Vmware ESX 4/5/6 - Provision virtual machines through vsphere, assign available resources and install operating systems. - Configure the various built in alarms for monitoring, configure alarm thresholds and email settings. - Understand the use and purpose of snapshots, creating and removing snapshots in vsphere and through command line. - Exporting virtual machines using vsphere to OVF template. - Importing virtual machines using vsphere from OVF template. - Datastore types and usage including local attached, SAN and iscsi. - Storage provisioning types and limitations, thin vs thick. - Configuring vcenter for managing multiple ESX servers. - Configuring virtual switches and port groups including assigning multiple virtual switches to a virtual machine. Active Directory - User, group, and computer account management in active directory on a domain controller. - User and group access and permissions. DHCP - Adding and configuring scopes with domain, dns, gateway, pxe options and address reservations. DNS - Configure and mange internal and external DNS servers on Windows Server and Linux. - Create and manage forward and reverse lookup zones. - Create and manage DNS records including A, MX, Cname, and TXT records. RDP - Familiar with remote server managing through RDP. Group Policy - Assigning network shares and login scripts via group policy. - Creating policies based on operating system type and WMI. Login Scripts - Using login scripts for network share mounting within Active Directory.
Exchange 2010 - Use the Exchange management console and shell for Exchange server management. - Exchange server configuration and management of Outlook Web Access, Outlook Anywhere, IMAP, POP, SMTP, and Active Sync. - Managing Exchange database and log file storage locations. - Configuring Exchange transports and send connectors. - Exchange configuration with multiple accepted domains. - User mailbox management with active directory integration. - SSL certificate management including adding and renewing certificates, assigning services to SSL certificates. Outlook 2013 - Configuration for Exchange mailboxes and as well as multiple mailboxes per user. - Configuration with Outlook Anywhere for remote clients. - Configuration with Business Contact Manager. Symantec Mail Security for Exchange - Configuring quarantine and manage quarantined items, release falsely quarantined items. - White listing email addresses and domains to bypass filtering. - Add custom filtering rules based on content or subject. Symantec Endpoint Protection - Managing and configuring company groups and protection policies. - Use the Endpoint manager to deploy packages to clients remotely. Symantec Backup Exec 2012 - Configure and manage backup jobs for Windows and Vmware servers including monitoring backup job statuses. - Deploy and update remote backup agents on Windows servers. - Configure and manage local and remote storage media for backup jobs. - Familiar with full, incremental, differential, granular, and deduplication backup practices for file based backup and image based backup. - Familiar with Backup Exec s method of backing up Vmware virtual machine using vstorage api for performing snapshots. - Perform disaster recovery scenario testing. IIS 7/8 - Understand site bindings with IP addressed and SSL certificates. - Adding and renewing site SSL certificates in IIS. - Familiar with SNI (Server Name Indication) in IIS8. - Configure HTTP authentication for site access with username and password. - Familiar with installing and using PHP5.x in IIS.
- Familiar with the IIS URL Rewrite module and using rewrite rules to rewrite URLs. - Familiar with the format and sections of IIS web.config files for manual editing. - Familiar with robots.txt and sitemap.xml file formats for creation and editing. FTP - Create and manage virtual FTP directories and access permissions. - Create and manage user access. MSSQL - Familiar with MSSQL manager studio and logging into database management with database and Windows authentications. - Able to backing up and restoring a database. - Able to modify database security and user permission. MySQL - Able to perform a MySQL database query through command line in order to display table values. - Able to add and remove table values from a database through command line. - Able to add users and assign database permissions for read or read/modify through command line. - Able to dump a database to a file through command line. - Able to import a database from a dumped SQL file through the command line. - Able to script basic MySQL commands for automating tasks. Windows Deployment Services - Configuring the server for PXE booting images based on architecture (x86, x64, UEFI). - Able to perform boot image functions such as adding, replacing, and disabling images. - About to mount images to perform driver injections and maintenance. - Configure WDS to use TFTP and DHCP with PXE booting. Deployment Workbench - Import operating systems into deployment workbench from source disks. - Create and configure operating system install tasks for deployment. - Maintain a repository of Windows update packages for multiple versions of Windows operating systems for injection. - Maintain a repository of hardware drivers for multiple platforms for injection. - Able to find silent install switches for exe and msi installer packages to use in unattended software installations. Rsync - Familiar with Rsync block level backup technology and its advantages for offsite backup use.
Sonicwall - Familiar with DMZ configurations and implementation. - Familiar with vlan configurations and implementation. - Familiar with Portshield groups and aggregation. - Create and use custom address objects and object groups for use in NAT and firewall tables. - Able to configure NAT and Firewall polices based on network zones and address objects. - Understand network zones such as LAN, WAN, DMZ, and WLAN. - Understand network zone security types such as Public, Trusted, and Untrusted. - Familiar with application control and blocking rules. - Familiar with content filtering and blocking rules. - Familiar with RBL blocking and the advantages/disadvantages of RBLs. - Familiar with enterprise wireless configurations. - Familiar with Sonicwall Single Sign On (SSO) authentication. - Familiar with LDAP integration for user control and methods of authentication such as WMI, NETAPI, and DC Security Log. - Configuring a Sonicwall VPN, users, and the Sonicwall VPN client. PHP 5 - Read values from a MySQL database and display the values on web pages. - Use sessions to store variable data for use in forms and HTTP links. - Use includes to inject code into pages. - Use PHP to form HTTP links with variable data. Deployment - Familiar with BIOS updating and configuration such as sata/raid, pxe boot and boot order. - Able to perform network booting on multiple platforms. - Familiar with unattended Windows installations and xml answer files. - Able to install Windows from disks including all manufacturer drivers and Windows updates. - Familiar with Windows Sysprep and its uses. - Familiar with batch files and its uses for automating Windows tasks and unattended application installation. - Able to perform firmware updating on server hardware such as motherboards, raid controllers, and hot swap backplanes through DOS and EFI shells. - Able to configure and manage Raid arrays on controller cards including building, rebuilding, verifying, and hot spares. - Familiar with BMC logs and how to retrieve and read them. Linux - Able to use package managers such as apt-get to update and upgrade system packages. - Familiar with Bind9 configuration and management as a secondary DNS server. - Familiar with SSH for remote Linux administration.
Troubleshooting - Able to test for defective hard drives using scanning tools and smart attribute reader. - Able to test for defective memory using memtest software. - Use Windows debugging tools to decode blue screen dump files to determine cause. - Familiar with stress testing software. - Familiar with Windows event viewer. - Able to rebuild and recover Raid arrays after hard drive failures. - Boot pre-configured PE environments from network or USB. System Builds - Able to build systems in a consistent manner with respect to component location and wiring. - Verify parts for systems match work order exactly. - Familiar with ESD. Misc - Familiar with HTML and validation. - Familiar with CSS. - Able to configure network printers and other peripherals. - Familiar with imaging software such as Norton Ghost and Acronis. - Able to configure and use virtual machines in Virtualbox as well as exporting and importing virtual machines. - Familiar with full disk and partition encryption software such as truecrypt and bit locker and its uses. - Familiar with Google webmaster tools and analytics for website health monitoring. - Familiar with Smarty template engine.