System administrator services. Complex maintenance of
computer systems, monitoring of IT infrastructure.
ukr
ru eng
phone: +38 066 044 1311 (9-18) Telegram
@ums2012 , +38 067 990 4812 Viber, e-mail: info at sysoko.info ,
https://sysoko.info
1. Remote administration of Windows servers, Linux, FreeBSD and workstations:
- implementation
of virtualisation servers - ESXi hypervisors (VMware vSphere, vCenter,
vSAN),
Proxmox VE, Hyper-V;
- implementation, realization of high availability clusters and and failover clusters;
- experience
in designing, configuring and supporting Wi-Fi networks (Ubiquiti,
Mikrotik) on
the scale of AT "Megabank", airport "Kharkiv", Internet
provider on the scale of 7 districts of Kharkiv;
- experience
in implementing Zabbix for monitoring infrastructure, servers and
network
devices in AT "Megabank" (migration from Icinga), airport
"Kharkiv" (migration from Nagios);
- configuration
of Windows servers 2022/19/16 (AD, GPO, MSSQL, terminal server);
- administration MS Office365, Google Workspace (GSuite);
- configuration
of AlmaLinux, Debian/Ubuntu, FreeBSD servers;
- implementation
of virtualisation platforms, transfer of servers to cloud solutions Hetzner,
Dcxv, Serverdale, Hostzealot, etc.;
- application
of storage systems OpenMediaVault, FreeNAS, Nas4Free, creation of NAS
for
customer needs FreeBSD ZFS;
- backup
of virtual and real servers, workstations, Veeam Backup &
Replication,
Bacula, Acronis, Cobian Backup, Duplicity, APBackUp;
- infrastructure
monitoring: servers and network devices with Zabbix,
Nagios, Icinga, Cacti, MRTG informing via Telegram, e-mail;
- web
server administration, domain registration, mail, configuration of
hosting
panels cPanel/WHM, HestiaCP/VestaCP, BrainyCP, ISPmanager;
- experience using Cloudflare service;
- configuration
of applications: LAMP, FAMP, HAProxy, pfSense, Docker,
Jail, PHP, Apache, Nginx, MySQL, ftp, sftp,
Squid, rsync, etc.;
- configuration
of network equipment: Juniper EX4200 Series (Virtual Chassis),
Mikrotik,
FortiGate VM, FG-100, FG-60, Cisco7200, 1841, 2960, D-Link DGS3420, HP,
Huawei,
Alcatel, Allied Telesyn AT-8000;
- configuration
of servers Dell PowerEdge R720HP, ProLiant G9/8/7, SuperMicro;
- remote
administration of servers and clients via SSH, IMPI, iLO, iDRAC, RDP;
- basic
installation and configuration of 1C 8.3 SQL, Medoc, regular backup;
- software configuration of video cameras and recorders
Dahua, Hikvision, PSS, SmartPSS, DMSS;
- PXE
download, installation of necessary software for Thinstation, Syslinux,
SliTaz,
nanoBSD, mfsBSD thin client;
- migration
to free software for workplaces - Ubuntu/Debian, AlmaLinux;
- setting up peripheral equipment - network printers,
scales, scanners,
label printers;
- security measures, implementation of SysLog,
Graylog, Wazuh, Elasticsearch, Logstash, Kibana;
- configuration
and administration of iRedMail, Kerio Connect, MDaemon, Exim, Postfix and
Dovecot;
- access
control systems Hikvision, StopNet, GoldenGate;
- modification
and writing scripts on Bash, PowerShel for task automation;
- technical
support: phone, Telegram, Viber, WhatsApp, TeamViewer,
RemouteAdmin,
AmmyAdmin;
- antivirus
software, OS security updates, preventive and routine maintenance;
- implementation and configuration of cryptographic protection systems BitLocker, VeraCrypt, Encrypting ZFS File Systems, Geli FreeBSD, fscrypt, LUKS, dm-crypt;
2. Measures for the security of the enterprise IT infrastructure:
- control
of the integrity of the software environment, control of configurations;
- development and implementation of a disaster recovery plan - disaster recovery planning (DRP);
- development and implementation of an action plan to minimize risks and possible damage - business continuity planning (BCP);
- audit of operating system settings for compliance with the recommendations and requirements of the Center for Internet Security;
- implementation
of 12 main security requirements and the maximum list of verification
procedures, according to the PCI DSS standard (Payment Card Industry
Data Security Standard);
- implementation of requirements of industry standards and practices of DSTU ISO-IEC 27000-2015, 27001-2015, 27002-2015;
- IT threat testing, information security reporting and
development of solutions for their mitigation and prevention;
- Implementation of Zabbix monitoring
system for the IT infrastructure, logging in Syslog+Loganalyzer, Wazuh, ELK. Key benefits:
- allows
you to monitor events in real time, track changes occurring on various
equipment and report them to responsible employees;
- notification
of possible critical events, the specialist gains time and has time to
intervene in the processes before the emergency failure of equipment or
service;
- the
possibility to trace the dynamics of changes of any parameter, to build
graphs
on changes of several parameters at the same time;
- values
of the monitored parameters are stored in the database, which greatly
simplifies the search for "bottlenecks" in systems, determination of
the cause of a particular failure when analysing situations;
- the
ability to add monitoring of various devices and services without
restrictions,
all configuration is done through the web-interface;
- for
many devices and services there are ready-made templates, which can be
modified
quite quickly depending on the tasks of the enterprise;
- the
ability to view the history of events, build comparative graphs;
- make
analyses and measures for effective interaction of
equipment/nodes/departments
of the enterprise;
3. Co-operation options:
- outsourcing
or outstaffing, labour contract in case of long-term cooperation;
- payment
to the FOP's bank account under the contract;
- payment
to a bank card;
- piece-rate
payment by agreement of the parties;
- payment
under civil law contracts and the act of completed work;
- monthly subscription fee, depending on the
volume of agreed works;
phone: +38 066 044 1311 (9-18) Telegram @ums2012, +38 067 990 4812 Viber, e-mail info at sysoko.info , https://sysoko.info