LiveCareer-Resume
Jessica Claire
Montgomery Street, San Francisco, CA 94105 609 Johnson Ave., 49204, Tulsa, OK
Home: (555) 432-1000 - Cell: - resumesample@example.com - -
Summary

Strategic Partner Manager in Cyber Security Sales

Highlights
  • Strategic planning and leadership
  • Relationship building expert
  • New program and promotion implementation
  • Channel Sales Strategies
  • Business Development
  • Territory growth and management
  • National account management
Accomplishments
  • First in US market to cultivate enabled, sales-driven partners for enterprise business growth.
  • Groomed and positioned a key strategic partner to win the Trend Micro / VMware partner of the year in a global competition with 202% YoY growth.
  • Achieved goal of attaining the most new gold level partner recruitment in US for enterprise level sales.
  • 32% YoY sales growth in territory in less than 1 year.
Experience
2015 to Current
Director, Strategic Partnership Management - US South Nutrien Ltd. Taft, TX,
  • a global leader in internet content security software and cloud computing security with a focus on data security, virtualization, endpoint protection
  • Cultivated and positioned the Trend Micro / VMware Partner of the Year winner Achieved status of having the only enabled partners in US territory.
  • Achieved goal of attaining the most new gold level partner recruitment in US.
  • Review operational records and reports to project sales and determine profitability.
  • Monitor customer preferences to determine focus of sales efforts.
  • Prepared budgets and approved budget expenditures.
  • Confer with potential customers regarding equipment needs and advise customers on types of equipment to purchase.
  • Direct foreign sales and service outlets of an organization.
  • Advise dealers and distributors on policies and operating procedures to ensure functional effectiveness of business.
  • Represent company at trade association meetings to promote products.
  • Prepare budgets and approve budget expenditures.
  • Formulate, direct and coordinate marketing activities and policies to promote products and services,working with advertising and promotion managers.
  • Evaluate the financial aspects of product development, such as budgets,expenditures, research and development appropriations, or return-on-investment and profit-loss projections.
  • Consult with users,management,vendors,and technicians to assess computing needs and system requirements.
  • Coordinate or participate in promotional activities or trade shows,working with developers, advertisers, or production managers,to market products or services.
  • Stay abreast of advances in technology.
  • Advise business or other groups on local, national, or international factors affecting the buying or selling of products or services.
  • Meet with department heads,managers,supervisors,vendors,and others,to solicit cooperation and resolve problems.
  • Recruit,hire,train and supervise staff,and participate in staffing decisions.
  • Control operational budget and expenditures.
  • Direct daily operations of department, analyzing workflow, establishing priorities, developing standards and setting deadlines.
  • Confer with company officials to develop methods and procedures to increase sales,expand markets, and promote business.
  • Analyze details of sales territories to assess their growth potential and to set quotas.
  • Contact new and existing customers to discuss their needs, and to explain how these needs could be met by specific products and services.
  • Emphasize product features based on analyses of customers' needs and on technical knowledge of product capabilities and limitations.
  • Collaborate with colleagues to exchange information, such as selling strategies or marketing information.
  • Provide customers with ongoing technical support via enabled partners.
  • Initiate sales campaigns and follow marketing plan guidelines in order to meet sales and production expectations.
  • Complete product and development training as required.
  • Consult with engineers regarding technical problems with products.
05/2002 to 10/2015
Operations Federal Bureau Of Investigation City, STATE,
  • Collaborate with other officials to prepare and analyze damage assessments following disasters or emergencies.
  • Train local groups in the preparation of long-term plans that are compatible with federal and state plans.
  • Keep informed of federal, state, and local regulations affecting emergency plans and ensure that plans adhere to these regulations.
