We provide IT Staff Augmentation Services!

Lead Associate / Lead Architect Resume

3.00/5 (Submit Your Rating)

SUMMARY:

  • Confidential is a hands - on architect that specializes in the design of next generation smart computing infrastructure in support of large organization transformation efforts.
  • He has unique "end-to-end" expertise including: strategy development; solution design; rapid prototyping; costing; project team development; software development; transition planning; infrastructure engineering (CAD/facilities/networks/mechanical sensors-controllers/electrical) and device design (CAM/sensors/relays/motors/electronics/mechanical/programming).
  • Experience includes twenty years advising, leading and executing complex technology change for commercial, defense, R&D and federal enterprises.
  • Recent projects include designing Cloud systems and datacenter facility architectures, developing engineering and global transformation plans for Confidential and Confidential (4 yrs), prototyping Internet of Things smart embedded devices (2 yrs), leading business process consolidation and enterprise Cloud transformation as CIO in commercial professional services industry (9 yrs).

BROAD TECHNICAL DOMAIN EXPERIENCE AND EXPERTISE:

Computer Aided Design (CAD): Assemblies, component parts and floor plans with AutoCAD (2D, Inventor, Fusion, CAM, Electrical), VCarve Pro, Cut 3D

Computer Aided Manufacturing (CAM): ULS Laser/WaterJet CNC cut, ShopBot/Tormach CNC machine/mill/cut, 3D Printer

Prototype Design: Sensors, displays, carbon fiber, sheet metal, aluminum/steel (lathe, mill, cut, bend, shape), plastic (mold, vacuum), welding

Cloud / Data Center: Green design, Internet of Things, performance opt., build vs. buy, in-memory data, colo, web services, security, xhtml/css

Programming: C/C++, Basic, Java, Object Pascal, Python, LAMP, Linux on X86, X64, ARM, Arduino ATmega

Virtualization & Clusters: Compute and storage hardware, application rationalization/ redesign/ consolidation, Docker, VMware, XEN, LXC, Citrix, EC2

Project Management: Lean, agile, scrum, waterfall, XP, OS PM software design

Databases: SQL, NoSQL, flat, indexes, sorts, statistics, relational

Storage: Physical, userspace & synthetic file systems, LVM, RAID 105620

Communication: RFC2822, smtp, pip, imap, mime, xmpp, tdp, udp, sip, tdm, mobile, voip, wan, firewalls, IPv6, Cisco VPN/router/switch

Interfaces: GUI, web, desktop linux, fonts, human-agent, EDI, mirrors, db triggers, stored procedures, SOAP, REST-ful Computer/Embedded Design breadboard, pcb, electronic test, measure, enclosures, cooling, power, sensors, clients, servers, clusters (design and assembly)

BROAD FUNCTIONAL DOMAIN EXPERIENCE AND EXPERTISE:

Architecture and Design: Basic facilities, 3D assemblies, devices/components, solar microgrid, DC power, software (object/data/process design, source code control) Enterprise IT datacenter consolidation, staffing, merger, acquisition, business intelligence, search, ECM/document management, ERP, CRM, KM, PeopleSoft, Autonomy, Oracle

Information Security: FISMA, secure platform design, audits, cryptography, pro-active monitoring, VPN, SSL, public key, two-factor authentication Space Based Systems least cost routing, ground and orbital assets, firmware upgrades, network monitoring

Legal & Regulatory: Contracts, retention rules, holds, knowledge mgmt, ethical walls, conflicts, billing, litigation support

Defense: Survivable systems, cryptography, electronic intelligence, information security

EXPERIENCE:

Confidential

Lead Associate / Lead Architect

Responsibilities:

  • Leads team that develops technical designs for systems, services and facilities; cost data; plans for acquisition, consolidation and migration.
  • Developed Confidential Cloud Architectures (DoDAF) and Engineering Specifications (CAD assemblies/parts, power, electrical) for Core and Edge (region/metro/campus/facility) highly secure compute environment including: OpenStack Cloud OS with standard enterprise application services (SaaS); development services (PaaS) hypervisor and linux container host facilities; web service interfaces (RESTful, SOAP, mail+xml); portals for access, delivery, control, identity management, attribute based access control, file storage, SQL db, noSQL analytics (hadoop/zookeeper/hdfs/accumulo)); processing clusters (with large memory hybrid CPU/GPU processing, software defined storage and data network) and standard physical system design, manufacturing control and management.
  • Co-developed in coordination with military services 2012 Plan of Action and Milestones for Cloud and datacenter consolidation for the Joint Information Environment (JIE)
  • Coordinated with military service organizations to develop the “bottom-up” consolidation plan for 2000+ base/camp/post facilities
  • Supported ROM costing effort and developed detailed 6-year model for Confidential -wide costs for consolidation, standardization and Cloud transition; performed cost, engineering and facility architecture analysis for cloud use, services, networks, systems and operations
  • Member of Confidential Cloud Forum, Confidential CIO Cloud Working Group, DISA Cloud Technical Exchange Meeting Working Group

Confidential

Managing Director

Responsibilities:

  • Research, development and consulting specializing in design and development of next generation intelligent cloud infrastructure / Internet of things devices.

