My Portfolio

Projects That Deliver Real Impact

Strategic execution across infrastructure, security, and agile transformation.

Led IT initiatives for 15+ years, delivering system upgrades, security rollouts, and agile execution with clarity, collaboration, and measurable impact

Branch Office Thin Client Replacements

I led a multi-site infrastructure refresh across 25+ branch and satellite offices, replacing legacy thin clients with secure, high-performance devices. Each location supported ~10 users, requiring precise coordination for hardware deployment, configuration, and testing. To ensure seamless execution, all accessories and tools were pre-shipped, and decommissioned assets were securely returned with updated inventory records. The project involved close collaboration with vendors, office contacts, and facilities teams to manage logistics, installation, and disposal. I also developed and managed Statements of Work (SOWs) to ensure vendor compliance, timely execution, and accurate payment approvals.
TOP

Challenged I Faced

Coordinating a phased rollout across more than 25 geographically dispersed branch offices demanded meticulous scheduling and logistical oversight. Each location presented unique constraints, including limited technician availability, varying operational hours, dependencies on local facilities teams, and blackout periods due to regional events. Delays at any single site had the potential to create a cascading effect, impacting the overall project timeline. Furthermore, rescheduling with local vendors in response to such delays sometimes necessitated formal modifications to the Statement of Work (SOW), introducing additional administrative and contractual considerations with varying approval processes.

Securely decommissioning and disposing of legacy devices involved strict adherence to data protection standards (e.g., NIST 800-88, GDPR, CCPA). Ensuring that all devices were properly wiped, documented, and destroyed required rigorous quality control and audit-ready documentation. Any lapse could result in compliance violations or data breaches.

This type of initiative involved multiple internal and external stakeholders, including IT, Finance, Procurement, Facilities, local office managers, and third-party vendors. Aligning expectations, maintaining clear communication, and managing change requests across these groups was complex. Misalignment or lack of engagement from any stakeholder group led to delays or scope creep.

Business Value & Outcomes

Branch Office Canon Copier Replacements

This copier infrastructure refresh project involved the strategic decommissioning of legacy copier devices across multiple office locations, each with distinct lease renewal timelines. Decommissioning activities were carefully aligned with lease schedules to optimize asset lifecycle management and minimize contractual exposure. The initiative included the installation and configuration of new Canon multifunction devices to enhance performance, reliability, and user experience. Network printing and scanning services were reconfigured to ensure seamless integration with the updated hardware environment. As part of the data protection protocol, copier hard drives were securely disposed of in compliance with applicable standards. Asset inventory records and lease documentation were updated to reflect hardware transitions and decommissioning activities. Throughout the project, coordination with local vendors and facilities teams was maintained to manage delivery logistics, installation scheduling, and on-site troubleshooting, ensuring smooth execution across all locations.

Challenged I Faced

Managing decommissioning activities across multiple office locations, each with distinct lease renewal schedules, requires precise coordination. Aligning hardware removal with lease expirations to avoid early termination fees or extended lease costs can be complex, especially when dealing with third-party leasing companies and local site constraints.
Installing and configuring new Canon multifunction devices while reconfiguring network printing and scanning services demands careful planning to avoid downtime. Ensuring that users across all locations experience a smooth transition without loss of functionality or productivity—especially in high-volume environments—can be a significant challenge.
The success of delivery logistics, installation scheduling, and on-site troubleshooting hinges on effective collaboration with local vendors and facilities teams. Delays or miscommunication in these areas can impact timelines and user satisfaction. Coordinating multiple stakeholders while maintaining consistent standards across locations adds complexity to execution

Business Value & Outcomes

Headset and Camera Deployment

The scope of the project included identifying compatible headset and camera models that met both technical requirements and budget constraints. Procurement activities involved tracking equipment shipments and ensuring timely delivery to designated locations. Installation services were coordinated to align with site readiness and user availability. Compatibility testing was conducted to ensure seamless integration with existing hardware and software environments. Additionally, asset inventory systems and support documentation were updated to reflect the deployment of new devices, ensuring accurate tracking and ongoing support.

Strategic Oversight

Procurement & Compatibility Management

Advance Logistics & Installation Scheduling

Site Readiness & Walkthroughs

Asset Management & Documentation

Challenged I Faced

Identifying headset and camera models that meet both technical requirements and budget limitations can be challenging, especially when dealing with diverse user needs, existing hardware environments, and rapidly evolving technology. Ensuring compatibility across platforms while staying within financial boundaries requires careful evaluation and stakeholder alignment
Tracking shipments, aligning installation services with site readiness, and ensuring user availability across multiple locations can be complex. Delays in delivery or misalignment with installation schedules may lead to disruptions, underutilized resources, or user dissatisfaction.
Updating asset inventory systems and support documentation to reflect new deployments is critical for long-term maintenance and troubleshooting. Incomplete or inaccurate records can hinder support teams, complicate warranty claims, and impact future upgrade planning.

