Jessica Madrid

Payroll Specialist Miramar, FL
Share on facebook
Facebook
Share on google
Google+
Share on twitter
Twitter
Share on linkedin
LinkedIn

What’s your work-life philosophy?

Enjoy what you do and do it with a smile. I am a true believer that our actions can make the difference, don’t be afraid to leave your footprints for others to follow.

How does HR strive to create a great company culture?

Over the years, HR has strived to create a culture where all our employees feel they are an important part of the company, and that together we can achieve great things.

What’s your best professional advice?

Believe in yourself, there is no better reward than seeing the fruits of a job well done.

Being new to UDT and starting virtually, how would you describe the UDT culture?

I was pleasantly surprised to find myself sharing screens with my co-workers, who happened to be miles away, and still feel the person-to-person connection.

What is your favorite part of your position?

Being able to help and guide our employees with their needs.

What are some of your hobbies?

I love going on road trips, it clears my mind. I will also stay up until late at night reading a good book. And of course, going to the beach and listen to the sound of the waves.

People would be surprised if they knew you…

Love soccer.

More to explore

Data Privacy Versus Data Security: A Closer Look

The terms, data privacy and data security, are often misunderstood and are being used interchangeably. However, they are two separate concepts! Data privacy focuses on how information is handled, stored and used, while data security is concerned with protecting your organization’s assets.

Why Your Business Needs a Data Security Policy

According to the FBI, cybersecurity complaints increased from 1,000 to 4,000 complaints daily during the COVID-19 pandemic. The growing number of data breaches only validates that data security should be a top priority.

Ransomware: Cybersecurity’s Biggest Bully Yet

Sounds pretty serious, but why are we calling it cybersecurity’s biggest bully yet? Keep reading to know all about its history, destructive impact and dangerous growth trajectory to get your answer.

Just one more step

Please fill out the following form,