Identified the systems in place and met with every department to understand their business process.
Established a cohesive relationship with their software and hardware vendors to begin to adapt to their technology needs.
Enhanced their environment’s server infrastructure with virtualization and high‑availability server and network components.
Worked with each employee and manager to facilitate workflow.
Identified processes that could be outsourced to cloud‑based service providers for server‑intensive and security‑sensitive roles such as email and off‑site storage.
Added several aspects of security to reduce exposure to risk and worked with processes and procedure to satisfy their Cyber Security audit responses.