We provide IT Staff Augmentation Services!

It Technician Resume Profile

4.00/5 (Submit Your Rating)

OBJECTIVE:

Seeking challenging IT position utilizing problem solving abilities and business experience to perform tasks requiring attention to detail and high degree of accuracy

PROFESSIONAL SUMMARY:

  • IT Professional with over 30 years working with Mainframe technologies, with extensive experience as a Security Analyst, as well as Mainframe Automation and User Interface Tool Creation
  • Security background with experience with IT Security Access Monitoring and Account Administration
  • Experience working with RACF and CA Top Security, CA Compliance Manager, CA Auditor
  • Strong attention to detail and able to work within strict deadlines most recently worked as an IT Security Analyst mostly working with SOX Compliance, audit preparation and response would have a strict deadline after an audit was requested to gather and send back the necessary information successfully passed every audit on the Mainframe, which occurred four or more times a year

PROFESSIONAL EXPERIENCE:

Confidential

IT Security Analyst

  • Responsible for creating reporting tools for SOX compliance using CA Compliance Manager data, CA Auditor, and CA Top Secret data.
  • Assisted with setting up automated notification using CA Auditor
  • Created auditing reports from CA Compliance Manager data, combining data from 32 reporting LPARs into single, summarized reports DB2, REXX, SAS for ease of monitoring and validation.
  • Documented CA-TSS Command Propagation Facility across 37 LPAR environment
  • Automated re-write of REXX 184 member REXX library from VB to FB file for deployment
  • Created Excel sheet documenting various pieces of needed information in order to work in 37 LPAR environment such as shared/non-shared catalogs, OS software, JES characteristics, TSO allocations and permissions, etc.
  • Created ISPF panel driven, site specific tool for automating use of XCOM file deployment
  • Created function to automate CA-Clean reports, ACID backups and TSS command creation

Confidential

  • IT Security Analyst
  • Created interactive TSO/ISPF security monitoring application tool to automate batch job reporting and violation tracking used date/type keyed PDS member names for database records using REXX and SAS Base the tool queried CA-Top Secret activity, violations data and recovery data to create violation tracking records and emails this tool reduced time required to perform daily monitoring tasks from a full day down to 30 minutes it also read and summarized Syslogs for quick review, sent users and account owners status of their TSO/batch ACIDs, created weekly monthly SAS graphs for trending, backed up daily data in GDGs for historical reporting, and also ran monthly Baseline Security Configuration reports included DB2-SQL extracts wrote 60,000 lines of REXX, JCL/utilities, ISPF panels and SAS Base code to complete this project
  • Was responsible for handling internal and external security audits to ensure corporate SOX compliance. No audit failures during my tenure.
  • Performed security investigations and incident response tasks by querying UNIX or Windows servers logs using LogLogic
  • Performed administrator tasks for SecureWorks log monitoring
  • Created mainframe security reports to monitor and track FTP and CD transmissions
  • Assisted CICS end users with their transaction OTRAN/PPT access issues
  • Prepared MS-PowerPoint overview presentations for upper management, Risk Management and auditors that explained mainframe monitoring procedures and identified inputs and outputs
  • Created tools to interact with mainframe COTS products SAR and IBM utilities to simplify data collection for audits
  • Monitored account changes to validate user roles and privileges using Active Directory
  • Trained junior staff to run daily operations

Confidential

IT Security Analyst Contract

  • Was responsible for user access account creation, access privilege assignments and account maintenance across platforms UNIX, mainframe/CA-Top Secret, Windows/Active Directory security access administration, as well as security incident response
  • Created interactive processes to expedite with 100 accuracy external user account creation on the mainframe Unix

Confidential

IT Software Installer Contract

Was responsible for installing IBM's Software Configuration and Library Management SCLM tool at customer site s

Confidential

Application Tester / Quality Assurance

  • Was responsible for validating new application software and execution of test cases
  • Redesigned/rewrote mainframe automated batch scheduler to execute without user intervention the updates reduced the elapsed processing time from 3 days to 4 hours new tool created and edited test bed data to allow for cyclical application processes
  • Participated in review meetings with analysts and developers to address findings
  • Created tools to assist with creation of test bed data, eliminating the potential for errors created by human intervention
  • Performed RACF field administrator tasks at Department level

Confidential

Application Developer / Production Support

  • Was responsible for application production support 24x7 on call and tier 2 application support including COBOL, JCL PROC updates, and data integrity validation
  • Created and updated automated in-house tools supporting application software configuration and release library management utilized combination of clist/REXX, TSO ISPF, JCL, and IBM utilities to track and promote software across all stages of lifecycle support added an option to execute JCLCheck utility to create composite report for release component
  • Created interactive tools to simplify use of COTS software
  • Interrogated SAS-MICS system data to instigate application program performance and tuning efforts, eliminating batch processing bottlenecks and teaching COBOL coding efficiencies across departments
  • Performed RACF field administrator responsible for user ID's, profiles and access controls at the Division level
  • Wrote ad hoc REXX code to rewrite and re-compile 60,000 COBOL programs to change INCLUDE statements to COPY statements when this shop converted from LIBRARIAN software to PDS files

Confidential

IT Technician / Online Monitoring

  • Monitored mainframe IMS and CICS consoles for exceptions and performed application support functions such as software updates with corresponding IMS gens
  • Maintained the automation tools to perform software updates

Confidential

IT Technician / Production Support

  • Exploited CA-7 capabilities by writing interactive user clists to create customized application batch schedules with JCL override editing and on-demand processing
  • Monitored the execution of application batch strings and ensured their successful completion
  • As technical team lead on night shift I was responsible for monitoring all applications batch and troubleshooting/resolving batch job failures with follow-up trouble reporting and disaster recovery

Confidential

Computer Room Operations

  • Performed console operations monitoring tasks, hardware trouble shooting and vendor support, tape library management, printer operations, trouble reporting and issue tracking
  • Performed manual workload balancing that reduced 2 hours from nightly batch window

We'd love your feedback!