Experienced Quantitative Developer with a demonstrated history of working in the information technology and services industry. Skilled in IT Infrastructure Management, Databases, Front-end Development, Programming Languages, and Document Management. Strong research professional graduated from Asnuntuck Community College.
Exploit Analytics
-
Quantitative Developer | AnalystExploit Analytics 2016 - Present• Conduct high-level analysis of financial data• Translate complex concepts & data into meaningful & actionable business reporting• Assemble data sets from disparate sources & analyze using appropriate quantitative methodologies
-
Quantitative Analyst | Data Scientist (Type B)Exploit Analytics 2014 - 2016Develop dynamic & robust tools that apply technical algorithms to data. Utilize: large structured, semi-structured & unstructured data. Back test complex scenarios using statistical methods: time series, regression models & hypothesis testing.• Build report applications interfaces, data feeds & develop features in Visual Studio 2012• Decipher trends in complex data by applying modeling techniques• Create user-interface for capturing manually entered data & ad-hoc reports• Analyze time requirements, optimize code & refine complex formulas: Reduce latency & memory usage• Automated & manual assessment of code: Stored procedures ( Archiving, data transformation )• Gathered & collected information from various sources to provide a data pipeline• Validate, manipulate & perform exploratory data analysis on datasets• Root cause assessment of recurring product quality issues• Automation: Configuration scripts, Infrastructure code
-
Data Analyst | ProgrammerExploit Analytics 2011 - 2014Develop software programs to automate: Collection, Storage, Analysis & Archiving of data• Process improvements & code revisions reduced iSTAC assembly & build time by 92.22%• VBA Modules include complex functions to loop through form controls, VBA code working in conjunction with SQL Statements to manipulate data• Design pivot table dashboard, front end Excel/user form based application, which connects to a back end Access database using SQL & VBA for exporting & importing data
-
Data Analyst | Database DeveloperExploit Analytics 2010 - 2011Initiated architecture & implementation of MS Access Database to leverage & redeploy idle iSTAC data for Market Analysis & Research.• Designed & developed tables, relationships, forms & data validation in MS Access• Converted flat file Excel Spreadsheets to Access Database Tables. ACE (Access Connectivity Engine)• Output using Access as well as object oriented application output to Excel via Access VBA
-
Process Improvement SpecialistExploit Analytics 2010 - 2010• Spearheaded the design & creation of iSTAC a suite of web-scraping & data collection models that boosted data acquisition & data mining by 99.17%• Autonomous data manipulation & data cleansing via the automation of scripts conducting data transformation, file system manipulation, archiving & cleanup. Reclaimed 0.37 FTE
-
Programmer | AnalystExploit Analytics 2009 - 2010Data wrangling MS Excel VBA: Design & code new programs to automate time-consuming tasks• Create a reporting model using Excel to monitor transaction history & track profit & loss• Automate web harvesting: Unattended web navigation, login & data collection (IE, Firefox, Opera)
-
Data Security Analyst | It Analyst | Level Iii (Freelance Consultant)Travelers 2017 - 2017New York, Ny, Us• Create user-interface for capturing manually entered data & ad-hoc reports• Develop, maintain & support existing Excel VBA, VB, C# & PowerShell applications• Document process along with creating ad-hoc programs to automate manual tasks• Performed extensive research with technologies (TROUX, SIEM, SERTS, AD & LDAP) & meet with application owners identify/transfer owners in Active Directory groups -
Business Analysis Manager (Freelance Consultant)Cigna 2016 - 2016Bloomfield, Ct, UsVBA SME for CIGNA’s Informatics team for an Rx Carve out project. Convert legacy VBA Access rebate model to a SAS web based data system. Reverse engineered & documented all processing logic Including the GUI front end utilizing DDE & ODBC interface between DB2 data warehouse.• Work with business users & gather requirements• Document code along with creating business & technical documents for stakeholders• Support project managers with their changing requirements & needs• Provide status to stakeholders & met all KPIs ahead of project milestone• Provide technical insight to onsite & offsite team• Execute unit test cases for the new enhancements -
Computer Information Systems | White Hat HackerAcs Solutions 2003 - 2012Duluth, Georgia, UsProvide support for clients that have been referred to me through word of mouth as well as training for end-user clients & fellow coworkers on current computer related issues custom builds & diagnostic practices. Installing software & peripherals, re-imaging machines & performing a variety of related tasks.• Administrative duties through Active Directory, user privileges, access, account lockouts & password re-sets• Network Mapping, Network drives & shares, profile backups to network shares• Password recovery, data backup & migration, PST files, desktop, user settings & favorites• Network & local printer additions printer set-up, local printer set-up, default printer assignment, printer maintenance, paper jams, online status, cartridge replacement• Imaging remotely & desk side deployment software installation/replacement & maintenance of XP, Vista, windows 7, via Ghost, Acronis & Windows Backup• Workstation hardware upgrades/installation & peripheral assembly PSU, CPU, GPU, memory upgrades, HDD/SDD, keyboards motherboards & LCD monitors• Application installations, support & user; end user training, upgrading, & supporting various desktop/laptop hardware/software & troubleshooting: HP, Compaq, Lenovo, Dell, Gateway, Acer, Asus, Sony, Samsung, Toshiba & custom build PCs Windows.98, 2000, XP Vista, Windows 7• Office 2000, 2007, 2010: Excel Power user, Advanced Access, Word, & PowerPoint user. Efficient in Outlook, OneNote, & Visio Studio.• Customer service & sales; appointment setting with users, & user follow-up; user education on software, wireless security & settings, connectivity issues defensive computing anti-virus, AVG, McAfee, NOD, Kaspersky & Symantec anti-virus & firewall setup operation. Virus removal -
Shift SupervisorStarbucks Coffee 1996 - 2003Seattle, Wa, Us•Maintain open & friendly atmosphere with strong customer focus •Manage all aspects of store operation•Part of an elite team handpicked to facilitate training at new/underperforming stores (CT, MA, NY, & PA)
Ken Bell Skills
Ken Bell Education Details
-
Stanford UniversityStanford Engineering Everywhere -
Asnuntuck Community CollegeComputer And Information Systems -
Asnuntuck Community CollegeManufacturing
Frequently Asked Questions about Ken Bell
What company does Ken Bell work for?
Ken Bell works for Exploit Analytics
What is Ken Bell's role at the current company?
Ken Bell's current role is Problem Solver & Innovator | Business Analyst | Project Manager | PCI Compliance Enthusiast | Quantitative Development | IT Consulting.
What schools did Ken Bell attend?
Ken Bell attended Stanford University, Asnuntuck Community College, Asnuntuck Community College.
What skills is Ken Bell known for?
Ken Bell has skills like Mysql, Vb6.0, Powerpoint, Vista, Algorithms, Active Directory, Computer Hardware, Debugging, Dreamweaver, Storage Area Networks, Windows Server 2008, Photoshop.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial