Friday 31 July 2020

NJ SOCIETY OF CPAS PARTNERS WITH IVDESK

Minneapolis, MN – The NJ Society of CPAs (NJCPA) today reported a key organization with IVDesk, a main IT private cloud supplier for CPA and bookkeeping firms. IVDesk is a finished IT arrangement supplier, offering facilitating of utilizations, work areas and workers; versatility; back-up; and fiasco recuperation. 

"We're eager to have an accomplice like IVDesk as an affirmed merchant in our Member Benefits Marketplace. Their cloud IT administration offers a genuine upper hand to our individuals who need to grow their practices and influence cloud innovation," says Ralph Thomas, CEO/Executive Director of NJCPA. 

IVDesk has been presenting finished private cloud innovation to CPA firms since 2009. "We have top to bottom information on CPA applications and the IT needs of CPA firms. Our administration is a development quickening agent once firms get our foundation introduced. No personal time, secure versatility and various other one of a kind highlights permit firms the capacity to concentrate on development like they have never gotten the opportunity to preceding our administration," said Chuck Reese, CEO of IVDesk. 

About NJ Society of CPAs 

Established in 1898, the New Jersey Society of Certified Public Accountants (NJCPA) is the biggest expert association serving the necessities of Garden State CPAs and yearning CPAs. With an enrollment of more than 15,000, the NJCPA speaks to most of New Jersey CPAs out in the open practice, business and industry, government and training. We bolster our individuals through an assortment of training, systems administration, authority and volunteer activities. 

About IVDesk IT Support Analyst

IVDesk releases the potential in each organization. Our IT administration help firms work together, drive new business and serve their clients better. IVDesk has been adjusting CPA firms for a long time and numerous organizations the nation over utilize IVDesk's IT administration. The capacity to have a safe, consistently on administration enormously helps in an association's development, cooperation, correspondence, administration the executives and ability improvement to work more astute and convey quality outcomes on schedule and outpace your opposition. IVDesk gives a total IT arrangement by facilitating the entirety of a client's work area, information, and applications while including all day, every day helpdesk backing and reinforcement/recuperation arrangements. IVDesk was a pioneer in conveying facilitated IT, and keeps on coming out on top as an ever increasing number of associations move to a compensation for-use, distributed computing model for their IT administrations.

Thursday 30 July 2020

Duties of a system engineer

A system engineer realizes how to design different system gear, identifies and fixes organize breakdowns, looks after documentation, counsels clients, takes an interest in different activities planned for overhauling system framework, makes and executes different tasks planned for guaranteeing system security. 

Understand that the obligations of a framework engineer incorporate a genuinely enormous measure of work. Consequently, you have to comprehend that individual characteristics as an authority and only an individual ought to include: performing multiple tasks, precision and persistence, proficient execution of work, mindfulness, just as quick and high learning network administrative tools

Both the framework manager and the framework engineer are masters who can work in different organizations paying little heed to their kind of action. These might be suppliers of administrations identified with framework incorporation, different IT offices in different territories of business, utilities, instructive administrations, in the medicinal services framework, and so on. 

You have to comprehend that a frameworks engineer must be a pioneer from a specialized perspective. This implies such an individual sorts out a group of masters who chip away at a similar framework, that is, they move a similar way, as a group. Such specialized pioneers are significant representatives who satisfy the assignment, yet in addition make the specialized arrangement itself, over which the entire group will keep on working, including draftsmen, executives and different authorities. 

Framework engineer (Russia) - this position is regularly found in the rundown of opportunities. Simultaneously, pay rates in different declarations can shift extraordinarily. Along these lines, in certain advertisements you can see a measure of 35 thousand rubles, and in another promotion - 120 thousand rubles. The thing that matters is that the frameworks engineer is a similar expert as the specialist. As needs be, there can be a wide range of enterprises wherein an architect works. From one perspective, it might be the space business, on the other, design. In addition, regularly every pro is occupied with a few territories on the double, yet they are like one another. In spite of the fact that there are situations when a designer profoundly changes the extent of his action, adapting autonomously, increasing new understanding, moving starting with one region then onto the next. 

Employments and work: framework manager, engineer in Moscow more popular than any time in recent memory. Consistently the quantity of offers just develops, while pay additionally increments, as one of a kind arrangements show up in the IT framework for all business zones that try to build up their exercises through improvement and computerization of their zones.

Wednesday 29 July 2020

User technical support

If we talk about what tasks the customer support service performs, then first of all it connects IT and all other areas of the business. User technical support is unlimited opportunities for users to receive qualified assistance. At the same time, system administrators and programmers will be able to obtain information about various business needs.

