Brad J. Wilkus Sr. – Sr. IT Network Infrastructure Project/Program Manager – Mergers and Acquisitions and Migrations
- Discovery of the acquired company’s IT Infrastructure and determining the Integration effort required
- Created Statement of Work (SOW), identifying resources and planning the effort for integration and execution
- Brought each acquisition into the parent company’s IT infrastructure in a timely and cost-effective manner and ensured network security
- Integration of ADT standards, including Palo Alto Firewalls, Meraki Routers and Switches, Cisco WLCs and Wi-Fi
- Managed cutover transitioning working with Real Estate, Network Engineering, Integration of ADS and retiring old MS Domains and data centers of purchased company, adding capacity of ADT Canadian data centers
- Managing 10 PMs for de-coupling 14 on-premise and cloud-based applications due to the sale of the Canadian portion of the business, including migration of some applications to AWS and to ADT U.S. data centers
- Built an on-premise document management server platform to secure PCI/PII data to meeting Security requirements
- Managed IT integration for acquisitions, focusing on network security and infrastructure updates to support corporate growth
Sr. Project Manager – ADT Integration of 180 Service and Sales offices – Migrations/Technology Refreshes
- Cisco Meraki integrations for purchased entities and existing Sales offices and integration into company SDWAN
- Deployment of Palo Alto Firewalls, Meraki Switches and Routers, Cisco Wireless deployments – WIPS/WLCs/WAPs
- Tracked compliance for Cyber Security including appropriate firewall policies and accesses over VPN
- Technology refresh of offices with Palo Alto firewalls and Meraki switches
Sr. Network Project Manager – ADT Network projects, Network Segmentation for PCI/PII and Cyber Security Management
- Network segmentation of PCI/PII proprietary data and bring the organization into PCI compliance
- Tracked compliance for Cyber Security including but not limited to Wireless protections for rogue devices, penetration testing and port utilization analysis tested with appropriate firewall policies and accesses over VPN