We provide IT Staff Augmentation Services!

Infrastructure Architect, Senior Resume

4.00/5 (Submit Your Rating)

SUMMARY:

  • Designing and documenting infrastructure strategies for standardization and use throughout the enterprise.
  • Designing scalable and highly available storage, compute and network infrastructure architectures for data centers.
  • Designing scalable virtual solutions to support infrastructure services and business critical applications.
  • Designing common architectures to accommodate the use infrastructure services (authentication, directory services, name resolution, file print, etc.) in both well connected and poorly connected distributed sites.
  • Designing role based frameworks for managing enterprise directory services.
  • Designing federation and single sign - on services to integrate with enterprise directory services.
  • Designing distributed data processing and storage architectures that scale to petabyte sized capacity requirements.
  • Designing scalable infrastructure for deploying data wrangling, data modelling and data visualization tools as enterprise shared services.
  • Designing and documenting disaster recovery frameworks and strategies.
  • Documenting and scoring failure modes for infrastructure via Failure Mode Effects Analysis (FMEA).
  • Documenting component dependencies for data center infrastructure, middleware and applications into color coded matrixes for use with DR planning and coordination.
  • Collaboration & Coordination:
  • Coordinating the design of multi-discipline architectures to support enterprise objectives.
  • Gathering business requirements and objectives and translating them into technical requirements.
  • Converting technical requirements into scalable infrastructure architectures.
  • Collaboratively reviewing new and existing architectures to ensure adherence to enterprise design principles and objectives.
  • Deploying Cisco Unified Computing Systems (UCS) B Series, C Series, Fabric Interconnects and Fabric Extenders as the backbone for centrally managed compute infrastructure in data centers.
  • Engineering and implementing vSphere based virtualized server environments for high density data centers along with small distributed sites.
  • Implementing Distributed Resource Scheduler (DRS) enabled vSphere High Availability (HA) clusters to provide improved resiliency for virtualized infrastructure and applications.
  • Engineering failover and failback procedures and deploying VMware’s Site Recovery Manager (SRM) with Storage Replication Adapters (SRA) to enable faster disaster recovery of virtualized infrastructure.
  • Engineering and implementing Windows Distributed File System (DFS) and Distributed File System Replication (DFS-R) throughout the enterprise to enable highly resilient file sharing for distributed sites and central locations.
  • Engineering and implementing Windows Clusters to support cluster aware applications such as Microsoft SQL.
  • Directory Services:
  • Engineering and implementing Active Directory, Group Policies, DHCP, DNS, WINS, and DFS Replication.
  • Advanced Active Directory infrastructure troubleshooting (Sites and Services, Group Policies, ADSI and DNS).
  • Implementing role based resource management systems for delegated domain resource access.
  • Engineering and implementing Active Directory Federation Services (ADFS) to enable single sign on (SSO) to third party services.
  • Documenting and testing disaster recovery procedures for infrastructure and infrastructure services in order to meet targeted recovery time objectives (RTOs) and recovery point objectives (RPOs).
  • Engineering and implementing various replication and snapshot based backup technologies to meet DR targets.
  • Server Administration:
  • File and print server administration and maintenance
  • DFS replication
  • Server/domain security
  • Exchange
  • SharePoint
  • SQL
  • IIS
  • Windows cluster management
  • Windows Network Load Balancing
  • Patch management
  • Virtualization Administration:
  • Admission control policies
  • VM cluster options
  • DRS groups and affinity rules
  • DPM settings
  • Host networking configuration (vSS and vDS)
  • Host security settings
  • Host profiles
  • Licensing
  • Active Directory Management:
  • Users and Computers
  • Sites and Services
  • Domains and Trusts
  • ADSI
  • Group Policies
  • DHCP, DNS, WINS
  • Backup Administration:
  • Tape rotation, VM replication, and disk-based backups, and restore tests.
  • Storage Administration:
  • Creating LUNs, masking views, and initiator groups on Fibre Channel (FC) and iSCSI SANs.
  • Network Administration:
  • Hardware installation, setup, troubleshooting and maintenance.
  • Layer 2 hardware installation (copper, fiber and wireless connections) and configuration (VLAN management, port-channel groups).
  • Layer 3 hardware (firewalls, routers and modems) configuration (access rules, routing and security).
  • Disaster Recovery (DR):
  • Reviewing and updating backup and recovery policies and procedures.
  • Completing disaster recovery drills and tests, and then updating applicable documentation to reflect results and tests and improved procedures.
  • Scripting:
  • PowerShell, Windows Command Shell batch files, Visual Basic Scripts (VBS).
  • Logon scripts and process automation tasks.
  • Documentation:
  • Creating and updating technology related policies and procedures.
  • Inventory management and asset tracking.
  • In-person and remote first level customer support.
  • Assisting customers with the normal use of office applications, such as Microsoft Office (Word, Excel, PowerPoint, Access, etc.) and web-based applications, such as proprietary hosted databases.
  • Design and delivery of software and hardware training for non-technical audiences.
  • Creating standalone documentation and instructions for users.
  • Small to midsize project research, proposal creation, cost analysis and presentation.
  • Timeline creation.
  • Vendor negotiations for hardware, software and resource acquisitions.
  • Initiating and maintaining strong communication between all team members and upper management.
  • Modular design of HTML, ASP, Java Script and XML web pages.
  • Script debugging and testing.
  • Simple MS Access and SQL database creation.
  • Database manipulation through web-based applications using SQL queries.

