Infrastructure Analyst Resume
2.00/5 (Submit Your Rating)
SUMMARY
- Microsoft Certified Professional specializing in Windows Server, TCP/IP, storage management, routing, LAN, WAN, security, VMware, ESXi, Horizon VDI, Exchange, Office 365, Azure, Veeam, Cisco, SonicWALL, QNAP, Active Directory, Linux, SolarWinds, HP, Dell and Lenovo
- Management experience with direct and dotted line reports
- Proven diagnostic skills with attention to detail and the ability to work effectively in a fast - paced, 24/7 environment
- Ability to stay calm and focused and calm in emergency situations
PROFESSIONAL EXPERIENCE
Infrastructure Analyst
Confidential
Responsibilities:
- Managed SolarWinds Orion and refined alerting structure with the goal of making every alert actionable
- Performed daily Office 365 tasks such as onboarding new accounts, terminations and group management.
- Evaluated and increased email security in Office 365 as well implementing a program to test end user reaction to simulated phishing attempts with KnowBe4
- Migrated servers and workstations from newly acquired company into primary domain
- Lead role in establishing governance for Microsoft Teams
- Assisted lead Microsoft Azure engineer with server migration, new server creation and worked with the network team on connectivity
Systems Architect
Confidential
Responsibilities:
- Designed and implemented VDI Virtual Desktop Infrastructure on a VMware Horizon cluster to deliver secure, zero downtime solutions to both local and remote clients. This solution was based upon the use of both Linked Clones and Instant Clones using VMware App Volumes Manager, ESXi, Horizon Connection Server, and Skyline
- Planned and executed Office 365 migration, moving email from on-premises Microsoft Exchange to cloud based email, implementing OneDrive for easy access to files and rolling out a heterogeneous Microsoft Office environment to the organization
- After servers were attacked by ransomware I was able to have all system fully restored and operational within four hours. Following this I implemented several security measures to prevent future infections and to make any possible future infections less severe
- Provided physical connections for the VMware clusters to a fault tolerant Meraki switch stack with 10 gigabit connections between the physical servers and switching backbone, also using PoE to provide power to cameras and desk phones
- Secured the network with a UNIX based Kemp load balancer providing not only load balancing but also acting as a reverse proxy to shield internal resources from external threats
- Installed configured and maintained a Veeam backup solution for on-prem backups, Veeam for Office 365 and Veeam ONE for server monitoring
- Began employment in a situation where failure of mission critical servers was commonplace; quickly revitalized the environment to provide a stable infrastructure and made end user satisfaction a priority
- Oversaw all aspects of hiring support staff and provided Tier 2 end user support
- Greatly decreased remote support issues by implementing wireless internet communication via hotspots and automatic snapshot software on remote laptops using Deep Freeze and later Reboot Restore RX
- Introduced an emergency kit for remote users in case of hardware failure, allowing a last-ditch method to connect
- Provided firewall, routing, VPN, and point to point VPN services through SonicWALL routers
- Implemented Blue Iris server for DVR of PTZ security cameras
- Worked with Ubuntu Linux in both server and desktop environments
- Rolled out RemoteApp delivery to negate the need for a VPN clients
- Updated aging building access system
- Maintained internal company phone system and wireless communications while drastically cutting costs of wireless services through renegotiating contracts with vendors and reorganizing internal policies
- After having to lay off staff due to financial reasons, trained, reallocated and empowered existing resources
- Migrated from single host VMware ESXi implementation with local storage to a robust virtual infrastructure with NetApp SAN, later moving to new hosts with VSAN
- Implemented Spiceworks for organizing helpdesk tickets
Systems - Network Analyst
Confidential
Responsibilities:
- Initiated a mass virtualization project and lead our team through the steps of interviewing and selecting vendors for software, server and SAN hardware run on and performed cost justification showing a 200 percent two-year return on investment
- Initially configured and performed daily administration on a NetApp SAN in a VMware and ISCSI environment while also providing a sister company with support for their NetApp SAN, saving them costly consulting fees
- Installed and managed every version of Microsoft Exchange from Exchange 2000 with Microsoft Cluster Service to Exchange 2007 with Standby Continuous Replication to Exchange 2010 with Data Availability Groups
- Managed routine changes on Cisco PIX and ASA firewalls, Cisco 3000 VPN Concentrator and installed and maintained Cisco switches
- Maintained server and infrastructure security for PCI credit card industry compliance
- Quickly restored network connectivity to the mission critical Editorial department after a water pipe burst disabled closet switches, ensuring that employees could meet publishing deadline
- Migrated from Citrix to Windows Terminal Services for remote clients on Windows 2003 Server, later creating a Windows Server 2008 solution with SSL access, eliminating the need for VPN for Terminal Services applications
- Created an off-site disaster recovery environment using existing high speed WAN links to a sister comany
- Negotiated with vendors for products and services including the purchases of a replacement core switch and SAN infrastructure
- Configured EMC CLARiiON 4500 SAN for use with Microsoft SQL in a Microsoft Cluster environment
- Reduced the number of critical system failures by implementing fault-tolerant and highly available solutions such as Microsoft Cluster Service, NSI Double-Take, and VMware Vmotion
- Eliminated the need for a backup internet connection after finding that existing hardware could enable automatic routing of emergency traffic through an existing WAN connection, saving thousands of dollars annually
- Coordinated a virtualized disaster recovery infrastructure to replace the existing physical disaster recovery environment
- Implemented SNMP monitoring on WAN and internet connections displaying bandwidth utilization–later replaced this with application-level Netflow monitoring
- Created a test network that mirrored the main aspects of the live network to test new server applications without affecting end users
- Performed second level help desk duties
- Upgraded backup systems from a legacy Legato server to Symantec NetBackup
- Planned and implemented migration a sister company’s domain into Confidential Newspapers’ domain.