Description
Timing pm to am
JOB RESPONSIBILITIES
VOIP:
Design, implement, and maintain VoIP networks and systems.
Troubleshoot and resolve issues related to voice quality, connectivity, and performance.
Configure and manage VoIP equipment, such as IP phones. SIP. Trunks, IVR and Ring Group.
Integrate VoIP with existing systems
Monitor and analyze network traffic to optimize VoIP performance.
Administer and maintain VoIP servers.
Manage user accounts, extensions, and permissions on the VoIP system.
Conduct regular backups and implement disaster recovery plans.
Provide technical support to end-users for VoIP-related issues.
Diagnose and troubleshoot problems with voice quality, call connectivity, and hardware.’
Sip Accounts
Cloud Infrastructure:
Azure, Kamatera, Digital Ocean
Production Window server with IIS
VOIP on Linux
WHMCS on Linux
Staging servers with IIS
Collaborate with stakeholders to understand business requirements.
Select appropriate cloud services and components based on application needs.
Configure networking, storage, and security settings within the cloud environment.
Monitor and respond to security incidents, conduct regular audits, and implement security patches.
Develop and implement disaster recovery plans for cloud-based systems.
Ensure data backup and restoration processes are in place.
(Web Host Manager Complete Solution) WHMCS
Set up new client accounts in WHMCS.
Define and configure hosting plans, domain registration options, and other products/services.
Integrate domain registration services and manage domain registrations for clients.
Automate domain renewal processes and manage domain expiration notifications.
Implement automation for common workflows, such as account setup, suspension, and termination.
Implement security measures within WHMCS to protect client data.
Address and resolve issues related to WHMCS functionality.
Keep WHMCS software up-to-date by applying patches and updates.
Take regular backups of client websites, databases etc.,
Co-operate and help team to develop websites, content and others features/plugins.
Host/Servers
Check and implement security measures on both hosts
Configure multi-RAID on fresh machine and install virtual environment
Migrate vm from old host to new host
Create backup and disaster plan for both virtualized hosts.
Manage storage on both hosts with NAS.
Network Area Storage (NAS)
Troubleshooting and resolve issues
Monitor alerts and take action as per need
Update time to time
Secure all data and manage permission as per need
VM Ware ESXI and Hyper-V
Install and configure the ESXi hypervisor on physical servers.
Set up and configure host networking, including NIC teaming and VLANs.
Configure storage options, including datastores for VMs.
Create, configure, and manage virtual machines.
Install and configure guest operating systems on virtual machines.
Manage VM snapshots for backup and recovery purposes.
Allocate CPU, memory, and storage resources to virtual machines.
Monitor resource usage and performance of VMs.
Configure virtual networks, including switches and routers, within the ESXi environment.
Adjust resource allocations based on changing workload requirements.
Implement and manage network policies, such as security and traffic shaping.
Apply patches and updates to address security vulnerabilities.
Window Server
Install and configure Windows Server operating systems on physical and virtual machines
Set up and configure server roles and features based on organizational needs.
Configure and manage Active Directory services, including domain controllers.
Create and manage user accounts, groups, and organizational units (OUs).
Implement Group Policy Objects (GPOs) for centralized management of user and computer configurations.
Implement and maintain security best practices for Windows Server environments.
Install and configure antivirus software and other security tools.
Set up and manage file shares for data storage and access.
Implement and troubleshoot network policies and access control.
Perform regular backups and test restoration procedures.
Implement backup solutions to ensure data integrity and recovery in case of data loss.
Monitor server performance and resource utilization.
Identify and troubleshoot performance issues.
Implement performance tuning measures based on monitoring data.
Keep servers up-to-date with the latest security patches and updates.
Configure and manage Remote Desktop Services for remote access.
IIS
Customize IIS settings based on the requirements of hosted applications.
Create and configure websites within IIS to host web applications.
Deploy and manage web applications on IIS servers.
Configure virtual directories and application pools for optimal application isolation.
Configure and manage SSL/TLS certificates for secure communication.
Renew and update SSL/TLS certificates in a timely manner.
Configure authentication and authorization settings for websites and applications.
Implement IP and domain restrictions for access control.
Monitor IIS logs to identify issues, analyze traffic, and track user activity.
Enable and configure logging for websites and applications.
Implement backup solutions for IIS configurations and web content.
Websites Deployments
Efile staging and production Website web deployed.
Eworkforcepayroll staging and production Website web deployed.
Accountbluebook staging and production Website web deployed.
MaxoutCrm staging and production Website web deployed.
EMS staging and production Website web deployed.
Configure and manage SSL/TLS certificates for secure communication.
Renew and update SSL/TLS certificates in a timely manner.
Configure authentication and authorization settings for websites and applications.
Implement IP and domain restrictions for access control.
Monitor IIS logs to identify issues, analyze traffic, and track user activity.
Enable and configure logging for websites and applications.
Implement backup solutions for IIS configurations and web content.
SQL
Install and configure SQL Server instances on servers and end users.
Configure server and database settings based on organizational requirements.
Design and create new databases based on application and business requirements.
Implement security measures to protect databases and sensitive data.
Develop and implement backup strategies to ensure data integrity.
Test and validate database recovery procedures.
Monitor database performance and identify bottlenecks.
Optimize queries and indexes for improved performance.
Schedule and perform routine database maintenance tasks, such as index rebuilds and statistics updates.
