We provide IT Staff Augmentation Services!

Program Manager Resume

4.00/5 (Submit Your Rating)

SUMMARY:

  • Over 20 years of experience with a broad “body of knowledge” in security and program management of cross - functional teams for complex systems from initiation to integration.
  • Built on established service delivery mechanisms, performance metrics, service level agreements (SLA’s), and accountability measures that translate customer business objectives into tactical plans that ensure the delivery of quality system solutions.
  • These management practices and structures ensure timely and within budget delivered projects for private, commercial, federal, and the intelligence community customers.
  • He has built a core competency of success through his alignment of organizational skills, program and project leadership, and technical guidance.
  • These practices work in concert with his cost, schedule, and earned value management methods which collectively provide the foundation to develop positive stakeholder relationships.
  • As a leader in his project interactions as a senior advisor to executive management and stakeholders, Confidential delivers a customer service acumen that balances quality and satisfaction while achieving program goals, milestones, and mission objectives.

TECHNICAL SKILLS:

Comprehensive understanding of Enterprise: wide Infrastructures, Platforms, Networks, Security, and Architectures.

Cloud Platforms: Amazon Web Services

D Confidential bases: Oracle, Sybase, SQL Server, and MS Access.

Configuration, Change, and Requirements Management: Confidential s Rational Requisite, Pro, ClearQuest, DOORS, Rally, SCARAB, and WinCVS.Microsoft Office Suite of tools for collaboration, Visio, as well as MS Project.

EXPERIENCE:

Confidential

Program Manager

Responsibilities:

  • Confidential provides diversified expertise in IT senior program management, security analysis, and implementation.
  • His background includes program management, architectural analysis, security, software development, and has led many high level strategy, analysis, and decision support projects for major Government IT programs. rganized, solicited, and negotiated vendor contracts for mobile and internet service that established service level agreements, and created a $1.8 million in savings.
  • Conducted the system requirements solicitation, vendor selection, and COTS tool customization and deployment.
  • Coordinated with multiple system architects, developers, testers, integrators, and senior agency stakeholders.
  • Authored the agency’s Security Architecture and conducted IT Security Audits based on Confidential specifications, Executive Orders, and Office of Management and Budget directives.

Confidential

Program Manager

Responsibilities:

  • Conceived, designed, and developed the CMS Claims Processing Dashboard that detailed claim volumes by State, D Confidential Center, Contractor, Claim Cost, and Dollar Processed Values.
  • Authored the first high-level conversion plan to migrate the Financial Accounting and Control System (FACS) to the Department of Health and Human Services’ Health Integrated General Ledger Accounting System (HIGLAS). provided senior technical guidance in determining the metric criteria used to establish a program management office, and the ability to track multi-vendor and multi-agency IT System Integration programs.

Confidential

Project Manager, Principle Systems Engineer

Responsibilities:

  • Managed several technical projects of increased complexity for multiple government agencies Management; ensuring that the technical solutions and schedules are implemented in a timely, cost effective manner that achieved the customer’s mission.
  • Authored Confidential ’s Information Technology Architecture. Authored AOUSC’s Security Architecture.
  • Blueprinted the production hardware platform specifications to operate their Electronic Fraud Detection System.

Confidential

Program Manager

Responsibilities:

  • Managed the corporate Integrated Test Facility. Determined the security standards for hardware platforms, software testing tool-kit-suite, and established the system availability and resource utilization standards.
  • Established new software version product application performance criteria for d Confidential transfer rates, latency, bandwidth, and CPU utilization.
  • Confidential also established the ITF operational policies, procedures, practices, and the application deployment acceptance criteria.
  • Confidential managed the pilot project to migrate a mission critical mainframe application to client/server relational d Confidential base platform.

Confidential

Vice President - End User Computing, Chief Technical Consultant

Responsibilities:

  • Managed the bank’s End User Computing organization, and the IT Research and Development division.
  • Experienced establishing and managing Tier 1 and Tier 2 CONUS staff to support 70+ thousand end-users.
  • Analyzed service, hardware, and software vendor’s product offerings to be potentially used in banking operations to create a competitive advantage.

We'd love your feedback!