We provide IT Staff Augmentation Services!

Ystems Architect Resume Profile

3.00/5 (Submit Your Rating)

ColombiA

Key Skills Experience

  • Active Directory setup and access provisioning
  • Anti-Virus software Various
  • Backup Software Various
  • Barracuda E-mail filter
  • Blue Coat Web Content Filter
  • Cisco Catalyst switches
  • Cisco routers
  • Content Filtering
  • Data Security
  • Deploying applications with group policies and automation tools
  • Disaster Recovery
  • Employee Performance Management EPMS
  • End User application support
  • LANs/VLANs
  • Load Balancing
  • MAC OSX
  • Microsoft Desktop OS versions 95 through 7
  • Microsoft Server versions NT4, 2000, 2003, 2008
  • MPLS
  • Network Printing
  • Novell version 5
  • Routing
  • Switching
  • SQL Server 2000, 2003 and 2005
  • System Security Policies and Procedures
  • Training and Management
  • Virtualization VMWare Server

TECHNICAL EXPERIENCE

Infrastructure Systems Architect

Confidential

  • Assess application infrastructure for alignment with enterprise standards using questionnaires and bank systems of record to gather the information needed to make the analysis. The assessment would involve understanding virtualization concepts, middleware technologies, database concepts, local and global load balancing and DMZs.
  • Work with Project Managers, application owners to capture the requirements for successful implementation whether it is standing up new servers or simply installing and configuring needed software.
  • Identify equipment needing the Technology Refresh process to ensure the various systems stay in compliance with established policies.
  • Document go forward designs and remediation activities using Microsoft Word, Visio and Excel. This includes documenting the current state of the environment then creating a future state document that specifies the requirements needed. This requires the use of performance analysis tools as well as creating a sizing document that creates an estimate of how much the implementation will cost. When the design is completed, a catalog request is submitted with all of the hardware, software and storage elements entered into the document.

Implementation Engineer

Confidential

  • Work with fraud detection and stock trading business partners to properly design systems for their projects. This included using technology such as WebEx, Live Meeting and Microsoft Office Communicator to work with application vendors to determine their requirements as well as obtaining performance statistics for existing applications already in production.
  • Met with various project managers and members of management to provide project status updates and to notify them of any issues that may affect the project timeline.
  • Provide the security access management team with the needed details to grant users and applications the minimum access needed to perform tasks through Microsoft Active Directory. I used bank provided policies as the basis for the requests and Active Roles Server to validate what access might be needed and would create the required objects as needed.
  • Requested quotes from approved vendors and then submit purchase order requests for dedicated servers. Using bank applications I would schedule the necessary resources needed to rack, cable, and configure the servers. This included provisioning IP Addresses, installing the appropriate operating system and obtaining external storage as necessary.
  • Submitted requests to have virtual servers, traditional and cloud, built out as needed
  • Coordinated with the Final QA team to ensure that the server has been validated for proper configuration, security patches installed and monitoring software operational
  • Created resource records in various databases for the tracking of the servers
  • Assisted in troubleshooting issues that as the servers were tested by the business partners before the servers were put into production.
  • Using various Microsoft Office applications, I created multiple training documents concerning the roles and responsibilities of my position. The documentation included links to the various web based tools we used as well as what information was required to submit requests.

Senior Security Manager

Confidential

  • Monitored the agency's infrastructure using HP and Solar Winds tools to ensure that any incidents were remediated as quickly as possible. This was accomplished by identifying the nature of an incident and contacting the appropriate vendors and suppliers as needed.
  • Worked with the CIO I identified policies and procedures that needed to be updated or created and after the appropriate reviews, they were placed on the agency's SharePoint server and employees were required to read and acknowledge the information.
  • Used a new software application to organize and prioritize the tasks.
  • Approved or denied regular and emergency change requests submitted through the Change Control Board SharePoint site.
  • Coordinate maintenance and emergency repair services for fifty local offices
  • Used a combination of Active Directory and a database to provision users with VPN access using RSA devices
  • Configured the Barracuda and Blue Coat firewalls to create web content and email filters to eliminate unwanted traffic

Confidential

IT/CNS School Chair

  • Assisted the local Systems Support Technician in troubleshooting network issues, supporting up to 250 workstations. Ordered replacement parts for hardware issues or would reimage a system using Norton Ghost or similar application if needed.
  • Served as school liaison with AT T for WAN upgrade including the replacement of the Cisco Router. I coordinated the pulling of the fiber optic cable inside the building to the demarcation point and contacted AT T when that was completed to ensure that the process would be completed on schedule. I then worked with the corporate network technicians to perform the final cutover for the new circuit.
  • Hired, trained and evaluated IT instructors

Confidential

IT Instructor

  • Taught the following courses: Needs Assessment and Project Planning, Introduction to Personal Computers, Operating Systems dealing with the evolution of operating systems from first generation through fourth generation systems, N.T.4 Workstation, N.T.4 server, Windows 2000 Professional, Windows XP Pro, Windows 2000 Server, Windows 2003 Server, Active Directory, Network Systems Management, Network Protocols with a heavy emphasis on TCP/IP, WAN Technologies with an introduction to Cisco 2500 and 2600 routers and 1900 series switches, and Network Technologies System Integration an introduction to telecommunications,
  • Ran and punched in cables for new workstations
  • Managed student workstations until a Systems Support Technician was hired. This included repairing computers and reimaging the computers using Norton Ghost.
  • Assisted the Boys and Girls Club of Arlington in getting a wireless lab implemented as well as upgrading the computer labs in the various Arlington locations as part of a partnership with ITT
  • Assisted students with Macintosh connectivity related issues
  • Nominated Employee of the Year 2004 and 2005

Confidential

Network Administrator

  • Administered the daily operation of a church network that includes fifty computer workstations, seven network printers, and four servers running Windows 2000 and 2003 R2. This included all computer repairs, reimaging computers with Acronis True Image, pulling cables for new users and monitoring the infrastructure for issues.
  • Used Microsoft Active Directory to control user access and deployed applications through the use of group policies
  • Analyzed the hardware and software needs of the church, discussing the requirements with the users and implementing the solutions with a small budget. This includes special projects such as the purchase and set up of 16 laptops for a wireless computer lab and working with the church administrators and AT T on the purchase and implementation of a new phone system
  • Implemented a dual network infrastructure so that guests would only use the public network and the employees would use the secured network. This was accomplished through the use of VLANs and routers.
  • Transitioned to a Windows 2000, 2003 R2 server environment from a Novell 5.1 network
  • Brought the church into compliance with software licenses

We'd love your feedback!