Order from us for quality, customized work in due time of your choice.
I was the first among my friends and neighbors to get a computer around the age of 10. I can recall the glee and childish exuberance surrounding every aspect of my being on that morning my mother arrived from England. I was just elated seeing the Hewlett parked logo at boot up, then the black screen with white lettering long before I knew it was called dos loaded. This was my first experience with anything called computing and from day one I fell in love with this object that became the center of my attraction. Today that love and desire to advance in my knowledge and fulfill my passion has not abated. Â
Since my first interaction with the computer until now, I am constantly intrigued by the capabilities, advancement, and rate of change within computer systems and networks. My passion in computing is to improve business processes and systems by utilizing applications, devices, smart integration through API, etc. to enhance productivity. This trend stirred me to study Management Information Systems for my undergraduate degree. I studied courses like Applied program development, Database Management, Enterprise Architecture, and System Analysis Methods. These helped me gain a solid understanding of computer systems in the enterprise. Â
I was hired as an assistant project manager for a doctors office and I was tasked with digitizing paper records. This project was part of a larger organizational conversion to an electronic medical records system which I ended up inheriting and piloting to the end. I later took the position of health information manager and I documented and trained staff for this purpose. This job gave me an opportunity to practice what I was studying. Â
I have worked as a Field Engineer and Technical operations lead for a myriad of projects in local government, medical, and SMB.  Â
However, in the enterprise, I quickly learned that such smart processes preclude the element of security and the threat of breach and hacking is still a major concern. I developed an ardent interest in this area, and I sought to understand the methods behind the breaches, how to counter them, and how to prevent future occurrences. Â
As a Messaging Engineer with Smith and Nephew Inc., I was responsible for URL security and web browser protection. This brought me front and center with the prevalent threat of phishing and other emerging internet threats. This required constant research, analysis, and documentation for training level 1 and 2 support and also for reporting to my superiors. Another aspect of my job required me to team up with information security, Microsoft Engineers, and ForcePoint Engineers to formulate and program DLP and other security policies for Office 365. This inoculated me against the work-alone mentality and allowed me to interact with colleagues, senior management, and High-level engineers alike. It also helped me to accept new challenges and I gain expertise in problem-solving by harnessing existing resources, talents, and everyday concepts.Â
Now my desire is to matriculate and undertake a study in Cyber Security and Leadership for my next frontier. I will be greatly honored if I am offered the opportunity to join this program. As a Level 3 Network Specialist for a US local government agency, I believe this program will provide me with the armamentarium to successfully combat and thwart current emerging threats facing us today. I also desire to take this knowledge back home to Ghana where I will set up a consultancy firm to facilitate sharing this knowledge among young students and proctor them to the world stage. Thank you for your consideration.Â
Order from us for quality, customized work in due time of your choice.