  • Coordinate disaster response or crisis management activities, such as ordering evacuations, opening public shelters, and implementing special needs plans and programs.
  • Prepare emergency situation status reports that describe response and recovery efforts, needs, and preliminary damage assessments.
  • Maintain and update all resource materials associated with emergency preparedness plans.
  • Develop and maintain liaisons with municipalities, county departments, and similar entities to facilitate plan development, response effort coordination, and exchanges of personnel and equipment.
  • Inspect facilities and equipment, such as emergency management centers and communications equipment, to determine their operational and functional capabilities in emergency situations.
  • Collect business intelligence data from available industry reports, public information, field reports, or purchased sources.
  • Disseminate information regarding tools, reports, or metadata enhancements.
  • Document specifications for business intelligence or information technology (IT) reports, dashboards, or other outputs.
  • Design, use, or maintain databases and software applications, such as geographic information systems (GIS) mapping and artificial intelligence tools.
  • Establish criminal profiles to aid in connecting criminal organizations with their members.
  • Evaluate records of communications, such as telephone calls, to plot activity and determine the size and location of criminal groups and members.
  • Gather and evaluate information, using tools such as aerial photographs, radar equipment, or sensitive radio equipment.
  • Gather, analyze, correlate, or evaluate information from a variety of resources, such as law enforcement databases.
  • Link or chart suspects to criminal organizations or events to determine activities and interrelationships.
  • Prepare comprehensive written reports, presentations, maps, or charts based on research, collection, and analysis of intelligence data.
  • Prepare plans to intercept foreign communications transmissions.
  • Study the assets of criminal suspects to determine the flow of money from or to targeted groups.
  • Validate known intelligence with data from other sources.
  • Collaborate with representatives from other government and intelligence organizations to share information or coordinate intelligence activities.
  • Develop defense plans or tactics, using intelligence and other information.
  • Study activities relating to narcotics, money laundering, gangs, auto theft rings, terrorism, or other national security threats.
  • Recommend measures to help protect workers from potentially hazardous work methods, processes, or materials.
  • Configure security settings or access permissions for groups or individuals.
  • Document network support activities.
  • Identify the causes of networking problems, using diagnostic testing software and equipment.
  • Install network software, including security or firewall software.
  • Perform routine maintenance or standard repairs to networking components or equipment.
  • Analyze and report computer network security breaches or attempted breaches.
  • Back up network data.
  • Create or revise user instructions, procedures, or manuals.
  • Maintain logs of network activity.
  • Monitor industry websites or publications for information about patches, releases, viruses, or potential problem identification.
  • Perform routine maintenance or standard repairs to networking components or equipment.
  • Develop or update project plans for information technology projects including information such as project objectives, technologies, systems, information specifications, schedules, funding, and staffing.
  • Analyze and report computer network security breaches or attempted breaches.
  • Manage project execution to ensure adherence to budget, schedule, and scope.
  • Assign duties, responsibilities, and spans of authority to project personnel.
  • Coordinate recruitment or selection of project personnel.
  • Develop and manage annual budgets for information technology projects.
  • Develop implementation plans that include analyses such as cost-benefit or return on investment (ROI).
  • Direct or coordinate activities of project personnel.
  • Analyze internal processes and recommend and implement procedural or policy changes to improve operations, such as supply changes or the disposal of records.
  • Conduct classes to teach procedures to staff.
  • Direct daily operations of department, analyzing workflow, establishing priorities, developing standards and setting deadlines.
  • Evaluate the organization's technology use and needs and recommend improvements, such as hardware and software upgrades.
