Fabian Valencia

IT Support / Systems / AutomationAmerica/Los_Angeles

I build stable, secure IT environments and automate the repetitive work that slows teams down. Strong in troubleshooting, identity, and scripting — with a bias for documentation and measurable impact.

6+ yrs IT experiencePowerShell automationAD/Azure AD identityM365 admin

Stack snapshot

A quick cheat sheet for what I work with. Swap tags to match your real toolset.

Core

  • Identity & AccessStrong
    AD / Azure AD, GPO, SSO/MFA concepts
    Active DirectoryAzure ADGroup PolicySSOMFA
  • M365 AdministrationComfortable
    Teams, SharePoint basics, licensing, Exchange fundamentals
    M365Teams AdminSharePointExchange
  • NetworkingComfortable
    DNS/DHCP, VPN basics, Wi-Fi troubleshooting
    DNSDHCPVPNWi-Fi
  • ScriptingStrong
    PowerShell automation, reporting, bulk changes
    PowerShellAutomationReporting

Tools I use

  • TicketingSwap as needed
    Jira Service Management / ServiceNow / Zendesk
    SLAKBIntake
  • EndpointPick yours
    Intune / Jamf / RMM
    Device MgmtCompliancePatching
  • Remote SupportDaily
    RDP / TeamViewer / AnyDesk
    User commsEscalations
  • DocumentationAlways
    Confluence / Notion / internal KB
    RunbooksSOPsTemplates

Tip: keep this truthful. “Strong / Comfortable / Familiar” reads well to hiring managers.

Projects

Readable in 10 seconds, with optional technical depth.

Automated Onboarding + Access Provisioning

PowerShellAD / Azure ADM365Automation
Problem: Onboarding was manual and inconsistent.
Solution: Standardized checklist + scripted steps.
Impact: Fewer missed permissions; faster day-1 readiness.
Technical notes
  • Inputs: new-hire CSV / form submission (name, dept, manager, start date).
  • Provisioning: create user, group assignment, mailbox/licensing, baseline apps.
  • Safety: dry-run mode, logging, and rollback notes.
  • Edge cases: name collisions, rehires, contractor rules, department overrides.
# Example skeleton (replace with your real script)
param(
  [string]$CsvPath,
  [switch]$WhatIf
)

Import-Csv $CsvPath | ForEach-Object {
  # 1) Validate inputs
  # 2) Create AD/AAD user
  # 3) Assign groups + licenses
  # 4) Log every action
}

Device Compliance + Patch Baseline Reporting

Intune/JamfReportingPolicySecurity
Problem: Patch posture was inconsistent; compliance visibility was weak.
Solution: Defined a baseline + automated reporting with thresholds.
Impact: Clearer risk view; faster remediation loops.
Technical notes
  • Baseline: OS version, encryption, AV, lock screen, patch cadence.
  • Scheduled report + alert thresholds (new non-compliant devices, overdue patches).
  • Playbook: notify → safe auto-remediate → escalate via ticket.
# Example: report structure
DeviceName, Owner, OSVersion, Encryption, LastPatchDate, ComplianceState
LAP-1021,  A.User,  23H2,     True,       2026-01-01,  Compliant

Ticket Triage Rules + Knowledge Base Cleanup

ProcessKBSupport OpsDocumentation
Problem: Repeat tickets + slow handoffs.
Solution: Routing rules + refreshed KB + templates/macros.
Impact: Faster resolution; fewer repeat issues.
Technical notes
  • Built a category taxonomy (Access, Devices, Networking, Apps, M365).
  • Standard response macros + “minimum info required” per ticket type.
  • KB: pruned outdated articles; added troubleshooting flowcharts.
# Example: intake checklist snippet
- What changed?
- Exact error message/screenshot?
- Device + OS?
- Network (office/home/VPN)?
- Steps to reproduce?

Labs

Small experiments and utilities that show curiosity without cluttering the main work section.

PowerShell Utility Pack

Scripts for user audits, license reporting, bulk updates, and safe dry-run outputs.

PowerShellCSVReporting

View repo →

Homelab: Identity + Network Sandbox

AD/DNS testing, policy experiments, and “break/fix” drills to validate changes before production.

AD LabDNSGPO

(Optional) Add diagrams/screenshots here later.

Experience

Impact-first bullets with optional depth. Replace placeholders with your real roles.

  • Owned endpoint support workflows; improved resolution quality with documentation + templates.
  • Led identity/access tasks (onboarding/offboarding, permissions hygiene) with least-privilege habits.
  • Automated repetitive tasks with PowerShell to reduce manual overhead and errors.
M365AD/Azure ADPowerShellNetworkingSaaS Admin
  • Handled ticketing, escalations, and root-cause investigations.
  • Supported Windows/macOS devices, accounts, printers, VPN, and common SaaS apps.
  • Improved internal KB so fixes were repeatable and fast.
WindowsmacOSVPNTicketingDocumentation

Certifications & tools

Even “in progress” items help if you label them clearly.

Certifications

CompTIA A+ (example)Azure Fundamentals (in progress)Security+ (in progress)ITIL (optional)

Replace these with your real certs (or remove this box entirely).

Toolbelt

M365Azure ADIntuneJamfJira/ServiceNowConfluence/NotionRDPVPN

Keep this as recognition, not a dumping ground.

Contact

Want someone who can troubleshoot fast, automate safely, and document what matters? Send a message.

Let’s talk

I’m open to roles focused on IT support, systems administration, and automation. If you’re hiring, the fastest way is email.

Optional: add a scheduling link here later.