Protect network security |
Reset all passwords |
Developed a VB script to efficiently reset passwords |
Success bolstering network security against cyber threats. |
Monitor over 200 servers in network |
Installed and configured Opmanager service |
Enabled the monitoring of over 2000 servers |
All servers under 5 servers monitor. |
Reduce Hardware footprint DataCenter, Cost |
Collect 600 servers info |
Successfully migrated and performed P2V conversions on more than 600 servers |
Collaborated with the Network team to transition DNS each server to the new InfoBlox platform. |
Replace multiple systems protection |
Build new servers & software |
Work with tech support vendor |
Upgraded security infrastructure by replacing old security cameras with a modern security monitoring camera system. |
Replace new AC system |
Build new servers & software |
Work with tech support vendor |
Successfully installed and configured AC facility systems and SAGE Tax servers. |
Change New Active Directory Win16 |
Collect all servers info meet requirement using new AD |
Schedule BU to change domain |
Successfully managed the seamless migration of over 900 servers from legacy domains to a new Active Directory domain. |
Reduce Cost |
Decommission less active server or migrate |
Collection info with BU |
Successfully spearheaded the removal and replacement of over 200 servers to streamline costs and enhance lifecycle management. |
Replace older OS to compliant security policy |
Make all servers meet new security level |
Collect servers using OS need upgrade |
Successfully upgraded over 180 servers and applications with new Windows versions for enhanced production efficiency. |
Replace Server service cost |
Find servers to cut resource |
From Vcenter search performance and set new level resource |
Successfully implemented server right-sizing strategies, optimizing performance and reducing costs across 1000 servers during challenging periods. |
Reduce Old Hardware storage cost |
Find BU utilize these servers |
Work with application team migrate data out |
Successfully upgraded storage systems, replacing old Tegile and EMC systems with higher performance and cost-effective Dell Max solutions. |
Reduce time delay for restore from backup |
Turn on digital backup service |
Working with backup team define which server can move to it |
Successfully transitioned Tapes Backup services from IronMountain to HP Digital Backup. |
Implement servers in private cloud |
Make all AWS servers part of AD |
Login each server, apply patch, security, join AD |
Successfully integrated AWS servers into the new AD domain, ensuring compliance with security requirements. |
Improve performance and reduce hardware service cost |
Move Large MS SQL database without damage |
Build new environment and ready for backup/restore database over WAN |
Successfully managed the migration of the largest MS SQL database to the Engineering team's new Data Center. |
Security requirement monthly |
Apply MS patch on 300 servers and reboot |
Schedule with BU day/time for this implement |
Successfully conducted monthly patching for manufacturing servers across three locations: Fremont, Great Oak, and Las Vegas. |
Remove out-of-service Norton antivirus |
Need to install Crowstrike asap |
Using script to push installation asap |
Successfully improved security by installing Crowstrike and Splunk on over 1800 servers, removing non-compliant antivirus software. |
Need to improve server security |
Identify servers with recurring performance issues |
Query Splunk to detect issue |
Successfully utilized Splunk to update server performance and KPIs on over 2800 servers to meet requirements. |
Organize 2 Services Now from 2 companies compile CMDB |
Find conflict record host |
Replace/update correct CMDB |
Leveraged Splunk to update 1000 servers with CMDB information and track unmanaged servers. |
Avoid ransomware attack network |
Check and update all servers missing WanaCry patching & apply |
- |
Successfully applied WanaCry Patch and ensured full security with Crowdstrike installation on 100% of servers. |
During Cyber Incident Response |
Identify and isolate compromised systems until resolution |
Research and locate infected servers and isolate before use |
Successfully isolated and applied hard security measures to prevent further infection. |