Hiring Portfolio

20 Oct No Comments

Hiring Portfolio

Student’s Name

Instructor’s Name

Course Title

Date

Table of Contents

Cover Letter.……………………………………………………………………….……..3

Resume…………………………………………………………………………………….4

Memo From My Supervisor………………………………………………………………11

Letter of Appreciation…………………………………………………………………….12

Article……………………………………………………………………………………..13

Customer Survey……………………………………………………………………..……14

Awards…………………………………………………………………………………….14

Portfolio of Products……………………………………………………………………….14

Research Project……………………………………………………………………………15

References………………………………………………………………………………….17

COVER LETTER

Student’s Name

Address

City, State, Country

Email Address

Date

Hiring Manager’s Name

Company Address

Company City, State, Code

Hiring Manager’s Email Address

Dear Sir/ Madam (Name),

I am writing to you concerning the position of Information Technology Manager as I feel that I am perfectly qualified for the job. I have diverse experience in sales consultancy, marketing as well as in security.

In this regard, I have received high ratings, awards and recognition for efficiency and accuracy in these fields. I have excellent communication skills having dealt with clients of diverse culture, careers and ethnicity. I look forward to working with you if granted the opportunity. I appreciate you going through my portfolio. Thank you.

Sincerely,

(Name)

RESUME

Trevor Henry

10804 Ashfield Road * Hyattsville MD 20783 *

________________________________________________________________________________

OBJECTIVE__________________________________________________________________________

To find a challenging position, that allows the opportunity to utilize skills and experience to grow within the company.

EDUCATION__________________________________________________________________________

Argosy University Online

Working on Bachelor’s Degree in Information Technology

George C. Marshall Senior High School

Fall Church, VA – 1997

Certification

Smithsonian Institute-Asp Baton

Washington, DC – 2007

Smithsonian Institute-Special Police

Washington, DC – 2003

Allied Barton MD – SOMB Certificate

Maryland Unarmed security license

PROFESSIONAL

EXPERIENCE_________________________________________________________

Darcars Nissan of College Park, College Park, MD

New and Used Car Sales Consultant 11/2016-Present

Establish a customer base working face-to-face with a diverse society of careers, ethnicity, and tax brackest utilizing communication skills and marketing strategies.

Attended training sessions that developed negotiation techniques that were utilized to increase closing sales ratio and to overcome objections.

Demotrated all vehicle features to customers

Completed all scheduled training and certifications on all new vehicles.

Matched subprime customers with proper vehicles that meets their needs and wants.

Established long term relationship with customers developed a pattern of repeat sales, client loyalty and referrals.

Thompson Creek Windows, Lanham, MD

Field Marketer 05/2016-11/2016

Work as an Entry Level Sales team member knocking door to door visiting homes to promote Thompson Creek products by setting in-home customer appointments.

Six Flags America, Largo, MD

Security Officer 04/2014 – 10/2015

Checked bags, conducted mobile, and foot patrols according to park rules and provided overall security for the amusement park.

Greeted guests at front gates during check in and answered questions as needed.

Escorted employees when large sums of money were being transferred and escorted unruly guests out of the park as needed.

During concerts attended to VIP guests to ensure a safe environment.

Conducted Mobile patrols around and inside the park.

Six Flags America, Largo, MD

Security Officer 04/2013 – 10/2014

Checked bags, conducted mobile, and foot patrols according to park rules and provided overall security for the amusement park.

Greeted guests at front gates during check in and answered questions as needed.

Escorted employees when large sums of money were being transferred and escorted unruly guests out of the park as needed.

During concerts attended to VIP guests to ensure a safe environment.

Mobile Patrols conducted on foot and in vehicles.

Allied Barton, Silver Springs, MD

Security Officer August 2012- January 2013

Provided security for the building and all staff working in the facility by way of security cameras.

Answered phones as needed and provided appropriate entrance badges to employees and visitors.

Conducted roving foot and mobile patrols to ensure the safety of the building.

Six Flags America, Largo, MD

Security Officer May 2011 – September 2011

Checked bags, conducted mobile, and foot patrols according to park rules and provided overall security for the amusement park.

