| Microsoft OS and Office Suite - Windows Server 2000/ 2003/2008/2012. Windows WinXP/Vista/Windows 7 8.
- Windows ISA Server 2004 and 2006. MS Forefront, MS Visio, MS Project, MS Group Policy.
- MS-Office 2007/2010, MS-Access. MS-Exchange 2007/2010, MS Outlook2003/2010.
- MS Active Directory, TCP/IP, DNS, DHCP, MS SQL 2000/2005/2008.MS SMS, SCOM, SCCM 2007.
Industry Project/Change Management Methodology COBIT/ITIL/AGILE/ADKAR/KOTTER. Data Center 24/7 monitoring /Power Monitoring /Server and Network installation/Inventory Control/Network Planning/Preventative Maintenance/Hardware Procurement/Infrastructure Planning/Build Outs/Cost Analysis/Telecommunications Installation/Project Management/Vendor and Contractor Liaison/Cat 5,6 Cabling/Network Rack and Card Installation. Accounting Packages MS Dynamics/SAGE MAS 90/200/300. QuickBooks Pro/PeopleSoft Accounting Software Ver. 8.9. Clinical Applications Cerner Classic/Cerner Millennium/Power Chart/Power tools/EPIC/Siemens Invision Patient Accounting/ Master files, RPM/OAS/Olie Scripts/AS400/Signature/Med iSOFT Medical billing software V14/Meditech NPR/ Seacoast LIS. Remote Access Applications Remote Desktop/LogMeIn/TeamViewer/ Citrix GoToAssist/Citrix GoToMeeting/MS Terminal Server/VPN/VNC. Ticketing Software's and Asset Management Remedy/Numara Track-IT/Heat/Lotus Notes/ Manage Engine Service Desk/CA Service Desk/Symantec Altiris. Antivirus Applications McAfee ePO Security Enterprises, Symantec Endpoint Protection Suite, HP Tipping Point, LogRhythm. ERP - ERP Sales and Distribution SD ,Logistics Execution LE ,Production Planning PP-SOP, PP-MP,
- Material Management MM , Quality Management QM , Customer Service CS , Logistics Information System LO-LIS , Customer Relationship Management CRM .
Firewalls/Spam Filter Sonicwall, WatchGuard, Barracuda, HP Secure Proscan, Checkpoint/Palo Alto/ Juniper /SonicWALL Firewalls. Security Applications Wireshark, Snort, Cain, Nmap, SNSI, LANDesk, Fiberlink, Tufin, Blue Coat Proxy Client/Policy Center, Kaspersky, Zenoss, Netcat, Dsniff, Netfilter, Nessus. Other Hardwares and Applications Citrix XenDesktop, Citrix XenServer ,Oracle VirturalBox, Cisco Switches and Routers, Meraki Wireless, Symantec Ghost, Websense Internet Security, SecureFTP, File Servers, Print Server, Wi-Fi, VERITAS Backup Exec, NAS, DAS, RSA, PKI, PKCS11,MSCAPI/CNG,KMIP, Desktop Authority. Oracle Discoverer Query Tool. CA Clarity, Crystal Reports 8.5 and XI, VMware ESX/ESXi/ VMware vSphere. Nortel Meridian / Iwastu VoIP Telephone Systems. Apple/ Android OS's. HP and DELL Hardware's. Confidential Senior IT Security Consultant Contract with Signature Consultants - Support the governance and implementation of the enterprise's technical Data Access and Security strategy.
- Recommend methods to strengthen data security, required access and availability of information for the business, while tying back to enterprise-wide expectations.
- Documentation/Communication of data access/security issues. Communicate potential HIPAA issues and recommendations to business clients serve as a primary data expert on compliance rules surrounding delivery of protected health information to internal and external parties.
- Measures and monitors level of compliance with Security Program across the enterprise.
- Participate in governance, risks and controls activities related to security and report back to the CIO.
- Educate business/affiliates and peers about security program, policies, standard, legal requirements and state regulations about HIPAA pertaining to PHI and EHR.
- Create and implementation of new Security Incident Response Team.
- Creating security policies and procedures.
- Supports the development and publication of Information Security policies, procedures, standards, penetration testing and defensive engineering techniques for Cloud Platforms and Mobile BYOD within Unity Health Insurance Software/Hardware Infrastructure.
- Provide guidelines based on knowledge of best practices and compliance requirements.
- Monitors and advises on information security issues related to the systems and workflow at Unity and its affiliates to ensure the data security controls are appropriate and operating as intended.
- Implement and monitor the secure product development practices and processes for the entire product lifecycle for web applications development pertaining to PCI/DSS policies and procedures.
- Using McAfee EPo, HP Tipping Point SMS Client, LANSweeper and LANDesk to manage security and assets mgmt.
- Research and analyze laws and regulations and apply them to complex privacy and security issues.
- Data privacy: handles de-identification of electronic health records and data security tasks to insure compliance with the HIPPA Security Rule.
- Maintains inventory of all external data requests, associated business associate agreements and related protected health information for each request.
- Conduct weekly meetings with CEO/CIO and upper management to keep them up to date on technical guidance in relationship to information security controls for operating systems, development processes, and access control and network infrastructure.
Confidential IT Security System Analyst/Engineer Contract with Blue Horizon Tek Solutions - Perform technical functions related to Information Security including project/engineering work and operations ensure compliance with Security Policy and best practices across all business units within all VFF networks.
- Provide input for data migration for Syspro and Goldmine to VMware/Citrix infrastructure.
- Assist and provide Syspro operational functions and new drawing control system replacement.
- Create and update system architecture diagrams from current to new environment in MS Visio.
- Interpret system security architecture changes, understand the implementation point and effectively coordinate for a resolution. Using Solar winds/LANDesk and GFI Languard to discover/monitor enterprise network security activities such as intrusion detection and prevention.
- Create OU's within 2008/2012 AD and creating GPO's to manage and modify OU groups/printers and BYOD.
- Evaluate current security system environment and propose new effective solutions and follow through to its implementation which included vulnerability, security, patch management and log consolidation.
- Plan, monitor, coordinate and lead data security activities to completion within project timeline and to setup, execute, and evaluate performance bench marking before and after environment changes.
- Track issues and resolved in a timely manner and coordinate multi-team issue resolution if needed.
- Create functional and technical specifications to support system upgrades and software update builds to relevant hardware configuration.
- Create test cases, coordinate testing efforts and validate software release changes.
- Create, publish and maintain application/administration documentation and effectively communicate processes to company IT director and manager.
Confidential Remote Endpoint Security Manager Contract with Vision IT - Responsible for working with Endpoint Management team to manage software deployment to PCs using tools such as 2008/2012 Active Directory GPO's, Microsoft WSUS patching, Anti-virus and endpoint protection using McAfee ePO/Websense and Q-Radar products, creation and management of PC Build Images WinXP and Win7 , and application for PCI security policies.
- Evaluating client requirements for security lockdown on PCs and determining how to apply those security lockdown requirements including PCI compliance requirements on the targeted 45,000 PCs.
- Manage McAfee ePO A/V environment, using ePO console to pull reports to validate security protection compliance via DAT file updates, and take appropriate action to correct issues found within the ePO environment.
- Work as SME contact for on security technologies and threat mitigation best practices for applications pertaining to cryptography, key management, trust, authentication, penetration testing, and defensive engineering.
- Dealing with APTs, DDoS, and Targeted and Non-Targeted attacks.
- Use Websense/Q-Radar /Nessus to monitor and lockdown authorize access across the enterprises networks.
- Deploying monthly Microsoft patches using WSUS, targeting PCs across the entire enterprise over multiple WSUS servers.
- Deploying application installs using various tools SCCM, Altiris, and GPO .
- Works with Desktop Support Teams to test and validate security lockdown solutions.
Confidential Remote Data Security/ Network Engineer Contract - Specify, Procure, Deploy and Operate fault-tolerant high-availability payment processing platforms composed of VMware ESXi and Win Server 2008 R2, Server 2012, MS SQL Server R2, Forefront TMG, StrongAuth Encryption Tokenization appliances, Checkpoint / Palo Alto firewalls.
- Design and maintain network security architectures supporting PCI-DSS-compliant payment applications.
- Using SIEM Metasploit and Nexpose to manage scanning, vulnerabilities and reporting.
- Coordinate ongoing software development, testing, and release operations for Medical Practices.
- Performs testing, implementation, and maintenance of security technologies for PCI-DSS and HIPPA.
- Maintain company security policy meeting Payment Card Industry best-practices.
- Maintains proactive approach to network and phone system security monitoring.
- Document system integrations, and their relationships and dependencies within the network.
- Deploy and operate management, surveillance, logging alarm systems providing 24x7 monitoring.
- Manage 24x7 customer service and payment processing operations.
Confidential Project/Business Security Support Analyst Contract with Apex Systems - Provide hardware/software security support in windows based enterprise networks.
- Maintain network security architectures supporting PCI-DSS-compliance payment applications.
- Troubleshooting KMIP settings on Dell/IBM and HP laptops and desktops for security issues.
- Troubleshoot Blackberry setup in an enterprise environment.
- Install and configure Market Data applications such as Bloomberg, Reuters, and other Wealth Management Applications.
- Organize project to move users to Zen desktops and act as SME between staff and IT team.
- Meeting projects' deadlines and keep projects below projected cost.
- Maintain and configure users' security settings within Active Directory.
- Administer Symantec Virus protection software to newly deploy desktops and laptops.
- Maintain inventory and accountability for all IT components via IBM Bigfoot.
- Use IBM Security QRadar Vulnerability Manager to manage security auditing.
- Manage time effectively, set priorities appropriately for schedule calls for techs on site.
Confidential IT Project / Security Systems Analyst - Manage and securing data pertaining to Hayes patients PHI Protected Health Information and EPHI
- Electronic Protected Health Information
- Responsible for following the Application Support Lifecycle by managing application availability, deployment, patching, capacity upgrading servers to meet HIPPA and PCI compliances.
- Software Development Life Cycle SDLC phases such as Planning, Analysis/Design, development, and testing for the software/system development process.
- Using SCCM, Websense, Checkpoint and Secure Proscan to filter and manages web traffic, intrusion alerts and security stress testing for network infrastructure.
- Support incident management process for business applications network infrastructure security.
- Analyze, correlate, and reduce 100 thousands security logs creating less than 200 actionable work items per day with various Security Incident Event Management SIEM systems.
- Provide senior technical expertise in support of both business application and network infrastructure for the lab and doctor's offices projects.
- Troubleshoot any security root causes on a daily basis and document the steps/solutions.
- Implementation of web applications interfaces into doctor offices and creating vpn's via Checkpoint.
- Develop and build datasets for HL7 interfaces for EMR applications such as E-clinical, Greenway, Siemen Practice Partner, Cerner Millennium, EPIC and Practice Fusion.
- Maintained patient database integrity, normalization and maintenance in Lifepoint, to include interface relationships such as Cerner PowerChart and other EMR applications.
- Use Symantec Endpoint Security to deploy antivirus to computers.
- Coordinates day to day activities with IT vendors, including development, server operations, infrastructure engineering, troubleshooting solutions and engineering for web base applications.
- Work closely with accounting department to secure credit cards payment processing within LIS.
- Maintenance of Business PeopleSoft and Clinical LIS applications servers.
- Maintain PeopleSoft HCM/FIN/CRM application software security.
- Managing users access within Server 2008/2012 Microsoft Active Directory.
- Using MS Excel and MS Access/Project as reporting tools.
- Performs weekly maintenance on data center networks.
- Creating Visio flowcharts of network infrastructure.
Confidential System/Network Security Analyst Contract with KForce - Auditing CSI network infrastructure for security vulnerability.
- Network monitoring to allow for maximum security, safety and performance.
- Manage and develop policies and procedures documentation for the network projects.
- Install new/rebuild existing server and configure hardware, peripherals, services, settings, directories, storage in accordance with standards and project/operational requirement.
- Install and configure systems such as support CSI infrastructure applications and Asset Management applications. Audit network system for PCI compliance.
- Perform daily system monitoring, verifying the integrity and availability of all financial applications, server resources, systems and key process, reviewing system, applications and security logs.
- Managing users in a Microsoft Active Directory.
- Perform daily security monitoring to identify any possible intrusions.
- Implementation of Symantec Endpoint Security includes Antivirus, Spam filter and Network Threat software Microsoft Forefront and Checkpoint Firewall.
- Create network layout in MS-Visio.
- Implementation of storage server and application server.
Confidential Enterprise Network/System Support Analyst Contract with Iconma - Installed, Configured, Upgraded and Maintained Window 2003/2008 Servers, workstations and laptops encryption with RSA tokens.
- Setup and Configured Network.
- Use Symantec Antivirus solutions to maintain and monitor mobile users in the field via wifi.
- Design, install, and maintain backup Solutions.
- Deploy Windows XP-Pro workstations to doctor's offices.
- Perform Security Audits, Operations and Maintenance to secure PHR.
- Working with and teaching doctors, nurses and staff on 1 and 1 basic how to use the new web portal to place orders specimens and tests on Quest Care 360 web apps.
Confidential System/Network Security Administrator Contract - Rebuilding the network infrastructure.
- Migrating system from SBS 2003 to Server 2003.
- Build and configure the Medical Insurance Billing System Medisoft.
- Automate posting of claims via Claim Manager and configure Medisoft to print 1500 and UB90 for insurance claims submission via secure transmissions.
- Analyze and research CMS documentation for billing purpose.
- Manage project changing out their Dell XP Home computers to Dell OptiPlex business computers.
- Manage project for rebuilding their Accounting Mas 300 and Global contact database ACT10 from Sage. Managing users in a Microsoft 2003 Active Directory. Creating security policies and procedures.
- Implementation of one Cisco switch and a Juniper SSG140 Secure Services Gateway for vpn access for the doctors to use the Clinical EMR for patient care.
Confidential System/Network Support Security Engineer Contract - Managed all aspects of the network infrastructure security.
- Managed and maintained servers.
- Managing users in Microsoft Active Directory. Write GPO policies.
- Upgrade Terminal Servers from Windows 2000 Advance Server to Windows Server 2003/2008.
- Implement security procedures to protect company patient's data and from information leaks.
- Design and administrated server consolidation program through use of VMware ESX Server 3.5, VMware Virtual Center/Hyper-V.
- Designed and administrated the environment virtual desktops for users.
- Configure Checkpoint VPN for remote office connectivity.
- Managed Checkpoint firewall Policies.
- Assess current IT infrastructure security vulnerabilities and make recommendations for improvements.
- Rebuilding the company Active Directory and Group Policy.
- Monitoring internet and network data center with Solarwinds Orion and Websense Software's.
- Analyzing system/security logs and identifying potential issues with network systems.
- Performing daily routine IDP/IDS security audits of systems, desktops and software's.
- Responsibility for documenting the configuration of the system.
- Ensure that the network infrastructure is up and running 24 hours 7 days a week.
- Manage and maintain the RDMS for the company core application Pivotal.
- Troubleshooting any reported security problems. Manage all change management requests.
- Applying operating system updates, patches, and configuration changes.
- Setup security control protocols for network logins, VPN, internet for LAN/WANs.
- Implementation of security, backup and disaster recovery strategies.
Confidential Manager of Information Systems - Managed all aspects of the network infrastructure including additions, deletions and major modifications, printing, network planning, design, testing, system backups, disaster recovery, reports documentation, monitoring system performance, performing data transfers between network/security domains within data center, deployment and maintenance and support of laptops, handhelds devices, windows-based servers, Active Directory, Group Policy, WSUS, SMS, Desktop Authority.
- Use McAfee ePO Suite to secure network and data within the network enterprises environment.
- Collaborate with non-technical users to develop solutions to assess and adapt to rapid technological change.
- Manage all change management requests from Senior Management.
- Manage assets and expenditures budget for all computer systems.
- Provide support for patient admission and revenue cycle. Knowledge of MedHost
- Successfully engineered, implemented and managed a core VMware virtual infrastructure.
- Responsible for complete support, installation, maintenance for all network/system components security.
- Accountable for troubleshooting and repairing computer related technical issues.
- Installed, updated, and maintained Core application AdvantX on SQL Platform software, analyze HL7 entries into AdvantX.
- Administrator for the PACS/RIS systems for the Radiology Department.
- Performed various network IDP/IDS security testing/auditing functions and constantly resolving complex security issues.
- Harden and configure all systems to meet HIPPA compliance standard.
- Inpatient and Outpatient Coding, Document Imaging, Chart Tracking, and Physician Deficiency Tracking.
- Monitor doctor's laptops with Fiberlink Technology and RSA token via Checkpoint VPN secure login.
- Project Management implementations from start through to completion.
- Completed project timelines during various installations and upgrade projects.
- Effectively communicates relevant IT-related and security data gathering information to superiors.
- Teach the medical staff how to use MS Office Suite and Core Application Medrite, LabDaq, HRMS, AdvantX, EMR, HCPCS, CPT, CPT RVU and CPT coding.
Confidential Clinical Systems Security Support Analyst - Perform Vulnerability assessments on projects.
- Perform Vendor security assessments.
- Identify potential risk consult on correcting or reducing risk.
- Analyzes moderately complex business and technical problems and devises procedures for solving them.
- Selection of software, mapped unit process/flow, development, testing, training and implementation of FirstNet for the ER Department.
- Functioned as Super User for Hospital and Ambulatory Services, Support for ITs Help Desk.
- Training of RNs, Physicians and ancillary staff. Area of training specialty PharmNet, RadNet, FirstNet.
- Create and maintain user's profiles on the network.
- Troubleshoot network, desktops and printers/scanners via Remote access connectivity including Citrix Metaframe, Gotoassist, Netware Administration, Console One and VNC.
- Works with IS Analysts/Specialists, department user liaisons, and end users in order to identify security and production issues within clinical application HIM systems such as Cerner Classic/ Millennium Powerchart and Siemens Invision/Signature after testing within the development phase and the deployment phase.
- Ability to multi task and prioritize to meet demanding schedules for clinical systems implementation, deployment and maintenance.
- Resolving IDP/IDS security issues as they occur in a timely manner.
- Conducts special studies regarding development of new clinical information systems to meet current projected IT needs.
- Teaches doctors and nurses how to use clinical applications and Microsoft Office Suite.
|