We provide IT Staff Augmentation Services!

Software Engineer Resume

2.00/5 (Submit Your Rating)

SUMMARY:

  • Confidential has thirty (30) years of experience in the software engineering profession with twenty (20) years of leadership experience.
  • Leading, mentoring, and coaching large and small teams to deliver quality results.
  • Architecting, designing, and delivering complex mission critical web/SOA, COTS/MOTS, and client/server systems involving extensive systems integration.
  • Delivering value in diverse environments: consulting, product development (8 years), consulting, and data center (MIS) .

TECHNOLOGIES:

Architecture Patterns: Client/Server, Service - Oriented Architecture (SOA), Event-Driven Architecture

Content Management: Imaging, Optical Character Recognition (OCR), Document Management, Content Management, Search Engine, Workflow, and Redaction

Integration Technologies: Workflow, Electronic Data Interchange (EDI), Computer Telephony Integration (CTI), Enterprise Application Integration (EAI), and SOA Run-Time Governance

Customer Interfaces: Voice Response Unit (VRU), Kiosk, and Web

Application Infrastructure: Rules Engine, Web Server, Portal, Application Server, Web Server, Search Engine

Communications: Radio Frequency (RF), Mobile Web (J2ME)

Data Technologies: Relational Database Management Systems (RDBMS), XML

Modeling Tools: Erwin, LBMS/SE, Cadre/Teamwork, Model Pro/IDEF, Excelerator, Rational/RequisitePro, Rational/Rose, SELECT/OMT, EMS PostgreSQL Manager, Provision, Visio Professional

Integrated Environments: 4D, Forte, IBM/AIX Workbench, Oracle Developer

Configuration Management: ClearCase, CMVC, DECSet (CMS,MMS,DTM), Merant Dimensions, PVCS, Subversion

Languages: Ada, Assembler, Basic, C, C++, Cobol, Forte, Fortran, Java, Mumps, OPS5, Pascal, PL/1, REXX, RPG, SGML/XML, SQL, SQR, UNIX scripts, Visual Basic

Testing: Mobile Complete, SQA/TeamTest

Other Tools: ANT, PMD Code Analysis, Trac Application Architecture

Graphical User Interface: Forte, PowerBuilder, MOTIF, IBM/AIC, PeopleSoft/PeopleTools, Java Swing, HTML

Portals: Custom JavaScript/Java/XML, Custom ASP/IIS, SharePoint

Web/Application Server: Cache, Forte, Oracle Application Server, Apache HTTP Server, Apache Tomcat, IIS

Middleware: Custom Developed (Data Interface (FTP/File, SQL/DB), Messaging (JMS, OLE, TCP/IP, SNA, SMTP)), Forte, IBM/DAE, DEC MessageQ, Sybase Open Server, SeeBeyond, SOA Software

Operating System: IBM RS/6000 UNIX, DEC VAX/VMS, DEC RISC/ULTRIX, HP/UNIX, SUN/UNIX, IBM/CICS, IBM PC/MS-DOS, IBM AS/400, Telxon RF devices, MS/Windows NT, XP, 2000, Red Hat Linux, SUSE Linux

Applications: Consilium/Workstream, SDRC/I-DEAS, Tedoc, IntelliCapp, Cardiff/Teleform, PeopleSoft/Project Costing, Asset Management, Vinzant’s Event Control Server, Action Workflow, Optika FilePower, FileNet Panagon/P8 Suite, MediTech

Databases & Repositories: 4D, Cache, DB2, Oracle, Sybase, DEC RDB, Microsoft SQL Server, Microsoft Access, MySQL, PostgreSQL, VSAM

PROFESSIONAL EXPERIENCE:

Software Engineer

Confidential

Responsibilities:

  • Provided Confidential templates (policy, compliance component, product component).
  • Developed draft Confidential processes (governance process, repository management).
  • Created Confidential repository, documenting draft Confidential baseline and Confidential target architectures
  • Developed draft IT Infrastructure Architecture Segment document & SLA Policy

Lead/Analyst

Confidential

Responsibilities:

  • Developed IV&V Plan based on IEEE 1012 standard.
  • Reviewed FI$Cal RFI requirements, mapped requirements to industry standards (e.g. Confidential ), mapped requirements to industry ERP templates and developed Requirements Review report.
  • Lead 1st FI$Cal IV&V Quarterly Report to OCIO.
  • Leveraged Microsoft Access database to track IV&V Observations, Recommendations, and related project status.

