Available for Remote Opportunities

I operate enterprise systems, identity, and infrastructure at scale.

IT Specialist (Support) | Identity & Systems Operations

Supporting 300+ users and 400+ endpoints across secure enterprise environments.

Operating in a federal enterprise environment supporting mission-critical systems.

300+

Users Supported

400+

Endpoints Managed

98%

Patch Compliance

Bobby Litmon - IT Specialist and Systems Administrator
Verified Professional
Systems & Endpoint Operations
Identity & Access Management
Enterprise Support & Tier II Escalation
Infrastructure Support & Deployment

Approach

How I Operate in Enterprise Environments

I don't just resolve tickets — I operate systems.

Root Cause Focus

I focus on root cause, not symptoms. When issues arise, I diagnose systematically to prevent recurrence.

Impact-Based Prioritization

I prioritize based on operational impact, user access, and system dependencies.

Security-First Access

In identity scenarios, I evaluate risk before granting access, ensuring least privilege and compliance.

Scale Thinking

In endpoint and infrastructure work, I think in terms of scale — not one device, but patterns across hundreds of systems.

I work independently in environments where decisions matter, systems are interconnected, and downtime has real consequences.

Problem Solving

Decision-Making in Real Environments

Examples of how I approach real-world IT scenarios in enterprise environments.

These scenarios reflect how I approach real-world issues involving identity, endpoints, and enterprise systems.

Identity & Access Issue

A user reports being locked out of critical systems. My approach is to verify identity, analyze authentication logs, and determine whether the issue is user error, misconfigured access, or a potential security concern. I prioritize restoring access quickly while ensuring security policies are not bypassed.

Endpoint Failure / Device Issue

A device fails or experiences performance issues. I assess whether it's an isolated issue or part of a broader pattern across multiple endpoints. From there, I determine whether to troubleshoot, reimage, or escalate based on impact and system dependencies.

High-Priority / Escalated Issue

An issue impacts multiple users or critical operations. I prioritize based on business impact, communicate clearly with affected users, and work toward rapid resolution while identifying the root cause to prevent recurrence.

System-Wide Issue / Outage Scenario

Multiple users report access or system failures at the same time. I first determine whether this is a localized issue or a broader system outage by checking patterns across users, devices, and services. I prioritize identifying the root cause (identity, network, or service failure), communicate status updates clearly, and focus on restoring functionality while preventing further disruption.

Security / Suspicious Activity Scenario

A potential unauthorized access or suspicious login is detected. I approach this by validating the event, reviewing authentication activity, and ensuring access is restricted if necessary. I balance immediate response with investigation, maintaining security while minimizing disruption to legitimate users.

Capabilities

Scope of Responsibility

Enterprise-level operations with infrastructure ownership and independent decision-making.

Enterprise IT Operations

Advanced troubleshooting and operational support for complex enterprise environments

Infrastructure Deployment

Site setup, network readiness, system deployment, and environment demobilization

Identity & Access Lifecycle

Provisioning, deprovisioning, MFA enforcement, and IAM workflow management

Endpoint Management at Scale

Imaging, patching, compliance enforcement, and full lifecycle management

Network & Physical Infrastructure

Troubleshooting, cabling, patching, and connectivity resolution

Executive User Support

Priority issue resolution for senior leadership with complex requirements

Results

Impact & Operational Value

Measurable outcomes from enterprise IT operations in a secure federal environment.

~0%

Reduced Downtime

Rapid issue resolution and proactive monitoring

0%

System Compliance

High compliance across all managed endpoints

0+

Tickets Weekly

Resolved in enterprise environment

0+

Endpoints Managed

Tier II escalations and high-impact incidents

Track Record

Key Accomplishments

Improved Troubleshooting Efficiency

Documented workflows and reduced repeat issues through process improvement and knowledge sharing.

30–50 Issues Resolved Weekly

Consistent technical issue resolution across identity, endpoint, and access systems.

98% Endpoint Compliance

Maintained high security compliance across all managed devices through proactive monitoring.

Secure Onboarding/Offboarding

Supported user lifecycle workflows ensuring secure access and minimal operational disruption.

