audit, and compliance requirements Serve as primary point of contact for customer contracts, technical support, and end - user training Utilize interpersonal and technical skills as liaison between clients, technicians, and subcontractors Train large staffs ensuring they understand the brand and adhere to corporate policies and procedures Oversee the implementation of asset management processes and procedures Coordinate activities with desktop leads to ensure SOX compliance Validate asset information, manage defect reports, and submit correct action recommendations Design and implement enterprise - wide security protocols, mainframe / pc policies, & software / hardware packages Collaborate with department managers to identify and address security concerns through IT Security policies Reduce corporate information ricks through implementation of sensitive document control processes Utilize RACF and Windows / LAN measures to greatly improve user, administrator, and application security Establish and oversee regular system security audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technicaSecurity Manager — Duties & Responsibilities Manage IT security, customer service technicians, assets and finances, and client training Responsible for ensuring that multiple IT groups meet finance, audit, and compliance requirements Serve as primary point of contact for customer contracts, technical support, and end - user training Utilize interpersonal and technical skills as liaison between clients, technicians, and subcontractors Train large staffs ensuring they understand the brand and adhere to corporate policies and procedures Oversee the implementation of asset management processes and procedures Coordinate activities with desktop leads to ensure SOX compliance Validate asset information, manage defect reports, and submit correct action recommendations Design and implement enterprise - wide security protocols, mainframe / pc policies, & software / hardware packages Collaborate with department managers to identify and address security concerns through IT Security policies Reduce corporate information ricks through implementation of sensitive document control processes Utilize RACF and Windows / LAN measures to greatly improve user, administrator, and application security Establish and oversee regular system security audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technicasecurity, customer service technicians, assets and finances, and client training Responsible for ensuring that multiple IT groups meet finance, audit, and compliance requirements Serve as primary point of contact for customer contracts, technical support, and end - user training Utilize interpersonal and technical skills as liaison between clients, technicians, and subcontractors Train large staffs ensuring they understand the brand and adhere to corporate policies and procedures Oversee the implementation of asset management processes and procedures Coordinate activities with desktop leads to ensure SOX compliance Validate asset information, manage defect reports, and submit correct action recommendations Design and implement enterprise - wide security protocols, mainframe / pc policies, & software / hardware packages Collaborate with department managers to identify and address security concerns through IT Security policies Reduce corporate information ricks through implementation of sensitive document control processes Utilize RACF and Windows / LAN measures to greatly improve user, administrator, and application security Establish and oversee regular system security audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technicasecurity protocols, mainframe / pc policies, & software / hardware packages Collaborate with department managers to identify and address security concerns through IT Security policies Reduce corporate information ricks through implementation of sensitive document control processes Utilize RACF and Windows / LAN measures to greatly improve user, administrator, and application security Establish and oversee regular system security audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technicasecurity concerns through IT Security policies Reduce corporate information ricks through implementation of sensitive document control processes Utilize RACF and Windows / LAN measures to greatly improve user, administrator, and application security Establish and oversee regular system security audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technicaSecurity policies Reduce corporate information ricks through implementation of sensitive document control processes Utilize RACF and Windows / LAN measures to greatly improve user, administrator, and application security Establish and oversee regular system security audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technicasecurity Establish and oversee regular system security audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technicasecurity audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technical skills
Core Competencies Network & Helpdesk Analysis • Desktop Support • Network Administration • Quality Assurance Technical Troubleshooting • Systems Troubleshooting • End User Training • Customer Technical Support • Network Installation • Network Troubleshooting • IT Support • Server Maintenance • Installations • PC Repair • Project Management • Technology Deployments & Enhancements • Network Security and Reliability • Client Relations Vendor Management • Negotiations • Network Design & Maintenance • Inventory Management
Investigations and Law Enforcement — Selected Duties & Responsibilities Build and implement investigations programs and security solutions to enable effective organizational administration, threat detection / elimination, conflict / issue resolution, and other critical discovery functions Utilize various technical applications, including cameras, A / V equipment, transmitters, recorders, and bugs, to generate valuable information and isolate parties responsible for criminal and civil malfeasance Create issue and security reports to enable development of new policies and procedures aimed at preventing further wrongdoing and protect valuable resources team Integrate investigative principles into corporate strategic mission, ensuring management and program accountability, proactive prevention of discrimination, case efficiency, and legal analysis Perform security and crime analyses of firm infrastructure against related compliance requirements as well as on - going vulnerability assessments to continuously mitigate risk Develop investigatory standard documents to serve as guide and rules resources to promote fair and legal probes Supervise related departmental staff, including performance plan development and assessment, technical oversight, personnel recruitment and training, staff discipline, and other pertinent functions Work as a member of the corporate incident response team in the execution of all related tasks, including incident response plan development, damage minimization, resource restoration, and firm integrity protection Communicate all issues and user feedback to members of management, law enforcement professionals, and other interested parties, generating situational reports and follow - up recommendations based on investigatory results Maintain a strong working knowledge of all software, hardware, applications, techniques, trends and other critical tools which aid in effective investigation React quickly based upon limited and confidential information, drawing upon extensive police and military experience in tense, complicated situations Collaborate in the preparation of necessary legal documents, including search and arrest warrants Assist management with various other duties as assigned
Core Competencies Network & Helpdesk Analysis • Desktop Support • Network Administration • Quality Assurance • Technical Troubleshooting • Systems Troubleshooting • End User Training • Customer Technical Support • Network Installation • Network Troubleshooting • IT Support • Server Maintenance • Installations • PC Repair Project Management • Technology Deployments & Enhancements • Network Security and Reliability Client Relations Vendor Management • Negotiations • Network Design & Maintenance • Inventory Management • Resource Optimization • Operations Management
Core Competencies IT Support • Server Maintenance • Installations • Network Connections • Project Management Technology Deployments & Enhancements • Network Security and Reliability • Client Relations • Vendor Management • Negotiations • Network Design & Maintenance • Training & Development • Administrative Management • Operations Management • Project Life Cycle • Program Analysis • Design & Development Testing • Implementation • User Training of Software Applications
• Mercury Using Quick Test Professional 8.0, Advanced Quick Test Professional 6.5 • MS VB Scripting Edition & MS Windows Scripting Host Essentials • Web Performance & Security Testing, Web / eBusiness Testing, Mastering Test Desig; Systematic Software Testing • Java Script, HTML / Homesite; Testing During Development • Mercury WinRunner Training; Lotus Notes Technical User, MS Access Advanced (Forms & Reports), and MS Office Suite.
Help Desk (1999 — 2000) • Responsible for software updates, OS issues, network issues, user training, and daily system operations • Implemented the use of network installs to streamline processes • Managed security within Windows NT system and Novell Netware Systems • Oversaw Linux systems and migrated systems to a standard windows platform • Consistently recognized and promoted for excellence in management and technical skills
a b c d e f g h i j k l m n o p q r s t u v w x y z