During my professional career, I handled numerous technical, maintenance, and computer support issues for corporate and branch locations. In particular, I configured and set up hardware, software, and peripherals and diagnosed and troubleshot problems relating to local area network (LAN). I also worked with virus protection software and utility programs, ensuring that company policies and procedures were followed and that each new aspect addressed technical advancements.
Technical Support: Provide first and second-level technical support to end-users, resolving hardware and software issues in a timely and effective manner. This includes troubleshooting and solving problems related to desktops, laptops, printers, mobile devices, and software applications.
User Assistance: Assist end-users with IT-related queries, including password resets, account setups, and configuration of devices and applications.
Remote Support: Provide remote assistance to users working off-site, ensuring that they have the necessary tools and connectivity to perform their tasks.
Hardware and Software Maintenance: Maintain, repair, and upgrade computer hardware and peripherals. Install, configure, and update software applications as needed.
Network Support: Troubleshoot and resolve network connectivity issues, including wired and wireless connections. Assist in configuring routers, switches, and firewalls.
System Monitoring: Monitor the performance of IT systems, identify and address potential issues before they cause disruptions, and maintain system backups.
Documentation: Maintain accurate records of hardware and software inventory, user accounts, and support requests. Create and update user manuals and knowledge base articles.
Security: Ensure the security of IT systems by implementing security protocols, monitoring for security breaches, and assisting in the implementation of cybersecurity measures.
Collaboration: Collaborate with other IT professionals and teams to support larger IT projects and initiatives, such as system upgrades, migrations, and deployments.
Vendor Management: Manage relationships with external vendors and service providers, ensuring the timely delivery of services and support.
Training and Education: Conduct user training sessions to improve end-users' IT skills and knowledge. Keep up-to-date with the latest technology trends and certifications.
Server and Network Management:
Install, configure, and maintain servers, including web servers, database servers, and file servers.
Manage network devices such as routers, switches, and firewalls to ensure connectivity and security.
Operating System Maintenance:
Administer and update operating systems (e.g., Windows, Linux, or macOS) on servers and workstations.
Perform patch management and system updates to address vulnerabilities and ensure stability.
User Account Management:
Create and manage user accounts, access permissions, and security policies.
Troubleshoot user account issues and provide technical support to end-users.
Backup and Disaster Recovery:
Implement and maintain backup and recovery solutions to protect data and ensure business continuity.
Develop and test disaster recovery plans and procedures.
Security Management:
Monitor systems for security threats and vulnerabilities.
Implement and maintain security protocols, firewalls, and antivirus software.
Respond to security incidents and conduct forensic analysis when necessary.
Hardware and Software Support:
Troubleshoot hardware and software issues, diagnose and resolve technical problems.
Install, configure, and update software applications and utilities.
Performance Optimization:
Monitor system performance and make adjustments to optimize performance and resource utilization.
Identify and resolve bottlenecks and issues affecting system efficiency.
Documentation and Reporting:
Maintain detailed documentation of system configurations, procedures, and troubleshooting steps.
Generate reports on system performance, security, and compliance.
Compliance and Policy Adherence:
Ensure compliance with IT policies, industry regulations, and data protection laws.
Keep systems up to date with the latest security patches and best practices.
Installation and configuration of Desktops and laptops.• Installation and configuration of Apple Desktops and laptops.• Installed and configured software and hardware.• Installation and re-programing of WIFI Routers.• Front desk support at customers’ homes.
Maintained current software licenses and patched applications to stay up to date with latestfeatures.• Responded to queries on phone, via email or through IT ticketing system.• Managed network security and filtering settings.• Set up and maintained Firewall servers.• Installed and configured software and hardware.• Configured hardware, devices and software to set up workstations for employees.• Removed malware, ransomware and other threats from laptops and desktop systems.• Maintained servers and systems to keep networks fully operational during peak periods.• Worked with software development team on reported errors and bugs on newly releasedsoftware and assisted in deployment of release fixes
Maintained current software licenses and patched applications to stay up to date with latestfeatures.• Responded to queries on phone, via email or through IT ticketing system.• Managed network security and filtering settings.• Set up and maintained Firewall servers.• Installed and configured software and hardware.• Configured hardware, devices and software to set up workstations for employees.• Removed malware, ransomware and other threats from laptops and desktop systems.• Maintained servers and systems to keep networks fully operational during peak periods.• Worked with software development team on reported errors and bugs on newly releasedsoftware and assisted in deployment of release fixes.
Encrypt data transmissions and erect firewalls to conceal confidential information as it isbeing transmitted and to keep out tainted digital transfers.• Review violations of computer security procedures and discuss procedures with violatorsto ensure violations are not repeated.• Monitor use of data files and regulate access to safeguard information in computer files.• Monitor current reports of computer viruses to determine when to update virus protectionsystems.• Modify computer security files to incorporate new software, correct errors, or changeindividual access status.• Perform risk assessments and execute tests of data processing system to ensure functioningof data processing activities and security measures.• Coordinate implementation of computer system plan with establishment personnel andoutside vendors.