Position Requirements
Formal Education & Certification
• College degree in a related field and/or 8-10 years equivalent work experience.
• Certifications in IT infrastructure, Microsoft technologies, and Cisco technologies are a plus.
Knowledge & Experience
• Working technical knowledge of Microsoft technologies, Cisco routers/switches, Palo Alto firewalls, and Avaya Aura systems.
• Proficiency in managing a fully converged WAN data network using Meraki SD-WAN infrastructure.
• Strong knowledge of VPN and protocols used in EDI transmissions and user connectivity.
• Hands-on experience with the configuration/installation, implementation, maintenance, and tuning of IT equipment.
• Knowledge of infrastructure monitoring applications such as SolarWinds and WhatsUp management tools.
• Familiarity with Microsoft Office applications including Outlook, Excel, and Word.
Personal Attributes
• Understanding of the organization’s goals and objectives.
• Strong interpersonal skills, oral communication skills, and proven analytical and problem-solving abilities.
• Highly self-motivated and directed.
• Ability to conduct research into IT issues and products as required.
• Strong customer service skills and the ability to work in a team-oriented, collaborative environment.
Work Conditions
• Office environment with occasional on-call availability as needed to solve problems.
• Occasional inspection of cables and wiring.
• Occasional visits to data centers & plant locations to administrate, repair, install, or decommission IT equipment.
• Regular lifting and transporting of moderately heavy objects, such as IT equipment and peripherals.
Proficiency Requirements:
As Networks & Server Systems Admin, candidates should demonstrate a high level of proficiency in the following key areas:
1. Network Infrastructure:
• Design and Architecture: Demonstrated expertise in designing, implementing, and maintaining robust and scalable network infrastructures. In-depth knowledge of DHCP and DNS protocols.
• Routing and Switching: In-depth knowledge of routing protocols (e.g., OSPF, BGP) and switching technologies (e.g., HSRP, LACP, VLANs/SVIs, 802.1q), with the ability to optimize network traffic.
• Network Security: Proficiency in implementing and managing network security measures, including firewalls, intrusion detection/prevention systems, and VPNs.
• Quality of Service (QoS): Experience in implementing QoS policies to prioritize and optimize network traffic based on business requirements.
2. Server Infrastructure:
• Architecture and Design: Strong understanding of design and administration of merged physical and virtual server environments.
• Configuration: Configure and administrate physical and virtual servers using iLO, iDRAC, Hyper-V and VMWare
• Hardware: Familiarity with HP and Dell server hardware; past and current generations
• Software: Familiarity with Windows Server 2008/R2, 2012, 2016, 2019, 2022, System Center, Failover Cluster management, and PowerShell scripting.
• Storage: Familiarity with SAN, NAS, and backup/dedupe technologies such as Lefthand, Dell Data Domain, IBM Power Vault, and Cohesity backup/recovery solutions.
3. Active Directory:
• Architecture and Design: Strong expertise in the architecture and design of Active Directory environments, including forest and domain design, replication, and trust relationships.
• User and Group Management: Proficiency in managing user accounts, groups, and organizational units within an Active Directory environment.
• Group Policy: Experience in designing and implementing Group Policy Objects (GPOs) for centralized management and configuration of network resources.
4. Azure/Entra ID:
• Cloud Services: Extensive experience with Microsoft Azure, including proficiency in deploying and managing cloud services, virtual machines, and storage solutions.
• Identity and Access Management: In-depth understanding and hands-on experience with Azure Active Directory (Azure AD) and Entra ID for efficient identity and access management in cloud environments.
• Security and Compliance: Knowledge of Azure security features, compliance standards, and the implementation of security best practices
5. Power Platform Fundamentals:
• Power BI: Understanding and experience with Power BI for data visualization, reporting, and business intelligence.
• Power Apps: Proficiency in creating custom applications using Power Apps to streamline and automate business processes.
• Power Automate: Knowledge of Power Automate for designing automated workflows and integrations between different applications and services.
6. Certificate Services:
• Public and Private Key Infrastructure: In-depth knowledge of Public Key Infrastructure (PKI) concepts and hands-on experience with the implementation and management of Certificate Services.
• SSL/TLS Certificates: Proficiency in managing SSL/TLS certificates, including issuance, renewal, and troubleshooting certificate-related issues.
• Security Protocols: Familiarity with security protocols such as HTTPS, TLS, and their integration within the overall network security strategy.
7. Telephony:
• VoIP Systems: Hands-on experience with Voice over Internet Protocol (VoIP) systems, including configuration, optimization, and troubleshooting.
• Unified Communications: Proficiency in Unified Communications (UC) solutions for seamless integration of voice, video, and messaging services.
• Telephony Infrastructure Design: Ability to design and manage telephony infrastructures to meet organizational communication needs efficiently.
8. Meraki SDWAN:
• SDWAN Implementation: In-depth understanding and hands-on experience with Meraki SDWAN solutions, including deployment, configuration, and ongoing management.
• Traffic Optimization: Proficiency in optimizing network traffic through intelligent routing and prioritization in Meraki SDWAN environments.
• Monitoring and Troubleshooting: Ability to effectively monitor and troubleshoot issues in Meraki SDWAN, ensuring high availability and performance.
9. WiFi Technologies:
• Wireless Network Design: Expertise in designing and implementing wireless network architectures, including access point placement and coverage optimization.
• WiFi Standards: In-depth knowledge of WiFi standards (e.g., 802.11ac, 802.11ax) and the ability to leverage the latest technologies for enhanced wireless performance.
• Security and Authentication: Proficiency in implementing wireless security measures, such as WPA3, and configuring authentication protocols to ensure a secure WiFi environment.
10. Cybersecurity Strategy, Planning, and Design:
• Risk Assessment: Conduct comprehensive risk assessments to identify and evaluate potential cybersecurity threats and vulnerabilities.
• Strategic Planning: Work with infosec team to develop and implement a robust cybersecurity strategy aligned with the organization's goals, taking into account the global and dynamic nature of the corporation.
• Network Security: Design and implement secure network architectures, incorporating firewalls, intrusion detection/prevention systems, and VPNs
11. Incident Response and Management:
• Incident Handling: Lead incident response efforts, including detection, analysis, containment, eradication, and recovery from cybersecurity incidents.
• Post-Incident Analysis: Conduct thorough post-incident analysis to identify root causes and enhance the incident response plan.
12. Identity and Access Management (IAM):
• IAM Policies: Develop and enforce IAM policies, ensuring that access controls are aligned with the principle of least privilege.
• Multi-Factor Authentication (MFA): Implement MFA solutions to enhance the security of user authentication processes.
13. Security Technologies:
• Endpoint Protection: Implement and manage advanced endpoint protection solutions to secure devices across the organization.
• Security Information and Event Management (SIEM): Utilize SIEM tools for real-time monitoring, correlation of security events, and proactive threat detection.
• Advanced Threat Detection: Implement advanced threat detection technologies to identify and respond to sophisticated cyber threats.
14. Compliance and Auditing:
• Regulatory Compliance: Ensure compliance with relevant cybersecurity regulations and standards applicable to a large global corporation.
• Regular Audits: Conduct regular cybersecurity audits and assessments to evaluate the effectiveness of security controls.
15. Global Collaboration:
• Cross-Cultural Collaboration: Effectively collaborate with infrastructure and cybersecurity teams across different regions, taking into account cultural nuances and regulatory variations.
• Global Threat Intelligence: Leverage global threat intelligence to stay ahead of emerging cybersecurity threats and trends.