In an MSP environment, I work with 60+ companies with 2000+ endpoints with, individual hardware and software requirements. This has given me a unique ability to become an expert in a multitude of business solutions while keeping security at the forefront. Below are my responsibilities for these companies:
- Guided staff technology use, assisting with troubleshooting and quality control to streamline operations.
- Trained users on desktops, laptops and mobile devices.
- Maintained system quality control, surveying users, collecting metrics data, and handling IT audits to support updates and maintenance.
- Documented risk management issues and outlined mitigation actions.
- Oversaw pre-deployment IT testing of new systems prior to migration planning.
- Investigated system issues and implemented resolutions to reduce downtime.
- Maintained authoritative knowledge through continued education and ongoing training.
- Researched and adopted new technologies to add value to existing offerings and/or to improve security.
- Engineered and implemented total network and server rebuilds to leverage new hardware and software for client growth.
- Analyzed client business processes to propose optimal software applications for unique requirements.
- Educated stakeholders on data protection tactics to reduce breaches.
- Collaborated with stakeholders to transform client requirements into turnkey solutions.
- Created cybersecurity best practice communications to educate staff against known threats and potential vectors of attack.
- Authored security incident reports, highlighting breaches, vulnerabilities and remedial measures.
- Developed and maintained incident response protocols to mitigate damage and liability during security breaches.
- Managed relationships with third-party intrusion detection system providers.
- Participated in creation of device hardening techniques and protocols.
- Maintained company-wide compliance with industry standards, PCI Certification, and HIPAA Certification.
- Spearheaded bring your own device program, defining necessary security parameters and designing complementary security deployments.
- Specialized in VOIP programming and deployment for clients.