business operations it consultant resume example with 14+ years of experience

Jessica Claire
, , 609 Johnson Ave., 49204, Tulsa, OK 100 Montgomery St. 10th Floor
Home: (555) 432-1000 - Cell: - - : - -
Professional Summary

Information Technology Specialist within the Intelligence Community having demonstrated proficiency in troubleshooting enterprise networks to include software; and hardware peripherals. Currently a member of an IT technical team responsible for providing customer service to end users via network; voice; or in person interaction. Leveraging acquired skills in Cybersecurity and information assurance. Actively seeking a challenging position within an organization that fosters team cohesion and professional development. Has excellent research, time management and problem solving skills. Ability to function at high levels within a wide variety of settings and fast paced environments. Capable of working autonomously or as a valued team member. Ready to increase technical acumen through a practical and theoretical approach in cybersecurity and computer networking.

  • Navy Veteran
  • Team leader
  • Inventory management
  • Hardware and software installation
  • Computer imaging
  • Desktop and laptop installations
  • Microsoft Office suite
  • Windows 10
  • Customer service driven
  • Troubleshooting hardware/software issues
  • Outstanding interpersonal skills
  • Staff education and training
  • Multitasking Abilities
  • Critical Thinking
  • Planning and Coordination
  • Hardware Installations
  • End-user support
  • Software updates
  • Device configuration
  • Implements Security Protocols
Work History
12/2022 to Current
Information Technology Specialist Humana Inc. Seneca, SC,
  • Translates complex technical issues for non-technical users.
  • Assists customers in identifying issues and explain solutions to restore service and functionality.
  • Uses ticketing systems to manage and process support actions and requests.
  • Manages high levels of call flow and respond to various technical support needs.
  • Configures hardware and grant system permissions to new employees.
  • Resolves diverse range of technical issues across multiple systems and applications for customers and end-users across various time zones.
  • Installs and configures operating systems and applications.
  • Creates user accounts and assigns permissions in Active Directory.
  • Encrypts/ Decrypts hard-drives for pre-defined usage.
  • Monitors and updates virus protection systems.
  • Ensures all enclaves consisting of Top secret; Secret and Unclassified data is separated according to agency rules and regulations.
  • Images encrypted and unencrypted desktops, and mobile devices for deployment.
  • During agency emergency situations ensures rapid deployment of IT assets and related peripherals for cleared personnel.
  • Generates reports highlighting daily events.
12/2018 to 12/2022
Business Operations /IT Consultant TEKsystems City, STATE,
  • Operated as a Business Operations IT Consultant, accounting for developing the business infrastructure from inception to profitability.
  • Installed, configured, and managed routers, modems and computers.
  • Installed and configured IT hardware, ensuring smooth operation of all company devices.
  • Troubleshot and installed software, resolving all issue within 24 hours of notification.
  • Escalated tier 2 troubleshooting issues.
  • Installed and troubleshot network interference/ connectivity issues on various IT devices.
  • Managed and assigned phones/printers and computing peripheral devices and other IT equipment.
  • Created/edited word documents, power-point presentations, and excel spreadsheets.
  • Created a Cyber Security Policy for implementation. Responded to all cyber security notifications to include fraudulent financial activity.
  • Directed operational processes and develops company policies; performed daily tasks of maintaining social media marketing and increasing brand presence.
  • Directed operational processes and develops company policies; performed daily tasks of maintaining social media marketing and increasing brand presence.
  • Established networking and relationship building with a wide array of internal and external stakeholders.
  • Sought the procurement of customer acquisition to ensure successful business continuity; demonstrated exemplary leadership abilities through the company's core values of selflessness, teamwork, and a "mission first" mindset.
  • Demonstrated ability to assimilate to new ideas, concepts, methods, and technologies; dedicated and innovative team builder with a superior work ethic.
  • Identified opportunities for improvements in the efficiency, effectiveness, and optimization of service provision costs and all incident responses relating to IT equipment and issues.
  • Cultivated positive relationships with vendors to deliver timely and cost-effective supply of services and materials.
11/2021 to 12/2021
IT Field Technician Military Sealift Command City, STATE,
  • Assisted Sentara Hospital Windows 10 migration of over 22,000 devices across several locations.
  • Followed spreadsheets of existing assets and inventory to log and report how many units were present vs. what should be there.
  • Deployed in small teams to various Sentara healthcare locations to perform hardware audits by verifying serial numbers on desktops and peripheral equipment.
  • Unpackaged, inventoried, and installed hardware prior to imaging and deployment of machines.
  • Actively engaged end-users by providing customer service and assistance with file/document transfers prior to the migration process.
  • Performed routine installation and service calls for hospital personnel.
  • Patched software and installed new versions to eliminate security vulnerabilities and protect data.
  • Downloaded applications frequently utilized in hospital settings through Company Portal such as Impax; Dragon; EPIC;and Cisco WebEx.
  • Frequently educated end-users on their usage of software/hardware and other computing devices.
  • Followed up with clients to verify optimal customer satisfaction following support engagement and problem resolution.
  • Consistently adhered to Information Security best practices.
  • Disseminated technical information in non-technical terms to end-users/clients.
09/2008 to 08/2013
Merchant Mariner United States Navy City, STATE,

Served onboard the USS Mount Whitney LCC-20 as a civilian Merchant Mariner in support Naval operations globally. Gaeta, Italy- 24 Months.

