Skip to content

Commit

Permalink
updating verbiage
Browse files Browse the repository at this point in the history
  • Loading branch information
Mark-at-IBM committed Mar 22, 2024
1 parent 5ba2987 commit 0b2efcd
Show file tree
Hide file tree
Showing 2 changed files with 57 additions and 52 deletions.
58 changes: 32 additions & 26 deletions files/2024_ibm_resume.yml
Original file line number Diff line number Diff line change
@@ -1,23 +1,27 @@
---
meta:
theme: "elegant"

# Basic Resume Info
# ================================================
basics:
name: Mark Reyes
label: Site Reliability Engineer
picture: https://raw.githubusercontent.com/mrreyes512/resume/master/my_profile.png
image: https://avatars.githubusercontent.com/u/6344935?v=4?s=460&u=38f220a2c9c658141804f881c334c594eb1642ac&v=4
email: [email protected]
phone: (512) 790-0901
# website: https://registry.jsonresume.org/mark_reyes
website: https://registry.jsonresume.org/mrreyes512
summary: |
As a proud Naval Veteran, I transitioned from four years of dedicated
service in the Navy as an IT to embark on a successful 14-year journey with
a major ISP in Austin.
a major ISP in Austin.
In my latest role as a Site Reliability Engineer within CIO's Network as a
Service team, I have shifted my efforts to optimizing operational efficiency
through automation. With a specialized focus on our team's Security
Compliance and alignment with CISO guidelines, I am dedicated to driving
excellence and ensuring seamless operations within the organization.
In my latest role as a Site Reliability Engineer within IBM, I have shifted
my efforts to optimizing operational efficiency through automation. With a
specialized focus on our team's Security Compliance and alignment with CISO
guidelines, I am dedicated to driving excellence and ensuring seamless
operations within the organization.
location:
postalCode: TX 78665
city: Round Rock
Expand All @@ -30,36 +34,36 @@ basics:
- network: GitHub
username: mrreyes512
url: https://github.com/mrreyes512/
# - network: JSON Resume
# username: mark_reyes
# url: https://registry.jsonresume.org/mark_reyes
# - network: JSON Resume
# username: mark_reyes
# url: https://registry.jsonresume.org/mrreyes512

# Work Experience
# ================================================
work:
- position: Site Reliability Engineer
company: IBM
name: IBM
website: https://www.ibm.com/careers
startDate: 2022-03-01
endDate: 2024-04-12
summary: |
As a Site Reliability Engineer within CIO's Network as a Service team, my
primary responsibility revolves around automating manual tasks that reduce
human time required for complex procedures or deployments.
As an SRE within CIO's Network as a Service team, my primary
responsibility revolves around automating manual tasks that reduce human
time required for complex procedures or deployments.
In my role as the team's Security Focal, I am dedicated to automating
Security Compliance requirements outlined by ITSS using the CISO/BISO
guidelines for Infrastructure Security Requirements. Over the past five
quarters, I have served as the trusted Technical Owner Delegate for our
team's Quarterly Security Assessments (formerly MSAC), consistently
achieving successful outcomes with minimal findings requiring attention.
For Application Security I designed a Jenkins Pipelines that followed the
Code Signing Service using Skopeo to publish to Garantir GaraSign.
Enhancements for automated vulnerability scanning using Twistlock which
published results to our Artifactory Repo was also used to keep our team
in compliance with ITSS Ch. 5.
Implemented a Netbox-Driven Lifecycle for virtual machines, using webhooks
to automatically generate Jira tickets upon changes in VM's state. This
seamless workflow will extended into creating AccessHub tickets and
Expand All @@ -78,7 +82,7 @@ work:
- Defined a repeatable procedure for BlueFringe Deployments

- position: Manager Network Development
company: Spectrum Enterprise
name: Spectrum Enterprise
website: https://business.spectrum.com/
startDate: 2019-04-01
endDate: 2022-03-01
Expand All @@ -96,14 +100,14 @@ work:
tests using GitLab CI/CD and Jenkins; and Containerizing legacy
applications in Docker.
highlights:
- 'Established an environment with three vertical slice teams involving
- 'Established an environment with three vertical slice teams involving
over twenty developers and three Area Product Owners'
- 'Guided my development team to automate a manual process which saved
- 'Guided my development team to automate a manual process which saved
Spectrum a projected estimate of one million dollars in Capital Expense'
- Deployment automations using Ansible Roles allowing a scalable cookbook

- position: Sr Network Developer
company: Spectrum Enterprise
name: Spectrum Enterprise
website: https://business.spectrum.com/
startDate: 2014-07-01
endDate: 2019-04-01
Expand All @@ -129,7 +133,7 @@ work:
- 'Application Development: Coffee Reports'

- position: Network Engineer
company: Spectrum Enterprise
name: Spectrum Enterprise
website: https://business.spectrum.com/
startDate: 2012-04-01
endDate: 2014-07-01
Expand All @@ -141,7 +145,7 @@ work:
highlights: []

