LAN/WAN ADMINISTRATOR (A) - Crown Cork & Seal USA, Inc.
Yardley, PA 19067
About the Job
Crown Cork & Seal, Inc. - Yardley Corporate Office
Good Things Come in Our Packages…
Crown Cork & Seal, Inc. is a Fortune 500 Manufacturing Company with a rich history dating back to 1892. As a global leader in the packaging industry, we operate in over 45 countries with more than 200 plants. Our commitment to excellence is reflected in the trust that the largest consumer products companies place in Crown for their packaging needs. Join us and be part of a team where over 20,000 employees trust their careers to our innovative and dynamic organization.
LAN/WAN ADMINISTRATOR ("Networks & Server Systems Administrator")
Description
As the Networks & Server Systems Admin at Crown Cork & Seal, Inc., you will play a crucial role in our IT network and support team at the corporate office in Yardley. Your responsibilities will encompass a wide range of hardware, networking, and application technologies, as well as proficiency in scripting and web development. As a member of a team of 12 IT network and support staff, you will be at the forefront of ensuring seamless operation and continuous improvement of our IT infrastructure.
Responsibilities
• Design, implement, and optimize PC and server networks leveraging Cisco technologies including routers and switches, in a fully converged WAN data network with primary DMVPN and Cellular backup connections.
• Facilitate inbound connections through VPN links and Citrix NetScalers/Access gateways.
• Oversee the implementation, configuration, and support of Microsoft technologies, including but not limited to Windows Server, Active Directory, and Microsoft Office Suite.
• Aid telecommunications projects aimed at improving or expanding the current infrastructure while managing cost controls.
• Monitor and identify capacity and performance issues, conducting research on emerging products, services, and protocols.
• Develop disaster recovery plans and conduct testing to minimize outages.
• Provide on-call technical support as needed.
• Install state-of-the-art IT equipment and provide guidance to team members.
Position Requirements
Formal Education & Certification
• College degree in a related field and/or 8-10 years equivalent work experience.
• Certifications in IT infrastructure, Microsoft technologies, and Cisco technologies are a plus.
Knowledge & Experience
• Working technical knowledge of Microsoft technologies, Cisco routers/switches, Palo Alto firewalls, and Avaya Aura systems.
• Proficiency in managing a fully converged WAN data network using Meraki SD-WAN infrastructure.
• Strong knowledge of VPN and protocols used in EDI transmissions and user connectivity.
• Hands-on experience with the configuration/installation, implementation, maintenance, and tuning of IT equipment.
• Knowledge of infrastructure monitoring applications such as SolarWinds and WhatsUp management tools.
• Familiarity with Microsoft Office applications including Outlook, Excel, and Word.
Personal Attributes
• Understanding of the organization’s goals and objectives.
• Strong interpersonal skills, oral communication skills, and proven analytical and problem-solving abilities.
• Highly self-motivated and directed.
• Ability to conduct research into IT issues and products as required.
• Strong customer service skills and the ability to work in a team-oriented, collaborative environment.
Work Conditions
• Office environment with occasional on-call availability as needed to solve problems.
• Occasional inspection of cables and wiring.
• Occasional visits to data centers & plant locations to administrate, repair, install, or decommission IT equipment.
• Regular lifting and transporting of moderately heavy objects, such as IT equipment and peripherals.
Proficiency Requirements:
As Networks & Server Systems Admin, candidates should demonstrate a high level of proficiency in the following key areas:
1. Network Infrastructure:
• Design and Architecture: Demonstrated expertise in designing, implementing, and maintaining robust and scalable network infrastructures. In-depth knowledge of DHCP and DNS protocols.
• Routing and Switching: In-depth knowledge of routing protocols (e.g., OSPF, BGP) and switching technologies (e.g., HSRP, LACP, VLANs/SVIs, 802.1q), with the ability to optimize network traffic.
• Network Security: Proficiency in implementing and managing network security measures, including firewalls, intrusion detection/prevention systems, and VPNs.
• Quality of Service (QoS): Experience in implementing QoS policies to prioritize and optimize network traffic based on business requirements.
2. Server Infrastructure:
• Architecture and Design: Strong understanding of design and administration of merged physical and virtual server environments.
• Configuration: Configure and administrate physical and virtual servers using iLO, iDRAC, Hyper-V and VMWare
• Hardware: Familiarity with HP and Dell server hardware; past and current generations
• Software: Familiarity with Windows Server 2008/R2, 2012, 2016, 2019, 2022, System Center, Failover Cluster management, and PowerShell scripting.
• Storage: Familiarity with SAN, NAS, and backup/dedupe technologies such as Lefthand, Dell Data Domain, IBM Power Vault, and Cohesity backup/recovery solutions.