Greeted guests at front gates during check in and answered questions as needed.

Escorted employees when large sums of money being transferred and escorted unruly guests out of the park as needed.

During concerts attended to VIP guests to ensure a safe environment.

Smithsonian Institute, Washington, DC

Special Police Officer July 2002 – December 2009

Patrolled all galleries, halls, and all communal spaces to ensure the security of all ancient artifacts and delicate displays.

Supervised 15-45 security guards throughout the 12 Smithsonian buildings and maintained communication via two-way radio.

Oversaw assigned areas and checked all locks, alarms, and doors to provide a safe environment.

Ran the entrance x-ray machine and checked bags for all visitors entering the facility.

Followed government policies and procedures during all shifts.

Greeted visitors and answered questions as needed.

Carried a 38 revolver, Asp baton, OC spray and handcuffs during each shift.

Escorted high profile VIP’s during regular business hours, and to after hour events.

Conducted armory duty and issued weapons and ammunition to security staff.

C and D Security, Greenbelt, MD

Security Officer June 2002 – July 2002

Provided protection for the entire building and all employees working in the facility by way of safety cameras.

Answered phones as needed and provided appropriate entrance badges to staff and visitors.

Conducted roving foot and mobile patrols to ensure the safety of the building.

Initial Security, Greenbelt, MD

Security Officer January 2002 – June 2002

Provided protection for the entire building and all staff working in the facility by way of safety cameras.

Answered phones as needed and provided appropriate entrance badges to staff and visitors.

Conducted roving foot and mobile patrols to ensure the safety of the building.

Vance International, Greenbelt, MD

Security Officer October 2000 – January 2002

Provided security for the entire building and all staff working in the facility by way of security cameras.

Answered phones as needed and provided appropriate entrance badges to staff and visitors.

Conducted roving foot and mobile patrols to ensure the safety of the building.

Name of the Institution

Internal Memo

TO: Student’s Name

FROM: Supervisor’s Name

CC: The Human Resource Department

DATE: 10/12/2017

SUBJECT: Nomination for our Company’s Annual Awards.

I hereby write to you to congratulate you for the effort that you have put towards increasing the sales numbers over the past few months. More importantly, you’ve landed two great clients and managed to bring them on board. You have become a highly productive member of our team and we cannot fail to recognize that.

This has contributed greatly in raising our profits in the current financial year as compared to the previous one. This can be attributed to the various projects you came up with which have diversified our market and greatly increased our customer base. In this regard, we are glad to inform you that you have been nominated for our annual awards ceremony as sales-person of the year. The date for the said awards will be communicated on a later date. Congratulations.

(Signature)

Name

Supervisor

A Letter of Appreciation.

Dear Trevor,

I wish to extend my appreciation to you for being very patient with the difficult customers that you sometimes have to deal with. I have received positive feedback from our customers that you have been very patient, courteous and professional while handling them. Bearing in mind that some customers have extremely unreasonable demands, I must admit that you have very valuable skills in accommodating all of them

We understand that it can be difficult to keep all the customers happy and at the same time following the company’s set policies. We therefore recognize this as an organization and appreciate your efforts. Kindly continue maintaining the same positive attitude as it is reflecting positively in the sales profits.

Regards,

Michael.

ARTICLE

Safety and Health at the Workplace

The mental, physical, emotional and psychological wellbeing of employees at their place of work is very important as it enhances both organizational and personal success and resilience. Therefore, it is necessary for each and every individual to play their role in creating a healthy workplace both for themselves and for their colleagues (Rzepecki, 2012). This can be achieved by creating a positive culture in the workplace by ensuring that everyone feels supported and encouraged to do better. Additionally, there should be zero tolerance to discrimination. This is both a legal and a social requirement which ensures that everyone gets an equal chance at opportunities.

It is the responsibility of business leaders to ensure that their employees are working in a healthy business environment. The management can achieve this by making a commitment towards offering training and education about mental health.. Furthermore, the management should focus on aspects such as plants to create a serene environment, natural light, social spaces where employees can interact freely and standing desks versions. Emergency exits should also be created and well labeled.

