Summary
Overview
Work History
Education
Skills
Certification
Languages
Timeline
Generic

Gentian Mema

Glenolden,PA

Summary

Insightful Information Technology Manager with 16years of IT leadership experience including oversight of infrastructure, application support and security services. Dedicated to customer satisfaction with focused delivery of technical solutions. Proven leader in directing operations, maintenance and support of complex systems. Develops creative business solutions, leveraging diverse methodologies and delivering engineering solutions for leading organizations. Highly adept in request for proposal development, technology needs assessments and staff training.

Overview

14
14
years of professional experience
1
1
Certification

Work History

Cybersecurity Consultant

RogueSecOps
01.2025 - Current
  • Monitored confidential company data and mitigated hacking through network systems updates.
  • Recommend improvements in security systems and procedures.
  • Encrypted data and erected firewalls to protect confidential information.
  • Performed risk analyses to identify appropriate security countermeasures.
  • Conducted security audits to identify vulnerabilities.
  • Developed plans to safeguard computer files against modification, destruction, or disclosure.
  • Organized professional with expertise in managing resources and optimizing performance. Proficient in providing valuable insights and supporting decision-making processes. Committed to enhancing productivity and contributing to overall success.
  • Assisted with day-to-day operations, working efficiently and productively with all team members.
  • Demonstrated respect, friendliness and willingness to help wherever needed.
  • Proven ability to develop and implement creative solutions to complex problems.
  • Excellent communication skills, both verbal and written.
  • Gained strong leadership skills by managing projects from start to finish.
  • Demonstrated leadership skills in managing projects from concept to completion.

Director of Information Technology

PPCIGA
10.2024 - Current
  • Developed and implemented technical application support and information technology policies and procedures that advanced investment needs, outcomes and performance measurements to balance continuous innovation with responsible risk-taking.
  • Analyzed department and job-related functionality requirements to align technology priorities with business needs.
  • Fostered positive working environment that encouraged innovation, collaboration and accountability and managed end-user needs with functional and security responsibilities.
  • Developed, tracked, and controlled information technology operating budgets and cost and benefit analyses for IT spending initiatives.
  • Performed regular audits and tests of infrastructure and applications.
  • Deployed, monitored and maintained system installation, upgrades and network integration.
  • Documented and analyzed processes and procedures and adhered to regulatory guidance.
  • Cultivated highly-regarded technology services organization that sustained culture of respect, collective pride and individual and group professional development.
  • Developed and maintained service level agreements for strategic applications and measured performance against objectives.
  • Identified opportunities for application optimization, redesign and development and troubleshot and resolved user and application issues.
  • Implemented, created and tested disaster recovery and business continuity plans and maintained appropriate back-up system.
  • Wrote strategic business plans outlining need for departmental information technology resources.
  • Liaised with other departments to minimize network interruptions and possible downtimes.
  • Coordinated secure system access of users to various department systems and platforms.
  • Oversaw development and implementation of improvements to support network operations.
  • Implemented and maintained technology and software budget.
  • Led technical upgrade projects for clients by working and coordinating with consultants and developers for integrations.

IT Engineer

Manko Gold Katcher Fox LLP
09.2021 - Current
  • Executed troubleshooting and server support in both in-person and remote situations.
  • Maintained service schedule for software and hardware.
  • Resolved issues related to operational components for LAN, WAN and voice systems.
  • Monitored ongoing technical compliance with applicable laws and regulations.
  • Monitored confidential company data and mitigated hacking through network systems updates.
  • Recommend improvements in security systems and procedures.
  • Monitored computer virus reports to determine when to update virus protection systems.
  • Conducted security audits to identify vulnerabilities.
  • Performed risk analyses to identify appropriate security countermeasures.
  • Managed data backups and disaster recovery operations to comply with business continuity initiatives.
  • Implemented network security measures to minimize data loss.
  • Maintained applications to keep software current with necessary software updates and upgrades.
  • Installed, configured and supported local area network (LAN), wide area network (WAN) and Internet system.
  • Interfaced with customers and developers to diagnose problems and implement configuration requirements and solutions.
  • Analyzed and mapped data and wrote SQL scripts to extract data from SQL databases.
  • Troubleshot incidents reported by end-users to schedule system changes and identify permanent solutions.
  • Powershell scripting for extending exchange archiving past threshold, with Conference room teams password extension and with defender smart screen.
  • Create vmware instances on GUI and configure NIC, Virtualization specs for desktop and sql software environment.
  • Configured VoIP phones according to company standards.
  • Virtualized sandboxes to assist in mitigating malicious vulnerabilities and what risk would it produce to company and how to remediate it.
  • Follow Standard of MITRE, NIST, CISA to stay up to date and be ahead of adversaries.
  • Suggested Implementation of ISO Governance and SIEM tools to monitor and detect systems.
  • Performed preventive maintenance on network system, maintaining average
  • uptime of [Number]%

Desktop Support Specialist

Duane Morris
08.2014 - 09.2021
  • Implemented technical solutions to solve customer issues and increase satisfaction.
  • Documented technical issues and solutions to enable tracking history and maintain accurate logs.
  • Broke down and evaluated user problems, using test scripts, personal expertise, and probing questions.
  • Patched software and installed new versions to eliminate security problems and protect data.
  • Suggested software and hardware modifications to reduce lag time and improve overall speed.
  • Configured hardware, devices, and software to set up work stations for employees.
  • Served as a liaison between customers and higher-level support teams, facilitating timely issue escalation when necessary.
  • Collaborated with IT team members to identify recurring problems and develop long-term fixes.
  • Provided after-hours support during critical system updates or outages, minimizing downtime for users.
  • Conducted regular training sessions for new help desk staff, ensuring consistent service quality across the team.
  • Managed hardware inventory, ensuring timely replacements or repairs of faulty equipment to minimize downtime.
  • Used established procedures to identify critical customer and system issues and escalate problems to appropriate person or group.

