top of page

IT SYSTEMS

Enterprise infrastructure leadership across on-premises and hybrid cloud environments, with focus on network architecture, identity governance, endpoint management, and operational stability.

​

Specialized in production infrastructure supporting multi-department operations with centralized identity control and segmented network design.

​

Core competencies include:

• Active Directory and Azure AD hybrid identity
• VLAN-based network segmentation and firewall enforcement
• Microsoft 365 integration and identity lifecycle management
• Endpoint deployment and lifecycle governance
• Incident management and operational continuity

My Very 1st Office, As Sole Campus IT  Specialist in Texas, USA

IT ARCHITECTURE

Defined logical network architecture governing traffic flow, segmentation, and service exposure across production environments.

​

• Designed firewall boundary enforcement and VLAN-based traffic isolation
• Structured core and access layer switching for controlled east-west communication
• Integrated on-prem infrastructure with cloud services through secure routing paths
• Established network segmentation to protect identity, server, and endpoint tiers

​

Scope: Segmented production network supporting multi-department operations

ENTERPRISE NETWORK  ARCHITECTURE

HYBRID IDENTITY ARCHITECTURE

Established hybrid identity model bridging on-prem Active Directory with Azure AD and Microsoft 365.

​

• Managed Azure AD Connect synchronization and directory consistency
• Governed identity lifecycle processes including provisioning and deprovisioning
• Supported conditional access enforcement for secure authentication
• Maintained centralized role-based access control across cloud and on-prem systems

​

Scope: Unified identity governance across hybrid infrastructure

SERVER  ROOM AND  INFRASTRUCTURE  LAYOUT

Maintained physical infrastructure supporting core network and identity services within production rack environment.

​

• Organized rack layout including patch panels, switching hardware, and server placement
• Managed structured cabling standards to ensure service reliability
• Maintained UPS-backed power continuity for critical systems
• Supported hardware lifecycle and environmental stability monitoring

​

Scope: Physical infrastructure ensuring operational continuity

IT OPERATIONS

End poit deployment.png

ENDPOINT DEPLOYMENT FRAMEWORK

Established a standardized endpoint provisioning workflow to ensure configuration consistency, security baseline enforcement, and operational readiness across managed devices.

 

• Designed and executed structured imaging process for Windows endpoints aligned with enterprise configuration standards

​

• Enforced domain join and Group Policy application to maintain access control and policy compliance

​

• Integrated asset tagging and centralized inventory logging to support traceability and audit accountability

 

Scope: Repeatable and controlled device deployment supporting production operations

INCIDENT MANAGEMENT SEVERITY MATRIX

incident managment matrix.png

Implemented a structured severity classification model to ensure prioritized response and controlled escalation across production systems.

 

• Defined incident impact levels aligned to business risk and service availability

 

• Established clear response time objectives and escalation pathways

 

• Standardized triage procedures for infrastructure, identity, and endpoint incidents

 

• Documented resolution outcomes to reduce recurrence and improve operational stability

 

Scope: Production environment requiring controlled incident response and minimized service disruption

Screenshot 2026-03-02 at 4.39.23 PM.png

ASSET  LIFECYCLE  GOVERNANCE

Owned end to end asset lifecycle management to ensure accountability, audit readiness, and controlled infrastructure refresh cycles.

​

• Implemented structured procurement and asset registration standards
• Maintained centralized inventory with ownership and location tracking
• Conducted periodic reconciliation audits to prevent asset drift
• Managed hardware refresh planning and secure decommissioning procedures

​

Impact: Reduced untracked assets, improved audit confidence, and strengthened infrastructure cost visibility

IT GOVERNANCE

ROLE  BASED  ACCESS  CONTROL FRAMEWORK

ROLE BASED ACCESS COTROL STUCTURE.png

Implemented structured access governance model aligning permissions to job roles to reduce risk and maintain least privilege across production systems.

​

• Defined Organizational Unit structure to separate departments and security boundaries
• Managed security group based access assignment to prevent direct user permission sprawl
• Standardized onboarding and offboarding workflows to eliminate privilege drift
• Supported periodic access reviews to reduce overprivileged accounts and improve audit readiness

​

Scope: Centralized identity governance across directory services and business critical resources

©2019 by My Site. Proudly created with Wix.com

bottom of page