WORK HISTORY:

Confidential

Infrastructure Architect, Senior

Responsibilities:

  • Infrastructure Evergreen Strategy
  • China Operations Data Center Design
  • Global Distributed Data Center Consolidation
  • Product Development Lab Design
  • Big Data Analytics Discovery Environment

Confidential

Infrastructure Management Senior Analyst

Responsibilities:

  • Data Center Upgrade & Migration
  • Cisco UCS Deployment
  • Disaster Recovery Implementation
  • Role Based Management System Implementation

Confidential

Server Engineer

Responsibilities:

  • Global Active Directory (AD) Deployment
  • Global Symantec Endpoint Protection (SEP) Deployment
  • Active Directory Federation Services 2.0 Deployment (AD FS 2.0)

Confidential

Systems/Network Administrator

Responsibilities:

  • Workgroup to Active Directory (AD) Domain Migration
  • Branch Office Deployment
  • Server Consolidation/Virtualization

Confidential

IT Technician

Responsibilities:

  • PC Staging Process Implementation
  • LMS Web Design

Infrastructure Architect, Senior

Confidential, Dearborn, MI

Responsibilities:

  • Strategy was based around the premise that the need for rapid application deployment will outpace internal service level agreements for deliver and that resource demands from analytics and machine learning initiatives will outstrip the upper bounds for existing virtual clusters and other ITO infrastructure.
  • Worked with key stakeholders throughout IT and the business to set direction and define requirements for the overall strategy of a new data center that focused on providing infrastructure to business customers rapidly while simultaneously keeping that infrastructure up to date non-disruptively.
  • Researched industry trends around evergreen IT and evergreen infrastructure to inform a standard definition of evergreen for IT.
  • Defined internal measures to assess and compare current and future states and created a common format to frame discussions and help visualize the current and future evergreen levels for various technologies and groups.
  • Coordinated with core infrastructure teams to define plausible approaches for moving towards evergreen for compute, storage, and network.
  • Evaluated potential converged, hyper converged, and composable approaches for underlying compute hardware resources along with standalone, clustered, and distributed approaches for OS level evergreen options.
  • Outlined an approach for providing a catalog of storage services based on parameters rather than specific technology while abstracting the backend hardware from the consumer to allow for seamless updates and changes.
  • Defined a potential approach for separating the control plane and data plane in order to have network configuration parameters move across the physical network with the logical resource they’re assigned to, providing improved data center mobility for resources.
  • Program’s goal was to identify the effected applications, determine their non-functional requirements and deploy the necessary hosting infrastructure in China to support them.
  • Worked with Portfolio Architects and Application Engineers to determine infrastructure requirements, dependencies and interoperability between and within the various applications and their respective tiers (web, application and database).
  • Used the identified requirements to work with Enterprise Engineering Teams (LAN, WAN, Storage, and Server) to create a scalable, resilient, data center design to accommodate virtual and physical servers to host standalone virtual or physical applications, WebSphere Application Server (WAS) Java Virtual Machines (JVMs), WebLogic JVMs, Oracle Databases, DB2 Databases, zSeries LPARs and AS/400 LPARs.
  • Collaborated with Extranet and Security Teams to ensure secure, reliable, access to the public facing applications as well as limiting external access to the China data center for the suppliers and partners needed for normal operations.
  • Helped Deployment and Operations Teams integrate IBM China as a partner for colocation facilities and onsite services into enterprise systems.
  • Coordinated with Virtual Desktop Infrastructure (VDI) Engineering to enable secure access to centrally hosted Citrix XenDesktop clients to be used by IBM China support personnel for data center administration and secure access to internal Enterprise systems.
  • Distributed Data Center Consolidation program aimed to reduce the global footprint of distributed computer rooms where legally feasible and technically viable.
  • Created modular architecture to address the technical limitations imposed by bandwidth and latency along with adhering to regional PII and SPII restrictions in regards to data storage, handling, retentions and transfer.
  • Designed an onsite analysis process to gather site data such as application footprint, network profile, shared resource usage profile and application network performance profile. The site data, along with data collected from other sites and previous migrations, was then used to determine consolidation opportunities and risk for presentation to decision makers. Analysis results also used to help determine which pieces of the module architecture would be a good fit for a site.
  • Key modular architecture components:
  • Primary enterprise data centers used to host infrastructure services for well connected (gigabit fiber) sites.
  • Cisco Wide Area Application Services (WAAS) and regionally hosted NAS appliances used for sites with adequate bandwidth and the appropriate file server and application footprints.
  • Local servers, standalone and virtual, used for poorly connected locations and locations with an abnormal application, data and network resource usage profile.
