Sign in

Beate Lemieux

Photo

Unternehmensberaterin, Business Analyst

Hamburg, Bremen, Osnabrück, Düsseldorf, Bayers, Österreich

Profile

I have been providing business consulting services and integration of technical solutions with processes to the public and private sector for over twenty (20) years.

I am certified in Six Sigma Green Belt, ITIL, and a Process Master and offer an in-depth knowledge on how to leverage and integrate technologies with processes to reduce overall costs, enhance profits, and improve service delivery and resource utilization.

In addition to my extensive knowledge in process development and client service management, I am a certified Assistant Business Continuity Professional (ABCP) with proficient knowledge in business continuity planning including risk assessments, business impact analysis, recovery procedures and (IT security) incident management.

I am a creative and systemic thinker who is results-driven, highly analytical, detail-oriented, organized and has excellent time management and communication skills.

I am fluent in German and English.

 

Experience

Self-Employment

January 2004 – today: Thought-Evolution Inc., Ottawa, Ontario

Clients: Employment and Social Development Canada (ESDC), Public Service and Procurement Canada (PSPC/PWGSC), Department of National Defence (DND)/Canadian Armed Forces (CAF), Public Safety Canada, Immigration and Refugee Board (IRB),Health Canada, Infrastructure Canada, Correctional Services Canada (CSC), Parliamentary Protective Services (PPS), Canada Border Services Agency (CBSA), Transport Canada (TC), Global Affairs Canada (GAC), Treasury Board OCHRO, City of Ottawa, Environment Canada, CSE, Industry Canada, Stentor/Bell

o   Business Continuity and Disaster Recovery Planning:

–        Developed Business Continuity and Disaster Recovery Plans

–        Performed Business Impact Analysis  (incl. impact on humans/workforce and property; critical systems, facilities, business and operational processes, and applications)

–        Developed communications strategy, identified general duties of individuals

–        Developed mitigation strategy to prevent/minimize business impact

–        Developed Incident Handling and IT Security Management processes

–        Developed technology recovery plans with IT teams (addressing infrastructure, network, application, security requirements)

–        Established procedures/processes to test BCP/DRPs

–        Performed Risk Identification and Vulnerability Analysis (identifying risks that the business could face incl. natural disasters, technological interruptions, civil emergencies)

o   Process Development (Business, Operational, Supply Chain)

–        Mapping and maturity assessment of Business, Operational and Supply Chain Processes and their technology integration

–        Mapping/development of ITIL Functions and Processes: Services Desk, Business Intake/Service Request handling, Change and Release Management, Configuration/Asset Management

–        Established work priorities, assigned deliverables and resolved issues with Operations and Project teams.

–        Developed and recommended corrective measures aimed at improving supplier performance in terms of on-time, lead-time and quality.

–        Established relationship with Corporate Legal and Risk Management to ensure all contractual terms and conditions comply with standard or other contract changes are formally reviewed and approved by legal/risk management.

–        Identified and controlled high risk items, including daily status reporting to management

–        Responsible for developing and presenting supply chain recommendations that capitalize on client opportunities by improving workflows that eliminate operational and process challenges while providing maximum economic benefit

–        Lead white-boarding sessions with large inter-departmental groups and functional leaders to map out business processes

–        Worked closely with the Inventory Manager to create a standard to improve inventory tracking

–        Developed Corporate and IT security policies, processes and procedures

–        Defined and recommended Key Performance Indicators (KPIs) including lead times for service delivery teams and Service Level agreements to ensure on time delivery of services and/or products

–        Monitored forecasts and evaluated supplier performance to ensure quality and delivery requirements are met; discussed performance metrics, provided feedback, and recommended corrective measures

–        Documented and assessed as-is supply-chain and operational processes and designed to-be processes for greater cost savings, quicker services and/or product delivery

–        Performed analysis of supply and demand of products and/or services;

