Infrastructure Designer and Administrator Architect for IT

City of GainesvilleGainesville, FL
21hHybrid

About The Position

Gainesville Regional Utilities is looking for a team-oriented IT Compute and Storage Infrastructure Architecture professional. Are you a motivated, organized, self-learner always looking for a challenge in which to test your advanced problem-solving skills? Do you want to broaden your skill set beyond just one area of IT Infrastructure? Can you communicate clearly at a professional level both verbally and in writing? Do you have superior skills in being organized and able to handle multiple complex assignments and successfully complete them? If so, apply to see where your knowledge, skills and enthusiasm might contribute to helping us build a stronger utility company and community. We need a quick-learning professional who has the ability to successfully collaborate with others and thrive in an environment of continuous learning and improvement on a diverse portfolio of technical and operational work within our 10 plus member IT Infrastructure group. This group provides a broad range of services, from high-level architectural design and planning, all the way down to the detailed daily operational work needed to maintain our complex, multi-site, virtualized server, database, storage, and IP network/voice hybrid cloud infrastructure. This is a senior level position that performs advanced, complex technical work in the public sector and utility industry. It involves a broad range of professional activities in support of a highly automated, multi-site enterprise computing environment for government, business and 24/7 control applications. There is an emphasis on team-oriented system architecture, planning and design within an ITIL framework. Work is performed remotely and on-site in a secured, regulated and audited environment. Work requires broad information technology skills and specialization in at least three of the following technical areas: networks, server, storage, database management, security, data center implementation and disaster recovery, multi-tier enterprise application architectures, or client infrastructure. Incumbents in this classification report to a designated manager and work under general direction. Work in this class is distinguished from other classes by its technical design leadership responsibility, and by the highest degree of expert technical skills for planning, design and administration.

Requirements

  • Bachelor degree from an accredited college or university with major course work in computer science, operating systems, computer architecture, data structures, programming, database management, networking and security, or an equivalent program acceptable to management; and six (6) years information technology experience including three (3) years as a systems programmer, network administrator, or equivalent; or an equivalent combination of education, training and experience which provide the required knowledge, skills and abilities.
  • MCSA Cloud, MCSE Cloud, MCSE Data, CCNA Routing and Switching, or CCNP Routing and Switching certifications or equivalents may be substituted for up to two (2) years of education; 1 year per certification.
  • A valid State of Florida Driver License is required at all times while employed in this classification.
  • Information Technology Infrastructure Library (ITIL) Foundation certification is required within six months of assignment date.
  • Ability, experience, and willingness to provide leadership and guidance to less experienced co-workers as well as provide effective training to new employees and end users.
  • Ability, experience and willingness to communicate effectively, both orally and in writing, with customers, coworkers, supervisors and managers.
  • Ability and willingness to write technical documentation.
  • Ability and willingness to self-learn.
  • Ability, experience and willingness to effectively plan and organize work to ensure the highest quality performance of self and others.
  • Ability and experience to lead, coordinate and participate in key process improvements as they relate to the organizational computing environment.
  • Ability, experience and willingness to work without direct supervision and to creatively and effectively solve system, hardware and interpersonal issues.
  • Ability, experience and willingness to work effectively with coworkers and the general public.
  • Ability and experience to maintain a high level of integrity when dealing with customers and systems to instill trust and to maintain security.
  • Ability, experience and willingness to make sound decisions to effectively solve problems of systems and hardware, as well as to maintain effective interpersonal relations that ensures a team atmosphere.
  • Ability, experience and willingness to stay current on all software and hardware systems to ensure ability to maintain system integrity and security, as well as the ability to resolve issues.
  • Ability, experience and willingness to observe all safe work practices to ensure the safety of systems, hardware, self and others.
  • Considerable knowledge of principles, practices, and methodologies of networks, client and server computer hardware, operating system functions, system management and administration, database design techniques, security, storage management, data center management, network design, disaster/recovery techniques, middleware and application configuration, problem solving and programming.
  • Knowledge of business and management principles involved in strategic planning, resource allocation, human resources modeling, leadership technique, production methods, and coordination of people and resources.
  • Knowledge of principles and processes for providing customer service which includes customer needs assessment, meeting quality standards for services, and evaluation of customer satisfaction.
  • Knowledge of relevant equipment, policies, procedures, and strategies to promote effective local security operations for the protection of people, data, and property.
  • Knowledge of administrative and clerical procedures and systems such as managing files and records, designing forms, and other office procedures and terminology.
  • Working knowledge of arithmetic, algebra, geometry, statistics, and their applications.
  • Working knowledge of principles and methods for curriculum and training design, teaching and instruction for individuals and groups, and the measurement of training effects.
  • Working knowledge of economic and accounting principles and the analysis and reporting of business data.

Nice To Haves

  • Expertise in designing, administering, operating and supporting a hybrid cloud infrastructure in an ITIL framework with emphasis on Windows OS, VMWare vSphere, SAN storage, Microsoft 365 Tenant, Azure Tenant, Active Directory, and IP networking.
  • Expertise in DevOps based on Windows IIS and Linux Apache Tomcat.
  • A programming background and ideally are current with C style languages (like C, C#, Java), Web development languages (like JavaScript, jQuery, HTML/CSS, PHP) and scripting languages (like Powershell, Perl).
  • MCSA, MCSE, MCSE+I, MCSA Cloud, MCSE Cloud, MCSE Data certifications.