The description of the subject area shows that without professional support from our company, you will not be able to effectively perform the assigned tasks. It should be noted that our company offers two levels of user support. First and second support lines - where is the border? The first line allows the IT infrastructure to work successfully. This includes services such as consultations, field engineers, regular audits, other work related to user requests, and we also necessarily respond to network notes from the system administrator. The second line is not just customer support. The services that we offer you are associated with training and consulting your staff members, with anti-crisis IT management, with emergency work that allows you to restore the operation of IT services administrator.computer.

Also, our clients have access to support for users of the 1C: Enterprise 8 system. With us you can register software, check the data on the terms of the contract, activate services and perform many other actions. Technical support is the solution to all your problems. We have established a strict procedure for considering incoming applications by the IT support service, which makes it possible to respond promptly to any request. In addition, we suggest using our website, where you can find any information of interest. For the convenience of users, we offer a convenient search on the site, we also have a special quick launch panel and an upper link bar for quickly navigating to the section of interest.

Dear users! You can always order a call back and clarify the details and terms of cooperation with our professional team!

Tuesday 28 July 2020

Implementing Office 365

Microsoft Office 365 is a suite of collaboration and communications products.

Depending on the service subscription level, the following services may be available to you:

Office Professional Plus
SharePoint Online
Exchange Online
Lync Online

Viewing and editing a document in a browser
Document preview on iPad
Editing any office documents on iPad
An example of implementing the start page of an internal site
Document library with typing
SkyDrive
Outlook Online
Lync Online
The calendar

Compare plans for small business
  Email on a server on the Internet (Exchange Online) Office 365 Small Business Office 365 Small Business Premium
Approximate cost per user per month. Price without taxes 132 rubles per user per month 198 rubles per user per month 495 rubles per user per month
Maximum number of users Not limited 25 users 25 users
Office applications:
Office subscription for up to 5 PCs or Macs per user.
 
Office Web Apps:
create and edit Office files in the browser.
(View attachments only) Yes Yes
Office mobile apps:
use Word, Excel and PowerPoint on select mobile phones and tablets.
  Yes
Email server on the Internet:
Get business-class email, shared calendars, 25GB of storage per user, and the ability to use your own domain name.
Yes Yes Yes
Web conferencing:
host online meetings using HD video conferencing, screen sharing, and instant messaging.
  Yes Yes
Public website:
Position your company with an easy to customize website using your own company domain name. No additional accommodation fees.
  Yes Yes
Anti-spam and malware protection:
advanced malware protection and spam filtering.
Yes Yes Yes
Comparison of plans for medium and large businesses
  Office 365 Enterprise (Plan E1) Office 365 Midsize Business Office 365 Enterprise (E3 plan)
Approximate cost per user per month. Price without taxes 264 rubles per user per month 495 rubles per user per month 660 rubles per user per month
Maximum number of users Not limited 30 users Not limited
Office applications:
Office subscription for up to 5 PCs or Macs per user.
  Desktop versions of Word, Excel, PowerPoint, Outlook, OneNote, Access, Publisher, and Lync. Desktop versions of Word, Excel, PowerPoint, Outlook, OneNote, Access, Publisher, and Lync.
Office Web Apps:
create and edit Office files in the browser.
Yes Yes Yes
Office mobile apps:
use Word, Excel and PowerPoint on select mobile phones and tablets.
  Yes Yes
Web conferencing:
host online meetings using HD video conferencing, screen sharing, and instant messaging.
Yes Yes Yes
Public website:
Position your company with an easy to customize website using your own company domain name. No additional accommodation fees.
Yes Yes Yes
Anti-spam and malware protection:
advanced anti-malware and spam filtering
Yes Yes Yes
Integration with Active Directory: Network administration definition
managing user credentials and permissions. Single sign-on and synchronization with Active Directory.
Yes Yes Yes
Intranet site for teams: SharePoint sites provide workspaces with customizable security settings for individual teams in an organization.

up to 3000 subsites up to 20 subsites up to 3000 subsites
Site Mailboxes: Store and share email and documents in separate project folders, making it easier for teams to communicate Yes Yes Yes
Enhanced email capabilities: Legal archiving and retention capabilities plus unlimited storage space. Yes
EDiscovery Center: Compliance Tools. Search SharePoint sites and Exchange mailboxes Yes
Advanced Voicemail Features: Supports hosted voicemail with auto attendant capabilities. Yes
Advanced Business Intelligence: Create interactive dashboards with multiple data sources. Yes
Who might be interested in using Office 365?
Naturally, this solution will be of interest to small businesses. Those who do not have the opportunity to build their own powerful server infrastructure, but who want to use the full functionality of Microsoft products.

