I am a goal-oriented and collaborative IT professional with proven analytical and problem-solving skills. I possess a keen ability to assess needs, define requirements, analyze business impact, and improve the operations and functions of an IT team in a dynamic environment. I also excel in leading high-performing, dynamic teams, driving efficiency and innovation. Additionally, I am adept at communicating effectively with both technical and non-technical audiences.
Career Highlights
- Successfully spearheaded the implementation and launch of Okta, an industry-leading IAM solution, which enhanced the University’s account lifecycle processes and streamlined user access management.
- Led the implementation of a new Enterprise Backup Platform, adhering to the industry-standard 3-2-1 backup strategy. This ensured reliable data protection, disaster recovery readiness, and minimized potential data loss risks.
- Served as the lead architect for the University’s adoption of Microsoft 365 services, including Exchange Online, Teams, SharePoint, and OneDrive for Business.
- Directed the deployment of an Endpoint Management system, which optimized device management, security configurations, and software distribution across university-managed devices. This resulted in improved operational efficiency and strengthened endpoint security.
- Deployed a next-generation Endpoint Detection and Response (EDR) solution, significantly enhancing the University’s ability to detect and respond to advanced threats, zero-day vulnerabilities, and sophisticated malware attacks.
- Represented the Division of Information Technology on a search committee tasked with selecting the University’s Vice President for Information Technology and Chief Information Officer. The committee, consisting of 15 members from various university departments, collaborated with executive leadership, key stakeholders, and an external search firm to interview candidates and recommend finalists to the University President.
- Played a key role in leading the recovery effort following a ransomware attack, rebuilding critical infrastructure and systems within three weeks, and ensuring business continuity.
Skills
Soft Skills | Problem-Solving Communication Collaboration Adaptability Time Management Emotional Intelligence Critical Thinking Leadership Attention to Detail Conflict Resolution |
Security | Security Awareness Training Identity and Access Management Endpoint Security System Hardening Vulnerability Assessment Incident Response Risk Management Network and Web Application Security Security Audits Compliance Management Data Encryption |
Microsoft 365 | Microsoft 365 Admin Center Entra ID Exchange Online Teams SharePoint OneDrive for Business Intune |
Server OS Administration | Windows Server 2008 - 2022 Ubuntu Server Red Hat Enterprise Linux (RHEL) CentOS VMware vSphere Hyper-V |
Server Administration | Microsoft Exchange Active DirectoryGroup Policy DNS DHCP IIS Print Management Windows DFS and File Share WSUS Microsoft KMS |
Database Administration | MSSQLMySQL |
Application Development & Scripting | Powershell Python PHP Javascript / jQuery HTML(5) CSS(3) .NET |
VDI Technologies | Citrix VDI VMware |
Professional Experience
-
2021 - NOW
Assoc. Dir of Enterprise Technologies - Kean University
- Standardized and stabilized operations by managing application and system development lifecycles. Implemented industry best practices and standards to ensure the stability, reliability, and security of University systems and applications.
- Developed and executed a "cloud-smart" strategy aligned with the University’s mission of resiliency. This involved moving critical systems to SaaS, IaaS, and PaaS platforms, including the adoption of the Microsoft 365 suite: Exchange Online, Teams, SharePoint, and OneDrive for Business.
- Collaborated with University stakeholders to design technical solutions that addressed business challenges related to regulatory compliance, security, and technology.
- Worked with senior leadership to define technology roadmaps and ensure that technology initiatives were aligned with business priorities.
- Conducted regular risk assessments, vulnerability testing, and audits to identify and mitigate security risks.
- Reviewed internal IT systems and processes, identified areas for optimization, and implemented streamlined solutions. Collaborated with functional areas and IT resources to enhance business processes through integration, automation, and operationalization.
- Led and mentored a team of 4 technology professionals (System Administrators and Cloud Engineers), fostering a collaborative and high-performance culture that encouraged learning, innovation, adoption of new technologies, and professional growth.
Cybersecurity Engineer - Stevens Institute of Technology
- Partnered with the CISO to develop and implement a security strategy aimed at protecting university resources while enhancing the user experience.
- Oversaw the daily operation of the university's information security systems, ensuring continuous risk mitigation awareness.
- Collaborated with the Information Risk Management team to create a strategy for quantifying and identifying risks through data analysis (e.g., vulnerability, device compliance, HIP checks) at both executive and business levels.
- Worked with technology and business stakeholders across the university to identify and communicate security risks and mitigation strategies.
- Reviewed and analyzed threat intelligence reports and sources (e.g., security events, network traffic, logs), and presented findings to business leaders to facilitate risk-based decision-making.
- Teamed up with the CISO to assess university vendors from a risk perspective. This included analyzing technical documentation, using tools to identify external security concerns, and reviewing contract language to identify potential risks to the university.
- Commissioned and conducted information security awareness training, and organized regular activities to raise awareness.
- Managed university intrusion detection systems, intrusion prevention systems, SIEM, and other tools to detect, respond to, and mitigate information security vulnerabilities and incidents.
- Assessed systems, processes, and projects against compliance requirements, control objectives, and security best practices for all university information systems, including those dedicated to research grants and awards.
- Acted as a liaison between IT and academic departments to coordinate the execution and documentation of research technology systems and information security processes, including those adhering to NIST SP 800-171 in a Controlled Unclassified Information environment.
Senior Systems Administrator - Stevens Institute of Technology
- Provided comprehensive support for all aspects of Stevens' Microsoft-based networked systems environment, including Windows Servers, Azure Active Directory, Exchange, O365, VDI, DNS, DHCP, Symantec, Microsoft Defender ATP, and BitLocker.
- Supported Stevens' Active Directory domain, handling user and group management, group policies, authentication, asset tracking, and related functions.
- Ensured the security, stability, reliability, and availability of Stevens' virtualization infrastructure, delivering a high-quality experience for students, faculty, and staff.
- Delivered a range of information security technologies and services, including patch management, vulnerability scanning, system hardening, and encryption services.
- Configured and managed workloads in the Controlled Unclassified Information environment, enforcing security posturing in compliance with NIST SP 800-171 security controls.
Systems Administrator - Kean University
Contact Me:
Interested in working together? Drop me a line using the form below.