Free Essay

Lan Consulting Plan

In:

Submitted By dragunlord46
Words 1841
Pages 8
LAN Consulting Plan
IT/240
February 26, 2012
James (Garrett) Miller

LAN Consulting Plan

Data Assurance:
1. Backup system:
a. Type?
Backup of data will be done with the Norton 360 version 6.0 antivirus protection suite provided backup utility, Symantec Backup Exec. There are two types of backup for this network. The first is a digital tape drive backup that is located on site for intermediate recovery based on the disaster conditions. The second backup is a mirror backup on a bank of servers at an external site to ensure the security of the data in the case of total disaster of the network site.
b. Backup Schedule?
The backup schedule will be determined by the importance of the information. Business critical information will be backed up at the completion of the task. A scheduled mirror backup will be done daily during the off business hours. c. Backup Data Storage plan?
The first backed up data will be stored on an independent server drive using RAID at the main site location for ease of access in the case of an independent component failure. The second backup will be also use RAID and be stored at a different graphical location than the network.

Data Integrity:
1. Antivirus system:
a. Type? Norton 360 version 6.0 antivirus program is installed at each geographical location including the offsite backup of the network. This security protection will provide virus protection, spyware protection, and scan incoming and outgoing e-mail.
b. Scan Schedule?
The anti-virus software will be scheduled to scan incoming and outgoing e-mail messages. It will also scan packet files as they are received. The program will be scheduled to scan the whole system every night when the business operations have ended for the day.
c. Quick reaction plan for system(s) infection?
The protection program will be directed to attempt to repair any infections found as a first resort. If the infection is not repairable by the system it is then directed to a quarantine file for further review by the IT technician(s). As a last resort to protect the system the program will be directed to remove the infected items from the system.
Data Reliability:
1. Disaster Recovery Plan:
a. Site location? The offsite recovery backup data is located at a remote company location (NAS) designed especially to house the backup data servers of the company. It is designed this way to keep the information safe in case of a geological network failure.
b. Data/Systems replication plan?

i. Systems:
1. …The network data is copied from the main data storage located at the Central Office to the external backup location using Veritas Replicator. This program is additional security software from Symantec that coincides with the virus package.
2. …The Operating Software, Windows 7 premium, the development software, and all other business related applications have been copied to disk. One copy is located at the central office for intermediate recovery needs. The other copy is located at the backup site.
3. The employees use a thin client platform that retrieves the information from a central server. On hand replacement servers will initiate the repair of the network in a timely manner.
4. Repair tactics or replacement thin client system components, to include monitors, hardware, and printers to recover the critical business functions will be available at the remote location. …
5. The routers necessary for the fast recovery of the business operations will be available at the remote location for quick replacement.
6. The switches that are critical for the fast recovery of the network will be available and located at the backup site.…
c. Full site recovery schedule?
The full site recovery schedule will begin with identifying the disaster and will focus on the recovery of the critical business systems that are needed immediately to ensure business continuity. Once the business is running the focus will be on restoring and recovering the business essential and secondary aspects of the network. i. Services Recovery Priority: 1. Business Critical systems?
The business critical systems include a power supply, the primary database located in the Central office, the critical presentation servers and databases located at the central office. A goal time to recovery these systems is within 36 hours. 2. Business Essential systems?
The business essential systems include any remaining presentation servers and application servers necessary for the continuity of the business practices. Must be restored starting at 36 hours and within 5 days.

3. Secondary systems?
The secondary business systems include any repairs or replacement of hardware and replacing of cords, cables, misc. Can be restored in as little as 5 days, but may take longer.

2. System Redundancy protection:

a. Fault-Tolerance systems?
The fault tolerance is provided with the use of the RAID technology which provides redundancy and speeds up data transfer. b. Load balanced systems?

The load balancing on the network will be accomplished using routers, such as the Linksys WRT54GL to forward data packets between the computers in the network, and also provide redundancy. c. Clustered services?
Clustering services will be used to provide redundancy by connecting two or more computers together to act as one computer. Load balancing clusters are used to distribute client connections over multiple servers.