  • Gathered non-functional business requirements in regards to services hosted internally by the business unit and services provided externally via the enterprise or a 3rd party.
  • Compiled current security and policy restrictions by working with internal security and auditing resources.
  • Designed a modular infrastructure architecture to be used as the “greenfield” standard for new sites and as an aspirational target for existing sites that would meet business requirements while still aligning to security and policy standards via the use of various compensating controls.
  • Compensating controls applied in a tiered fashion based on the target end device. Including firewalled segregation for all labs as a base, McAfee Application Control (Solid Core) for modern OSes, and various service proxies for legacy applications.
  • Tiered approach to compensating controls allows for secure access to enterprise and external services for platforms as they go further outside of their supported lifecycle.
  • Lead the creation of an enterprise wide strategy for application internationalization standards.
  • Coordinating with Unicode and localization subject matter experts (SME) from various regions. Using SMEs, standards were codified around ensuring language, numerals and time are stored and presented properly at the various tiers of the technology stack (presentation, application and resource).
  • Overall strategy offered as guidance for the enterprise, with implementation documentation created by various SMEs.
  • Long term goal of integrating compliance with strategy into existing governance model.
  • “Discovery Environment” designed to act as an analytics sandbox for data scientist and other business customers to enable fast deliver of multiple analytics tools for enterprise use while still adhering to enterprise architecture and engineering standards.
  • Designed scalable and resilient “utility style” architectures for each of the analytics component (listed below), enabling them to be deployed as individual enterprise shared services, each independently scalable to meet customer demand.
  • “Utility style” architecture allows for separate instances of each analytics component to be deployed using a standardized design. This allows for faster deployment to meet any policy and security standards that require data separation.
  • Hortonworks Hadoop 2.x
  • Small initial deployment (10 PB) of Hortonworks Data Platform (HDP) 2.2 targeted to scale up to meet customer demands.
  • DistCP used for replication across data centers to ensure availability of critical data.
  • Ambarii and Yarn used for management and Hive, Sqoop and HDFS offered to end users for interoperability.
  • Greenplum 4.x
  • EMC (Pivotal) Data Computing Analysis (DCA) used as basis for infrastructure.
  • Greenplum Database (GPDB) hosted on EMC Data Integration Accelerator (DIA) modules.
  • Redundant GPDB Master Servers and GPDB Compute Modules.
  • SAS 9.x
  • EMC (Pivotal) Data Computing Analysis (DCA) used as basis for infrastructure.
  • Data Integration Accelerator (DIA) modules used to host SAS Master (Enterprise Miner and TKGrid Master) and TKGrid Nodes (Data Mining, Statics Components and Text Analytics Components).
  • SAS Embedded Process and SAS Code Accelerator run on GPDB nodes.
  • QlikView 11.x
  • Redundant load balanced wed nodes (ISS + QSS), clustered application (QVS and QDC roles) nodes and clustered publisher nodes (QDS role) for scalability and availability.
  • Common shared folders (User Docs, Source Docs, Configuration and Logs) replicated offsite for warm standby servers.
  • Alteryx 10.x
  • Alteryx Gallery, Worker and Controller server roles on separate virtual servers to allow for independent scaling of each role based on capacity and user demand.
  • VMware Site Recovery Manager (SRM) used to enable resiliency of the Controller role (redundant active Controllers not supported in Alteryx 10).
  • Work and Gallery server roles deployed across data centers in redundant, load balanced pairs.
  • Tableau 9.x
  • Redundant, load-balanced, Tableau virtual servers deployed across data centers to allow for resiliency and scalability.
  • Sizing and scaling based on active concurrency recommendations provided by vendor.
  • Revolution R Enterprise 7.x
  • Edge-node hosting Hadoop and Revolution R binaries allowing R clients to submit jobs to be converted to MapReduce code and processed by data nodes.
  • MATLAB R2015x
  • Edge-node hosting Hadoop and MATLAB binaries allowing MATLAB clients to submit jobs to be converted to MapReduce code and processed by data nodes.
  • Anaconda 2.x
  • Edge-node hosting Hadoop and Anaconda binaries allowing Anaconda clients to submit jobs to be converted to MapReduce code and processed by data nodes.
  • Anaconda Server for Python code sharing.
  • Architecting infrastructure that meets customer’s functional and non-functional requirements while adhering to enterprise standards, principles and strategies.
  • Reviewing newly proposed architectures created by Solution and Infrastructure Architects to help ensure that they meet current enterprise standards and align to current and future enterprise strategies.
  • Technical review of architecture details such as logical component makeup, physical component requirements, and component interoperability in and outside of the enterprise.
  • Strategic review of architectures for alignment with enterprise direction including virtualization, internationalization and resiliency.
  • Review and approval of expansions to currently deployed scalable architecture to ensure continued technical and strategic compliance and alignment.