- position: NOC Analysist
company: Spectrum Enterprise
name: Spectrum Enterprise
website: https://business.spectrum.com/
startDate: 2011-03-01
endDate: 2012-04-01
Expand All @@ -150,7 +154,7 @@ work:
highlights: []

- position: Broadband Tech
company: Spectrum Enterprise
name: Spectrum Enterprise
website: https://business.spectrum.com/
startDate: 2007-04-01
endDate: 2011-03-01
Expand All @@ -159,12 +163,14 @@ work:
highlights: []

- position: Information Systems Technician
company: US Navy
name: US Navy
website: https://www.navy.com/careers/information-systems-technician/
startDate: 2003-02-01
endDate: 2007-02-01
summary: |
My time in the Navy was a brief 4 years and arose through the ranks of E1 - E4.
My time in the Navy was a brief 4 years and arose through the ranks of E1
- E5. I also rose to the challenge of obtaining my Enlisted Surface
Warfare Specialist pin while still an E3.
# Relevant Skills
# ================================================
Expand Down
51 changes: 25 additions & 26 deletions resume.yml
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ basics:
image: https://avatars.githubusercontent.com/u/6344935?v=4?s=460&u=38f220a2c9c658141804f881c334c594eb1642ac&v=4
email: [email protected]
phone: (512) 790-0901
# website: https://registry.jsonresume.org/mark_reyes
website: https://registry.jsonresume.org/mrreyes512
summary: |
As a proud Naval Veteran, I transitioned from four years of dedicated
service in the Navy as an IT to embark on a successful 14-year journey with
Expand All @@ -34,9 +34,9 @@ basics:
- network: GitHub
username: mrreyes512
url: https://github.com/mrreyes512/
# - network: JSON Resume
# username: mark_reyes
# url: https://registry.jsonresume.org/mark_reyes
# - network: JSON Resume
# username: mark_reyes
# url: https://registry.jsonresume.org/mrreyes512

# Work Experience
# ================================================
Expand All @@ -52,32 +52,28 @@ work:
time required for complex procedures or deployments.
In my role as the team's Security Focal, I am dedicated to automating
Security Compliance requirements outlined by ITSS using the CISO/BISO
guidelines for Infrastructure Security Requirements. Over the past five
Security Compliance requirements outlined by ITSS. Over the past five
quarters, I have served as the trusted Technical Owner Delegate for our
team's Quarterly Security Assessments (formerly MSAC), consistently
achieving successful outcomes with minimal findings requiring attention.
team's Quarterly Security Assessments, consistently achieving successful
outcomes with minimal findings requiring attention.
For Application Security I designed a Jenkins Pipelines that followed the
Code Signing Service using Skopeo to publish to Garantir GaraSign.
Enhancements for automated vulnerability scanning using Twistlock which
published results to our Artifactory Repo was also used to keep our team
in compliance with ITSS Ch. 5.
I ensured Application Secuity by automating a pipeline in Jenkins for our
Code Signing Services during the build process. Automated vulnerability
scanning was achieved using Twistlock and published results to our
Artifactory Repository.
Implemented a Netbox-Driven Lifecycle for virtual machines, using webhooks
to automatically generate Jira tickets upon changes in VM's state. This
seamless workflow will extended into creating AccessHub tickets and
updating VM's description in vCenter. This workflow is designed to
systematically track and document a repeatable lifecycle process.
As a Subject Matter Expert in promoting new feature sets for BlueFringe
production, I've led over 20 deployments within a Sprint-based release
framework. By optimizing our procedures, I've transformed the deployment
process from a multi-day endeavor into a streamlined, repeatable procedure
completed in just a few hours.
seamless workflow will extended into updating VM's description in vCenter.
As a Subject Matter Expert in promoting new feature sets, I've led over 20
deployments within a Sprint-based release framework. By optimizing our
procedures, I've transformed the deployment process from a multi-day
endeavor into a streamlined, repeatable procedure completed in just a few
hours.
highlights:
- Technical Owner Delegate for Quarterly MSACs
- Automated Code Signing Services for ITSS Ch. 5
- Technical Owner Delegate for Security Assessments
- Automated Code Signing Services
- Image Scanning Automation using Twistlock during build process
- Defined a repeatable procedure for BlueFringe Deployments

Expand Down Expand Up @@ -168,7 +164,9 @@ work:
startDate: 2003-02-01
endDate: 2007-02-01
summary: |
My time in the Navy was a brief 4 years and arose through the ranks of E1 - E4.
My time in the Navy was a brief 4 years and arose through the ranks of E1
- E5. I also rose to the challenge of obtaining my Enlisted Surface
Warfare Specialist pin while still an E3.
# Relevant Skills
# ================================================
Expand All @@ -178,7 +176,8 @@ skills:
- name: Security Compliance
level: Intermediate
keywords:
- MSAC
- Security Compliance
- Nessus
- Twistlock
- Mend / Whitesource
- Garantir GaraSign
Expand Down

0 comments on commit 0b2efcd

Please sign in to comment.