WAN Infrastructure:
1. Circuits Type/Provider:
a. New Mexico?
The circuit from the central office to the New Mexico location is a T1 dedicated connection provided by Comcast Business Class internet service.
b. California?
The circuit from the Central office to the California location is a T1 dedicated connection provided by Comcast Business Class internet service. d. Central Office?
The circuit from the gateway to the Central office is a T3 dedicated connection provided by Comcast Business Class internet services e. Internet?
The circuit from the internet to the gateway of the network is a T3 dedicated connection provided by Comcast Business Class internet services.
2. WAN Topology?
The WAN topology of the network including the central office, the New Mexico location, and the California location is Star topology. Each location is connected to the next with a dedicated T1 connection. 4. Circuit failure/outage plan?
The use of ring topology in the network will provide each node another avenue of communication if there should be a failure. 5. Firewall/IDS implementation?
The firewall and Intrusion Detection system will be scheduled through and maintained by the Norton 360 version 6.0 security suites.
5. DMZ services:
a. ….one implementation for a DMZ zone in the network is the use of a mail server. This will allow communication between the inside network and the outside network.
b. …. A second implementation for a DMZ zone is the use of a web server. This will allow the customers to access the information and services provided by the company.
c. … A third implementation for a DMZ zone is a fall over firewall that will allow communication from the outside network to the inside network with predetermined restrictions.
6. Remote Access services?
Remote access services will be provided with the use of the Symantec pcAnywhere 12.5 software which will allow remote access of computers efficiently, manage help desk issues quickly, and connections to remote devices simple and secure. 7. WAN Monitoring/Management tools?

WAN monitoring and management will be controlled by the System and Network Monitor (SNM) application, which is a tool that monitors, graphs and alerts on computing devices and services.

LAN Infrastructure: 1. Router(s)? The routers used in the network are Cisco ISR G2 modules which contain media service engines to deliver rich media capabilities and enhanced EtherSwitches that offer industry leading layer 2 and layer3 switching. 2. Switches?
The switches used in the network are Cisco Nexus 3000 series that offer low latency in high frequency areas and increased application performance through wire rate layer 3 switching. 3. Patch Panel?
The patch panel is a Cisco Catalyst Inline Patch Panel. This device enables inline power for Cisco multiservice enabled catalyst switches. 4. Labs; Model Office, Development, Training?
Training will be provided for all employees on a regular monthly schedule to introduce and provide instruction on new components in the network infrastructure. 5. Building Cabling?
The cables to supply internet to the network is shielded twisted twisted-pair coaxial cable. The cables that connect the components of the network are category 5 stranded cables with RJ-45 round wire connections. 6. LAN Infrastructure Monitoring/Management tools?
The monitoring and management tools for the LAN Infrastructure will be the installed Network and System Monitor application. This application will monitor, graph, and provide alerts on computing devices and services within the LAN.
Systems Architecture: 1. Email Services?
The email service of the company Widget’s World will be provided by Google Business e-mail through an independent e-mail server on the network site which will also act a DMZ location. 2. Internet/Intranet/Extranet Services?
The internet service is supplied by Comcast business class internet services, the intranet is supplied and controlled by an intranet data center located within the network. The extranet service is provided by using a secure link (tunnel) across the internet and used in a (VPN). 3. OS Platform Server/Client?
The Operating System platform is Microsoft and the client service datacenter for this company is Microsoft Server 2008 R2. 4. User Security/Access management platform?
The security in this company is controlled by the use of a user- level security platform. This security platform ensures the security of the company data by only allowing pre-designated users with the appropriate passwords into specify information. 5. Naming Resolution services?
The naming resolution services in the Widget’s World network is the process of caching URL’s that had previously been performed lookups for DNS. 6. Client Application delivery model?
The model used for client application delivery is Citirx XenApp. This application is a thin client product that is used to allow users to connect to the companies applications. 7. Specialized company applications?
Specialized applications of this company would include specialized design and personalization concepts and tools that focus on the development of widgets.
HelpDesk services: 1. Trouble Ticket management system/process?
The trouble ticket management system will consist of a database that records all data that consists of trouble in the network. These data are managed by the business logic layer of an application. 2. Employee training processes?
The employee training processes will consist of regular employee training schedule to keep the employees up-to-date on changing processes, procedures, software, and hardware that is implemented into the business. 3. Employee technology usage policies?
The company will have written policies describing the ways the technology available in the network will be used by the employees.

