01
EMR/PACS AWS Migration
Healthcare infrastructure modernization
Context
Clinical imaging and EMR-adjacent systems required cloud modernization with strict uptime, recoverability, and security expectations.
Role
Migration lead and cloud architect collaborating with technical and operational stakeholders.
Scope
Hybrid healthcare workloads, dependency-heavy systems, and phased migration planning with rollback readiness.
What I did
- Led discovery and migration planning across application dependencies, data flows, cutover paths, and rollback options.
- Designed AWS landing-zone patterns including network segmentation, IAM guardrails, logging, backup, and patching expectations.
- Coordinated execution windows with clinical and operations stakeholders to reduce disruption.
- Implemented high-availability and backup/recovery patterns for critical systems.
- Established operational runbooks and monitoring support for 24x7 workloads.
Outcomes
- Reduced on-premises operational burden while improving recoverability for patient-care critical systems.
- Improved security posture through standardized cloud controls and centralized visibility.
AWSEC2S3IAMRoute 53Hybrid connectivityMonitoring & alertingHealthcare compliance
02
Security Monitoring Program
Cloud + enterprise detection and response
Context
Need for layered monitoring and consistent incident response across cloud and hybrid infrastructure.
Role
Security program builder driving standards, operational playbooks, and visibility strategy.
Scope
Centralized telemetry, identity monitoring, operational hardening, and governance alignment.
What I did
- Implemented centralized logging and alerting across critical infrastructure and identity control points.
- Defined monitoring standards for logging scope, retention, escalation paths, and response playbooks.
- Built defense-in-depth controls spanning visibility, hardening, and policy rather than tool-only security.
- Improved governance through privileged access tightening, vulnerability management cadence, and audit readiness support.
Outcomes
- Faster detection and more consistent incident handling through centralized telemetry and defined response workflows.
- Reduced risk exposure from misconfigurations and weak operational controls.
SIEM/SOC integrationCloud loggingIAM hardeningVulnerability managementNIST conceptsISO-aligned practices
03
Citrix Cloud Modernization
Hybrid application and desktop delivery
Context
Legacy Citrix architecture had reliability constraints, limited scalability, and recurring support issues.
Role
Architect and modernization lead focused on resilience, supportability, and user experience.
Scope
Legacy farm assessment, platform redesign, performance tuning, and operating-model standardization.
What I did
- Assessed legacy farm components to identify reliability gaps and single points of failure.
- Re-architected delivery patterns with redundant control components and stronger operational observability.
- Tuned profile/session behavior and connectivity paths to improve user experience and stability.
- Implemented standardized builds, patching approach, and documentation to improve supportability.
Outcomes
- Improved user experience with fewer recurring incidents tied to legacy constraints.
- Increased scalability and resilience for remote and hybrid access use cases.
Citrix Virtual Apps & DesktopsXenAppXenDesktopNetScaler/ADC conceptsHA designPerformance tuningHybrid cloud
04
Data Center Consolidation & DR Uplift
Infrastructure rationalization and recoverability
Context
Need to reduce data center footprint and operational overhead while improving disaster recovery maturity.
Role
Consolidation lead coordinating infrastructure, risk, and recovery design decisions.
Scope
Inventory, dependency mapping, migration/cutover planning, backup/replication improvements, and process hardening.
What I did
- Led consolidation planning with service inventory, dependency mapping, cutover sequencing, and risk controls.
- Improved backup and replication strategy and standardized recovery procedures.
- Defined DR capabilities for tiered applications with documented recovery expectations.
- Strengthened change management, monitoring, and platform standardization to reduce unplanned outages.
Outcomes
- Lower operational complexity with stronger recovery readiness across critical services.
- Reduced outage risk through standardized infrastructure and operational discipline.
RTO/RPOReplicationBackup modernizationVirtualization platformsITIL-aligned operationsInfrastructure standardization
05
IT Operational Excellence Program
Governance + reliability program leadership
Context
Service delivery needed stronger governance, reliability standards, and measurable operational consistency.
Role
Program lead driving operational maturity across internal teams and vendor partners.
Scope
Process design, runbook standardization, reliability improvements, lifecycle upgrades, and execution tracking.
What I did
- Introduced ITIL-aligned operating practices for change, incident, and problem management plus asset/patch standards.
- Implemented monitoring and event-management standards with repeatable operational runbooks.
- Established lightweight PMO-style planning for prioritization, timelines, stakeholder updates, and risk tracking.
- Focused modernization efforts on eliminating single points of failure and reducing end-of-life technology risk.
Outcomes
- More predictable service levels with fewer surprise outages.
- Improved delivery speed and accountability across teams and vendors.
ITILGovernancePMO practicesLifecycle managementOperational maturityReliability engineering mindset