–        Compiled and analyzed data to determine the feasibility of acquiring products and/or services

–        Developed and implemented procedures and methodologies to facilitate improvements in operational processes

–        Analyzed and recommended how to improve sourcing strategies, procurement processes, reduce costs

 

o   Architecture Development

Enterprise/Business Architecture

–     Analyzed existing and/or developed new organizational core capabilities for decision-making activities (planning and enabling) and execution/implementation activities (sourcing, development, implementation/delivery, monitoring and reporting)

–     Interviewed senior management levels to understand vision, mandate, business objectives and goals, and level of leadership

–     Provided specialized business management and technical advice various architectural components for departments as part of architectural framework development

–     Performed high-level analysis of complex problems and make recommendations via road maps;

–     Analyzed and/or developed business/enterprise transformation strategies and plans

–     Collaboratively worked with multiple stakeholders to collect, analyze and document requirements (business, stakeholders, end-users, functional and non-functional requirements)using workshops, interviews and process maps to develop solutions that benefit all areas of the organization, obtain agreement on requirements for IT architectural services and resolve architectural issues.

–     Conducted research and feasibility studies to facilitate the development, maintenance and renewal of complex architectural solutions

–     Analyzed current and/or modeled new business processes as part of renewing the enterprise architecture model

–     Developed and/or analyzed enterprise architecture artifacts and documentation using various representation formats including text, graphics, diagrams, process models and sometimes tabular formats or as a mix of these formats; artifacts included business capability models, business process models, heat maps, enterprise architecture domains

–     Ensured alignment between enterprise architecture model and business objectives and goals

–     Provided architectural design direction to working groups if/when required in enterprise/business architecture and/or end-to-end solution architecture

–     Recommended a set of activities that an organization could use to actualize its organizational business and operational strategy (aka value proposition)

IT Security Architecture

–     Collaboratively worked with system administrators and IT Security specialists to ensure confidentiality, integrity and availability of data and information, compliance, proper process flow, clear demarcations of roles and responsibilities during technology integration and business transformation projects.

–     Assisted in gathering and documenting personnel, physical and IT security requirements (including account RBAC/access controls to systems and databases) for Statement of Sensitivities (SoS), Threat and Risk Assessments (TRA) during business and project planning exercises;

–     Developed Business Continuity and Disaster Recover plans and procedures

–     Designed Incident Handling/Response process (including response procedures for IT security incidents)

–     Developed Corporate and IT security policies, processes and procedures

–     Established relationship with Corporate Legal and Risk Management to ensure all contractual terms and conditions comply with standard or other contract changes are formally reviewed and approved by legal/risk management.

–     Reviewed and documented maturity levels of IT security when mapping operational and work processes; using “Current State” versus “To Be” methodology for identifying the security gaps

–     Developed an IT/IM security management, associated security policies, procedures and SDLC integration activities

–     Created an IT security technical reference architecture and documented current state security capabilities, current state gaps and future state roadmap aligned with IT and business strategies

–     Developed or contributed to IT/IM Security Governance development

Information and Data Architecture

–     Analyzed methods of how data is collected, stored and shared within business and operational processes

–     Developed a data collection process for IT security operations

–     Analyzed how and how much data is collected and how it was used for performance reporting

–     Defined and documented Metadata standards and practices, including naming standards, and modeling guidelines for Enterprise Information Management (EIM) solutions

–     Developed folder structures for IM solutions

–     Mapped current state processes and re-designed them with new technologies to create a more automated process for cost and time savings

Collected, documented and analyzed records management processes including record destructions and archival procedures and made recommendations on how to move from manual to automated records management

 

o   Program and Service Performance Management

–        Development of Performance Measurements  (KPI’s) and management practices

–        Development of a Service Performance Management Program

 

o   Requirements Development

–        Collection, Analysis and documentation of Requirements Development (business, stakeholders, end-users, functional and non-functional requirements)using workshops, interviews and process maps

