Cloud Adoption

Dedicated managed & drove a full portfolio logistic enterprise digital transformation program. Includes 13 business applications (functionalities) from initiatives to the execution, Contract value is over $7M.

Phase 1: Migration & Modernization:


• Supply the LOE and project budgeting
• Azure landing zone setup
• Azure DevOps best practice adoption(repos, branch strategy, code review strategy, CI/CD pipeline design & setup)
• Azure Kubernetes Service enablement to containerize the business applications.
• Modernize the retail management system to integrate VLM and Pick to Light systems
• Using AI Computer Vision to re-engineer the existing quality control in ERP system.
• SharePoint migration & modernization
• Azure AD integration with existing ADDS

Phase 2: Optimize, Governance & Compliance:


• Quality plan & process enhancement
• Security transformation (Endpoint protection, DLP consulting, SIEM & SOAR deployment)
• IaC strategy & integration with DevOps system
• Tagging strategy

Business Transformation

Managed an over $2M contract value end to end Dynamic CRM 365 project delivery for an entertainment account.

• Wireframe the business process flow, performed fit-gap analysis, design the security models, assisted to configure the MS Dynamic Sales module.
• Managed the offshore team to deliver the non-functional components of this project.
• Collaborated with internal & external teams for integration & migration with other applications.
• Perform the Stakeholder management by facilitating the regular project steering committee cadences. Create/present the reports with visual dashboarding, monitoring key metrics, performing risk assessment, plan, analysis & mitigation.

Security Transformation

• Establishing Security Standards, Procedures & Guidelines to meet the industrial compliance requirements for a finance customer. Conduct regular vulnerability management. Leveraging online knowledge portal to deliver Security Awareness & Training. Security Continuous Monitoring – Security Log Monitoring service. Business Impact Analysis (BIA) & Risk Assessment
• As a security consultant for a Beyond VPN program to gradually sunset legacy VPN systems. Design & delivery Zero-Trust Security Transformation with segmentation & adaptive access control solution. Upgrading network architecture into SD-WAN and integrate SASE solution. Delivered XDR solution by using CrowdStrike Falcon platform
• Microsoft Defender for endpoint solution consulting and project delivery for a conglomerate with integration of Microsoft Sentinel(Copilot for Security), Vulnerability & Threat Intelligence (XDR, EDR alerts, log & event detection), assist the customer adopted DevSecOps practice.

China Project

• Manage the business initiative with leadership team for budgeting & on boarding the hosting business in China
• Setup the business cadences which covers P&L, Operations, Pricing, Procurement, etc
• Participated in the meetings with legal & finance team for budget booking & support the business plan for WOFE filing
• Established the pricing/re-selling model with local partners
• Product localization with product owners
• Account onboarding
• Explore and formalize the ICP requirement & license
• Standardize the process for colo/hosting service into the internal systems

.

China & Hong Kong Data Center setup & cost optimization:

• Service POD setup to interconnect with US & EMEA regions hosting network.
• Landed 6 MNC accounts into the hosting platform with different private cloud solutions.
• Lead the regional initiative to scale down the hosting service to save the cost. Supply the business case creation by conducting rev/cost analysis to implementation.
• Contributes to $1.6M USD cost saving annually with both HK7 and SH2 data centers. Work closely with product, engineering, finance & sales leaders for both reviewing bookings, costings and the scaling down options of the infra.

SOC onboarding program:

• Acted as a security consultant to deliver an end to end traditional CenturyLink SIEM solution to a customer in education sector. Includes conducting workshops to understand the existing security gaps & vulnerabilities, SIEM portal setup, log collector, event forwarder setup, customer data source ingestion configuration, event schema mapping, parser configuration & tuning, Kibana visualization tool setup, event correlation (leads & clues), use case baseline & SOC onboarding