...

DOMINIC ALI

I am proficient at

IT Program Management. Information Security Governance. IT Service Management. Supply Chain Management. Relationship Management.

About

DOMINIC ALI

My professional goal, driving force and aspiration for my career are to continue aligning information technology with enterprise business objectives and goals while maintaining confidentiality, integrity, and availability. I am proud of my extensive knowledge in IT governance, cybersecurity management, risk assessment, regulatory compliance, and information technology management, which has allowed me to establish a successful reputation for producing valued results across different industry sectors. 

I use my experience as a goal-driven IT leader to manage IT-related initiatives, including establishing and implementing strategic directions, finding economical solutions, and supporting IT systems to fulfill company demands and goals. As a result, I was able to accomplish the respective career goals by utilizing my technical knowledge and creative leadership proficiencies:

✓ Improved program processes by Defining, Measuring, and Analyzing (DMAIC) complex problems using the Lean Six Sigma methodology, eliminating over 17% waste across production critical policies and procedures.

✓ Acquired ISO 27001 certification by proposing, implementing, and managing the ISO 27001 information security management system and performed quarterly and annual evidence-based audits.

✓ Managed steering committee to deliver strategic leadership in information security compliance programs such as PCI, COBIT, NIST CSF, and others to achieve security objectives and enhance client services.

✓ Developed, implemented, and managed an IT Service Management system functioning across several departments and programs such as IT Support, Asset Management, IT Systems, Client Engagement, Human Resources, Knowledge Management, and more. 

✓ Implemented an onboarding ITSM-based workflow for new hires that decreased the time to hire by 30% and increased the onboarding satisfaction score by 15%.

✓ Researched and developed a supply chain to refresh and streamline the deployment of 2000+ hardware kits to seasonal medical coders in less than four weeks, resulting in quarterly savings of $103,000.

In today’s highly advanced professional environment, I am inclined to use my comprehensive skills to achieve business success through proven client satisfaction! So let’s connect if my credentials sparked your interest. You can contact me at hello@dominicali.co or below in the contact box.

I look forward to collaborating!

Skills

What I Do

EXPERIENCE

My Journey

2008 – 2022

Experience

DIRECTOR OF INFORMATION SECURITY

MICROSOFT (Contract) | REMOTE | SEPT 2019 – PRESENT
Jun 2020 - Present

As the Director of Information Security, I initiate and implement an information security program by reviewing information security needs, priorities, and opportunities. I direct the security strategy, risk management, vulnerability assessments, and change management to prevent and remediate system issues while reinforcing security policies using leading security technologies. Additionally, I administrate various systems and solutions to monitor and enhance security posture to align with business objectives, increasing overall productivity and boosting daily operations. I deliver strategic leadership in information security compliance programs such as PCI, COBIT, ISO 27001, NIST CSF, and others to achieve security objectives and enhance client services. Moreover, I serve on the governance board by setting the IT goal, monitoring operations, and deciding on IT investments, pricing, and product strategies.

Sr. IT PROGRAM MANAGER

MICROSOFT (Contract) | REMOTE | JUL 2017 – SEPT 2019
2

I have worked as a Sr. IT Program Manager, progressively enhancing performance, IT operations, and security by developing, preparing, and monitoring the IT budget across CapEx and OpEx vectors for multiple Microsoft programs. I utilize a business intelligence data-driven methodology to analyze and determine the standard distribution of low, medium, high, and critical service levels. In addition, I enforce a three-sigma policy based on standard deviation, trend-spotting scatterplots, and correlation-finding matrices. I introduce a multi-year IT plan with definitive goals and key performance metrics to guarantee alignment of our strategy, goals and objectives, mission, and vision. Flourish strong connections with executive management, board leadership, and other stakeholders to fully grasp the organization's IT needs and strategic direction while remaining aligned with business goals. Finally, I undertake service governance and apply metrics to services to track performance against KPIs and OLAs, deliver information security services within agreed-upon service standards with customers and dependent IT teams, and negotiate Service Level Agreements (SLAs).

Key Achievements:
✓ Improved program processes by Defining, Measuring, and Analyzing (DMAIC) complex problems using the Lean Six Sigma methodology, eliminating over 17% waste across production critical policies and     procedures.
✓ Operated as a Security Officer, offering guidance on information security and risk management, maintaining safety and security.