References:

http://www.cisco.com/en/US/products/sw/netmgtsw/index.html Retrieved from http://www.cisco.com

http://www.symantec.com/products/allproducts.jsp Retrieved from http://www.symantec.com

http://www.slac.stanford.edu/xorg/nmtf/nmtf-tools.html#nmp Retrieved from www.slac.stanford.edu

http://www.ehow.com/info_8478654_comparison-between-internet-intranet- extranet.html Retrieved from http://www.ehow.com

Similar Documents

Free Essay

Determining Databases and Data Communication

...Determining Databases and Data Communications Scott Powers BIS/320 April 29, 2013 Dr. Julie Johnston Determining Databases and Data Communications A tracking system can be a complicated process, a Microsoft Excel spreadsheet or a Database system is the focus of this study, and the finding are in the following report. The first research conducted analyses a marketing assistance and the tracking systems used. The second part of the research conducted is to analysis the best options for computer access at a small office and how to determine the best system to use. A spreadsheet is attached to view the cost and abilities of each access for the office assistant. Each study took into account the particulate and the needed of the person and the desired outcomes. The first research looked at is the use of spreadsheets with particulars to include equipment, components, and shippers needed at the trade show. The research includes how to track what shippers were used or how many different shippers to use for multiple pieces of inventory and the ease of use of a spreadsheet. This Research also looked into when a database would be better to track the multiple components, equipment, and the shipper data history used. The research conducted will shows what tracking system is a better fit for the marketing assistant to track their inventory during the planning, setup, duration, and shipping of inventory and ultimately the post analysis of a tradeshow? Booth and trade show tracking:...

Words: 1120 - Pages: 5

Premium Essay

Multi-Layered Security Outline Plan

...RICHMAN FINANCIAL INVESTMENTAND CONSULTING FIRM Multi-Layered Security Outline Plan IT Infrastructure Security Daniel Satterfield 7/1/2014 Identification of Risks, Threats, and Vulnerabilities along with proposed Security measures and controls   MULTI-LAYER SECURITY PLAN (OUTLINE) FOR RICHMAN INVESTMEN The following Multi-Layered Security Plan outline I am submitting for approval and implementation for Richman Investments, will provide a sound security plan for the firms most important mission critical assets, identifying and reducing vulnerabilities, Risks and threats to the firms confidential proprietary intelligence, sensitive customer data and other important assets within each of the Seven Domains that make up the core for the IT infrastructure as a whole. An aggressive approach should be mapped out in a 3-5 year progressive implementation achievement plan starting with one or two security initiatives where success can be clearly demonstrated and evaluated. The FFIEC now has mandated financial institutions mitigate online threats by intergrading endpoint encryption pushing it out to all users in a non pre-boot fashion then using the console to migrate users to pre-boot encryption which would provide immediate protection and increased visibility and control of our overall risk posture. First, indentifying Risk, Threat and Vulnerabilities within each of the seven Domains that make-up the firms IT infrastructure. Secondly, proposed security...

Words: 751 - Pages: 4

Premium Essay

Religion Is Cause of War

...select two backbone configurations and discuss which one you think is the better option for networks of today. Indicate why you think that planning an enterprise-level backbone can be such a challenging process. I think before going into details, we should understand what is backbone. After a lot of research, I came up this definition; a backbone is a means of connecting two or more LANs. It provides a transmission channel for packets being transmitted from one LAN to another. After connection to a backbone, a LAN may remain distinct or be merged with another. Backbone networks can be applied to a single building environment as well as to campus environments, where the backbone is used to connect LANs in different buildings. Parallel backbone: I think parallel back is the best worth it for any company. The additional cost of setting up a parallel backbone can be well worth the money.  The design of this type of backbone consists of using two cables routed between the routers and switches.  While there are additional initial costs of installing a parallel backbone, the benefits can quickly outweigh these costs. However if company wants to save some money, they can use distribute network. It consists of a number of connectivity devices connected to a series of central connectivity devices, such as hubs, switches, or routers, in a hierarchy. This kind of topology allows for simple expansion and limited capital outlay for growth, because more layers of devices can be added...

