I am a determined, energetic, and diligent Cloud Engineer professional with vast knowledge and professional experience in managing server infrastructure and data. I am responsible for ensuring the efficient operation of cloud-based systems, often working with platforms like AWS and Microsoft Azure. I possess a strong understanding of networking and storage principles and architecture, coupled with excellent customer interaction skills. With my expertise in Windows/Linux OS systems administration and a focus on cloud technologies, I play a crucial role in optimizing cloud environments and ensuring their reliability.
Financial Institution • Feb 2016 - Present · 7 yrs 10 mos
• AWS Management, including but not limited to: - AWS: Oversaw and managed AWS services, including EC2 instances, S3 storage, and VPC configurations. Implemented and optimized solutions using AWS Identity and Access Management (IAM) for security.
• Microsoft Azure: Administered and managed Microsoft Azure services, covering virtual machines, Azure Active Directory, and other Azure components. Implemented security policies and user access controls within the Microsoft Azure environment.
• Google Workspace Administration.
• Orchestrated over 40 FortiGate firewalls, VPN connectivity and configuration management ensuring robust security.
• Automated updates for a 200+ client/server network, boosting efficiency.
• Recorded and tracked daily service desk requests, building a library of over 100 tutorials and how-to showing problem-solving process.
• Supervised a team of 3 to Led swift migration of 200 workstations from Windows 7 to Windows 10 in less than two months.
• Performed hands-on fixes at the desktop level, including installing and upgrading software, installing hardware, implementing file backups, and configuring systems and applications.
• Evaluated network performance of over 10 Linux/Windows Servers by monitoring and analyzing the infrastructure using Nagios, applying performance tuning when necessary; troubleshooting network problems as well as escalating identified problems when needed.
• Systematized software upgrades reducing the amount of labor from 3 days a week to less than 2 hours.
• Collaborated with the CTO on vendor interactions, monthly system enhancements, and schedule software releases.
• Developed, maintained, and monitored procedures for over 10 servers and data backups.
• Trained team members to be up to date on the system deployments and implementations.
• Designed, installed, maintained, and troubleshoot server software that spans over 40 locations, including Microsoft Azure’s Platform as a service, Software as a service, and Infrastructure as a service.
• Ability to work as a team with a team of four as well as individually to complete tasks and projects.
• Prioritized and scheduled problem resolutions. Escalated problem (when required.)
• Assisted in software releases and roll-outs and communication to the end users according to the company’s Change Management policies and procedures.
• Applied diagnostic utilities like Azure Monitor, Nagios to aid in troubleshooting.
• Configured Nagios to monitor over 300 active nodes and automatically report issues via team email when they arose.
Skills: · Amazon AWS Services (EC2, S3 Buckets, ELB, VPCs) · Security ( Identity and Access Mgm(IAM) Security Groups, Key Management Service (KMS) · Infrastructure as Code ( Terraform, AWS CLoud formation, Azure Resource Manager) · TeamLeader · Linux · Team Management · Server Administration · Automation · Docker · Git · Vim
C.A.Y. Technologies Inc. • Feb 2010 - Feb 2016 · 6 yrs
• Created plans to remove bottlenecks and resolve daily customer issues.
• Orchestrated the planning and execution of setup, configuration, and deployment for 15+ customer networks.
• Provided remote support, delivering effective solutions to 30 clients.
• Coordinated multiple projects by assigning tasks to 2 different teams and ensuring timely execution.
• Designed, installed, upgraded, configured, and repaired local and wide area network issues for 10+ clients.
• Managed and troubleshoot Group Policy in Active Directory, DNS, and DHCP.
• Investigated alerts created by IDS/IPS, including malicious file uploads, compromised servers, SQL injections, and port scanning.
• Developed, deployed, and tested custom bat automation to update five application servers.
- Skills: Problem-solving, System Monitoring, Project Management, Microsoft Teams, Office 365 Administration, Security, Remote Troubleshooting, Windows 10, Technical Support, Automation, Active Directory Management
ProntoCash • Jan 2007 - Dec 2009 · 2 yrs 5 mos
• Supervised and oversee network and day-to-day IT operations for over 10 locations.
• Entrusted in the planning, design, documentation, and implementation of various systems to include over 80 desktop PCs, 5 servers, network equipment, and software applications.
• Maintained, and troubleshoot 2 application servers and 1 database server on a 3 tier architecture.
• Managed multiple tasks, reported progress and met assigned deadlines on a weekly basis.
• Recommended computer purchases and replacements for over 10 locations with more than 80 workstations.
Skills: Network Management · System Monitoring · Microsoft Intune · System Design and Implementation· Office 365 Administration · Strategic planning · Remote Troubleshooting · Technical Support · Team Supervision · Server Maintenance and Troubleshooting
Bachelor of Science in Network and Communication Management
• 2006 Graduate
• Leverage wired and wireless media strategies
for developing network configurations• Design typical LAN, VLAN and WAN networks
• Manage enterprise level or small business
network and technology resources• Identify and mitigate network risk and cybersecurity threats
Enterprise Cloud Computing / Cybersecurity Analyst
• 2023 Graduate
• Network + Certification
• Security + Certification
• AWS Cloud Practitioner Certificate
• Linux + Certification
• AWS Cloud Infrastructure and Services
• Database Concepts Design
• AWS Solution Architect Associate
Verify Here • Issued by Amazon Web Services
Earners of this certification have a fundamental understanding of IT services and their uses in the AWS Cloud. They demonstrated cloud fluency and foundational AWS knowledge
Verify Here • Issues by CompTIA
Earners of the CompTIA Security+ certification have the knowledge and skills necessary to perform core security functions required of any cybersecurity role. CompTIA Security+ professionals know how to identify and address potential threats, attacks and vulnerabilities and they have established techniques in risk management, risk mitigation, threat management and intrusion detection.
Verify Here • Issued by Microsoft
Earners of the Azure Fundamentals certification have demonstrated foundational level knowledge of cloud services and how those services are provided with Microsoft Azure.
Verify Here • Issues by CompTIA
Earners of the CompTIA Network+ certification have the skills needed to troubleshoot, configure, and manage wired and wireless networks found in companies around the world. CompTIA Network+ professionals have demonstrated the ability to design and implement functional networks, configure, manage, and maintain essential network devices, implement network security, and troubleshoot network problems.
Verify Here • Issues by CompTIA
Earners of the CompTIA Linux+ certification have the knowledge and skills required to succeed in a Linux operating system environment. CompTIA Linux+ earners have demonstrated the ability to configure the system, navigate the command line, and use common package management systems. They are also able to customize the environment, create scripts and configure networking.
Verify Here • Issues by CompTIA
Earners of this badge have taken the AWS Academy Cloud Architecting course.
Verify Here • Issues by CompTIA
Earners of the CompTIA Linux Network Professional (CLNP) certification are Linux network professionals that are able to provide hands-on support and to monitor critical internal and client systems.
The challenge was to create an additional account for testing purposes that would be separate from the root account. To address this challenge, I set up an Organizational Unit and created a new account.
In this How-to-Guide, I explain how to create an admin user to administer the account. Then, I enabled Service Control Policies to only allow specific services and denied the disabling of Cloud Train.
Lastly, we tested the settings to verify that they are working.
In this project, I was in charge of establishing best practices for configuring an admin account to replace the root user. When a user account is created, they do not have access to any resources.
I then created a group and added the admin user to that group account. Afterward, I associated the user’s group with an account and added a permission set outlining what group members can access.