Confidential

Infrastructure Management Senior Analyst

Responsibilities:

  • Successfully upgraded and migrated the Enterprise data center hosting customer facing Production, UAT and Training environments.
  • Upgrade performed while meeting documentation standards, change management requirements, and target service level agreements (SLAs).
  • Environment migration covered the following:
  • 200 servers
  • 250 databases
  • 50 hosted applications
  • 25 SQL servers
  • 10 SQL clusters
  • Physical and virtual server deployment.
  • Cluster creation and preparation.
  • Backup and replication solution.
  • Monitoring and auditing tools.
  • Templates, policies, profiles and documentation.
  • Completed Cisco UCS deployment for the above noted infrastructure migration:
  • Fabric Interconnects (6248s)
  • Fabric Extenders (2232s)
  • Chassis (5108s)
  • Blades (B200s and B230s)
  • Rackmounts (C460s)
  • CNAs on all servers (M81KR, Palo cards)
  • Creation of server profiles and profile templates to match target server application (virtual host, physical Windows server, physical SQL server) and environment along with associated pools and policies.
  • Boot policies
  • BIOS policies
  • Firmware policies vNIC templates vHBA templates
  • Successfully completed deployment of a disaster recovery solution to account for the following systems/services:
  • SQL clusters/databases
  • Domain NTP services
  • External DNS lookup
  • Replication of application servers
  • Secure proxy access
  • Tape backups
  • Designed, documented, tested and implemented a role based resource management system for providing delegated access to domain resources and services for the production environment to meet security and audit requirements.
  • Coordinated with security, support and management teams to determine specific audit requirements and access needs for individual towers.
  • Provided multi-tiered delegated access to the following resources/services:
  • Active Directory User management for account management team.
  • Active Directory Object, DNS and Group Policy management for support teams.
  • Active Directory Sites and Services, Schema and Context management for infrastructure teams.
  • SQL Server cluster/instance management for DBA teams.
  • Backup and Replication management for storage and backup teams. vSphere and UCS management for server teams.
  • UAT, Training and Production application server access for Applications team.
  • Limited access for authorized temporary or external users.
  • System allowed for the dynamic creation of new roles, with the needed privileges, entirely within Active Directory on an as needed basis by account management teams to meet any new requirements.
  • Designed, documented and deployed a highly available, multisite, domain time source solution.
  • Scripted solution to check compliance and root dispersion across domain PCs.
  • Verifying and maintaining overall AD health across sites.
  • Role Based Management Rule and Role group creation and administration.
  • Non-privileged service account framework and management.
  • Designing, testing and implementing various group policies for security and user rights management.
  • Ensuring proper connectivity and replication between AD Sites.
  • Physical server deployment, configuration, management, troubleshooting and firmware updates.
  • Standalone Windows and Windows Cluster deployment, configuration, management, troubleshooting.
  • Monitoring and auditing tool deployment and configuration.
  • Physical host deployment, configuration, management and patch maintenance.
  • HA/DRS cluster design and configuration.
  • DRS groups and affinity rules.
  • DPM settings.
  • Host profile management.
  • Admission control policies.
  • Host networking configuration.
  • Host security settings.
  • VM templates.
  • VM setting standardization.
  • VM deployment configuration, management and troubleshooting.
  • Server profile and profile template creation and troubleshooting.
  • BIOS, firmware, and boot policy management.
  • Pool management.
  • DR environment monitoring.
  • Ensuring consistency of DR environment with any Production environment changes (server configuration, storage changes, templates, monitoring changes, new standards, etc).

Confidential

Server Engineer

Responsibilities:

  • Facilitated meetings with the Server Engineering and Network Operations teams to evaluate the server and network requirements for deploying Active Directory to remote sites connected via an MPLS network.
  • Adjusted and refined the national and international implementation plans to meet changes to the infrastructure, improve efficiency and meet any site-specific requirements.
  • Coordinated with local site contacts to gather relevant site-specific information in regards to users and the condition of existing infrastructure.
  • Created the AD security groups, distribution groups, users and shared folders needed to properly implement the enterprise’s standard AD and server model for each site.
  • Created the Group Policies and startup scripts needed to manage the end-user experience and other site-specific policies, such as user backup information.
  • Submitted necessary change management documentation and reviewed proposed changes with change management board.
  • Onsite, in person, server installation or remote installation using a local contact.
  • Added the necessary Distributed File System (DFS) Namespace Folder Targets and Replication Pairs to ensure redundancy and high availability of shared network data for each site.
  • Fine-tuned the DFS replication schedule to account for the site’s WAN utilization during initial data replication periods.
  • Added the site’s local server as a Distribution Point (DP) in System Center Configuration Manager, along with adding the standard packages deployed to most users to that DP.
  • Deployed user data backup software.
  • Held after action reviews (debriefings) to document any important items of note (what worked, what did not work, unexpected problems, etc.) and reported progress to senior staff.
  • Designed and executed an advanced and highly tuned implementation of Symantec Endpoint Protection 11 (SEP).
  • Worked with the Server and Network Operations Teams along with Symantec consultants to evaluate hardware, software and network environmental requirements to design an implementation that could handle managing all national and international sites.
  • Implemented Group Update Providers at remote sites to reduce WAN traffic and provide definition sharing among clients.
  • Coordinated with the Network Operations Team and used network session analytical tools to tune the SEP server configuration enabling:
  • Reduced impact on the WAN for remote sites.
  • Improved server responsiveness to clients by analyzing, isolating and eliminating critical issues (TCP 0 Window ACKs) and minimizing other errors.
  • Created disaster recovery documentation outlining steps necessary to restore SEP server in case of disaster, as well as the individual application and tuning settings.
  • Automated reporting system for corporate auditors.
  • Deployed client software with packages created in System Center Configuration Manager (SCCM) 2007.
  • Successfully migrated unstructured multilingual file servers with multiple unsecured shares, nested shares, no security groups and broken access control lists (ACLs) to a structured system with properly applied ACLs with security groups and an auditing trail integrated into the change management system.
  • Worked with local site contacts and translators to coordinate department head meetings, data gathering sessions and local resource deployment.
  • Documented site’s current file structure, current permissions, intended permissions and overall business structure in order to assess client needs.
  • Created and documented implementation strategies and presentations, as well as back out plans in case of emergency.
  • Coordinated the local technical resources of each site for the preparation, execution and closing phases of the project, delegating and managing various tasks.
  • Designed and implemented a role based resource management system for securing and accessing network resources for multilingual international sites.
  • Evaluated the disparate network resource security needs and day-to-day processes of the international locations and created a list of requirements for a network resource management system that addressed those needs.