  • Collect evidence from crime scenes, storing it in conditions that preserve its integrity.
  • Keep records and prepare reports detailing findings, investigative methods, and laboratory techniques.
  • Testify in court about investigative or analytical methods or findings.
  • Digital evidence recovery and analysis.
  • Prepare evidence for presentation in court.
  • Advise businesses or agencies on ways to improve fraud detection.
  • Gather financial documents related to investigations.
  • Conduct in-depth investigations of suspicious financial activity, such as suspected money-laundering efforts.
  • Lead, or participate in, fraud investigation teams.
  • Train others in fraud detection and prevention techniques.
  • Maintain knowledge of current events and trends in such areas as money laundering and criminal tools and techniques.
  • Research or evaluate new technologies for use in fraud detection systems.
  • Obtain and serve subpoenas.
09/2014 to 2015
Data Transfer Officer (Collateral Assignment) Federal Bureau Of Investigation , ,
  • Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
  • Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
  • Monitor use of data files and regulate access to safeguard information in computer files.
  • Modify computer security files to incorporate new software, correct errors, or change individual access status.
  • Monitor current reports of computer viruses to determine when to update virus protection systems.
  • Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.
  • Train users and promote security awareness to ensure system security and to improve server and network efficiency.
  • Document computer security and emergency measures policies, procedures, and tests.
  • Implement electronic document processing, retrieval, and distribution systems in collaboration with other information technology specialists.
  • Assist in determining document management policies to facilitate efficient, legal, and secure access to electronic content.
  • Assist in the assessment, acquisition, or deployment of new electronic document management systems.
  • Exercise security surveillance over document processing, reproduction, distribution, storage, or archiving.
  • Prepare and record changes to official documents and confirm changes with legal and compliance management staff.
  • Propose recommendations for improving content management system capabilities.
  • Document, and ensure communication of, key risks.
  • Maintain input or data quality of risk management systems.
  • Recommend ways to control or reduce risk.
  • Gather risk-related data from internal or external resources.
  • Meet with clients to answer queries on subjects such as risk exposure, market scenarios, or values-at-risk calculations.
  • Analyze new legislation to determine impact on risk exposure.
Education
Expected in Sep 2011
CompTIA A+ Certification ( No Expiration) FBI ACADEMY Quantico, VA * Insider Threat 2010 ; Active Shooter Awareness ; Overview of the Domestic Investigations and Operations Guide; WITT - Basic Cellular Tracking Course; Basic Networking for Investigators; Cell Phone Investigative Kiosk (CPIK and the Loose Media Kiosk (LMK); Clearwater Security and Basic Overview; CompTIA Network+ 2012: Network Installation adn Configuration ; CompTIA Security+ 2008: Threat Mitigation; Deploying and Initializing UNIX systems; Digital Video Technology; DOJ WMD Workplace Safety; Covert Lock Defeating for Law Enforcement; NCIC Basic Certification Course; CYD 1050: Introduction to Internet Investigations ; CYD 1200: A+ Certification Course; CYD 1500: LINUX for LEOs Exam; High-Tech Environment Training (HiTET); Obtaining and Analyzing Digital Records; Privacy and Information Security; i2 Analyst's Notebook; Management Development for Technical Professionals; Models for Managing Technical Professionals; Firewalls and Access to Internal Resources with Microsoft ISA Server 2000; Green Business: Planning Sustainability Strategies; Introduction to International Terrorism; Mortgage Fraud Foundation (Part 1) ; Mortgage Fraud Partners and Resources (Part 2) ; Mortgage Fraud Tools and Cases (Part 3); Knowledge as Capital Managing Yourself and Those Around You; Diagnosing and Planning; Principles of Internal Auditing; Developing Customer Satisfaction Surveys; OSHA for Collateral Duty Safety Officers; Blood borne Pathogens Protection Methods; Information Systems Security Awareness; 3SI Bank Tracker: Business Management
UNIVERSITY OF PHOENIX - Phoenix, AZ
GPA: Summa Cum Laude * Delta Mu Delta International Honor Society in Business / Lambda Sigma Chapter - Member