Sr. IT PROJECT MANAGER

MICROSOFT (Contract) | REMOTE | AUG 2015 – JUL 2017
3

At Microsoft, I assumed the position of the key point of contact for major and interrelated IT projects on several rapidly expanding programs conveying project needs and scope to all stakeholders. I handled daily activities, project timelines, presentations, deliverables, security-related documentation, risk analysis, and IT governance for all workflows.
I also oversaw the entire project lifecycle and operations for the IT service management system integration; this included hiring and managing IT staff to support multiple programs (remote and onsite), building and implementing an Information security management system, and engaging all departments to develop ITSM workflows. I integrated and arranged the programs' transition from outsourced vendor hardware solutions to an in-house asset management shipping and receiving department. In addition, I restructured ITSM security workflows to comply with ITIL and ISO 27001 governance frameworks. Finally, I leveraged my technical acumen to initiate project integrations and migrations for VolP, MFA, ITSM, and 3rd party software solutions for multiple programs.

Key Achievements:
✓ Acquired ISO 27001 certification by proposing, implementing, and managing the ISO 27001 information security management system and performed quarterly and annual evidence-based audits.
✓ Developed, implemented, and managed an IT Service Management system functioning across several programs and departments such as IT Support, Asset Management, IT Systems, Client Engagement, Human Resources, Knowledge Management, and more.

IT SUPERVISOR

CHANGE HEALTHCARE | WESTON, FL | APR 2013 – JUL 2015
4

As an IT Supervisor for Change Healthcare, I fostered a culture of dependable relationships, excellent customer service, and constant progress in directing IT initiatives. I successfully managed, trained, and hired a team of 17+ IT professionals. Additionally, I developed dependable relationships with key stakeholders by traveling to corporate acquisitions and collaborating with other departments to create IT plans aligned with business objectives. Further, I evaluated current systems and identified areas of improvement while recommending new technologies to improve efficiency. I also coordinated with external vendors and internal departments for system improvements, upgrades, and installations. As part of my role, I also developed detailed reports utilizing data from multiple systems to identify areas of opportunity for process improvement, scheduled regular maintenance on all IT systems, and monitored performance using automated tools. Finally, I defined, documented, and implemented all information security procedures to ensure the confidentiality, integrity, and availability of sensitive data.

Key Achievements:
✓ Led a team of 17+ IT professionals to support 2500+ onsite and remote users across 6 locations.
✓ Reduced service desk ticket volume by 27% within the first six months.
☆ Mentored, coached, and influenced a positive career culture for junior staff. Provided tools and guidance to excel in their desired fields.

SECURITY ADMINISTRATOR

ALTEGRA HEALTHCARE | MIAMI, FL | SEPT 2012 – APR 2013
5

As the security administrator, I developed and enforced security policies to ensure compliance with federal regulations. In addition, I Coordinated incident response efforts in the event of a security breach. Also, I monitored network activity for signs of intrusion, responded accordingly, and conducted regular audits of systems and networks to identify vulnerabilities. Further, I created user awareness training programs to educate employees on proper security. Lastly, I performed regular backups of systems and data to minimize the impact of security incidents.

APPLICATION SECURITY ENGINEER

ALTEGRA HEALTHCARE | MIAMI, FL | FEB 2010 – SEPT 2012
6

In my capacity as the application security engineer, I developed and led the implementation of multiple in-depth security audits that uncovered vulnerabilities and led to improved security protocols. I published comprehensive security reports detailing findings and recommendations to various stakeholders. In addition, I collaborated with IT and engineering teams to investigate and resolve incidents, including analyzing log data, packet captures, and system configurations. Finally, I established and maintained relationships with key vendors to ensure the timely resolution of security incidents.

Key Achievement:
✓ Successfully reduced the number of application vulnerabilities by 23% over a 6 month period

LEAD INFRASTRUCTURE / ASSET MANAGEMENT ENGINEER

ALTEGRA HEALTHCARE | MIAMI, FL | AUG 2008 – FEB 2010
7

As a Lead Infrastructure Engineer, I was accountable for engineers installing and upgrading desktop operating systems, troubleshooting hardware and software issues, deploying desktop images, managing Active Directory user accounts, groups, and computer objects, and training tier I and II service desk agents on IT hardware and software processes and standards. In addition, I was responsible for ensuring the organization's physical assets were well-maintained and adequately utilized. This includes developing and implementing policies and procedures related to asset management, conducting regular audits of assets, and working with other departments to ensure that all assets are accounted for and used efficiently and effectively.
Additionally, I assisted admins with other IT projects as needed. This position required deep knowledge of security policies, the ability to work independently and as part of a team, and strong analytical and problem-solving skills, which led to my promotion to Application Security Engineer.

