Rational Technology Manager with 6 years of experience enhancing operations for organizations through information systems solutions. Proven track record of transforming specific business goals related to growth and efficiency improvements into new system designs. Knowledgeable innovator known for recommending new technologies to enhance existing systems and introduce new systems.
Overhaul of 30,000 Cameras, Conducted an overhaul for over 30,000 cameras across the country that involved recreating the network settings for the camera. Some of the things changed were upgrading TLS to 1.3, switching off HTTP and only utilize HTTPS, configure user rights to these cameras by setting new authorization rules for who can use and who cannot use, disabling DHCP to create our own IP naming environment, using an updated SSL template for how our cameras communicate with the recording servers on the open internet, tracked the rollout of firmware, recycled legacy devices and upgrade hardware.
Onboarding and Imaging of New Servers, Onboarded new servers and imaged the OS on each one. This was for the Hudson Site in Detroit and involved 8 new servers. Updated the BIOS settings, Network IP address, U1 and U2 settings, configuring Cylance security settings instead of using Windows Firewall, Configured RAID 10 settings, updated NTP settings to our preferred NTP server, configured the recording server settings to create compatibility for the cameras. Metasploit, Nessus, MeshCentral, Cylance.
Ran a huge sweep of our internal code and run data c&cs to find coding deficiencies and successes within our team. This helped us weed out whether we were having issues with certain coding languages (IE Java would work better for our web application as opposed to Python) or if there was a software tool we were programming that would not respond to certain inputs.
Conducted a research project for NiX and its relationship with drone software and mapping technology. Researched the possibilities of integration between the two technologies, the cost, the pros, the cons, the overall usage, and the efficiency of the technology.
Managed an overhaul of vulnerabilities found within the company's source code and appointed team members to various areas of remediation. This vulnerability left open XML vulnerabilities, Code Injection, Remote Code and botnet possibilities. I was responsible for pointing our team members in the right direction of priority during the pipeline of the remediation. This took over 3 months to finalize and during which we found there could be a list of even more vulnerabilities that could have happened.
During our deployment in Jordan, I headed the analysis of satellite imagery, alongside my squad, to identify potential ambush points along our supply routes, allowing us to reroute convoys and avoid hostile areas. Additionally, I coordinated with local informants to gather intelligence on enemy movements and intentions, providing our patrols with actionable insights to mitigate risks and enhance their safety during operations. Through these efforts, we were able to maintain secure supply lines and keep our soldiers on patrol protected from potential threats in the region. We used radio equipment and taught classes on the encryption standards of the equipment we use and taught local units how our radar technology worked when we supplied intel and data to it.