Projects

Note: This is not an exhaustive list of all projects

2024

2023

  • Pitched and got approval for new cloud-based phone system to be deployed in 2023
  • Migrated over 24 offices and over 500 people from legacy on premises phone services to Zoom Phone
  • Coordinated multiple ISP/telco changes and upgrades
  • Configured networks for 10 new offices since the beginning of 2023
  • Participated in more vendor risk due diligence and incident response

2022

  • Migrate multiple offices from analog 3rd party phone systems to PRIs and our Call Manager system
  • Migrate multiple offices from analog POTS fax lines to eFax solution
  • Configure and deployed Single Sign-On (SSO) implementations across many platforms
  • Coordinated multiple ISP/telco changes and upgrades
  • Received CompTIA Security+ certification
  • Received Microsoft Security, Compliance, and Identity Fundamentals certification

2021

  • Planned, configured, and deployed new WAN circuits for HQ and secondary office to be DIA fiber instead of private L2 circuits
  • Migrate multiple offices from analog POTS fax lines to eFax solution
  • Worked with cloud-based disaster recovery service to deploy failover Meraki firewall
  • Configure and deployed Single Sign-On (SSO) implementations across many platforms
  • Research and configure TLS best practices on server infrastructure

2020

  • Planned, configured, and deployed client VPN solution for the entire company to be able to work from home
  • Configure Cisco Jabber softphone for the entire company to be able to work from home
  • Deployed and administer vulnerability scanning and management solution
  • Configured networking devices for two offices from acquisition
    • Configured a new firewall, switch, voice gateway, and wireless access point for new locations
    • Cut voice systems over to our Call Manager environment from old telco
  • Relocated a branch office and configured new networking equipment and subnet
    • Configured a new firewall, switch, voice gateway, and wireless access point for a new location
  • Reconfigure networking equipment company-wide for best practice SSH access

2019

  • Planned, configured, and deployed company-wide SD-WAN solution
  • Added redundant cellular internet connectivity at each office
  • Configured networking devices for an office from an acquisition
  • Configured a new firewall, switch, voice gateway, and wireless access point for a new location
  • Cut voice system over to our Call Manager environment from old telco

2018

  • Planned and configured 802.1X port security on all network switches
    • Configured all switches with either 802.1X or sticky MAC address security
  • Planned and configured a Cisco voice gateway router upgrade
    • Configured router and Call manager to handle new extensions and call flow using PRI instead of POTS
    • Worked with Telco to schedule and meet requirements of location
  • Replaced WAN router with RMA due Cisco chipset failure
  • Configured networking devices for two offices from acquisition
    • Configured a new firewall, switch, voice gateway, and wireless access point for new locations
    • Cut voice systems over to our Call Manager environment from old telco
  • Relocated a branch office and configured new networking equipment and subnet
    • Configured a new firewall, switch, voice gateway, and wireless access point for a new location
  • Configured new network equipment for office expansion
  • Cisco network hardware/firmware upgrades across the enterprise

2017

  • Lead in assisting network and voice planning and deployment of new Cisco Call Manager environment
    • Helped clean up old Call Manager configuration
    • Replaced multiple outdated Cisco voice gateway routers with new series
    • Helped plan new 4 digit internal extensions
    • Helped deploy Cisco Expressway infrastructure required for phone registration over the internet
    • Followed test plans during cutover for all call routes
  • Assisted in upgrading SAN environment
    • Researched, configured, and deployed SAN switches
  • Created IT Metrics reports for departmental and executive review
    • Maintained and delivered reports monthly
  • Cisco network hardware/firmware upgrades across the enterprise

2016

  • Lead in assisting network planning and deployment of a new WAN infrastructure while moving server environment to a co-location facility
    • Migrated HQ to new IPv4 subnet to allow for server subnet to relocate to colo
    • Configured and deployed new switches in colo for servers
    • Assisted in migrating to new Cisco ASA Firepower firewall as a hub for site-to-site VPNs
    • Cleaned up firewall ACLs and created technical and executive firewall documentation
  • Deployed PRTG Network Monitor in place of a simple Ping monitoring system
    • Built out the entire platform to monitor all network and server resources
    • Configured proper alerting on action items
    • Maintained and administered platform
  • Researched, planned, and deployed a new antivirus platform
    • Researched all of the top AV offerings and chose the best for the company
    • Planned all of the AV exceptions and policies
    • Deployed to entire server and workstation environment
    • Maintained and administered platform
  • Planned and deployed a new backups network
    • Deployed a new switch and connected critical servers to the backup server to offload network traffic from the data network
  • Cisco network hardware/firmware upgrades across the enterprise
  • Received Cisco CCNA certification

2015

  • Replaced core switch at HQ due to hardware failure
    • Configured and deployed new switch
  • Cisco network hardware/firmware upgrades across the enterprise
    • Upgraded Cisco ASA firmware and device management software for security and features
    • Upgraded Cisco IOS firmware on access switches for security and features
    • Replaced Cisco switches within infrastructure due to age

2014

  • Cisco network configuration best practices across the enterprise
    • Configured AAA on Cisco ASAs for more secure authentication
    • Standardized Syslog configuration for proper device logging
    • Standardized console login configuration for secure physical access
    • Configured and forced SSH access for secure remote access
    • Configured Network Time Protocol (NTP) for proper time stamps for logging