3. Active Directory:
• Architecture and Design: Strong expertise in the architecture and design of Active Directory environments, including forest and domain design, replication, and trust relationships.
• User and Group Management: Proficiency in managing user accounts, groups, and organizational units within an Active Directory environment.
• Group Policy: Experience in designing and implementing Group Policy Objects (GPOs) for centralized management and configuration of network resources.
4. Azure/Entra ID:
• Cloud Services: Extensive experience with Microsoft Azure, including proficiency in deploying and managing cloud services, virtual machines, and storage solutions.
• Identity and Access Management: In-depth understanding and hands-on experience with Azure Active Directory (Azure AD) and Entra ID for efficient identity and access management in cloud environments.
• Security and Compliance: Knowledge of Azure security features, compliance standards, and the implementation of security best practices
5. Power Platform Fundamentals:
• Power BI: Understanding and experience with Power BI for data visualization, reporting, and business intelligence.
• Power Apps: Proficiency in creating custom applications using Power Apps to streamline and automate business processes.
• Power Automate: Knowledge of Power Automate for designing automated workflows and integrations between different applications and services.
6. Certificate Services:
• Public and Private Key Infrastructure: In-depth knowledge of Public Key Infrastructure (PKI) concepts and hands-on experience with the implementation and management of Certificate Services.
• SSL/TLS Certificates: Proficiency in managing SSL/TLS certificates, including issuance, renewal, and troubleshooting certificate-related issues.
• Security Protocols: Familiarity with security protocols such as HTTPS, TLS, and their integration within the overall network security strategy.
7. Telephony:
• VoIP Systems: Hands-on experience with Voice over Internet Protocol (VoIP) systems, including configuration, optimization, and troubleshooting.
• Unified Communications: Proficiency in Unified Communications (UC) solutions for seamless integration of voice, video, and messaging services.
• Telephony Infrastructure Design: Ability to design and manage telephony infrastructures to meet organizational communication needs efficiently.
8. Meraki SDWAN:
• SDWAN Implementation: In-depth understanding and hands-on experience with Meraki SDWAN solutions, including deployment, configuration, and ongoing management.
• Traffic Optimization: Proficiency in optimizing network traffic through intelligent routing and prioritization in Meraki SDWAN environments.
• Monitoring and Troubleshooting: Ability to effectively monitor and troubleshoot issues in Meraki SDWAN, ensuring high availability and performance.
9. WiFi Technologies:
• Wireless Network Design: Expertise in designing and implementing wireless network architectures, including access point placement and coverage optimization.
• WiFi Standards: In-depth knowledge of WiFi standards (e.g., 802.11ac, 802.11ax) and the ability to leverage the latest technologies for enhanced wireless performance.
• Security and Authentication: Proficiency in implementing wireless security measures, such as WPA3, and configuring authentication protocols to ensure a secure WiFi environment.
10. Cybersecurity Strategy, Planning, and Design:
• Risk Assessment: Conduct comprehensive risk assessments to identify and evaluate potential cybersecurity threats and vulnerabilities.
• Strategic Planning: Work with infosec team to develop and implement a robust cybersecurity strategy aligned with the organization's goals, taking into account the global and dynamic nature of the corporation.
• Network Security: Design and implement secure network architectures, incorporating firewalls, intrusion detection/prevention systems, and VPNs
11. Incident Response and Management:
• Incident Handling: Lead incident response efforts, including detection, analysis, containment, eradication, and recovery from cybersecurity incidents.
• Post-Incident Analysis: Conduct thorough post-incident analysis to identify root causes and enhance the incident response plan.
12. Identity and Access Management (IAM):
• IAM Policies: Develop and enforce IAM policies, ensuring that access controls are aligned with the principle of least privilege.
• Multi-Factor Authentication (MFA): Implement MFA solutions to enhance the security of user authentication processes.
13. Security Technologies:
• Endpoint Protection: Implement and manage advanced endpoint protection solutions to secure devices across the organization.
• Security Information and Event Management (SIEM): Utilize SIEM tools for real-time monitoring, correlation of security events, and proactive threat detection.
• Advanced Threat Detection: Implement advanced threat detection technologies to identify and respond to sophisticated cyber threats.
14. Compliance and Auditing:
• Regulatory Compliance: Ensure compliance with relevant cybersecurity regulations and standards applicable to a large global corporation.
• Regular Audits: Conduct regular cybersecurity audits and assessments to evaluate the effectiveness of security controls.
15. Global Collaboration:
• Cross-Cultural Collaboration: Effectively collaborate with infrastructure and cybersecurity teams across different regions, taking into account cultural nuances and regulatory variations.
• Global Threat Intelligence: Leverage global threat intelligence to stay ahead of emerging cybersecurity threats and trends.