Helpdesk Technician June 2013 - October 2013
- Provided help desk support via phone as well as Team Viewer with end users.
- Utilized ticketing system to document all service calls. Managed 1500 users in the northeast region as well as the southeastern region of the US.
- Authored different support manuals for other team members in help desk leading to a team lead role.
- Mentoring new hire technicians and delegating priorities to team members.
Network Engineer October 2013 - October 2016
- Developed and deployed network switches in multiple locations.
- Developed network equipment inventory system across 200 offices.
- Troubleshoot network interruptions on a 24/7 basis through rotating shifts of 2-member team.
- Renewed CISCO switch environment implemented Meraki Wireless Access Points throughout the offices.
- Traveled to locations to do a pre-deployment audit of current systems prior to acquisition deployments.
- Analyzed, authored review documentation, and converted acquired companies into our network infrastructure.
- Maintained relationships with contractors, vendors, and other team members to insure network connectivity.
- Reviewed network security on CISCO network equipment, suggested new configurations as well as implemented new configuration to provide greater security.
Information Security October 2014 - March 2020
- Developed the initial Information Security department.
- Spearheaded Information Security department with the backing of the CIO with the goal of attaining ISO27001 certification.
- Implemented employee security training, implemented new tools in Azure to assist with security goals. Developed documentation in accordance with ISO27001 auditor request.
- Traveled to multiple offices to ensure those offices are compliant with ISO27001 requirements as well as company goals. Secured ISO27001 certification after 2 years of auditing network infrastructure, implementing network access control, reviewing Active Directory permissions.
- Created multiple script tools via PowerShell to assist in checking permissions, creating users, disabling users as well as gather systems active or inactive in Active Directory.
- Utilized tools such as AlienVault in conjunction with Azure to disable remote connections from outside the United States.