  • Reported issues to higher management with great detail.
  • Assisted with the creation of menu items.
  • Accepted; inventoried; stored and issued food stores from various vendors to crew members.
  • Operated and maintained galley equipment valued at $750,000+
  • Ensured sanitary practices were utilized throughout all food service spaces.
01/2002 to 06/2007
Petty Officer Company Name City, State,

Served on board the USS Anzio CG 68 as Culinary Specialist Petty Third Class in support of Operation Iraqi Freedom. Deployed and operated as an Individual Augmentee in Patika province of Afghanistan supporting Operation Enduring Freedom.

  • Volunteered to provincial reconstruction team Sharana tasked with engaging indigenous personnel by providing vital resources and development of sound principals in self-governance.
  • Culinary Specialist third class serving on board the U.S.S Anzio CG68.
  • Small Caliber Action Team(S.C.A.T) member operating in a collateral duty capacity manning the .50 caliber crew served weapon in support of Naval anti-piracy and Ships' security operations.
  • Served 455 days ‘boots on ground’ deployed o Paktika province, Afghanistan.
  • Engaged indigenous Afghans through humanitarian efforts.
  • Humvee turret gunner, manning the m. 240 bravo crew served weapon.
  • Stood over 1XXX cumulative hours of sentry guard duty in support of Forward operating base security objectives.
  • Performed personal security detail for Provincial Reconstruction Teams' Commanding officer on several high profile missions.
  • Supervised the daily activities of over 10 indigenous personnel in support of Forward Operating Base operations.
  • Lead Junior sailors in Basic Military Instruction and Seamanship.
  • Mentored junior Army personnel in pursuing career objectives.
  • Operated as an Individual Augmentee in the Paktika province of Afghanistan in support of Operation Enduring Freedom.
  • Coordinated activities of subordinate personnel to support mission success.
  • Ordered, unloaded, sorted and tracked supplies and equipment needed for unit activities.
Expected in to to
Master of Science: Cybersecurity Management And Policy
University of Maryland Global Campus - ,

The graduate certificate in cybersecurity management and policy program at University of Maryland Global Campus, students examine governmental and organizational responses to cybersecurity threats. Students assess technical and organizational controls that can prevent and detect cyber intrusions and create and assess policies and procedures to restore operations after a cyber attack. Students also explore the legal foundations of cybersecurity as well as the roles of government, international, and private organizations.

  • Conducted vulnerability assessments
  • Patch Management
  • Risk Management Framework (RMF)
Expected in 11/2021 to to
ACI Learning - Virtual,

ITIL and CompTIA entry-level program developed competence in IT fundamentals preparing for ITIL Foundation, CompTIA A+, Network+, and Security+ certification exams. A virtual learning environment offered via nightly zoom sessions with live instruction. courses were designed to prepare participants for the most in-demand certifications for entry-level IT positions.

Expected in 12/2017 to to
Bachelor of Science (B.S: Computer Networks and Cybersecurity
University of Maryland University College - ,

Coursework included fundamental usage in various types of software and hardware principals related to cybersecurity and computer networking: to include Intrusion detection/ Intrusion protection platforms such as:
Parrot OS; True crypt; Netstumbler; Metasploit; Dump sec; Cisco; Wireshark; Cain and Abel; Nessus; ProDiscover basic; OsForensics; WinHex; Acunetix

Expected in 12/2015 to to
Associate of Applied Science (A.A.S: Information Systems Technology
Tidewater Community College - ,

Received an AAS in Information Systems Technology with a concentration in Network Security. Coursework included:
Business and Communications; Networking 101
Introduction to Network security basics; Troubleshooting Software and Hardware; Digital Forensics; Ethical Hacking and

Cyber-security Law.


ACI Learning 40 Course hours Certificates of Completion:

ISC2 Certified In Cybersecurity (Anticipated completion 06/2023)

CompTIA Security + (Anticipated completion 08/2023)

CompTIA CySA+ ( Anticipated completion 08/2023)


    SAP- Virtual Experience Program on Forage Sept 22'


Candidate- (ISC)2 International Information Systems Security Certification Consortium

  • The International Information Systems Security Certification Consortium, more commonly known as (ISC)2, is a non-profit organization that provides security training and certificates.

By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy

Your data is safe with us

Any information uploaded, such as a resume, or input by the user is owned solely by the user, not LiveCareer. For further information, please visit our Terms of Use.

Resume Overview

School Attended

  • University of Maryland Global Campus
  • ACI Learning
  • University of Maryland University College
  • Tidewater Community College

Job Titles Held:

  • Information Technology Specialist
  • Business Operations /IT Consultant
  • IT Field Technician
  • Merchant Mariner
  • Petty Officer


  • Master of Science
  • Certificate
  • Bachelor of Science (B.S
  • Associate of Applied Science (A.A.S

By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy

*As seen in:As seen in: