Demonstrable skills and experience in both Enterprise and SME (MSP Clients) Project and Programme Management, based on the principles and methodologies of industry standards such as PRINCE 2 and PMP. With further demonstrable experience of managing teams in excess of 30 members including local hire and remote resources, together with all aspects of annual performance appraisals, and contractor negotiation, with an excellent understanding of the latest ITIL methodologies for ITSM. This specific experience has been gained from over 10 years of managing distributed teams and environments across multiple time zones and cultural forums, through Application and Infrastructure Support and Project and Change Management to have a complete understanding of the both SDLC and ITSM and how to make them successfully coexist. I have developed and managed enterprise grad SLA’s, OLA’s, UC’s and KPI’s framework, for both internal IT staff and external supplier resources to meet with industry and global regulatory requirements. Responsible for ALL Sarbanes Oxley (SOX) reporting and owner of ALL SOX controls for UK. I have a professional, adaptable, and competent approach to both Resource and Stakeholder management. I am more than comfortable with working in an integrated IT environment or as a consultant. I have a strong mix of corporate enterprise, SME and entrepreneurial experience, and to expand on that, my experience has afforded me the ability to learn the complex matrix management structures and business models which predominantly gained within Global Financial Services Industries (Investment Banking and Global, Corporate and Specialty Insurance). Where conversely some of my most recent and earlier career experience was based in one of the most competitive customer service industries, and to achieve success in this, I had to be flexible to market conditions, so that I could maintain strategic focus so as to continually meet my financial targets. The combination of my career experience has provided me with the opportunities of working in USA, Belgium, France, Spain, Gibraltar, Abu Dhabi and secondments to Brazil, Mexico and APAC, for projects that I was either managing or transferring to local piers and latterly I had responsibilities for USA, Germany, Italy, Switzerland and Denmark. I am confident that I have a strong comprehension of global business environments and managing diverse IT Departments across a multicultural platform. I feel that I am confident and excellent communicator and am completely at ease with interacting and influencing piers, partners, subordinates and executive management, both internally and externally to my working environment. Throughout my career, I have remained technically competent, complemented by my training and experience with Prince 2 and ITIL methodologies. I am a strong communicator, who is confident and experienced in influencing business and IT stakeholders-up to and including-CIO/Managing Director Level.
Business Continuity Planning Job Cost Overview
Typical total cost of oDesk Business Continuity Planning projects based on completed and fixed-price jobs.
oDesk Business Continuity Planning Jobs Completed Quarterly
On average, 3 Business Continuity Planning projects are completed every quarter on oDesk.
Time to Complete oDesk Business Continuity Planning Jobs
Time needed to complete a Business Continuity Planning project on oDesk.
Average Business Continuity Planning Freelancer Feedback Score
Business Continuity Planning oDesk freelancers typically receive a client rating of 4.63.
IT Security Consultant providing Consistent, Timely, and Cost-Effective IT Security Services. "firstname.lastname@example.org" ### Professional Security Services ### # Web Application/SaaS Security Testing and Defense (sql injection, cross site scripting) # Penetration Testing & Ethical Hacking # Vulnerability Assessment & Network Auditing # Implementation and auditing of various security compliance(ISO 27001, NIST, PCI-DSS) # Protection of hacked websites and servers, cloud security. # Security Testing Mobile Apps, Chrome Apps, Salesforce AppExchange Business Apps , RESTful Applications and APIs # Security Awareness - On Demand Phishing for Organizations. ### Value Added Services ### # Debrief with the client at the conclusion of each engagement. # Research and provide recommendations for continuous improvement. # Knowledge sharing. ### Certifications ### CISM,CISSP,Certified Ethical Hacker, ISO27001, Security+ ### Hands on Experience ### Web applications :- Wordpress, Joomla, Drupal, Network :- Cisco, Linksys, Netgear, TP-Link, E-Commerce Security - OScommerce, prestashop, Magento Forums - MyBB, phpBB cPanel, WHMCS Linux, Windows, Ubuntu, CentOS etc. ### Tools ### Manual SQL Injection Testing, Business Logic vulnerability testing, Kali Linux, Burp Suite, Metasploit Pro
I've lead teams and oversaw large IT projects and logistics/supply chain implementations for customers such as GE, Lockheed Martin, Tyco International and Motorola. I've presented to groups as small as 2-3 people and as large as 300 hundred. I've trained people on the use of software in groups as small as 5 and as large as 50. I thrive working in a client facing environment. On the technology front, I appreciate aspects such as project management, systems integration and training. I enjoy optimizing websites and blogs for search engine optimization and integrating the same with various social media tools. I can also write website copy. I also love photography. There is nothing like a photograph that captures a specific moment in time. Nothing else comes close to replicating it. I use a camera to tell stories. Specialities Creative: Project management, content editing, software training, conference photography, headshot photography, portrait photography, SEO, web copy Technical: Lotus Domino, Lotus Notes, Wordpress, Basecamp, MS Office, Microsoft Project, Microsoft SQL Server, Cognos, SQL, iSeries-AS/400 operations, Adobe Photoshop, Adobe Lightroom, AS400, AS2, EDI, XML
Steve is a highly motivated individual with an entrepreneurial drive, a creative spirit, sound scientific background, and a solid technology foundation in enterprise-wide system design, development, and deployment. He thrives in finding viable solutions in complex situations. He effectively operates at all organizational levels, internal and external, and with business partners. Steve has excellent communication skills, is a published author, and professional speaker, and has experience defending company policy, procedure, practices, and systems during regulatory inspections and audits. Steve is a certified Systems Auditor with extensive experience working in highly regulated industries (e.g., Environmental, Life Sciences, Department of Defense/DoD, Department of Energy/DoE), knowledge of domestic and international regulations (e.g., FDA, EMEA, MHRA, MHLW, SOX, HIPAA), along with compliance and risk management. Steve has extensive experience in establishing Policies and Procedures for Fortune 50 companies. Technologically speaking, Steve has experience developing software (custom internal and commercial external) in over 15 different programming languages. Steve has been a Data Base Administrator (DBA), Data Modeler, has strong SQL experience. He has lead software and systems development teams. Has worked as a Director in the .COM industry, started his own company, built it up, and eventually sold it to a Fortune 50 company. He has decades of experience as a consultant working with prestigious clients.
I worked as a managing director for 5 years at on-line web-store. Also I have experience as system administrator and content-manager of a Joomla based web site (www.polygroup.com.ua) For the last 13 month I am working at software development company as a GRC Analyst in Information Security Department. I have experience in: Supporting system security planning Developing and implementing security policies across multiple platforms Ensure successful implementation and maintenance of the defined standards Ensure compliance of IT security policies Work with the Information Security Manager to review and refine the information security policy, standards and procedures. Analysis of client's information security requirements Conducting HIPAA trainings for employees Analysis of compliance to HIPAA Developing of Information Security Training and Awareness Program Implementing of Information Security Training and Awareness Program Analysis and research of different data
To take on roles in Business - Technology Analysis/Consulting: Business Process, Technology, Strategy, Products & Projects Management; Enterprise Architecture/Engineering, Business Liaison, Service Delivery Management, Operations etc. with the ability to proactively translate customers, users or business requirements/needs into solutions, while leveraging technology for competitive advantage, market leadership and sustainable performance.