Currently Targeting

Ready to Interview For

Enterprise IT experience. Linux and Python capability. Operational discipline. Looking for roles where I can deliver value immediately.

Systems Administrator
IT Operations Specialist
Identity & Access Management (IAM)
Endpoint Management / MDM
Cloud Support / Infrastructure

About

Enterprise IT Operations That Deliver Business Value

IT Specialist (Support) at FEMA
Federal Emergency Management Agency
Targeting: Systems, IAM, Cloud, Security

At FEMA, I serve as a primary IT support contact for enterprise environments, delivering advanced troubleshooting across identity, endpoint, and infrastructure systems.

I support 300+ users and manage 400+ endpoints across distributed environments, operating independently in high-impact situations where system availability and access are critical.

My work spans identity and access management (Entra ID, Okta, RBAC, MFA), endpoint operations (SCCM, JAMF, Intune), and infrastructure support including device deployment, network patching, and collaboration systems.

My work focuses on maintaining system reliability, reducing disruption, and ensuring users can operate without interruption.

Capabilities

Technical Stack

Production experience. Not lab projects. These are tools I use daily to support enterprise operations and solve real business problems.

Identity & Access

Active DirectoryEntra ID / Azure ADOktaMFA AdministrationAccess ProvisioningGroup-Based Access ControlSSO Fundamentals

Systems & Endpoint Operations

Windows SupportLinux AdministrationSCCMJAMFPatch ComplianceEndpoint LifecycleDevice ProvisioningRemote Troubleshooting

Cloud & Productivity

Microsoft 365Exchange / OutlookTeams AdministrationOneDriveSharePointAWS Fundamentals

Automation & Scripting

Python ScriptingProcess AutomationTroubleshooting ScriptsBash FundamentalsOperational Documentation

Security & Operations

NessusEndpoint SecurityVulnerability AwarenessZero Trust ConceptsTicket TriageIncident SupportServiceNow

Strategic Development

Certification Roadmap

Targeted certifications that formalize existing enterprise experience and expand into cloud infrastructure and security. Each credential aligns with skills I already use in production environments.

CompTIA A+ certification badge

CompTIA A+

In Progress

Validates enterprise hardware, OS, and troubleshooting foundations I use daily at FEMA.

CompTIA Network+ certification badge

CompTIA Network+

In Progress

Formalizes network infrastructure experience from site deployments and troubleshooting.

CompTIA Security+ certification badge

CompTIA Security+

In Progress

Aligns with security compliance work and vulnerability awareness in federal operations.

Microsoft Azure Administrator certification badge

Microsoft Azure Administrator

Q4 2026

Extends Entra ID and M365 experience into broader cloud infrastructure management.

Okta Certified Professional certification badge

Okta Certified Professional

Q4 2026

Validates Okta IAM administration experience from current enterprise environment.

Development Philosophy

I pursue certifications that validate real operational experience, not fill resume space. Each credential on this roadmap corresponds to systems I administer daily in enterprise environments. The goal is formal validation of existing capability, plus structured expansion into cloud infrastructure and security operations.

Academic Foundation

Education & Credentials

Academic foundation in information technology, cybersecurity, infrastructure, and business-driven IT operations.

University of Cincinnati logo
Graduate Degree

Master of Science in Information Technology

University of Cincinnati

  • Graduate-level study focused on applied IT, cybersecurity, IT infrastructure, and enterprise systems
  • Core coursework: System Administration, Database Management, Programming
  • Curriculum aligned with real-world enterprise IT environments
University of Cincinnati logo
Graduate Certificate

Graduate Certificate in Data-Driven Cybersecurity

University of Cincinnati

  • Cyber threat analysis, incident response, and data protection
  • Network security and IT infrastructure continuity
  • Hands-on cybersecurity and data analytics development
Columbia Southern University logo
Undergraduate Degree

Bachelor of Science in Business Administration – Information Technology

Columbia Southern University

  • Combined business and IT foundation
  • Technical: Data Communications, Systems Analysis, Database Design, Programming, Web Development
  • Leadership: Decision-making, problem-solving, and strategic IT planning

Relevant Areas of Study

System AdministrationCybersecurityIT InfrastructureDatabase ManagementProgrammingData CommunicationsSystems AnalysisIT StrategyBusiness Leadership

Background

Career Track Record

Senior-level enterprise IT. Complex problem solving. Independent decision-making. Infrastructure ownership from deployment to demobilization.

