Download PDF

Work experience

Apr 2014Present

System Administrator

Graphic Packaging International

As a system administrator I ensured that the up-time, performance, resources, and security of the computers, which are managed meet the needs of the users without exceeding the budget. To meet the needs clients as a system administrator I acquired, installed, or upgrade computer components and software; provide routine automation; maintain security policies; troubleshoot; train and/or supervise staff; or offer technical support for projects.

Jan 2011Aug 2012

End User Support

Kent County

• Provided end-user support for Kent County Sheriff's Department

• For multiple computing platforms including Novell SuSE, Linux, Groupwise and Microsoft Operating systems.

• Main job responsibilities included installing, configuring and troubleshooting workstations, software, voice and video systems and a variety of peripherals.

• Provided applications software training and general end-user assistance including troubleshooting and issue resolution services.

• Maintaining connectivity between internal, external and remote networks.

• Started and maintained a complete inventory of computers and accessories.

•Transitioned the entire facility from Novell to Active Directory management structure •Technical support person for the Kent County Correctional Facility/Sheriff's Department.

Sep 2010Jan 2011

Professional Tutor (Technology)

Davenport University

• Apply knowledge of discipline to provide one-on-one and small group instruction to students, as needed.

• Assist students with course work.

• Provide guidance and instruction, as needed, with peer tutors.

• Maintain records, as required.

• Provided great customer service, anticipating and exceeding the needs of the customers.

May 2010Aug 2010

Information Technology Intern

Nucraft Furniture

This position is only a 3 month contract position. Among many other things my duties included: • Assisting the IT staff in various duties

• Rebuilding computers, installing operating systems

• Searching for hard to find parts for proprietary equipment online

• Windows 2003 server active directory

• Fixing and installing Linux OS's

• Packing equipment for deployment to trade shows • Assisting with setting up large corporate style video conferencing.


Jan 2012Present

Master of Business Administration (MBA)

Davenport University

BAS Network Security

Davenport University

Network Security program prepares students to create and implement network security policies for an organization. In addition to network security fundamentals, this program also includes the knowledge and skills to perform administrative oversight of disaster recovery, information assurance, and other network security policies. Hands-on coursework will provide more advanced security skills in a variety of hardware and software environments. The courses in the program cover topics directly related to the objectives of certification exams in the area of network security.

Jan 2006Jan 2010

AAS Network Security

Davenport University

Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.


Software Documentation
Disaster Recovery
Disaster recovery (DR) involves a set of policies and procedures to enable the recovery or continuation of vital technology infrastructure and systems following a natural or human-induced disaster.
Asset Managment
Dell Computers
Application Support
Providing assistance to users of technology products such as mobile phones, televisions, computers, software products or other electronic or mechanical goods.
Computer Software Training
Microsoft Office
discovery and communication of meaningful patterns in data. Especially valuable in areas rich with recorded information, analytics relies on the simultaneous application of statistics, computer programming and operations research to quantify performance.
Customer Service
 Technologies that measure and analyze human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes.
Computer Repair
Computer Hardware
Cisco Technologies
Routers, Switches, Access Points, Cabling
Wireless Networking
Network Administration
Windows Server
Windows 7
Active Directory
Dos, Windows XP, Windows 7, Windows 8, Windows Server 2003-2012
Network Security
Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.
Data Mining
Data mining is a process of extracting information from a data set and transform it into an understandable structure for further use.
Vulnerability Management
The practice of identifying, classifying, remediating, and mitigating vulnerabilities


Jun 2009Present

CompTIA A+