In conclusion, as much as creating a healthy and safe workplace can be overwhelming; its positive returns can be experienced both in the long-run and the short-run. However, it doesn’t happen overnight. Regardless, it can be achieved through commitment by both the employees and the employer. This can be realized by setting realistic goals for the employees, offering helpful ideas and input as well as creating empowerment trainings and seminars.

Customer Survey.

Having been based in the sales and marketing fields for a long period of time, customer satisfaction was very important. I therefore carried out customer surveys frequently to ensure that our customers got the ultimate satisfaction from our wide range of goods and services. These surveys helped in focusing on, fulfilling and further exceeding the customer’s expectations.

Awards

Throughout my career, I have been won several awards for my outstanding performance. They include:

Portfolio of Products

  1. Sales-person of the year
  2. Best customer service provider
  3. Employee of the year

In my career, I have handled a variety of products. The sale of these products required a one-on-one meeting with the customer while others were ordered online and delivered as per the customer’s specifications. They include;

RESEARCH PROJECT

  1. Cars
  2. Windows
  3. Doors
  4. Information Security Article Analysis

    The article aims to discuss the influence of technological advancements through IT systems in institutions. First, the article discusses the benefits associated with the use of technological solutions in different institutions. However, after discussing the general points, the author heads straight to the theme where the paper highlights the potential risks associated with the increased use of technology. Therefore, the paper aims to discuss some of the risks associated with increased reliance and use of technological solutions and how they can negatively affect the business once exploited by malicious people.

    Impressively, the research relies on several initially conducted studies on the risks associated with large-scale reliance on IT. As a result of this, the author is able to focus on the major points while offering additional insights on how the technological risks emerge. By maintaining focus on a specific aspect of IT, that is, security; the author provides additional information which is relevant to research on IT. As it stands, not many articles can be found on modern security threats when dealing with information technology security threats (Peltier, 2013). Thus, the research helps provide new information while expanding on initially conducted studies in an attempt to come up with relevant solutions to the problem of increased security threats.

    Indeed, from analyzing the article and similar articles in the field of IT; it is safe to conclude that more research is required, more so in the topic of security for systems that rely heavily on IT solutions and technological advancements. As technology continues to improve so does the threats associated with technology (Andress, 2014). Therefore, this implies that it is necessary for scholars to conduct extensive studies on the need for improving security in systems that rely on advanced technology.

    Information security is an essential aspect of IT which ensures there exists more positives than negatives when dealing with technological solutions. Therefore, information security is a field of interest for people interested in improving the efficiency of technology influenced solutions. When necessary security measures are put in place, it is easier for different stakeholders to use the systems without the persistent fear of hacking or system infiltration.

    Article assessment

    The article in examination provides relevant information regarding information security. However, for increased accuracy, the author should have conducted a more extensive literature review. This would have enhanced the credibility of the article and consequently make it more relevant in regards to information security topics. Except for a few linguistic errors, the paper was well written although it lacked a concise thesis that explained the aim of the paper to the reader. The author mainly relied on initially conducted research as a point of reference as no direct study was conducted. Therefore, due to the high level of research and strategic utility of peer-reviewed sources, the article is appropriate, more so when dealing with issues regarding security. The paper can be used to understand the vulnerability of information systems and how best institutions can position themselves to reduce the instances of hacking or inappropriate use of the systems. What is more, the paper can be used as an avenue for conducting further research on the topic of information security. This gives scholars something to build on when tackling the topic in the future.

    References

    Andress, J. (2014). The basics of information security: understanding the fundamentals of InfoSec in theory and practice. Syngress.

    Nagata, T., Mori, K., Aratake, Y., Ide, H., Ishida, H., Nobori, J., Matsuda, S. (2014). Development of Cost Estimation Tools for Total Occupational Safety and Health Activities and Occupational Health Services: Cost Estimation from a Corporate Perspective. Journal of Occupational Health, 56(3), 215-224. doi:10.1539/joh.13-0277-fs

    Peltier, T. R. (2013). Information security fundamentals. CRC Press.




Click following link to download this document

Hiring Portfolio.docx