  • Used best practices and recommendations from Microsoft MVPs, designed a system that allowed for:
  • Secured resource access.
  • Auditing trail and change management.
  • Network resource access based on job role and department, independent of individual users.
  • Simplified process for granting access to resources, allowing approvers to easily grant access.
  • Ability to see what network resources any given group or user had access to.
  • Abstracted NTFS access control lists (ACLs) from individual users by utilizing role and rule groups. This approach accomplished the following:
  • Eliminated the need for direct modification of the NTFS ACLs.
  • Reduced the chance of errors and the necessary upkeep and maintenance of the ACLs.
  • Increased overall security.
  • Site Expansion Technical Liaison:
  • Managed local resources for information gathering, user communication and first level technical response.
  • Coordinated local vendors, overseeing quality of work, timely execution and adherence to site specific health and safety requirements.
  • Liaised local site management and local service vendors to ensure appropriate delivery of materials required by the vendor and the services promised to the sites.
  • Implemented a redundant AD RMS server to help regulate access to confidential files and internal email.
  • Implemented a fault tolerant test and production environment of Cisco’s TIDAL Enterprise Scheduling software.
  • Deployed a Federation Server Farm and a Federation Proxy Server Farm to enable single sign-on (SSO) for externally hosted services such as Office 365 and ADP’s PayForce employee access portal.
  • Deployed and configured two VNXe 3100 units (one dual storage processor SP unit and one single SP unit) for use as additional storage for members of an Exchange 2010 DAG.
  • Deployed and configured 2 VG2s across 2 sites for disaster recovery, with a Symmetrix (VMAX) backend being used for storage.
  • Designed the redundant deployment model and created the standards to be used in regards to interfaces, virtual data movers, interconnects, file systems, and Celerra replication links when creating CIFS shares/servers.
  • Connection and replication issues in AD Sites and Services.
  • DFS blob, namespace and replication issues.
  • Domain trust issues for domain migration projects.
  • Internal and external DNS server and registrar complications.
  • HA/DRS cluster design and configuration.
  • Host profile design/management.
  • Administration of UCS Manager.
  • Server profile and profile template creation and troubleshooting.
  • Management of B and C Series servers.
  • Server hardware upgrades.
  • Server firmware updates.
  • Providing support for first, second and third level technicians.
  • Configuration of groups, user roles, subscribers, subscriptions and channels to manage alerts for key servers and delegated access.
  • Installation and configuration of management packs and creation of overrides to enable necessary monitoring functionality.
  • Maintenance, management and monitoring of EMC VNXe 3100. iSCSI based storage provisioning and management for Exchange 2010 DAG members.
  • Maintenance, management and monitoring of EMC VNX VG2.
  • Creation and management of virtual data movers, file systems and Celerra replication connections.
  • Backup resource for management of EMC VMAX via Symmetrix Management Console (SMC).
  • Backup resource for management of DataDomain DD680.
  • Maintained and optimized subnets, site links, site connections and domain controller replication connections in AD Sites and Services when expanding to new remote sites.
  • Created and managed security and distribution groups and service accounts for newly implemented sites.
  • Complied with the change management process to ensure proper audit trail.
  • Designed, tested and implemented various group policies for security, encryption, startup scripts and end-user experience adjustments.
  • Provided elevated support for technicians at multilingual international locations.
  • Coordinated and managed local onsite technical resources for various tasks that require a physical presence.
  • Reviewed and improved, or provided recommendations for improving, standard operating procedures.