Words: 731 - Pages: 3

Premium Essay

Cg Course Project

...Lan Infotech- LSI Christian Gomez DeVry University MGMT 591 Leadership and Organizational Behavior Instructor: Michael Carr December 16, 2013 MGMT 591: Leadership and Organizational Behavior Overview of Organization The organization that will be the topic of discussion in my final project paper is LAN Infotech. LAN Infotech is a small IT consulting company that specializes in IT projects and services. The company was first created when the owner first sold his shares from a company he helped form in New York called LAN Associates. Doing so, he was able to acquire all the small businesses the company was managing down in South Florida. He created LAN Infotech and started to provide professional IT services to the clients. The company grew from three employees in 2008 to at its highest of 25 throughout the years. Being in a highly competitive area where there are plenty of small managed service providers, it can be hard at times to gain and keep clients. So far LAN Infotech has been able to steadily grow and have also gained a lot of clients and business. Part of the success is credited to the engineers that have worked and currently work for the company. LAN Infotech has been featured in many local business magazines and has won numerous awards from partners such as Dell and Microsoft. But that’s not where the issue is, the issue is with the level of commitment from the engineers and the level of commitment from upper management, mainly the owner...

Words: 1071 - Pages: 5

Free Essay

Lan Consultation

...LAN Consulting Plan IT/240 February 26, 2012 James (Garrett) Miller LAN Consulting Plan Data Assurance: 1.      Backup system: a.     Type? Backup of data will be done with the Norton 360 version 6.0 antivirus protection suite provided backup utility, Symantec Backup Exec. There are two types of backup for this network. The first is a digital tape drive backup that is located on site for intermediate recovery based on the disaster conditions. The second backup is a mirror backup on a bank of servers at an external site to ensure the security of the data in the case of total disaster of the network site. b.     Backup Schedule? The backup schedule will be determined by the importance of the information. Business critical information will be backed up at the completion of the task. A scheduled mirror backup will be done daily during the off business hours. c.     Backup Data Storage plan? The first backed up data will be stored on an independent server drive using RAID at the main site location for ease of access in the case of an independent component failure. The second backup will be also use RAID and be stored at a different graphical location than the network. Data Integrity: 1.      Antivirus system: a.     Type? Norton 360 version 6.0 antivirus program is installed at each geographical location including the offsite backup of the network. This security protection will provide virus protection, spyware protection, and scan incoming and outgoing e-mail...

Words: 1841 - Pages: 8

Premium Essay

Meow Investments Meow Documents

...Unit Plans Unit 1: Information Systems Security Fundamentals Learning Objective  Explain the concepts of information systems security (ISS) as applied to an IT infrastructure. Key Concepts  Confidentiality, integrity, and availability (CIA) concepts  Layered security solutions implemented for the seven domains of a typical IT infrastructure  Common threats for each of the seven domains  IT security policy framework  Impact of data classification standard on the seven domains Reading  Kim and Solomon, Chapter 1: Information Systems Security. Keywords Use the following keywords to search for additional materials to support your work:  Data Classification Standard  Information System  Information Systems Security  Layered Security Solution  Policy Framework ------------------------------------------------- Week 1 Assignment (See Below) * Match Risks/Threats to Solutions * Impact of a Data Classification Standard Lab * Perform Reconnaissance & Probing Using ZenMap GUI (Nmap) * Page 7-14 in lab book. Project (See Below) * Project Part 1. Multi-Layered Security Plan ------------------------------------------------- Unit 1 Assignment 1: Match Risks/Threats to Solutions Learning Objectives and Outcomes  You will learn how to match common risks or threats within the seven domains of a typical IT infrastructure with solutions and preventative actions...

Words: 1409 - Pages: 6

Premium Essay

Network Design Project

...Networking-Assignment 1-Outline Assignment 1: The Benefits of Twisted Pair Cable You are a recently hired consultant for a NCF, the Networking Consulting Firm, and your first consulting assignment is at Ocper, Inc. Upon arriving at the client, you learn from the president that there is no one dedicated to information technology or networking on the staff and there are 20 Windows peer-to-peer client computers all connected via coax cabling. The president also indicates that the company plans to double in size over the next two years, but she is weary of drastically changing the computing environment. Write a 2-3 page paper in which you: • Describe what changes you would suggest in terms of the current network type / structure and how you would lay out the benefits of the changes you recommend. • Describe why you would suggest connecting all current and new client computers using twisted pair cable instead of staying with the current coax wiring structure. • Discuss the possibility of using fiber optic cable instead of either twisted pair cable or staying with the existing coax wiring structure. • Research the costs involved with making these changes to the network (not including the cost for buying more computers) and determine whether or not there is a cost benefit. Your assignment must: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with...