Business Value & Outcomes

Laptop Refresh, Updates, and New Requests

This laptop refresh initiative was strategically aligned with the organization’s enterprise IT roadmap, security standards, and workforce enablement objectives (Project Integration Management). The project scope included the procurement, configuration, deployment, and documentation of new laptops and supporting accessories across multiple business units (Project Scope Management). Stakeholder alignment was secured across IT, procurement, HR, and departmental leadership to ensure unified execution and governance (Project Stakeholder Management). Procurement activities were managed in coordination with CDW, including tracking laptop orders, delivery timelines, and inventory levels for associated peripherals such as docking stations, adapters, and monitors. A centralized procurement tracker was created and maintained to monitor shipments and site-level assignments, ensuring alignment with budget forecasts and technical specifications (Project Procurement Management and Project Cost Management). All laptops were shipped to headquarters for standardized imaging, configuration, and quality assurance testing. This included validation of hardware components, drivers, enterprise software, encryption protocols, and remote management tools. Configuration standards were documented to ensure consistency across all devices (Project Quality Management). Proof-of-concept (POC) testing was conducted for newly acquired laptop models to evaluate performance, compatibility, and user experience under real-world conditions. Feedback from pilot users informed adjustments to procurement and configuration plans (Project Resource Management and Project Risk Management). Deployment services were scheduled based on site readiness and user availability. Configured laptops and accessories were shipped to branch offices or directly to end users, with confirmation of receipt and functionality post-deployment (Project Time Management). All deployed assets were logged in the asset management system, including serial numbers, user assignments, and physical locations. Returned or repurposed devices were tracked and coordinated for secure storage or disposal. Real-time updates to asset records ensured inventory accuracy, and documentation was maintained for setup procedures, support contacts, and warranty details (Project Communications Management). This initiative delivered measurable Business Value & Outcomes by improving user productivity through faster, more reliable devices; enhancing security via standardized configurations and encryption; enabling operational consistency across the enterprise; supporting scalability for onboarding and remote work; reducing maintenance costs through proactive refresh planning; and increasing inventory transparency through real-time tracking and documentation.

Challenged I Faced

Coordinating large-scale procurement through CDW, tracking shipments, and maintaining inventory accuracy for laptops and accessories requires meticulous planning. Centralized imaging and configuration at headquarters adds complexity, especially when balancing throughput, quality assurance, and timely deployment to remote sites or end users.
Standardizing configuration and validating compatibility across various hardware/software environments is critical but challenging. Proof-of-concept testing and pilot feedback loops must be managed effectively to avoid widespread issues post-deployment. Additionally, ensuring that all users receive properly configured devices with minimal disruption requires tight coordination and responsive support.

Business Value & Outcomes

Improved Productivity
Faster, more reliable laptops enhance user efficiency and satisfaction
Enhanced Security
Standardized configurations and encryption reduce risk and support compliance
Operational Consistency
Uniform hardware and software environments simplify support and reduce downtime
Scalability
Supports onboarding, role changes, and remote work with flexible deployment options
Cost Efficiency
Reduces maintenance costs and extends lifecycle through proactive refresh planning
Inventory Transparency
Real-time tracking with CDW and accurate asset records improve accountability

Duo Mobile MFA Implementation

The scope of this project involved the comprehensive integration of Duo Mobile with the organization’s enterprise applications and systems to enhance security and streamline authentication processes. Key activities included enrolling users into the Duo platform and configuring authentication policies that aligned with organizational requirements and security protocols. The project also encompassed coordinating training sessions and providing ongoing support to ensure a smooth transition and user adoption. Deployment progress and adoption rates were actively tracked to monitor success and identify areas for improvement. Additionally, the project ensured full compliance with both internal security policies and external regulatory standards, maintaining a secure and reliable authentication environment across the enterprise.

Strategic Oversight

Planning & Execution

User Enrollment & Support

Testing & Validation

Vendor Coordination

Asset & Inventory Management

Challenged I Faced

Enrolling users into Duo and ensuring they complete setup correctly can be time-consuming and prone to resistance, especially in large or decentralized organizations. Varying levels of technical proficiency, device compatibility issues, and reluctance to adopt new authentication methods can slow down deployment and impact adoption rates.
Configuring authentication policies that meet security standards while maintaining a smooth user experience is a delicate balance. Overly strict policies may frustrate users or disrupt workflows, while lenient configurations could compromise security. Achieving consensus among security, IT, and business stakeholders adds complexity.

