We provide IT Staff Augmentation Services!

Project Manager Resume

3.00/5 (Submit Your Rating)

Vint Hill, VA

SUMMARY

  • Accomplished and energetic Information Systems Manager with extensive experience in project management, cyber security, business intelligence analytics, database design, network design and installation, network administration, and manual and automated testing of applications.
  • Experience spans business process analysis, requirements definition, creation of process documentation and mapping, gap analysis, and development of user guides and manuals. Information Technology experience is complemented by very successful experience in management.
  • Earned reputation for revenue growth, leading successful launches of new technologies, and managing complex business and technology integrations.
  • Very strong analytical, problem solving, interpersonal communication, business process improvement, and presentation skills.Cyber Security Contract Management Strategic Planning Systems Development Life Cycle Budgeting Process Mapping and Modeling Documentation Requirements

TECHNOLOGIES:

Systems: Mac OSX, Windows Systems, and UNIX/Linux

Databases: Oracle, Microsoft Access, Relational Databases

Languages: Visual Basic, SQL, HTML, Object - Oriented, Java, XML, Cold Fusion

Network Tools: RSA Security Analytics, SIEM, Wireshark

Security: Snort, Splunk, ArcSight, SourceFire, Fidelis, Nessus

PROFESSIONAL EXPERIENCE:

Confidential, Vint Hill, VA

Project Manager

Responsibilities:

  • Perform information systems security (ISS) monitoring and event detection for Confidential .
  • Monitor numerous sources of collected security data including system security event logs, system Internet Protocol (IP) data flows, Intrusion Detection System (IDS) alerts and payload, and system performance monitoring services.
  • Coordinate with other NAS monitoring entities to obtain all required event information and full situational awareness.
  • Perform security event correlation and risk determination functions to define event response needs
  • Perform NAS system security event response functions.
  • Use information provided via event monitoring and detection to coordinate Confidential responses to resolved detected events.
  • Establish and maintain security event tickets throughout the event lifecycle.
  • Coordinate with applicable stakeholders to develop security event remediation strategies and timelines.
  • Conduct security event telephone conferences as required to provide situational awareness to appropriate entities.
  • Perform upward reporting activities for events as needed.

Confidential

Cyber Security Center Manager, Reston, VA

Responsibilities:

  • Shift manager and personnel supervisor, performing annual performance reviews, managing and directing incident response services for Confidential product offerings and interact with clients in support of Confidential response services.
  • Responsible for effective shift management in the 24x7 Cyber Security Center and execution of response services. Guide and manage the Confidential analysts in their response operations job tasks and schedules. Manage the Confidential job tasks as they relate to the Confidential level agreements contractually provided by Confidential response services.
  • Responsible for Quality Assurance Controls and perform manual and automated testing of all new applications via Quality Center with HP Quick Test Professional (HP QTP), LoadRunner, Junit (with SOAPUI), JMeter, and Selenium.
  • Guide and direct analysts and senior analysts in researching current phishing methodologies and techniques to include web kit deployment, spam, and malware distribution and associated activities related to identity theft, social engineering and online fraud and scams.
  • Supervise and direct the process of reviewing unresolved cases to ensure their successful completion or escalate to the appropriate individuals or organizations based on established guidelines and procedures.
  • Exceptional oral and written communication skills to tactfully and effectively foster the development of relationships with providers (ISPs) while succeeding in the removal of malicious accounts or content from their networks.
  • Employs Confidential proprietary technology to identify relevant intelligence and current attacks.
  • Deep working knowledge of Internet protocols, technology, concepts and applications.
  • Advanced skills in writing, troubleshooting and optimizing SQL queries, records, functions, table structures, stored procedures, cursors, triggers, and exception handling for proprietary software.
  • Responsible for Contract Management in Salesforce and updating CRM for clients and analyst.

Cyber Security Center Analyst, Reston, VA

Confidential

Responsibilities:

  • Verifies, responds, and reports on incidents involving brand and copyright infringement, trademark violations, phishing and malware attacks and online impersonation activities.
  • Process reports of phishing attacks against client organizations such as banks, financial services firms, and leading computer organizations to identify sources of such attacks.
  • Performed Quality Assurance tasks and assist in manual and automated testing of all new applications via QC with HP QTP, LoadRunner, Junit (with SOAPUI), JMeter, and Selenium.
  • Responsible for updating CRM in Salesforce environment. Printing particular customer request for analyst to proceed and provide appropriate response.
  • Assist in Ticketing System (Jira and BugZilla) by tracking unresolved cases to ensure their successful completion or escalation to the appropriate individuals or organizations based on established guidelines and procedures.
  • While proprietary software was being developed, I assisted in evaluation and recommendation of scanning network tools as in WireShark, Nessus, VueScan, RSA Security Analytics, and Confidential ’s Technology.
  • Continue to successfully use exceptional oral and written communication skills to tactfully and effectively foster the development of relationships with providers (ISPs) while succeeding in the removal of malicious accounts or content from their networks.
  • Assist clients in troubleshooting, analyzing Internet content and sources, and advising on suitable courses of action.
  • Recognize situations requiring escalation to management and track issues through resolution.
  • Key contributor to the firm’s achievement of takedown times of two to four hours from time of phishing report, the industry’s best.
  • Enhance a database of Web-hosting providers worldwide, complete with current data on individuals and best methods.
  • Perform hands-on analysis of large volumes of customer level brand detection and cyber-crime using RSA System Analytics and HP’s ArcSight SIEM Tools.