What will you get?
costs of building a server infrastructure - 0 rubles.
new business opportunities at an adequate cost
Access to corporate information and services wherever there is Internet.
What do we offer?
We offer implementation of Ofiice 365 product in your organization. Namely:

Configuring the correctness of all services (Exchange Online, SharePoint Online, Lync Online, Office Professional Plus) for your company
migration of corporate email to Exchange Online
development of solutions for your business needs in SharePoint Online
Selling Office 365 Subscriptions

Friday 24 July 2020

Benefits of using a local network

A local area network allows you to solve many different problems in a company. There are several major advantages to using a LAN. First of all, this is the fact that this type of system allows you to store various data on a file server. Thanks to this, it is possible to simultaneously work many clients, update data in various network programs, use information that is protected in files and directories. Also, a local network allows you to exchange information between all computers connected to it. Each user has access to the global network if there is a special switching node. Among other advantages, it is worth highlighting full-fledged data printing by any user on shared printers.

Requirements for local area networks lan administrator

Today, local area networks can differ in topology, size, work algorithms, depending on the needs and structure of the organization. They can be used in a wide variety of countries, but they may have similar requirements. First of all, it is reliability, which should ensure the functioning of the network even if several nodes fail. The second important requirement is the speed provided by the high-speed data transmission channels. Another important requirement is adaptation that allows you to expand your networks by installing computers where needed and expanding the functionality of the LAN.

In the simplest network, there are at least two computers that are connected by a cable. This makes it possible to share data. Today, the local network and the Internet allow you to create very complex systems, so there are certain nuances of designing local networks. For these purposes, in most cases, special software products are required. Such products have a wide range of tools, a user-friendly interface, provide the ability to install additional applications and extensions integrated with them, show the location of various nodes and system elements. It can also be completely different functions that are necessary to build an efficient working local area network.

Local area network: design and network equipment

Various equipment is used to build a local area network. The most common of such equipment is a hub (hub), switch, repeaters, routers and modems or other signal conditioning devices.

Local computer networks - what is it?

From the information presented above, it can be understood that such networks are a closed space in which not only computers are connected, but also various equipment for printing, scanning, transferring and storing data. At the same time, you need to understand that there are various topologies of local networks: a common bus, a ring, as well as a star and other options.

The first option resembles a central line where the server and individual workstations are connected. This topology was popular before, when the demand for cable was not so great. The advantages of this option include low cabling costs and the ability to disconnect individual computers without losing the entire network.

The second option assumes that the server and all workstations are connected and connected to each other in a ring. Information is also transmitted around the ring, but it only goes to the addressee when the network recognizes that the data of the computer and the information match. The advantage of this type is the ability of workstations to transfer data between themselves, even without a server.

In star topology, each computer connects to a central station (network core), with the file server and the main server and network services located as close as possible to this core. Among the advantages of this topology is the stable operation of the entire network, even if the cable of one computer is damaged. Also, the connection is simply performed here, there are mechanisms for protection against unauthorized interference, and the data transfer rate is quite high.

What constitutes a local network is already clear, but at the same time you need to understand that a wired network (SCS) is often integrated with a wireless local area network, since recently it has been used much more often due to its maximum ease of use and its versatility.

Stages of building computer networks

The construction of computer networks includes such stages as development, design, installation, testing and maintenance. First, a pre-design survey takes place, then the requirements for the LAN are formed, after which the direct working design of the network is carried out. The next stage is preparatory work, in which holes are made for the installation of equipment, a place is allocated for its placement, cross-connection and installation of the cable system is performed. Then the installation of passive and active network equipment is carried out, the networks are tested, the sockets are marked, a journal is drawn up for accounting for communication lines. At the final stage, commissioning works are carried out.

What is a LAN, its capabilities - it is already clear, but not everyone can know what a wireless local area network is: W indows 10, an algorithm for configuring such a network. Usually such a network is quite simple to create. A router with a Wi-Fi module is required, in which this interface is enabled. Next, a network name is created, the type of encryption is selected and a password is created. You also need to check that all connected devices are in the same workgroup. If the user has no experience in creating special groups, then you can use home groups, where the connection is very convenient and simple. You just need to follow the prompts, instructions in the system and perform standard settings.

Thursday 23 July 2020

Remote server maintenance

Today, most of the processes in the work of the company are carried out using computer equipment. This is a guarantee of efficiency and reliability of a large enterprise or a small office. Accordingly, for such work, it is impossible to do without servers providing centralized processing, data storage and other important processes.