Ensuring compliance with internal and external security standards requires meticulous documentation, regular audits, and alignment with regulatory frameworks. Simultaneously, tracking deployment progress and adoption metrics across systems and user groups demands robust reporting tools and coordination, especially when integrating with multiple enterprise applications.

Business Value & Outcomes

Enhanced Security
Reduces risk of unauthorized access and credential-based attacks
Compliance Assurance
Meets regulatory requirements for strong authentication
Operational Resilience
Protects remote access, cloud apps, and privileged accounts
User Trust
Builds confidence in secure access to systems and data
Scalability
Supports future expansion and integration with additional platforms

Office Transitions & Infrastructure Management

This enterprise-wide initiative involves the strategic closure, relocation, renovation, and setup of office locations across the US and internationally A critical component includes the relocation and setup of IT closets, which requires meticulous planning to ensure continuity of operations, data integrity, and infrastructure readiness

Project Management Responsibilities

The Project Management (SPM) leads the planning and execution of all office transitions, focused on IT closet moves and infrastructure readiness

Planning and Assessment

Inventory & Documentation
Create a comprehensive inventory of all IT equipment (servers, switches, routers, firewalls, storage). Include manufacturer, model, serial number, and condition
Infrastructure Audit
Assess new site readiness—space, power, HVAC, humidity, outlets, and network ports
Network Mapping
Document current physical and logical network layout, including IP schema and DNS settings
New Layout Design
Mark up floor plans to reflect new IT closet layout, rack positioning, and cable routing
Vendor & Landlord Coordination
To ensure a seamless office transition, I proactively notified ISPs, phone carriers, and equipment lessors 2–3 months in advance. I coordinated lease terminations, renewals, and site access logistics with landlords, while drafting and managing Statements of Work (SOWs) for movers, cabling vendors, and disposal services—ensuring all contractual obligations and operational timelines were met.
Timeline & Milestones
Develop a detailed project plan with assigned responsibilities and contingency plans
Asset Review
Identify aging equipment for upgrade or disposal Plan secure data wiping and recycling
Staff Communication
Inform employees of move timelines, expected downtime, and escalation protocols

Preparation and Backups

Disaster Recovery Planning
Prepare contingency plans for system restoration
Site Readiness
Ensure new IT closet has power, cooling, cabling, and connectivity
Labeling & Documentation
Use color-coded labels for cables and devices Document rack positions and cable endpoints
Moving Supplies
Procure anti-static bags, foam padding, server crates, and rubber-wheeled dollies

Moving Day Execution

Final System Checks
Validate system health before shutdown
Secure Shutdown & Disconnect
Follow protocol to power down and disconnect labeled equipment
Safe Transport
Use climate-controlled vehicles and insured movers
Inspection Upon Arrival
Unpack and inspect all equipment before reinstallation

Post-Move Validation

Installation & Setup
Reinstall equipment per new layout and reconnect cables
Testing & Validation
Confirm full operational status—network, servers, phones, applications, and security
Documentation Updates
Revise network diagrams, asset records, and inventory systems
Troubleshooting
Have IT staff on-site to resolve issues
Post-Move Review
Conduct feedback sessions and document lessons learned

Challenged I Faced

Managing closures, relocations, and renovations across both domestic and international office locations involves intricate scheduling, vendor coordination, and regulatory compliance. Each site may have unique constraints—local laws, building codes, lease agreements, and cultural considerations—that require tailored planning and execution.

Relocating and setting up IT closets is a high-risk activity that demands meticulous planning to avoid service disruptions. Ensuring data integrity, network availability, and infrastructure readiness during transitions—especially across time zones and varying technical environments—can be challenging and requires close collaboration with IT teams and vendors.

With multiple stakeholders involved—facilities, IT, business units, landlords, and external vendors—keeping everyone informed and aligned is critical. Miscommunication or misalignment on timelines, responsibilities, or technical requirements can lead to delays, cost overruns, or operational disruptions.

Business Value & Outcomes

Operational Continuity
Minimizes downtime and ensures seamless transitions
Cost Efficiency
Optimizes lease agreements, consolidates infrastructure, and reduces overhead
Asset Optimization
Improves tracking, reuse, and disposal of IT assets
Security & Compliance
Ensures secure handling of sensitive equipment and data
Scalability
Prepares infrastructure for future growth and hybrid work models
 

Let’s Build What’s Next

From infrastructure refresh to agile transformation—your next project deserves clarity, speed, and measurable success.