Computer Systems Analyst

Confidential, Vienna, VA

Responsibilities:

  • Key accomplishment has been to align and define business and technology needs for the different Confidential projects.
  • Demonstrated strong communication skills in order to interact effectively and often with Project Managers, Developers, and customers on the formulation of modeling solutions and web applications.
  • Interpreted complicated modeling, analytical techniques, and results to both technical and non-technical audiences of varying degree levels, including senior management.
  • Clear understanding of internal and external customer business situations and translated them into analytical propositions.
  • Ensured appropriate business input on key strategic projects and applications.
  • Successfully completed creating test plans and working with Quality Assurance and User Acceptance Testing with integrating automation tools, such as LoadRunner, HP QTP, Junit, JMeter, and Selenium.
  • Successfully shared knowledge with other members of the analysts’ team and lead assigned projects.
  • Integrated diverse data sources and modeling techniques into solutions where appropriate.
  • Performed work that has enabled successful completion of Prevailing Wage, Perm, H-2A and H-2B applications, LCA, LCR, FUROA, and Operations and Maintenance (O&M).
  • Assisted in managing the exploration, development, and implementation of new methods and applications.
  • Assisted developers using Cold Fusion, Oracle, Java, Jira and BugZilla ticketing system.
  • Assist in installing and creation of Salesforce environment to work with future clients.
  • Advanced skills in writing, troubleshooting and optimizing SQL queries, records, functions, table structures, stored procedures, cursors, triggers, and exception handling. Including using and incorporating DbProtect scanning tools for Application Security.
  • Managed workload in DOL’s QC, HP ALM Explorer, Confidential Desk, and Harvest applications.
  • Successful experience in using tools as in Google Analytics, ForeSee, ClearCase, ClearQuest and Sparx Systems.
  • Successfully completed creation of the following documentation using Word, Visio, Excel, and Acrobat Pro:

Confidential

Manager / Project Manager / Quality Assurance, Lynchburg, VA

Responsibilities:

  • Project Manager working multiple vendor and clients under multiple contracts including fast turnaround delivery times.
  • Adopted Microsoft SharePoint to enhance and revise procedures for product distribution and inventory management, minimize cost, smooth relationships with vendors, and increase client satisfaction.
  • Performed Quality Assurance application testing to support hardware and software development.
  • Successfully implemented automated testing tools using QC with QTP and LoadRunner for the proprietary web application.
  • Selected as the rollout site for a new corporate proprietary web application.
  • Successfully used Oracle to create full database for the corporate proprietary web application.
  • Successfully installed, created, and implemented Salesforce environment to streamline CRM for busy location.

Manager / Project Manager / Subject Matter Expert

Confidential, Fredericksburg, VA

Responsibilities:

  • Managed the exploration, development and implementation of new methods and web applications.
  • Served as Project Manager for multiple clients on multiple contracts, each with a fast turn around delivery timeframe.
  • Served as Subject Matter Expert and Business Analyst to develop new proprietary software. Developed requirements and designs for the IT department.
  • Launched a successful training program to Hospice Foundation of America to provide Continuing Education Credits to hospice staff. The program has been instrumental in building referral relationships and has been adopted companywide.
  • Built revenues to $4 Million annually, increased sales average by $2,000, and secured an additional $1 Million of future business annually during Confidential tenure.
  • Served as Lead Project Manager to replace the existing network. Defined requirements, secured funding, managing procurement, and overseeing installation of a secured network at the site.
  • Created a Microsoft SharePoint site for clients, vendors, and employees to streamline communication, manage documents, and publish reports.
  • Instrumental in the successful merger of two organizations following the purchase of a regional competitor in 2007.
  • Successfully installed, created, and implemented Salesforce environment for vendor and client management.

Confidential

Manager, Educational & Market Consultant, Fredericksburg, VA

Responsibilities:

  • Lead Project Manager for replacement of outdated networks at all three locations. Secured funding, organized phases of network cutover, defined placement of new data and VoIP drops, and purchased and installed all equipment.
  • Performed work replacing and updating Confidential equipment and configuring to appropriate specifications.
  • Created a Microsoft SharePoint Website to manage documents and training materials for clients.
  • Installed and trained employees on Salesforce to enhance CRM experiences for clients and the market.
  • Maintained and troubleshot TCP/IP, network, and custom programming using telephone, IM, LogMeIn, and PCAnywhere.

We'd love your feedback!