Welcome to the Skills & Artifacts section of my ePortfolio. Here, I’ve highlighted three key technical skills that reflect the work I’ve done through hands-on experience in IT support, device deployment, and cybersecurity awareness. Each skill is supported by real examples that show how I’ve applied what I’ve learned in academic and professional environments.
🔹 Skill 1: Technical Troubleshooting & System Support
Intro Paragraph:
My background as a Provisioning Specialist and IT Technician helped me build strong troubleshooting skills. I’ve worked directly with devices, apps, and system-level errors, learning how to fix issues quickly and reduce downtime. These artifacts show how I’ve used those skills in real-world situations.
Artifact 1: Troubleshooting Log
Below is a sample log of common tech issues I resolved on the job:
- Issue: Device not connecting to Wi-Fi
Action Taken: Reconfigured settings, removed/re-added network, rebooted device
Result: Restored connection and logged resolution - Issue: App crashing on iPad used by pilot
Action Taken: Reinstalled app through MDM, verified software version
Result: App relaunched successfully after reconfiguration - Issue: Device freezing during initial setup
Action Taken: Reimaged device, installed system drivers, ran diagnostic tools
Result: Device worked as expected after system reinstallation
Artifact 2: System Reimaging Guide
A quick guide I followed when reimaging iPads or laptops:
- Boot device in recovery mode
- Use the approved software image
- Install OS updates and drivers
- Test for stability before deploying
Artifact 3: Incident Response Summary
During a system freeze issue, I documented the timeline, tools used, and how the issue was resolved step-by-step. This helped track repeat problems and speed up future responses.
🔹 Skill 2: Device & Network Configuration
Intro Paragraph:
A big part of my experience includes deploying devices at scale using MDM tools, configuring devices for secure use, and helping users get connected to the right networks. These artifacts show how I managed large device rollouts and ensured everything was set up properly.
Artifact 1: MDM Deployment Plan
One of my biggest projects involved provisioning over 2,500 iPads for Spirit Airlines. I used MDM to:
- Install essential apps (navigation, communication)
- Apply security policies
- Configure Wi-Fi and restrictions
- Track and label all devices
Artifact 2: Device Configuration Checklist
My setup checklist ensured every device was ready before leaving the desk:
- Device ID logged
- OS updated
- Apps installed
- MDM enrolled
- Security settings enabled
Artifact 3: Wi-Fi & Network Settings Sheet
To make sure users could get online easily, I created a document with:
- Step-by-step Wi-Fi setup for iPads and laptops
- IP settings and DNS instructions
- Common troubleshooting tips
🔹 Skill 3: Cybersecurity Awareness & System Integrity
Intro Paragraph:
Working in IT also taught me how important system security is. I kept systems safe by installing updates, monitoring viruses, and managing access. These artifacts show my focus on protecting devices and data.
Artifact 1: Virus Monitoring Report
While managing devices in a production environment, I regularly scanned for threats using antivirus tools. Each scan was logged for recordkeeping and review. Here is a simplified example of what I tracked:
- Date: March 15, 2025
Device: iPad
Threat Detected: None
Action Taken: Routine scan only
Follow-Up: Noted for monthly scan history - Date: April 3, 2025
Device: Windows Laptop
Threat Detected: PUA: Win32/InstallCore
Action Taken: Quarantined and removed
Follow-Up: User notified; device rescanned 24 hours later
Artifact 2: System Update & Patch Record
Keeping software up to date was a key part of reducing risk. I used a patch tracking spreadsheet to stay organized. Here’s a simplified entry:
- Device: Windows Laptop
Before: Windows 10 Pro 21H1
After: Windows 10 Pro 22H2
Date: March 28, 2025
Notes: Restart required; system stable after patch - Device: iPhone
Before: iOS 15.3
After: iOS 16.1.1
Date: April 2, 2025
Notes: Wi-Fi settings reconfigured post-update
Artifact 3: Access Control Summary
I supported our security efforts by helping monitor user access and manage credentials. Here’s an example of a few access tasks I completed:
- Removed inactive accounts from shared test devices
- Helped review failed login attempts on key admin accounts
- Reset passwords and enforced two-factor authentication
- Flagged a suspicious login from outside the U.S. and reported it to our security lead