Words: 335 - Pages: 2

Premium Essay

It240

...|[pic] |Syllabus | | |College of Information Systems & Technology | | |IT/240 Version 4 | | |Intro to LAN Technologies | Copyright © 2012, 2009, 2007 by University of Phoenix. All rights reserved. Course Description This foundational course covers local area network topics including rationale for networking, the open systems interconnection (OSI) model, common network topologies and architecture, client/server concepts, basic hardware devices and usage, and basic networking security concepts. Policies Faculty and students will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you...

Words: 2355 - Pages: 10

Free Essay

Lab #1 Assessment

...Lab #1 – Attack & Penetration Test Plan Answer Sheet Hacking and Countermeasures 6/28/2013 MR. Walker Ramon B Kreher Jared Long Part 1: Table of Contents 1. Introduction 2. Authorization 3. Preliminary 4. Scope 5. Goals & Objectives 6. Test Plan Reporting 7. Test Plan Reporting 8. Projecting Plan and Schedule Part 2: Sample Authorization Letter The Undersigned hereby testifies that they have proper authority and agrees to offer authorization to perform the work that is specified in the statement of work for the penetration test to be conducted by Security Consulting Inc. The systems to be tested shall not be compromised and any vulnerabilities that are discovered shall be kept confidential unless federal, state, or local law requires that they be disclosed or the statement of work specifies otherwise. This Document also certifies that the undersigned testifies that the Client has sufficient disaster recovery systems and insurance in the event of an incident during or after the test procedures. Part 3: Penetration Test Client Questions If black box is selected, do not fill out question 3 or following sections. 1. Black Box | White Box (please circle one) 2. Intrusive | Non-Intrusive (please circle one 3. Test Credentials: (fill in as many as needed) Username | Password | | | | | | | | | | | | | | | E-Commerce Web-based Application Server 1. Authorized to View Source? Yes | No (please...

Words: 652 - Pages: 3

Premium Essay

Whatabout Gene Gene

...Tech Partners Consulting www.techpartners.net.au SOEs – Standard Operating Environments The SOE concept explained in business terms Authored by Alan Pickering, Tech Partners Consulting September, 2003 Introduction The use of Information and Communications Technology (ICT) in organisations has gone well past the stage of being unique, novel and even technically difficult. Nowadays, the technology is readily available, thanks to the volume demand from commercial and residential market segments. Even so, there are benefits from adopting a Standards based approach to choosing and deploying ICT assets; and offering technology based IT services to customers. This white paper will provide a brief introduction to the philosophy of Standard Operating Environments, and will explain the likely benefits, costs and planning factors that relate to adopting an SOE approach. Background When desktop computing and Local Area Networks appeared in organisations in the 1980’s, they were small scale and of little immediate consequence. Being somewhat complex, and requiring some hands on technical skills, they were acquired in small quantities. The low cash costs meant they were often purchased ‘under the radar’ of senior management and IT teams. The practical use and popularity of PCs and LANs grew, to the point that some organisations recognized the need to account for the cost of assets and people’s time spent on support. Since then, industry analysts have studied the...

Words: 2707 - Pages: 11

Premium Essay

General

...Recommended Solutions 9 Hardware Solution……………………………………………………………………10 Software / policy Solution 10 Budget…...…………………………………………………………………………….11 Summary………………………………………………………………………………...11 References……………………………………………………………………………….12 Executive Summary Over the past 50 years, Boeing Aerospace Consulting (BAC) has dominated the Aerospace industry. Focusing more on client’s solution compromised BAC technology infrastructure. New technology inventions are frequently in the process of being developed, hackers formulate new ways to perform malicious attacks and fraud to take advantage of small and large companies. Today society has evolved in many ways, from the Roman Empire with modern electronic communication. Technologies, from those who discover the handiness, influence our lives with convenience, life, and many time horrible unforgiving acts. Maintaining security should always be the scope of a company priority. With those mental imperative in mind Boeing Aerospace Consulting (BAC) will focus to formulate solution for the growing Cyber, and other vulnerability attacks security policies have lacked within the company. Company Overview Boeing Airspace Consulting (BAC) is an entrepreneur in the Aero Space arena. The company is globally renowned as a major influential leader in Aerospace design fabrication of components and services. Many of these services support electronics, commercial, defense and aerospace industry. With highly trained employees who maintain...

