Innovative, forward-thinking executive offering over 15 years of success in various leadership roles in the areas of Information Technology consulting, customer support, pre-sales engineering, and global business development.
Expert in strategic and tactical planning, client relationship management (CRM), corporate governance, and change management.
Professional specialist in Cybersecurity, some of my responsibilities are to be in charge of the privacy and total data protection of companies and organizations, as well as guaranteeing the main users that their personal devices are perfectly protected to deal with the cyber attacks at all times.
Skilled in the areas of enterprise data warehousing, and data analytics. Motivated and eager to advance my career with a growth-oriented, technically-advanced organization as a Chief Information Officer. Analytical, accomplished, professional Business Intelligence (BI) Analyst and Developer with experience in multifaceted roles requiring project management, business development, and solutions architecture.
Hands-on, successful Software Engineer leading teams in delivering appropriate technology solutions for desktop and mobile products.
Innovative change agent with a unique mix of high-level technology direction and deep technical expertise.
Organize, define IT programs and strategies, provide technological support to computer equipment, network and server, through the administration of technological infrastructure and computer systems.
Organize, supervise and evaluate the training and updating activities of the teaching staff, promoting training and development according to the needs of the Faculty, as well as coordinating the evaluation process of the teaching staff.
Committed to provide an updated and excellent technological service. 15 years as a mac and pc specialist, Providing an ethical and professional service of excellence, personalized treatment to each of our clients. Honesty, leadership, forward-thinking, transparency and integrity at all times.
Develop different functions, such as system architect or administrator, risk manager, ethical hacker or other malware analysis activities, computer forensics, incident management, development and use of detection tools, monitoring and analysis as well as others related to research and innovation.
Manage material, human and financial resources in a rational and efficient manner, monitoring the use of budget resources and supervising the assigned assets of the D.S.P.M.
Provide all Departments of the Directorate, in the implementation of automated systematic controls that allow the generation of clear, timely and truthful information.