Christopher H
Writer #16279
Joined 6/26/2016
4 Star Rating
100% Success
64 Projects
0 Endorsements
0 Elite Skills
Christopher has an extensive work history in Information Technology, covering a wide span of areas, and has extensive experience writing policy and procedure documentation. His passion starts with research, investigating new technology and marketplace trends, and communicating these findings in audience-appropriate terms - writing for diverse audiences such as C-suite executives, Auditors, and System Administrators.
Presentation
Technology

Specialties

Technical Writing, Procedure Documentation, IT Security Policy, Product Analysis

Interests

Technology topics including Linux, Identity Access Management, Security Patching, Risk Management. Consumer technology including cord-cutting, home networking, Wi-Fi.

Education

Hear of America Bible College

In order to expand his experience, Christopher completed his Bachelor's degree in a non-technical field of study. This provides an additional perspective beyond the technical facets on a given subject.

Santa Rosa Junior College

Christopher has had an interest in IT since his youth, and took advantage of the then available educational opportunity to study programming and how to use the emerging field of data processing for business support.

Technology

64 Projects Completed

Christopher has written and delivered both policy and procedure documentation in several areas, including security patch management, Identity and Access Management (IAM), Risk and Issue Management to name a few. For the last several years, writing was done as an employee of IBM, and is retained by IBM as proprietary information. However, a sample is provided based on fictitious details.

Presentation

0 Projects Completed

Christopher has written and delivered presentations on a many topics and for various audiences, including C-Suite executives and Auditors, as well as technical System Administrators. Topics range from explaining support and security procedures to the life-cycle of security vulnerabilities from detection to remediation. For the last several years, writing was done as an employee of IBM, and is retained by IBM as proprietary information. However, a sample is provided based on fictitious details.

View My Full Profile