Enterprise Architect Resume
SUMMARY
- He is an Enterprise Architect with a broad range of technical skills and a record of high customer satisfaction.
- He is able to focus on meeting the immediate goals of specific projects while understanding & serving the strategic aims of the organization.
- He has experience with all phases of the systems development life cycle, leading technical teams in both the public and private sectors.
PROFESSIONAL EXPERIENCE
Confidential
Enterprise Architect
Responsibilities:
- Discuss processes and requirements with business representatives and executives.
- Author options analyses to identify viable solutions, assess architectural options, and make recommendations.
- Analyse and write conceptual descriptions of software architecture and development strategy for a proposed solution.
- Ensure the integration of security controls throughout the architectural design process;
- Provide technical analysis of architectural designs and the security controls applied to IT solutions;
- Translate business requirements into high - level technology designs that adhere to existing infrastructure technology standards and best practices. Designs are prepared in consultation with Engineering, Security, Data Management, and other enterprise divisions.
- Collaborate with business architects to produce business requirements documents and business use cases.
- Prepare issue reports and briefing notes for senior management.
Technical & governance environment: In-house architecture and service management processes (Architecture Review and Change Control committees); TOGAF; Agile methods; MS Visio; MS Word; MS Excel; SharePoint.
Confidential
Application & Technical Architect
Responsibilities:
- Discuss processes and requirements with business representatives and executives.
- Author options analyses to identify viable solutions, assess architectural options, and make recommendations.
- Analyse and write conceptual descriptions of software architecture and development strategy for a proposed solution.
- Ensure the integration of security controls throughout the architectural design process;
- Provide technical analysis of architectural designs and the security controls applied to IT solutions;
- Translate business requirements into high-level technology designs that adhere to existing infrastructure technology standards and best practices. Designs are prepared in consultation with Engineering, Security, Data Management, and other enterprise divisions.
- Collaborate with business architects to produce business requirements documents and business use cases.
- Prepare issue reports and briefing notes for senior management.
Technical & governance environment: In-house architecture and service management processes (TRB/ARB and SLMF); TOGAF 8; Archimate 2; Agile methods; MS Visio; MS Word; MS Excel; GCDocs; Java; XML; XSLT; HTML5, CSS3, WCAG, GC Web Standards.
Confidential
Business, Application & Technical Architect
Responsibilities:
- Led the bilingual development team.
- Reviewed aims and objectives with the IS Manager, and analyzed the existing publication systems.
- Conducted interviews and workshops; facilitated meetings with stakeholders.
- Analyzed and evaluated possible solutions (business, technology, data, and application) then selected a solution to satisfy the project requirements.
- Estimated effort, prepared project plans and developed work breakdown structures.
- Provided recommendations on functional, technical, policy and change management considerations.
- Provided technical analysis of architectural designs and the security controls applied to IT solutions.
- Planned workflow and functional design, designed architecture, specified system requirements, and created XML schemas.
- Wrote bilingual user and administrator guides; conducted bilingual workshops to introduce users to the new system.
Technical & governance environment: Secure facility; TOGAF ADM; Agile methodology; MS Project; Visio; MS Word; InDesign; Dreamweaver; Acrobat; Eclipse; JavaScript; ExtendScript; Visual Basic; SVN; MS SQL Server; WordML; XML (DocBook, Justice Canada, and internal schemas); XSLT; HTML5, CSS3, WCAG, GC Web Standards.
Confidential
Hardware/Software Support
Responsibilities:
- Traced & documented network cabling, devices and servers.
- Tested & analyzed the customer’s head office computing environment for any issues in functionality or performance.
- Analyzed and evaluated possible solutions (technology, data, security, and application) then selected solutions to satisfy the requirements of each project.
- Conducted research, planning, & testing to remove legacy systems and to integrate the new technology solutions into the organization’s computing environment.
- Ensured that the plans satisfied the functional, technical, and change management considerations.
- Maintained server, system, device, application, and intranetworking hardware documentation while changes were made to the organization’s computing environment.
- Carried out impact analyses for the proposed technology changes within the organization.
- Prepared project plans, estimated effort and prepared work breakdown structures.
Technical environment: MS Excel; MS Word; Visio; Lotus Domino 8.5; Windows Server; Active Directory.
Confidential
Database Developer
Responsibilities:
- Interviewed stakeholders to gather and elicit requirements.
- Prepared project plan and WBS.
- Designed and developed a publications tracking database (tables, forms, queries and reports).