Confidential

Chief Information Officer

Responsibilities:

  • create a service focused organization around common networks, consolidated datacenters and rationalized applications
  • Transformed a commercial IT organization from silo location specific services to an enterprise IT organization with technology and standard operations policies including strict change management, service levels (SLA), security and privacy protection.
  • Published vision, core objectives, and master project portfolio.
  • Defined software and systems asset portfolio, identified staff with competencies in each and published end user, design and administrative documentation relating to each product and service to company Intranet. Reorganized training and help desk organizations to better support all services.
  • Implemented Remedy support management software.
  • Designed Lean global enterprise IT infrastructure around single IDAM/sign-on and strong master data management (i.e. one personnel management record, one client record across all enterprise systems).
  • Focused on identifying enterprise technology needs, phasing out antiquated or duplicate systems, acquiring, integrating or building new enterprise systems such as PeopleSoft ERP, iManage/Autonomy document management, intellectual property management, expense reporting, staff time accounting, and litigation support to fill gaps.
  • Used post merger deployment and training of a new desktop platform to speed global transition to unified platform. Within two years, employees could access all enterprise applications using a single log-in from a standard global desktop (with local language support).
  • Virtualized with 75:1 consolidation using XEN (desktop virtualization) and VMware (server virtualization) technology and improved storage techniques. Led network and application teams in architecting virtualization efficiency improvements, validating numbers, drafting transition plan, testing and tuning design parameters. Worked with Sun, Microsoft, Netapp, Riverbed and VMware to design, implement and transition applications, storage, networks and compute facilities.
  • Developed Enterprise standard multi-level security strategy for 2,000+ users and 1,000 mobile devices:
  • Designed insider threat protections that monitored enterprise information repositories for suspicious use/theft/transfer activity.
  • Developed capability with nCircle to establish active monitoring of all devices attached to the network
  • Implemented firewalls at all locations, used physical and virtual (802.1) network separation for guest/visitor network access.
  • Worked with RSA to implement enterprise two-factor identity management, access system
  • Implemented automatic locking on all desktop and mobile devices to prevent access, was an iPhone beta customer and was the first large law firm to offer support for iOS platform.
  • Developed and maintained a comprehensive model of security risks to the firm. Met with other chief officers to discuss and define projects to mitigate risks.
  • Worked with Autonomy to establish rules-based automated electronic records systems that maintained retention of email and documents.

Confidential

Programming Services Manager

Responsibilities:

  • Captured business requirements from all locations and migrated functions (conflicts-governance, billing, finance, data warehouse, business intelligence/reporting, human resources, payroll) to new platform based upon PeopleSoft/Elite/Informix/Fulcrum.
  • As Piper Marbury rapidly grew and merged with larger firms, the infrastructure designed in 1996 (conflicts-governance, billing, finance …) has remained the enterprise backbone of the firm and remains so in today’s fourteen times larger Confidential firm.
  • Implemented Scrum process (daily status, seven day sprints).
  • Created database applications for managing all aspects of technology design including projects, change management, object definitions, data definitions, requirements, y2k remediation, administrative/user documentation, application design, data warehouse design. System integrated Lotus Domino web server, subversion, Informix, perl, Visio and MS Office & Project applications.
  • Partnered with Executive Director and HR lead to design enterprise processes, led implementation of PeopleSoft HR suite.
  • Citrix enabled fat client applications to run with good performance in all locations and facilitated process standardization as the firm rapidly grew. Since PeopleSoft financials could not handle requirements for legal time and billing, integrated PeopleSoft with Elite Information systems for a best of breed industry ERP platform.
  • Rather than purchase Informix’ decision support tool, designed a custom data warehouse with UNIX scripting and perl. The scripting ability enabled business intelligence publishing using (then new) web server technology and provided flexibility when publishing and integrating new information sources during mergers. Began 24x7 transaction shipping to a hot recovery server in DC to enable very fast site to site fail-over in case of primary system failure.
  • Began an aggressive effort to web enable applications. Used combination of Lotus (then new) web enabled Notes server and Informix with perl scripts to web enable HR new hire, new business intake and governance processes and back office information. This enabled central firm information to be easily accessed by newly merged entities.
  • Designed and led team that developed computer applications to automate defense program management activity at SPAWAR (databases, graphical user interfaces for managing contracts, requirements, administration, reporting).
  • Designed a standard deployment server (Oracle NLM/Novell), selected Windows development tools (Borland C/C++), organized a team and led development.
  • Vredenburg secured four defense Program customers and delivered six modules in just eighteen (18) months.
  • Created an integrated database application to support a rapid prototype and design software development.
  • System enabled Program analysts to directly enter client requirements that became the basis for object code design, documentation and end user support. Strategy reduced solution development time from months to days.

We'd love your feedback!