 

o   Project Management

–        Creating Work Breakdown Structures/project plans

–        Scheduling of meetings and preparing meeting agendas

–        Facilitating meetings and taking minutes

–        Updating project plans, tracking tasks and milestones; engaging cross-functional, multiple teams

–        Monitoring critical path

–        Project Risk management and quality control plans

Full-Time Employment

May 2001 – August 2003 : CGI, Ottawa, Ontario:

IT Security Consultant

–        Designed (mapped) operational processes using MS Visio/iGrafx to reduce costs, cycle times and improve client services (reviewing and identifying flow of information; reviewing and identifying decision flows, reporting structures/roles and responsibilities)

–        Drafted and recommended an initial corporate governance system of policy, rules, practices and processes by which the department would be directed and controlled and to balance the interests of many stakeholders including corporate and operational managers, employees, customers, suppliers, HR, and Finance to support the fulfillment of corporate mandate and IT security services

–        Identified and evaluated critical success factors and performance measurements relating to security management and operations (metrics and KPIs)

–        Performed interviews to collect additional information for roles and responsibilities

–        Assisted in the improvement of the documentation structure to support operational and business processes (aka business classification scheme and business process model Reviewed/updated documentation structure if and when required

–        Performed various aspects of project management responsibilities; including the preparation of work plans, identifying issues, risk management (incl. system accreditation and certification), and progress against schedule, providing weekly status reports; perform scheduling, defining deliverables, organize and hold meetings, assisting in developing an information gathering and analysis strategy for processes and procedures

–        Developed detailed, technical documentation for application installation and configurations of servers (including security configurations)

–        Installed, configured and tested Intrusion Detection System (IDS) as part of COTS purchase option

–        Installed, configured and tested Cisco Routers

–        Developed, organized and facilitated workshops with stakeholders and process design team members

–        Worked with and assisted system administrators to ensure integration, conformity, proper process flow, clear demarcations of roles and responsibilities, etc. and developing an implementation strategy for installation processes for progression through various project stages to reach the desired target state

–        Facilitated interviews as it relates to the development of visions, leadership and team building including  management teams

–        Reviewed existing System Development Life Cycle (SDLC) for the SESD Lab operations, recommended improvements, and re-designed various sections of the SESD waterfall methodology

–        Designed (mapped) operational processes (incl. IT Security and ITSM processes) using MS Visio to reduce costs, cycle times and improve client services (reviewing and identifying flow of information; reviewing and identifying decision flows, reporting structures/roles and responsibilities)

–        Drafted and recommended an initial corporate governance system of policy, rules, practices and processes by which the department would be directed and controlled and to balance the interests of many stakeholders including corporate and operational managers, employees, customers, suppliers, HR, and Finance

–        Developed and recommended critical success factors and performance measurements (metrics and KPIs)

–        Assisted in developing estimates and costing tables while working on business case(s) and business requirements documentation

–        Interviewed various stakeholders including functional analysts, system developers and other subject matter experts on software and applications

–        Performed  risk analysis in preparation of lab and systems accreditation and certification

–        Developed, organized and facilitated workshops with stakeholders and process design team members

–        Worked with and assisted process owners to ensure integration, conformity, proper process flow, clear demarcations of roles and responsibilities

–        Developed a process implementation strategy for the new business processes for progression through iterations to reach the desired target state

–        Reviewed organizational structure and processes to determine the core competencies and responsibilities of various positions during process design and recommend new key responsibilities and accountabilities

 

August 2000 – January 2001: JAWZ Inc. Ottawa, Ontario

IT Security Administrator

–        Developed, organized and facilitated process (re)design workshops;

–        Provided user training for technical aspects of the managed security services;

–        Administered and monitored PKI infrastructure and systems

–        Issued/revoked PKI certificates

–        Developed operational processes and procedures to protect the confidentiality, integrity, and availability of client information, data and records;

–        Performed editorial services; recommended and assisted client in the improvement of the documentation structure to support operational and business processes (aka business classification scheme and business process model reviewed/updated documentation structure if and when required

–        Researched, evaluated and/or developed new policies and cross border IT Service Delivery and Support processes to assure compliance for established Service Level Agreements (SLAs) and Operation Level Agreements (OLAs) for the managed services.