Confidential

Enterprise Architect

Responsibilities:

  • Developed the Confidential Portal based on SharePoint 2007, SQL Server, and Microsoft Access for reporting.
  • Designed and implemented site main page and navigation, 40 SharePoint lists, 2 document libraries, a wiki, and 12 reports.
  • Develop policies, compliance components (e.g. standards, guidelines), templates, and processes to create the foundation for California state - wide enterprise architecture governance.

Confidential

Enterprise Architect

Responsibilities:

  • Developed enterprise architecture framework based on Confidential and Confidential Framework which includes Confidential reference model classifications (e.g. BRM, SRM, TRM) and Confidential lifecycle classifications (e.g. current, twilight).
  • Developed Confidential templates and examples for solutions, compliance components (standards, guidelines, regulations), and product components (software, hardware, protocols).
  • Developed a Microsoft Access and SharePoint/SQL Server version of an Confidential repository to track both baseline and target architecture artifacts. Microsoft Access 2007 reports provide reporting capabilities for both versions.

Confidential

Enterprise Architect

Responsibilities:

  • Developed IV&V Plan based on IEEE 1012 standard.
  • Extracted requirements from many sources including BPR, SPR, Business Requirements Document, screen layout designs, report layout designs, and database schema dump to ensure Consent Decree needs are met.
  • Review of database design and 4D architecture.
  • Developed IV&V Monthly Reports across 9 sub-projects executing independently, but concurrently.

Confidential

Enterprise Architect

Responsibilities:

  • Developed the IV&V Plan based on IEEE 1012 standard.
  • Performed the review of 1180 requirements based on IEEE 830 standard.
  • Performed the SOW review to ensure that between the RFP requirements and SOW all the system functionality and services required to meet CDVA’s needs stated in FSR and SPR were covered.
  • Performed the assessment of the current environment description based on business process modeling notation (BPMN) and technology baseline based on enterprise architecture baseline (FEA, MITA) best practices. Current environment is a based on a MUMPS/Cache architecture.
  • Performed full review of Confidential Ew-VHIS Request for Proposal.

Confidential,

Enterprise Architect

Responsibilities:

  • Configured the SharePoint lists and views.
  • Configured the Technical Reference Model (TRM) that was defined based on the California Enterprise Architecture (CEA) Technical Reference Framework, the Service Reference Model (SRM) and Business Reference Model (BRM) based on the Federal Enterprise Architecture (FEA) framework.
  • Populated the repository with existing architecture assets which include principles, policies, practices (standards and best practices), systems (including custom/COTS, subsystems, and services), system interfaces, mission, goals, objectives, business areas, business functions, business processes, and glossary. The baseline Process Areas, Business Functions and Business Processes were created using the Medicaid Information Technology Architecture (MITA). Confidential ’ legacy systems are primarily mainframe systems.
  • Provided knowledge transfer sessions to facilitate the Confidential staff in maintaining the repository.
  • Reviewed Requirements Document based on IEEE 830.
  • Reviewed process flows based on Business Process Modeling Notation (BPMN) standard.
  • Reviewed architecture based on IEEE (document structure), RUP (architecture viewpoints), and SEI (COTS, quality attributes) for FileNet-based system.
  • Performed traceability between RFP and vendor’s requirements refinement.
  • Performed requirements to design component traceability.
  • Performed requirements to test case traceability.
  • Developed monthly requirements traceability matrix (RTM) that highlighted changes based on approved change control requests.

Confidential

Enterprise Architect

Responsibilities:

  • Performed technical IV&V activities which included RFP review based on IEEE 830 and 1062
  • Developed IV&V Plan based on IEEE 1012
  • Developed Requirements Traceability Matrix (RTM) between FSR and RFP and between RFP and vendor proposals, and maintained based on change requests
  • Reviewed vendor proposal reviews and mentored project team based on technical expertise of FileNet, Optical Character Redaction (OCR), and redaction technologies
  • Provided IV&V Monthly reports

Confidential

Enterprise Architect

Responsibilities:

  • Supported Confidential team’s development of roadmaps that included documentation of the “as is” and “target” architecture for the following architecture segments:
  • Business Intelligence (Enterprise Portfolio/TCO/ROI Analysis)
  • Human Resources
  • Contract Automation
  • Investments
  • Supported Confidential team in migration of existing Confidential repository to the Provision tool. Developed QA queries to validate data integrity.
  • Performed architecture assessment on Confidential ’ current portal architecture. Performed industry standards and market research, and developing an architecture white paper on the comparison of the current portal architecture to capabilities of open source and vendor product portals.
  • Performed industry research and developed an architecture reference model and requirements for Confidential ’ enterprise auditing and logging capabilities. Authored two (2) enterprise practices to be proposed to the enterprise architecture governance board: ELAPS Reference Model and an Application Transaction Log Practice based on the Application Response Management (ARM) standard.
  • Identity and Access Management (IAM).
  • Developed the enterprise architecture reference model, performed industry research developed the Justification for Focused Solicitation,
  • Created a consolidated list of enterprise-wide requirements (approx. 1000) based on Confidential requirements, industry research, and the state architecture direction.
  • Developed the EIAM RFP technical content, including the vendor questionnaire, customer reference forms, Fee proposal forms, and scoring strategy.
  • Facilitated the gathering of Confidential enterprise SOA requirements for Confidential ’ enterprise-wide SOA infrastructure which includes the Enterprise Service Bus (ESB) and common services (e.g. security, logging, document generation).
  • Provided traceability between the SOA Infrastructure requirements and Confidential ’ enterprise security requirements and Confidential ’ standard solution evaluation criteria.
  • Developed a set of detailed technical requirements for PSR based on over 3,000 enterprise requirements consolidated into an enterprise requirements repository. Provided traceability between the PSR procurement requirements and the detailed technical requirements. Performed reviews of project deliverables for the PSR project to validate the deliverables were consistent with IEEE standards.

Confidential

Senior architect

Responsibilities:

  • Developed the Enterprise Architecture Domains that provides a framework for classifying all technologies at Confidential .
  • Developed Reference Architectures for Identity and Access Management, Enterprise Document Management, Enterprise Application Integration (EAI), and Business-to-Customer ( Confidential Developed the charters for the three (3) IT governance committees that approve enterprise-wide IT principles, policies, practices, and processes.
  • Performed architecture reviews for new technologies, standards, and project architectures submitted to the Architecture Governance process.
  • Facilitated the gathering of Confidential enterprise SMT requirements.
  • Performed the industry research to define a vendor short-list for the SMT procurement.
  • Developed technical portions of the SMT RFP. Developed the Proposal Evaluation Plan (PEP) and participated as a subject matter expert (SME) on the proposal evaluation team.

Confidential

QA Manager

Responsibilities:

  • Developed a requirements database and requirements change control processes. Reviewed the requirements to ensure the requirements are clear, testable, and traceable based on IEEE 830 standard. Facilitated the requirements change control process. Created the requirements capture templates. Created a baseline of requirements by reverse engineering the requirements from existing Confidential Software documentation.
  • Developed a Master Test Plan, based on IEEE 829 standard that defines recommended testing levels testing types, test documentation, testing roles, and testing tasks. Created the test plan template. Developed the test plan for the Confidential Software Game Designer applications.
  • Reviewed all the development test plans to ensure test coverage. Reviewed all the outstanding defects to identify areas of risk.
  • Extended the requirements database to provide requirements traceability to functional components and test cases.
  • Performed the functional testing for Confidential ’s Java Swing and Web applications. Used Mobile Complete to perform end-user functional testing of Confidential mobile applications.
  • Performed server-side load testing of the Confidential Software, monitored the Linux system usage metrics, analyzed the information, and made recommendations on architectural, database, and configuration changes to meet the technical requirements.
  • Developed database reports to review and report on data within the Confidential Software databases to identify data errors, to perform test setup, and validate test results.
  • Evaluated testing tools to reduce the testing effort.
  • Used PMD to analyze the Confidential Software Java code, loaded the results into a database, and provided reports to the development leads.
  • Identified and logged all the vendor components used by Confidential Software and identified contacts for these components. Identified and logged all the custom components used by Confidential Software, including the contact information for each component. Documented the overall system architecture and provided recommendations for improvements. Performed research on Apache HTTP Server and Tomcat load-balancing and performance tuning and made recommendations. Proposed a database product roadmap to increase database performance and scalability.
  • Documented, streamlined, and clarified the development methodology to clearly identify mandatory and optional deliverables. Identified and logged all the product documentation and provided traceability to system components. Defined the Confidential Software Quality Assurance methodology.
  • Developed a PostgreSQL database that tracks all requirements, test items, system components, and releases and provides traceability between them. Provided extensive reporting using Microsoft Access. Queries and reports were developed to identify issues such as “Requirements without test cases”, “Components without requirements”, and “Components without documentation”. The QA repository was also extended to provide management with a summary of estimates by requirement, requirement group, or component.
  • Developed use cases guidelines, requirements guidelines, requirements review checklist, database design review checklist, component design review checklist, test plan checklist and user documentation checklist.
  • Set up a separate Linux test environment that included installation and configuration of Apache HTTP Server, Apache Tomcat, PostgreSQL, and Confidential software.