- Tested database for function and verified user acceptance.
Technical environment: MS Access 2007, MS Project.
Confidential
Web Architect
Responsibilities:
- Interviewed client to elicit business requirements.
- Analyzed and evaluated possible solutions (technology, data, and application) then selected solutions to satisfy the requirements of each project.
- Recommended a promotional & electronic publishing strategy.
- Developed and deployed a blog and book-promotion Web site.
- Published a 200-page book in HTML and PDF.
Technical environment: HTML 4.0; CSS2; XHTML; Acrobat; Dreamweaver; Illustrator; Photoshop; InDesign; Nvu; KompoZer; WordPress.
Confidential
IS/IT Architect
Responsibilities:
- Traced & documented network structured cabling, and documented network devices, servers, and mainframe computers.
- Tested, analyzed, and monitored the customer’s computing environment for any issues affecting the functionality or performance of the CRM and provisioning systems.
- Conducted interviews and facilitated meetings with both business and technical stakeholders.
- Analyzed and evaluated possible solutions (technology, data, and application) then selected solutions to satisfy the requirements of each project.
- Conducted research, planning, testing, and documentation to remove legacy systems and to integrate new technology solutions into the corporation’s computing environment.
- Ensured that the plans satisfied the functional, technical, and change management considerations.
- Maintained server, system, device, application, and intranetworking hardware documentation while changes were made to the corporation’s computing environment.
- Carried out impact analyses for the proposed technology changes (OS, web server, user directory and database server upgrades) within the corporation.
- Provided technical analysis of architectural designs and the security controls applied to IT solutions.
- Prepared project plans and effort estimates, developed work breakdown structures, and supervised plan execution.
- Trained, mentored, and supervised team members.
Technical & governance environment: Secure facilities; Lotus Domino; LotusScript; IBM MQ Series; QFlex; RAD and JAD; Java; Sarbanes-Oxley controls; TOGAF ADM; Tectia SSH; OpenSSH; SSL; HTML/CSS; XML; IIS; MS Project; MS Visio; MS Excel; MS Word; Nvu; AWStats; MS SQL Server; pcAnywhere; CheckPoint Firewall-1; Backup Exec; Windows Server; Active Directory, MS Exchange; Solaris.
Confidential
IS/IT Architect
Responsibilities:
- Traced & documented network devices and services.
- Used different tools and techniques to test, analyze and monitor the customer’s computing environment for any issues affecting the functionality or performance of the CRM and provisioning systems.
- Collected and developed documentation of the business and application requirements.
- Conducted interviews and consultative meetings with both business and technical stakeholders.
- Aligned the business and application requirements.
- Analyzed, evaluated and costed out technology solutions.
- Provided recommendations on functional, technical, policy and change management considerations for proposed solution implementations.
- Prepared project plans, developed work breakdown structures, engaged sub-contract resources, and mentored and supervised the team.
Technical environment: McAfee VirusScan; Backup Exec; MS Active Directory; pcAnywhere; MS IIS; MS SQL Server; Acrobat; Dreamweaver; Raiser’s Edge; PGP Desktop; MS Project; MS Outlook; MS Word; Visio; NetMeeting; Windows Server; Active Directory.
Confidential
IS Manager
Responsibilities:
- Responsible for IS/IT management (including organizational strategy & budget) as a member of the management team.
- Conducted interviews, workshops and meetings with both business and technical stakeholders.
- Documented the business requirements, then analyzed, evaluated and costed-out a technology solution to satisfy them.
- Provided recommendations to senior management, board of directors and national governance board on the functional, technical, policy and change management considerations for the proposed solution implementation.
- Prepared project plans and effort estimates, and developed work breakdown structures using MS Project and Excel.
- Lead a team of programmers, researchers and writers to execute the plans using Lotus Notes, Apache, and Solaris.
- Devised a system for performance measurement, and maintained a cycle of continuous improvement for enterprise information systems.
- Trained and supervised employees and volunteers.
Technical environment: Lotus Notes/Domino; LotusScript; Notes formula language; InMagic/dbTextWorks; Paradox; Cuadra STAR; NCSA HTTPD; HTML Assistant Pro; HoTMetaL; HotDog; HTML; Reference Manager; WinFax; Windows NT Server/Workstations; Solaris; UNIX shell scripting; Netware; Mercury Mail; McAfee VirusScan; BackupExec; Pegasus Mail; Visio; MS Project; MS Excel; MS Word; MS PowerPoint.
