We provide IT Staff Augmentation Services!

Technology Consultant Resume

5.00/5 (Submit Your Rating)

OBJECTIVE

  • A position requiring strong technical and/or management skills in a CICS/COBOL mainframe environment.

PROFESSIONAL EXPERIENCE

Confidential

Technology Consultant

Responsibilities:

  • Support Custody Management and Institutional Accounting systems.
  • Monitor online performance and resolve problems (over 50 CICS regions in total).
  • Support ‘System Services’ application infrastructure (access/authorization, menus, APPC / LU6x applications, MRO).
  • Manager of the Software Installation and Control Team (3 employees and several offshore contract positions).

Confidential

Principal Software Engineer

Responsibilities:

  • Support and development of IDS, a CICS - based communication product that allowed Wang machines to communicate over an IBM SNA network by using a CICS region as a node in the Wang System Network (WSN) using LU2 and LU6.2 communication protocol.
  • Managed 2 Software Engineers.

Confidential

Project Manager

Responsibilities:

  • Redesigned the Car Movement system to accommodate the merger of 3 railroads (MEC, D&H, B&M)
  • Managed ongoing projects for demurrage, yard inventory and switching, and empty car disposition.
  • Managed projects for labor / cost distribution, and American Software International A/P package installation contracted from B&M by Temple, Barker, & Sloane for New Jersey Transit as part of the Conrail dismantling.

Confidential

Systems Consultant

Responsibilities:

  • Online order entry, including access to order and credit history
  • Imprint Entry, an ’expert’ system to size and format online order entry text to product specifications and create TTS input to an Autologic typesetter to produce plate-ready output, eliminating the typesetting entry function.
  • The first business application to use an IBM 3762 Payment Transaction Processor to read OCR customer account and billing information from statement and invoice stubs, and create system payments with only operator verification. This machine is why most bills now have a payment stub designed to be placed in front of the check in a payment return envelope. The machine opens the envelope, reads the amount due and customer info from the stub and presents the check for verification with the stub. If verified, the payment is processed without further input.

We'd love your feedback!