 

May 1999 – May 2000 : ePresence (Banyan, Boston, Massachusetts) Ottawa, Ontario

IT Security Consultant

–        Documented and analyzed IT security processes and procedures in relation to established IT Service level agreements and metrics

–        Documented and analyzed business  processes to determine level of integration with operational process and fulfillment of business objectives and goals

–        Documented, analyzed and made recommendations for  information management (including record keeping practices) and how to improve recordkeeping management practices to protect the confidentiality, integrity, and availability of company and client information, data and records

–        Developed and recommended enhanced Asset and Application Portfolio Management practices for greater cost control and better business planning capabilities

–        Evaluated and made recommendation for improving Performance Management and measurements

–        Provided network troubleshooting and remote server management.

–        Network and System Monitoring

–        Development of IT Security processes and documentation

April 1999: Compaq Call Center, Gatineau, Quebec:

Call Center Agent

–        Enterprise IT Service Call Center support

–        User training

–        Network troubleshooting

–        Remote server management

 

Education

July 1974 – July 1979 : Heinrich-von-Oytha-Schule, Altenoythe (Friesoythe), Niedersachsen, Germany, High School Diploma

August 1979 –  July 1982 : Hannelore Hartmann and Handwerkskammer Oldenburg with coordination of the Oldenburger Berufsschule (Oldenburger Trade Colleges), Trade and Journeyman’s Diploma

April 1998 – December1998 : Algonquin College, Ottawa, Ontario, System Support Specialist Program Certificate

Courses

February 1999 : Compaq Canada, Ottawa, Ontario, Compact Severs and Software training

March 1999 : Delcom International, Ottawa, Ontario, A+ Certification Program Certificate

April 2000 : Cisco Systems Canada, Ottawa, Ontario, Canada, Cisco Certified Network Associate Certificate

January 2001 and October 2002 : Entrust Canada, Ottawa, Ontario

–        Entrust PKI (R5.x) Management Certificate

–        Securing Web-Business Solutions Certificate

October 2002 and May 2003 : Learning Tree International, Ottawa, Ontario

–        PKI in the Enterprise Network Vulnerability Assessment and Defense Certificate

–        Network Vulnerability – Assessment and Defense Certificate

December 2004 – April 2005: Algonquin College, Ottawa, Canada

–        Introduction to Project Management

–        Risk and Quality Management

–        Project Planning and Definition

–        Procurement and Contracting

April 2005 :  AXELOS ITIL Foundation Self Study, ITIL Foundation  Certificate

November 2005 – May 2006 : Michael Hammer & Company, Boston USA, Process Master Program Certificate

June 2006 : SAP Canada, Montreal, Quebec, SAP 01 SAP Overview of all 12 modules

August – November 2007 : APICS Canada, Ottawa, Ontario, APICS Supply Chain Professional

October 2010 :  McGill University, Montreal Quebec , Six Sigma Green Belt Certificate

January 2011 : Carleton University, Ottawa , Human Resources Planning

March 2020 : DRI – Self-Study Business Continuity Planning  , DRI Associate Business Continuity Professional (ABCP) Certificate

 

Deutsche Sprachkenntnisse: Deutsch C2 Muttersprache: Deutsch

Ausbildung

April 1998 - December 1998

System Support Specialist at Algonquin College, Ottawa Ontario Kanada

Berufserfahrung

January 2004 - heute

Unternehmensberaterin, Business Analyst at Thought-Evolution Inc.

  • Aktualisiert vor 2 Wochen
  • Deutsche Sprachkenntnisse: Deutsch C2

Share on