Featured

Senior IT Specialist – Enterprise Operations & Infrastructure

FEMA

CurrentFederal Government

Enterprise IT operations in a mission-critical federal environment. Improved system reliability through faster issue resolution. Reduced repeat incidents through documentation and process improvements. Maintained operational continuity in high-demand environments.

Identity & Access Management: Active Directory, Entra ID, Okta. User provisioning, MFA enforcement, and IAM workflows at enterprise scale.
Enterprise Endpoint Management: 400+ endpoints via SCCM, JAMF, and Intune. Imaging, patching, and 98% security compliance.
Mobile Device Management: Intune deployment and policy enforcement for enterprise mobile fleet.
Network & Infrastructure: Troubleshooting, cabling, patching. Infrastructure planning and deployment for new operational sites.
Linux & Automation: Linux systems administration. Python scripts that eliminate manual overhead and reduce operational errors.
Executive Support: 300+ users including senior leadership. Complex problem solving and independent decision-making.
Collaboration Systems: Microsoft 365 administration (SharePoint, Teams). Video conferencing configuration.
Documentation & Process: Security troubleshooting, vulnerability awareness, and process improvement documentation.

Work

Built to Solve Problems

Production projects with real operational impact. Built to solve actual pain points, not lab exercises.

IAM Security Dashboard

Problem

Limited visibility into identity risks, MFA compliance, and privileged access

Action

Built enterprise IAM dashboard with risk scoring, MFA tracking, and privileged access monitoring

Result

Real-time identity risk detection. Zero Trust alignment. Actionable security insights.

Entra IDOktaIAMZero TrustReact
View IAM Dashboard

SCCM Endpoint Compliance Dashboard

Problem

Reactive ticket response leading to preventable system issues

Action

Built real-time endpoint health and compliance dashboard with risk-based prioritization

Result

Cut reactive ticket volume. Data-driven maintenance scheduling that prevents issues.

SCCM/MECMPythonSQL ServerData Analytics
View SCCM Dashboard

Remote IT Support Automation Toolkit

Problem

Manual, repetitive IT troubleshooting tasks consuming support time

Action

Built modular Python scripts to automate endpoint diagnostics and generate summary reports

Result

Standardized troubleshooting workflows. Reduced manual diagnostic steps. Consistent execution.

PythonIT SupportAutomationSystems Admin
View Toolkit

Background

From Emergency Response to Enterprise IT

Before IT, I worked in emergency response — where decisions are time-sensitive and consequences are real.

That same mindset carries into how I operate in IT: prioritize impact, act decisively, and maintain operational stability under pressure.

Resume

Ready to Make an Impact

Download my resume or view the recruiter-optimized version tailored for technical hiring managers evaluating IT operations, systems, and identity management candidates.

Targeting Roles

Systems AdministratorIT SpecialistIAM / Identity OperationsEndpoint OperationsCloud / Support Operations
Recruiter Preview
PDF ResumeUpdated

Bobby Litmon

Senior IT Specialist | Systems Administrator

Enterprise IT professional with experience in identity and access management, endpoint operations, Microsoft 365 administration, infrastructure support, and secure federal environments.

IAMActive Directory, Entra ID, Okta
Endpoint ManagementSCCM, JAMF, Intune
Microsoft 365SharePoint, Teams, Exchange
InfrastructureNetwork Patching, Site Operations
ComplianceSecurity Documentation, Executive Support
Recruiter Ready

Connect

Let's Connect

Open to remote Systems Administrator, IAM, and IT Operations opportunities.

If you are hiring for enterprise IT roles, I would welcome the conversation. Let's discuss how I can deliver results for your team.

Send a Message

Quick Actions

Response Commitment: All inquiries receive a response within 24-48 hours. For urgent opportunities, please indicate in your message.