Key Achievement:
✓ Researched and developed a supply chain to refresh and streamline the deployment of 2000+ hardware kits to seasonal medical coders in less than four weeks, resulting in quarterly savings of $103,000. The chain consisted of but was not limited to, vendor management, client tracking (SaaS), hardware imaging, calculated boxing dimensions, color-coated hardware packaging, preventative maintenance, and documentation such as AUPs, instructions (QR Codes), and support.

EDUCATION

Degrees

MASTER OF SCIENCE

CYBERSECURITY MANAGEMENT
1

Purdue University Global

BACHELOR OF SCIENCE

BUSINESS ADMINISTRATION, INFORMATION TECHNOLOGY MANAGEMENT
2

Western Governors University

Contact

Let's Connect

DOMINIC ALI

DIRECTOR OF INFORMATION SECURITY

IASSC® Lean Six Sigma Green Belt™ (ICGB)

The recipient of this certification will have demonstrated an ability to understand detailed Value Stream Maps, identify areas of waste (with an in-depth look at the sources of defects and the associated quality issues), and will also apply Lean Six Sigma tools (including statistical analysis) to reduce the sources of waste and verify the effectiveness of their solutions.

AWS Certified Cloud Practitioner

Earners of this certification have a fundamental understanding of IT services and their uses in the AWS Cloud. They demonstrated cloud fluency and foundational AWS knowledge. Badge owners are able to identify essential AWS services necessary to set up AWS-focused projects.

Certified Data Privacy Solutions Engineer™ (CDPSE™)

The CDPSE certification is focused on the technical implementation of privacy solutions and privacy-enhanced design. CDPSE holders are integral to an organization’s privacy program and can facilitate a common understanding of best practices throughout the organization.

Certified in Risk and Information Systems Control™ (CRISC)

CRISC is the only certification that positions IT professionals for future career growth by linking IT risk management to enterprise risk management, and positioning them to become strategic partners to the business.

Certified in the Governance of Enterprise IT® (CGEIT)

CGEIT recognizes a range of professionals for their knowledge and application of enterprise IT governance principles and practices.

Certified Information Systems Auditor® (CISA)

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

COBIT® 2019 Foundation

Earners of the COBIT 2019 Foundation Certificate have successfully demonstrated a comprehensive knowledge of the COBIT 2019 principles, concepts and methodologies used to establish, enhance and maintain a system for effective governance and management of enterprise information and technology.

CompTIA A+ ce

Earners of the CompTIA A+ certification are proven problem solvers who are able to perform critical IT support tasks including device configuration, data backup and recovery, and operating system configuration. CompTIA A+ certified professionals have demonstrated baseline security skills for IT support roles and are able to detect and remove malware, address privacy concerns, and troubleshoot core service challenges.

CompTIA CySA+ ce

Earners of the CompTIA CySA+ certification have the skills, knowledge, and ability to address security analytics, intrusion detection and response in order to identify attacks and defend networks. CompTIA CySA+ analysts have demonstrated the ability to perform data analysis and interpret the results to identify vulnerabilities, threats and risks to an organization and the skills to secure and protect the systems.

 

CompTIA Network+ ce

Earners of the CompTIA Network+ certification have the skills needed to troubleshoot, configure, and manage wired and wireless networks found in companies around the world. CompTIA Network+ professionals have demonstrated the ability to design and implement functional networks, configure, manage, and maintain essential network devices, implement network security, and troubleshoot network problems.

ITIL 4 ® Foundation

ITIL® 4 Foundation demonstrates this individual understands the key concepts of IT and digital service delivery including the key concepts, guiding principles and practices of ITIL® 4 for service management. They have a fundamental understanding of the modern organisation’s end-to-end operating model for the creation, delivery and continual improvement of technology-enabled products and services. They have an awareness of how cultural or behavioural principles benefits the wider organisation.