Confidential, Troy, Michigan

Systems/Network Administrator

Responsibilities:

  • Planned and executed conversion from unsecured Windows workgroup to a secured AD domain.
  • Implemented Group Policies to manage client/server security, end-user experience and auditing compliance.
  • Designed and implemented data backup and recovery procedures.
  • Protection of client and server data via VERITAS Backup Exec and Symantec Ghost.
  • Implemented Distributed File System for high-availability of network file resources during planned and unplanned server outages.
  • Setup and implemented a centrally administered virus protection solution for servers and clients using Symantec Antivirus Corporate Edition.
  • Planned and executed the network and systems infrastructure design for a newly established out of state branch office.
  • Implemented a VoIP phone system (using SIP trunks) with redundant connections, QoS and VLANs to ensure high uptime and performance with a low total cost of ownership (TCO) target to meet the customer’s financial needs.
  • Designed, prepared and implemented computers, printers, faxes, copiers and network equipment.
  • Created and implemented an asset tracking and inventory management system.
  • Implemented VMware Server and VMware ESXi to consolidate legacy server applications and services using existing hardware.
  • Researched any potential technology related purchases and translated the technical details for non-technical audiences and senior staff.
  • Proposal/recommendation creation for technical and non-technical audiences.
  • Created and executed plans of action to address technology related needs.
  • Represented customer interests during vendor negotiations.
  • Hardware, software and service procurement.
  • Advocating for additional resources to address critical issues.
  • Evaluated current company procedures.
  • Searched for more efficient methods via emerging technology.
  • Prototyped the design, setup and maintenance of potentially useful technology.
  • Operated and maintained a Windows 2000/2003 Server based AD environment.
  • Management and maintenance of Active Directory.
  • Group Policies.
  • Active Directory users, computers, groups and replication
  • Administration of server services.
  • DFS, NTFRS
  • DNS, DHCP, WINS
  • File and print sharing, IIS
  • Startup scripts.
  • Management of network resource access rights and security.
  • Management of SharePoint Server.
  • Resolving critical server and Active Directory issues.
  • Monitored, maintained and configured LAN/WAN hardware.
  • Layer 2 hardware configuration and support for copper, fiber and wireless connections (VLANs, port aggregation, bandwidth throttling, port security).
  • Installation and management of network infrastructure components (cabling, racks).
  • Layer 3 hardware configuration and support (access rules, routing, security, port forwarding).
  • Mapped out network topology to identify bottlenecks and potential security risks.
  • Windows client hardware and software support for break/fix issues.
  • Support for various client applications for printing, publishing and productivity.
  • Remote and onsite support for a remote branch office.
  • Created, reviewed and updated disaster recovery plans.
  • Executed disaster recovery plans.
  • Administered VERITAS Backup Exec and Symantec Ghost for data and client recovery.
  • Managed Distributed File System (DFS) for network resource availability and redundancy.
  • Continued support and maintenance of server and client antivirus and security related needs.
  • Evaluated compliance against industry IT standards and proposed/implemented corrective action where necessary to meet those standards.
  • Persuaded users and senior management to adhere to critical security policies.
  • Documented technology related processes and procedures.
  • Maintained the asset tagging/tracking and inventory management system for all IT related items.

We'd love your feedback!