Words: 1288 - Pages: 6

Premium Essay

Case Study on Six Sigma at Wipro Technologies: Thrust on Quality

...Process Award. Wipro has one of the most mature Six Sigma programs in the industry ensuring that 91% of the projects are completed on schedule, much above the industry average of 55%. Six Sigma provides the tools for continuous improvement on existing processes thereby helping sustain the SEI-CMM Level 5 and CMMi certifications. This case focuses on the initiatives taken by Wipro Technologies to implement the Six Sigma Quality tool to achieve sustained strategic business results. It explores the implementation procedure at Wipro Technologies and the benefits reaped by the company on account of adopting Six Sigma. The case also throws light on the recent developments in the Six Sigma concept including Wipro’s Six Sigma Skill base and consulting experience and explains how the company intends to build its expertise and experience '' to bring continuous process improvement to the organization. Backdrop Wipro Limited was established in 1945 and commenced its operations in 1946 as a vegetable oil company. In the early 1980s, Wipro diversified into the Information Technology sector with Liberalization hitting India in the 1980s. This has been a fascinating transformation from a vegetable oil company into a global IT services giant. Today, Wipro Technologies has become a global service...

Words: 2613 - Pages: 11

Premium Essay

Computer

...Proposal Merger Project Week 2 Case Study Top-Down network Design Prepare an opening statement that specifies your organization capabilities to manage a deployment of size? We are a average size network design consulting company. We specialize in many different types of consulting form network design, merger, routing designing, topology design, logical network design, and we specialize in our customer. Our network design team our is consist to experts in their field they are CCIE qualified in their services. We are high motive and very knowledgeable in our jobs and we will think of your customer as our when we plan this merger. Our previous working projects * Design and implementation of a 1.5 million Cisco data center. * Security design and implementation of a new Cisco enterprise network * Custom Cisco ASA and Cisco NAC workshop for UK service Provider * Large Cisco network re design for mobile services provider in Ireland * Cisco network design for African bank complete new network. * Designing and configuring VLAN and LAN topology. We have done many more network design these are just few of them that we have worked on. Our teams are very highly recommended in this business we proved excellent qualified people that professionally. We are the company that will provide excellent care of your customer and your business for this merger. Graphically depict and effectively promote your company’s structured development and services? ...

Words: 396 - Pages: 2

Premium Essay

Applied Research

...over other firms. Investigations are conducted to deal with specific business issue of technology. A report is prepared on procuring I.T. services from IBM. Companies have the intention of connecting with IBM for I.T services news and information through the Internet. Business services offered by IBM are being studied, and a particular focus is on consulting and information services. Website services and other Application services are also investigated to report on I.T. issues. The strategic results of information technology solution will provide expertise, consultancy which will assist in building competitive advantage. Purpose of the Report: The report aims at obtaining information about I.T. services from the IBM, an information technology and consulting firm. Also, this report will show the benefits of incorporate the intranet for internal and external purposes. A study is conducted on how to access integrated data, acquire knowledge and guidance. Intranet: An intranet is an internal, secured business environment, which uses HTML and TCIP protocols like the Internet, but operates on a LAN (local area network). If the LAN provides access to the Internet, the intranet resides behind a firewall, with no gateway to, or from the Internet. An intranet provides access to information quickly and easily in a familiar environment, while keeping this information securely off the public Internet. It also facilitates interdepartmental cooperation and saves hard and soft resources...

Words: 1844 - Pages: 8

Premium Essay

Hhkhk

...by Al Marai. CR Covering Note In July 2012 I finished up my assignment as Head/Compensation & Benefits with Tatweer Petroleum in Bahrain. The drive to nationalize coupled with increasing pressure from the company?s joint venture partners to improve financial performance have led to the departure of numerous highly compensated expats, including me. I am now back in the market looking at full-time employment and consulting opportunities, e.g. the following: ? Am open to senior non-management HR roles, with emphasis on compensation and performance management development, in the USA, the Middle East/GCC, and worldwide. ? Vice-President (VP)/Director of Human Resources for small to mid-sized organizations ? VP/Director/Manager of Compensation & Benefits/Performance & Rewards ? Human Resources consulting; available for projects on an independent ?associate? basis; join ?delivery? team of a blue chip global consulting firm; conduct training workshops related to special HR strengths. I have remained in Bahrain while targeting the Middle East for employment and consulting assignments, but I am single, mobile, and available for assignments worldwide. Special Note: I have signed a contract with Petrosync in Singapore to conduct in September this year a week-long compensation workshop in Kuala Lumpur for Asia Pacific HR professionals in the oil and gas industry. Please feel free to contact...

Words: 1387 - Pages: 6