Microsoft Certified - Information Protection Administrator Associate

Earning the Information Protection Administrator Associate certification validates the skills and knowledge to plan and implement controls that meet organizational compliance needs. Candidates are responsible for translating requirements and compliance controls into technical implementation. They are responsible for creating policies and rules for content classification, data loss prevention, governance, and protection.

Microsoft Certified Azure Administrator Associate

Earning Azure Administrator Associate certification validates the skills and knowledge to implement, manage, and monitor an organization’s Microsoft Azure environment. Candidates have a deep understanding of each implementing, managing, and monitoring identity, governance, storage, compute, and virtual networks in a cloud environment, plus provision, size, monitor, and adjust resources, when needed.

Program Management Professional (PgMP)®

Earners of the globally-recognized Program Management Professional (PgMP) have demonstrated their extensive knowledge and mastery of program management concepts, tasks, and techniques that are applicable across virtually any industry and methodology. Earners have demonstrated the ability to manage multiple, related projects and navigate complex activities that span functions, organizations, regions or cultures and to align results with organizational goals.

Professional Scrum Developer™ I (PSD I)

Those who earn the globally recognized Professional Scrum Developer I (PSD I) certification have demonstrated a fundamental level of professional software development, proving an understanding of the Scrum framework and how to work as part of a Scrum Team. This individual has also demonstrated an understanding of building useful and valuable Increments every Sprint and applying contemporary software engineering practices and tooling.

Professional Scrum Master™ I (PSM I)

Those who earn the globally recognized Professional Scrum Master I (PSM I) certification have demonstrated a fundamental level of Scrum mastery, including the concepts of applying Scrum, and proven an understanding of Scrum as described in the Scrum Guide. This individual has also demonstrated a consistent use of terminology and approach to Scrum.

Professional Scrum Product Owner™ I (PSPO I)

Those who earn the globally recognized Professional Scrum Product Owner I (PSPO I) certification have demonstrated a fundamental level of Professional Scrum Product Ownership, proving an intermediate understanding of the Scrum framework and how to apply it to maximize the value delivered with a product. This individual has also demonstrated an understanding of how to maximize return on investment and optimize the total cost of ownership of a product.

Certified Associate in Project Management® (CAPM)

Earners of the globally-recognized Certified Associate in Project Management (CAPM) have demonstrated that they possess the knowledge in the principles and terminology of A Guide to the Project Management Body of Knowledge (PMBOK® Guide). Earners are able to apply the knowledge to on-the-job experiences that develop growing levels of competence in the practice of project management.

Professional Scrum Master™ II (PSM II)

Those who earn the globally recognized Professional Scrum Master II (PSM II) certification have demonstrated an advanced level of Scrum mastery and proven an understanding of the underlying principles of Scrum. This individual has also demonstrated the ability to effectively apply Scrum in complex, real-world situations.

PMI Agile Certified Practitioner® (PMI-ACP)

The PMI-ACP is evidence of your real-world, hands-on experience and skill as part of an agile team. It spans many approaches to agile such as Scrum, Kanban, Lean, extreme programming (XP), and test-driven development (TDD), not limiting a practitioner to one agile approach.

CompTIA Security+ ce

CompTIA Security+ certification is a global certification that validates the baseline skills you need to perform core security functions and pursue an IT security career.

Scaled Professional Scrum™ (SPS)

The Scaled Professional Scrum™ (SPS) certification validates your knowledge of using the Nexus Framework, representing the knowledge needed to enable multiple Scrum Teams to work from a single Product Backlog to build an Integrated Increment that meets a goal.

Project Management Professional (PMP)®

Project Management Professional® (PMP)

Earners of the globally-recognized Project Management Professional® (PMP) have demonstrated their extensive knowledge and mastery of project management concepts, tasks, and techniques that are applicable across virtually any industry and methodology. Earners are able to speak and understand the global language of project management. Individuals that earn this certification have demonstrated the knowledge and skills needed to initiate, plan, execute, monitor and control, and close a project.

Certified Information Security Manager® (CISM)

Certified Information Security Manager (CISM) is an advanced certification that indicates that an individual possesses the knowledge and experience required to develop and manage an enterprise information security (infosec) program.

Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.