Team Lead Information Analyst

Morgan Lewis
01.2013 - 07.2014
  • Organized information by studying, analyzing, interpreting and classifying data.
  • Researched and analyzed information into briefing papers, reports and project papers.
  • Collected data by identifying information sources and designing survey and collection methods.
  • Identified project requirements by establishing personal rapport with potential and existing clients.
  • Used database to research, gather, analyze and present data.
  • Maintained historical records by documenting system changes and revisions.
  • Analyzed data to identify root causes of problems and recommend corrective actions.
  • Demonstrated strong organizational and time management skills while managing multiple projects.
  • Analyzed network security and current infrastructure, assessing areas in need of improvement.
  • Liaised with other departments to minimize network interruptions and possible downtimes.
  • Managed life cycle replacement of hardware and software.
  • Completed paperwork, recognizing discrepancies and promptly addressing for resolution.
  • Skilled at working independently and collaboratively in a team environment.

Network Analyst II

Tech Commandos
02.2012 - 01.2013
  • Administered and prepared programs for IP addresses, developed network resources and trained support personnel to provide Tier I support to end users.
  • Upgraded and expanded network systems and components.
  • Troubleshot and maintained networking devices and infrastructure across enterprise.
  • Analyzed data traces using protocol analyzers to identify anomalies and find solutions.
  • Diagnosed system hardware and software problems using advanced root-cause analysis.
  • Configured and installed wireless controllers, routers and switches.
  • Upgraded network software and hardware for optimized performance.
  • Built server systems and installed into racks.
  • Completed remote repairs involving software solutions and hardware repairs.
  • Communicated with vendors to resolve network outages and periods of reduced performance.
  • Built databases and table structures for web applications.
  • Installed and configured middleware in Linux and Windows environments.
  • Resolved vulnerabilities by making improvements to network security.
  • Managed backup and disaster recovery through strict data control and retention policies, personally handling recovery tasks when issues arose.
  • Implemented and maintained virtual private networks.
  • Conducted security audits to identify vulnerabilities.
  • Mitigated risk by analyzing complex computer systems to assess vulnerabilities.
  • Administered software licensing and purchasing for effective installation of network.

Education

Bachelor of Science - Computer Science

Temple University
Philadelphia, PA

Associate of Science - Information Security

Community College of Philadelphia
Philadelphia, PA

Skills

  • Cryptography
  • Vulnerability Assessment
  • Penetration Testing
  • Incident Response Management
  • Intrusion Detection
  • Backup and Recovery
  • Security Protocols
  • Hardware Installation
  • Network Security
  • Virus Protection
  • Powershell Scripting
  • Sudo Linux commands
  • 0365/Azure
  • Exchange
  • VMware
  • Citrix
  • Google Cloud
  • Datto Backup And recovery
  • Palo Alto Firewall/VPN
  • Direct Access
  • Cisco
  • MITRE
  • ATT&CK
  • OWASP
  • Kali linux/Parrot
  • Blockchain security
  • Threat modeling
  • Patch management
  • Privacy regulations
  • Penetration testing
  • Malware analysis
  • Cloud security
  • Disaster recovery
  • Firewall management
  • HIPAA compliance
  • Business continuity
  • Incident response
  • Configuration management
  • Data protection
  • Forensic analysis
  • Intrusion detection
  • Ethical hacking
  • Application security
  • Security training
  • Reverse engineering
  • Compliance management
  • Network systems installation
  • IP addressing and subnetting
  • Performance improvements
  • Active Directory knowledge
  • Access issue resolution
  • Windows server
  • Effective communication
  • Load balancing
  • Leadership
  • Written communication
  • Team management
  • DDoS prevention
  • Threat analysis
  • Access control
  • Cybersecurity frameworks
  • Disaster recovery planning
  • Web application testing
  • Exploit development
  • Scripting languages
  • Vulnerability assessment
  • Teamwork and collaboration
  • Source code review
  • Analytical skills
  • Intrusion detection and prevention

Certification

  • Ec-Council Certified Ethical Hacker V12 Training
  • GIAC Security Essentials (GSEC) 2026



Languages

Albanian
Native or Bilingual

Timeline

Cybersecurity Consultant

RogueSecOps
01.2025 - Current

Director of Information Technology

PPCIGA
10.2024 - Current

IT Engineer

Manko Gold Katcher Fox LLP
09.2021 - Current

Desktop Support Specialist

Duane Morris
08.2014 - 09.2021

Team Lead Information Analyst

Morgan Lewis
01.2013 - 07.2014

Network Analyst II

Tech Commandos
02.2012 - 01.2013

Bachelor of Science - Computer Science

Temple University

Associate of Science - Information Security

Community College of Philadelphia
Gentian Mema