Monitor database size and space usage.
TFS
Create and configure build definitions for compiling and packaging applications.
Automate deployment processes for different environments.
Use pull requests for code reviews and collaboration.
Integrate with popular development tools, such as Visual Studio, Visual Studio Code, and various IDEs.
Manage user access and permissions for different team members.
Implement regular backup procedures for TFS/DevOps data.
SonicWall Firewall
Install and set up SonicWall firewall devices in the network.
Configure basic settings, including network interfaces, IP addresses, and system preferences.
Define and manage security policies to control traffic flow.
Configure firewall rules for allowing or blocking specific services, applications, or traffic types.
Implement access control policies based on user roles and groups.
Configure and manage intrusion prevention settings for VOIP smooth line communication.
Implement content filtering policies to control access to websites and online content.
Define policies for controlling and monitoring application usage.
Set up logging to capture firewall events, alerts, and security incidents.
Configure and manage high availability settings for redundancy and failover.
Regularly check for and apply firmware updates to ensure the firewall has the latest features and security patches.
Regularly back up firewall configurations to facilitate quick recovery in case of failures or replacements.
Servers Monitoring
Space, Alters and Storage issues
Live Monitoring.
Security.
Make zero-trust policy for servers.
Make a Secure Policy for the company security and deploy
End user support
Provide frontline support through a help desk or service desk.
Diagnose and resolve hardware and software issues reported by end users.
Investigate and troubleshoot problems related to applications, operating systems, and devices.
Install, configure, and update software applications on end-user devices.
Provide support for desktops, laptops, printers, and other hardware devices.
Perform hardware installations, upgrades, and replacements.
Support end users with operating system-related issues.
Provide assistance with email setup, configuration, and troubleshooting.
Troubleshoot network connectivity issues for end-user devices.
Provide remote support to end users who are working from different locations.
CCTV Camera / DVR
Plan and design the layout of CCTV systems based on security requirements.
Install and set up CCTV cameras, DVRs/NVRs (Digital Video Recorders/Network Video Recorders), and other related equipment.
Configure camera settings, resolutions, and recording parameters.
Manage storage solutions for recorded footage.
Configure storage settings, retention policies, and backup procedures.
Set up remote monitoring capabilities for real-time surveillance.
Configure access controls to restrict unauthorized access to the CCTV system.
Provide playback capabilities for reviewing historical footage.
Linux Administration (AlmaLinux , Rocky Linux , or CloudLinux™ )
Install and configure Linux operating systems on Cloud Servers.
Set up and customize system settings based on organizational requirements.
Create and manage file systems, partitions, and disk quotas.
Monitor and optimize file system performance.
Resolve package dependencies and ensure system stability.
Implement security best practices to protect Linux servers.
Configure and manage network interfaces, IP addresses, and DNS settings.
Install and Configure WHMCS on Linux latest flavor
Install and configure VOIP Vital PBX on Linux latest flavor
Develop and implement backup strategies for data and system recovery.
Time Attendance Machine (Back office and Front Office)
Install and set up time and attendance machines in appropriate locations.
Configure basic settings such as date, time, and display options.
Ensure accurate synchronization of employee data between systems.
Enroll employees in the time and attendance system.
Capture and store biometric or card-based identification data.
Provide training to employees on how to use the time and attendance machines.
Monitor and track employee attendance and punctuality.
Configure and manage employee work shifts.
Company Custom Applications
Provide ongoing support for end-users regarding company custom applications.
Troubleshoot and resolve application-related configurations problems.
Configure and manage SSL for custom applications on IIS timely.
Develop and maintain disaster recovery plans for custom applications.
Feature Tasks/Project
Upgrade/Migrate Linux from old expired version to new Linux versions
Install and manage WHMCS on upgraded or migrated Linux
Install and configure VitalPBX on newly installed Linux OS.
Configure Multi RAID Controller on Fresh Host
Migrate and divide vm’s on both hosts.
Configure SonicWall Firewall with both ISP
Buy new window VM and Install/Configure Server
Migrate Existing Machine IIS including Applications and Databases to new fresh IIS.
END Point Security
Deploy endpoint security antivirus software to all devices within the network.
Ensure proper installation and configuration on each endpoint.
Define and configure security policies for antivirus protection.
Set up scanning schedules, quarantine settings, and threat detection rules.
Regularly update virus definitions to ensure protection against the latest threats.
Automate the update process to keep endpoints current with new signatures.
Monitor endpoints for signs of malware, viruses, and other malicious activities.
Implement real-time scanning to detect and prevent threats during normal operations.
Manage quarantined files and take appropriate actions (delete, restore, or analyze).
Implement backup solutions for critical data on endpoints.
G-Suit
Create, modify, and delete user accounts within Google Workspace.
Configure and manage email accounts for users.
Monitor and address email security, spam, and phishing concerns.
Integrate Google Workspace with other GoDaddy domains.
Manage licenses for Google Workspace applications.
Configure MX records with new domain.
Azure Migration
All server migrations continue.
Sonar Que
Atera (RMM)
Network Administration
Monitor Network activities
Try to make network smooth in given resource.
G-Suit
Create, modify, and delete user accounts within Google Workspace.
Configure and manage email accounts for users.
Monitor and address email security, spam, and phishing concerns.
Integrate Google Workspace with other GoDaddy domains.
Manage licenses for Google Workspace applications.
Configure MX records with new domain