Confidential

Senior architect

Responsibilities:

  • Developed the Confidential Vision Document that defines Confidential ’s goals, objectives, and stakeholders. Authored Confidential ’s Management Plan that documented Confidential ’s accomplishments and Confidential ’s initiatives.
  • Consolidated the methodology assets into an integrated framework based on IEEE, RUP, and ITIL. Templates, examples, and standards were developed to enhance usability of the IT methodology. Developed a standard IV&V Plan based on IEEE 1012 standard.
  • Designed and implemented the Confidential repository that identifies and classifies all the technology components in use at Confidential .
  • Coordinated the establishment of a centralized library of profiles for all custom applications at Confidential .
  • Key information was loaded into the Confidential repository to track vendor software use, application interfaces, and other key architecture characteristics.
  • Facilitated the architecture governance committee responsible for approving additions to the Confidential Baseline Architecture and Target Architecture (i.e. standards, core technologies). Performed architecture quality assurance reviews of proposed architectures for key initiatives such as Straight-Through-Processing (STP) and Electronic Data Interchange (EDI). Performed as the primary architecture reviewer for all architecture change control proposals.
  • Worked with the chief architect to define the following key standards and technologies selected by Confidential:
  • Developed the technical strategy, developed the technical requirements and evaluated vendor solutions for the Scanning, Imaging, Document Management, and Workflow technologies. The FileNet suite was selected and implemented enterprise-wide based on the .NET architecture. Supported the project in the FileNet implementation.
  • Application Server, Web Server, Content Management, and Portal technologies were selected to be implemented enterprise-wide at Confidential .
  • Facilitated the gathering of requirements for Confidential ’ new content management solution. Facilitated the technical evaluation of the leading Content Management vendors.
  • Gathered the requirements for the Confidential ’ search engine. Performed industry research and a preliminary fit analysis to identify alternative solutions. Evaluated multiple vendor products. She performed a functional and technical gap analysis between multiple vendor products and Confidential ’ requirements.
  • Lead architect in the evaluation of multiple Customer Service solutions:
  • Lead architect on the evaluation of CRM product solutions.
  • Facilitated the collection of requirements. Performed industry research & analysis of CRM trends to determine the best business and technical approach for Confidential .
  • Developed the CRM Architecture Strategy and was a key participant in evaluating alternative CRM solutions.
  • Key participant in the evaluation and selection of the CTI and Interactive Voice Response (IVR) vendor evaluations.
  • Facilitated the gathering of both business and technical requirements for the Call Monitoring solution. Developed the alternative analysis and recommendation for the Call Monitoring product selection.
  • Key participant in introducing the Java programming language, eXtended Markup Language (XML) for specifications, and the J2EE component model to Confidential .
  • An enterprise communications gateway, enterprise application integration (EAI) solution, and mainframe integration technologies were selected and implemented enterprise-wide at Confidential . Facilitated the requirements gathering for the EAI procurement process for Confidential .
  • Worked with teams across Confidential to gather the requirements to ensure the EAI solution would meet Confidential ’ enterprise requirements.
  • Performed as the hands-on technical architect throughout the procurement process - responding to vendor questions and supporting the Confidential management staff in the evaluation process.
  • Facilitated the gathering of requirements to drive the definition of Confidential ’ strategic enterprise security architecture and to standardize the security requirements include in all technology procurements. Performed industry research on security standards and best practices.
  • Key contributor in defining the enterprise security data model and target architecture.
  • The Confidential Enterprise Security Architecture covers web applications, IVR applications, and client/server applications.

We'd love your feedback!