Download PDF
  • 241 E58th Street, Brooklyn, NY 11203
  • 407-409-8497

Kino Mondesir

IT Professional

Professional Experience


ICT Professional

United Nations Entity of Gender Equality
  • Developed Forms to improve the speed and accuracy of data collection
  • Planned the migration of all headquarters' users to CISCO Unity IP telecom systems
  • Executed the migration of over 2,000 users to Office 365 platform
  • Secured workstations using whole disk encryption technology Bitlocker
  • Streamlined desktop operations through automation and centralized configuration using Dell KACE
  • Create and maintained full catalog of application packages for automated deployment
  • Plan, staged and executed the migration to Windows 10 and Azure Active Directory
  • Provide first and third level support to all users across the organization
  • Implemented "Reboot to Restore" to secure all conference room workstations
  • Configured remote access to all systems within the organization using Teamviewer
  • Reduced first response time by 80 percent and resolution time by 50 percent
  • Create SharePoint lists, libraries and workflows for process automation
  • Used VBscripting to automate various processes e.g. mapping network drives offsite, copying files, etc
  • Create software packages for pushing using Dell KACE
  • Create and administer virtual servers and workstations
  • Create group policy to add printers and network devices to user's profile
  • Create technical documentation websites using SharePoint Online
  • Added, updated and removed users from AD users and computers
  • Redesigned the AD scheme to include country office users

E-Discovery Specialist

Bank of New York
  • Track evidence inventory for intake and release of all evidence items delivered to the E-Discovery team
  • Perform daily analytical actions in the performance of E-Discovery and reporting
  • Assist in developing, managing, communicating, and implementing an E-Discovery program
  • Develop and maintain the biweekly recovery activities report that identifies recovery team accomplishments and goals
  • Participate in IT security meetings and briefings tracking of evidence inventory for intake and release of all evidence items delivered to the E-Discovery team
  • Perform parsing and analysis of exchange, active directory, restored data; to include link analysis, filtering and file recovery
  • Categorize and manage large collections of tape backups to maintain file integrity and chain of custody
  • Provide support, reports, and all related deliverables on "chain of custody" matters
  • Perform case reviews to insure analysis reports meet acceptable standards as defined by policy

Instructional Technologist

Florida International University
  • Configured network printers for faculty and staff
  • Setup network infrastructure for remote campus
  • Setup VPN to connect to main campus
  • Created system images for setting up workstations
  • Created an intranet site for students and faculty to share course material
  • Developed a budget for the purchase of goods and services
  • Setup conferencing equipment for distance learning lectures


System Administration

Consulting Work


Application Specialist III

Wyndham Vacation Ownership

Worked closely with leadership to coordinate the actions of various subject matter experts. Coordinated with management to look for repeat incidents to determine root cause. Analyzed ticket history to determine patterns and look for opportunities to reduce or eliminate those incidents. 


Computer Analyst

Lockheed Martin

Worked with engineers in the field ensure systems are operating as expected. Escalated problems to the appropriate personnel. Kept detailed notes as to identification of a problem, cause and resolution. Communication with senior leadership as to the status of the work performed by various support personnel. Developed training for new analysts coming aboard 


Quality Assurance

Hewitt Associates

Create tests to evaluate changes made to the system to compare results from what was received to what was expected. Query sample users to evaluate development system. Develop task automation to test actions performed on multiple users in a graphical user interface.

Volunteer Experience


Technical Advisor

Unwomen MetroNY
  • Configured a backup solution to periodically make a point in time copy of Wordpress data
  • Developed a sandbox site for testing new Wordpress templates and plugins
  • Created, modified and removed Google Apps users and groups
  • Provide recommendations on products and services to be used by the organization
  • Implemented best practice security recommendations to restrict access to the site



Masters of Business Administration

Western Governors University

Coursework included the following:

  • IT Project Management
  • Ethical Leadership
  • Decision Analysis

Bachelors in Information Technology

University of Phoenix

Coursework included the following:

  • Visual Basic .NET
  • Java
  • SQL

Associates in Computer Networking

Seminole Community College

Coursework included the following:

  • Computer Repair
  • Networking
  • System Administration



AWS Certified Solutions Architect - Associate


Technical expertise in designing and deploying scalable, highly available, and fault tolerant systems on AWS.




PRINCE2 (an acronym for PRojects IN Controlled Environments) is a de facto process-based method for effective project management. Used extensively by the UK Government, PRINCE2 is also widely recognized and used in the private sector, both in the UK and internationally. The PRINCE2 method is in the public domain, and offers non-proprietorial best practice guidance on project management.




An entry level certification which offers you a general awareness of the key elements, concepts and terminology used in the ITIL service lifecycle, including the links between lifecycle stages, the processes used and their contribution to service management practices.




This certification demonstrates proficiency in the skills to successfully implement, manage and troubleshoot network environments running on Windows server systems, as well as implement and administer security in a Microsoft Windows Server network.




This certification indicates that the certificate holder demonstrates the knowledge and skills required to support end-users and troubleshoot desktop environments running on the Microsoft Windows operating system.




Covers network security, compliance and operation security, threats and vulnerabilities as well as application, data and host security.




A vendor neutral networking certification that is trusted around the world. It validates the essential knowledge and skills needed to confidently design, configure, manage and troubleshoot any wired and wireless networks.




An entry level certification demonstrating competency of entry-level PC computer service professionals in installing, maintaining, customizing, and operating workstations