Responsibilities

  • Data Center Designs, implements, administers, and monitors the efficient use of the data center floor space, rack space, power consumption, heat output, HVAC controls, environmental alarms, security access, cable management, disaster prevention and safety features with established practices for an auditable enterprise-level IT environment; conducting or participating in the annual data center disaster prevention, security, safety, and disaster response training.
  • Network Designs, implements, configures, administers, monitors, and troubleshoots the efficient and secure use of the in-house LAN, WAN, Wireless LAN, VoIP, and Video Conferencing IP networks using servers, routers, switches, VLANs, and other hardware to ensure stable operations, system connectivity, remote (VPN, DMZ, Certificate, PKI) access, security breach protection in conformance with established practices for an auditable enterprise-level IT environment for such activities as change management, preventative maintenance, and access control, and NERC-CIP Critical Cyber Assets requirements.
  • Servers Designs, implements, configures, administers, monitors, and troubleshoots a complex enterprise-level hybrid cloud and on premise physical and virtual server environment consisting of hardware, operating systems, back-office/middleware applications in multiple tiers from sandbox to production in conformance with established practices for an auditable enterprise-level IT environment for such activities as change management, preventative maintenance, and access control.
  • Storage Designs, implements, administers, monitors, and troubleshoots a complex enterprise-level storage environment consisting of local and centralized (SAN) storage technology, data replication, data archiving, and backup/recovery systems in conformance with established practices for an auditable enterprise-level IT environment for such activities as storage allocation, data protection, change management, preventative maintenance, and access control.
  • Database Administration Designs, implements, configures, administers, monitors, and troubleshoots a complex enterprise-level database environment at the physical and logical level, and to a lesser degree the application level, particularly using Relational Database Management Systems (RDBMS), in conformance with established practices for an auditable enterprise-level IT environment for such activities as storage allocation, data protection, change management, preventative maintenance, and access control.
  • Applications Designs, implements, configures, administers, monitors, and troubleshoots a complex enterprise-level mission-critical application server, storage and network environment in multiple tiers from sandbox to production in conformance with established practices for an auditable enterprise-level IT environment for such activities as change management, preventative maintenance, and access control.
  • Clients Designs, implements, configures, administers, monitors, and troubleshoots a complex enterprise-level physical and virtual client environment consisting of hardware, operating systems, front-office applications in conformance with established practices for an auditable enterprise-level IT environment for such activities as change management, preventative maintenance, and access control.
  • Disaster/Recovery Designs and implements redundant systems, policies, and procedures for disaster recovery to ensure effective protection and integrity of system and data assets, including operating systems, databases, network connections and protocols, servers, and software applications. Develop and modify plans based on results of tests or incidents. Develops and periodically conducts simulations to test system disruptions and disaster recovery plans and procedures, disaster avoidance and impact reduction strategies for the security and restoration of mission-critical business applications in the event of natural disasters, technical failures, power outages, and human or cyber interference. Manages and coordinates all aspects of actual recovery plan efforts, including initial emergency response, recovery procedures, and business resumption processes.
  • Security Conducts risk assessments and business impact analyses to identify vulnerable areas within the organization’s critical functions. Develops, implements, maintains, and oversees enforcement of policies, procedures, technologies, and associated plans for infrastructure security. Assesses need for any security reconfigurations (minor or significant) and execute them if required. Keep current with emerging security alerts and issues. Administers and maintains end user accounts, permissions, and access rights. Creates, maintains, removes and audits system and end user accounts, permissions, and access rights. Designs, performs, and oversees penetration testing of all systems in order to identify system vulnerabilities. Recommends, schedules, and applies fixes, security patches, disaster recovery procedures, and any other measures required in the event of a security breach. Plans, designs, implements, and maintains all security systems and their corresponding or associated software, including firewalls, VPN, intrusion detection systems, cryptography systems, biometrics, anti-virus software, and all client and server security activities. Develops and communicates IT security policies and procedures, including those for end users, network procedures, and legal/regulatory compliance. Recommends and assists with deployment of additional security products and tools, or enhancements to existing tools, to detect violations of infrastructure security measures.
  • General Participates in various IT work activities such as feasibility studies, capacity planning, performance analysis and fine-tuning, new technology evaluation, new systems and applications technical requirements specifications and review, and act as a project lead on technical IT infrastructure projects. Provides business hour technical support for escalated client-side and server-side hardware, software, security and network issues in a timely and customer-friendly manner. Provides after hours, on call technical support for all server-side hardware, software, security, and relevant network issues in a timely manner - usually on a rotating schedule. Provides after hours and weekend work for changes that must occur outside of business hours. Supports other IT teams throughout project, system, and application lifecycles. Acts as project lead in the design and review of new server systems, applications, and hardware; conduct capacity planning as needed. Works within an ITIL framework for service delivery and continuous improvement. Writes and maintains technical documentation. Attends work on a continuous and regular basis.
  • NON-ESSENTIAL JOB FUNCTIONS Develops and maintains training materials for educating end users and new IT staff. Conducts research on emerging products, services, protocols, and standards in support of infrastructure procurement, enhancements and development efforts. Performs cost-benefit and return-on-investment analyses for proposed infrastructure components to aid management in making implementation decisions. Performs other related duties as assigned.

Benefits

  • health insurance
  • life insurance
  • paid leave
  • 11 paid a holidays a year
  • a pension plan
  • a deferred compensation plan
  • on-site fitness centers
  • tuition reimbursement
  • on-site medical staff
  • a wellness program
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service