Business Management Summa Cum Laude


* Delta Mu Delta International Honor Society in Business / Lambda Sigma Chapter - Member

Expected in
Academy Training:
fbi - ,
GPA:
Interests

Special Agent in Charge (SAC) Employee Advisory Committee - Representative Fort Worth RA

  • Incident Command Post Coordinator / Leader
  • Tarrant County Safe Streets Task Force - Assistant Coordinator
  • Top Secret/ SCI Clearance
  • Member of FBI InfraGard
Additional Information
  • ADDITIONAL SKILLS Special Agent in Charge (SAC) Employee Advisory Committee - Representative Fort Worth RA Tarrant County Safe Streets Task Force - Assistant Coordinator Top Secret/ SCI Clearance Member of FBI InfraGard
  • AWARDS AND HONORS Commendation letters from the SAC and Director's Office for my project management role in one of the largest criminal organization dismantlement operations
  • Three "On the Spot" Awards - Expeditiously processed cash awards for outstanding service
  • Life Saving Award" Presented by the Johnson County Sheriff's Office for the safe recovery of a missing child
Skills

A+ Certification, advertising, Analyst, artificial intelligence, Basic, Blood borne Pathogens, budgets, budget, business intelligence, charts, hardware, content, content management, crisis management, clients, Customer Satisfaction, data processing, databases, Digital Video, document management, emergency preparedness, features, financial, Firewalls, firewall, focus, functional, GIS, government, Information Security, Information Systems, information technology, Inspect, Internal Auditing, Law Enforcement, legal, legal and compliance, LINUX, Managing, Management Development, marketing plan, marketing, market, materials, meetings, Access, exchange, Microsoft ISA Server, money, 2000, radar, Network Installation, network security, network support, Network, Networking, personnel, plan development, policies, presentations, processes, product development, profit, project plans, promotion, publications, quality, radio, recruitment, repairs, Research, risk management, Safety, selling, sales, testing software, staffing, Surveys, technical support, telephone, Phone, trade shows, Trend, UNIX, upgrades, websites, workflow, written

By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy

Disclaimer

Resumes, and other information uploaded or provided by the user, are considered User Content governed by our Terms & Conditions. As such, it is not owned by us, and it is the user who retains ownership over such content.

How this resume scorecould be improved?

Many factors go into creating a strong resume. Here are a few tweaks that could improve the score of this resume:

resume Strength

  • Measurable Results
  • Personalization
  • Target Job

Resume Overview

School Attended

  • UNIVERSITY OF PHOENIX
  • fbi

Job Titles Held:

  • Director, Strategic Partnership Management - US South
  • Operations
  • Data Transfer Officer (Collateral Assignment)

Degrees

  • CompTIA A+ Certification ( No Expiration) FBI ACADEMY Quantico, VA * Insider Threat 2010 ; Active Shooter Awareness ; Overview of the Domestic Investigations and Operations Guide; WITT - Basic Cellular Tracking Course; Basic Networking for Investigators; Cell Phone Investigative Kiosk (CPIK and the Loose Media Kiosk (LMK); Clearwater Security and Basic Overview; CompTIA Network+ 2012: Network Installation adn Configuration ; CompTIA Security+ 2008: Threat Mitigation; Deploying and Initializing UNIX systems; Digital Video Technology; DOJ WMD Workplace Safety; Covert Lock Defeating for Law Enforcement; NCIC Basic Certification Course; CYD 1050: Introduction to Internet Investigations ; CYD 1200: A+ Certification Course; CYD 1500: LINUX for LEOs Exam; High-Tech Environment Training (HiTET); Obtaining and Analyzing Digital Records; Privacy and Information Security; i2 Analyst's Notebook; Management Development for Technical Professionals; Models for Managing Technical Professionals; Firewalls and Access to Internal Resources with Microsoft ISA Server 2000; Green Business: Planning Sustainability Strategies; Introduction to International Terrorism; Mortgage Fraud Foundation (Part 1) ; Mortgage Fraud Partners and Resources (Part 2) ; Mortgage Fraud Tools and Cases (Part 3); Knowledge as Capital Managing Yourself and Those Around You; Diagnosing and Planning; Principles of Internal Auditing; Developing Customer Satisfaction Surveys; OSHA for Collateral Duty Safety Officers; Blood borne Pathogens Protection Methods; Information Systems Security Awareness; 3SI Bank Tracker
  • Academy Training

By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy

*As seen in:As seen in: