Impact highlights across analysis, service delivery, and product increments.
Cut recurring incidents by ~20% with runbooks, knowledge articles, and clearer escalation paths.
Sustained ~95% satisfaction across 100+ users via faster triage, clearer comms, and targeted training.
Improved request throughput by streamlining boards, tightening AC, and reducing UAT rework.
Lowered test escapes by capturing edge cases early and aligning test data to real scenarios.
Increased trust in reports with standardized SQL validation and reconciliation across environments.
Reduced config defects by standardizing change templates and peer checks, lifting first‑pass success on deployments.
Secured 100+ endpoints via updates and cybersecurity best practices to strengthen organizational posture.
Performed assessments, patching, and remediation to reduce system and network risk exposure.
Enforced least‑privilege access with IAM and Active Directory controls to align security with usability.
Maintained traceability matrices, test reports, and defect logs to ensure full SDLC coverage and transparency.
Executed API and database testing to verify data integrity and end‑to‑end behavior across applications.
Instituted risk‑based testing, end‑to‑end traceability, and pre‑release quality gates aligned to security standards to reduce defect and security‑escape risk across releases.
Requirements, process modeling, Excel analytics, capstone scenarios.
ITSM, sysadmin, networking, cybersecurity, troubleshooting.
Foundations of ITSM, value co‑creation, ITIL 4 practices.
Foundational study of NIST‑aligned risk management and control baselines for secure operations.
Security principles, access controls, network security, security operations, and incident response
Web app security, vulnerability mitigation, secure SDLC.
Intro to networks, cloud infrastructure, distributed paradigms.