It is important to understand that you get the highest level of reliability of the servers and all computer equipment if there is remote maintenance and administration of servers. Previously, server maintenance took place directly on site. Now on-site visits and IT services are not required on the client's premises, since by providing access to your equipment through a special program, you provide optimal conditions for resolving any issue.

Remote IT service is a proactive problem solving that allows you to quickly set up equipment, install, configure software, create a backup database, set access tools and ensure security for each user of the company.

Remote service: who needs network admin

Most often, remote server maintenance is a service that is required by a company with a small amount of computer equipment, with or without a server. Also, remote IT maintenance, remote server administration, a remote administrator is required for geographically remote company divisions. Sometimes this service is provided by companies in a state of austerity.

Remote service features

Remote administration, server maintenance occurs remotely, that is, the specialist does not visit the customer's office. How exactly do we service computers? Special means for remote access are used, as well as terminal access. Regardless of the scale of your company, an IT audit is required. Information is collected about the number, location of computers, channels of Internet access, network equipment, and access to the router. Thanks to the receipt of such information, it is more convenient and easier for you to work with us, because the specialists will know everything about the situation in your company.

Advantages and disadvantages

The main advantage of servicing computers and servers in Moscow is efficiency. Cooperation concept: fast, efficient and friendly. This means that by connecting to your computer, a specialist will be able to solve a huge number of problems and in some cases fix the equipment. If the task cannot be solved through remote service, then ordering IT services is possible in the form of a visit of the foremen to the site. The disadvantage can be called the fact that in difficult situations, a specialist visits the facility, while there is an hourly payment for service.

Who maintains your computers and servers? Remote maintenance of computers and servers is performed by a whole team of experts, consisting of IT professionals with vast experience in the field of building and developing a network.

What is the purpose of maintaining computers and servers? This is the stable operation of the system, quick solution to problems that have arisen, control of data backup, analysis of log data, changing passwords, managing the list of employees, etc.

What is remote IT service? This is an opportunity to receive subscriber IT services on the most favorable terms. Tariffs for subscriber IT servicing of computers for organizations from our company are the most profitable, so you can always ensure high availability of the entire network without additional costs. You can find out all the detailed information about our services from the company's specialists, you can also get professional advice by the phone number indicated on the website.

IT services for small businesses

IT services for companies

Services provided for business in the field of IT must comply with the currently applied methodologies, international and domestic standards. Outsourcing companies that provide such services often use their own processes and management systems to ensure the efficient operation of the IT infrastructure of various organizations. Such work is carried out on the basis of ITSM - today it is a universal approach that meets the needs of the business processes of most companies. Also for these purposes, the international ITIL methodology is used, which allows you to optimize the work of the information structure and the work of the enterprise as a whole.


What do we offer? We offer IT outsourcing, IT audit and optimization, maintenance of computers, local area networks, servers and other equipment and systems of your company.

How we are working? IT services for business consist in the fact that we create an IT infrastructure from scratch, taking full responsibility for the implementation of a full-fledged IT system. We also provide an effective support service for each client and provide a high level of services provided.

Provision of services based on ITSM and ITIL

ITSM-based services enable you to assist in the IT service delivery process so that the organization you serve can run its own business as efficiently and successfully as possible. That is why it is very important for an outsourcing organization that management is carried out using the optimal combination of correctly selected information technologies, appropriate specialists and technological processes. And to implement this management method, documents included in the ITIL library are used.

This international methodology presents the ways of organizing for the activities of IT departments and companies that have shown the greatest efficiency. This methodology includes seven volumes with the described set of processes that ensure the proper level of quality of information services and increase the level of user satisfaction. The applied process approach makes it possible to obtain effective IT services for small businesses, while making it possible to achieve strategic goals and daily business tasks. In addition, control and management of resources is provided with the help of which such goals and objectives are achieved.

IT services for business

For almost 20 years, many companies have transferred non-core areas of their business to third-party organizations in order to ensure the efficiency of their core business. IT outsourcing is especially popular. This is due to the fact that companies assessed how the delegation of authority to specialized organizations is beneficial and effective for their activities. After all, such firms have the appropriate level of qualifications, vast experience and their own solutions, which are aimed at optimizing information services.

For small businesses, the point of providing such services is very important, which allows you to reduce the costs of operating the IT infrastructure. IT outsourcing for small businesses sometimes seems like a difficult step for small business leaders. They are afraid that technical support will be performed by third parties. And such indecision can lead to the fact that the company will incur significant losses.

Tuesday 21 July 2020

Call System Administrator

The incoming system administrator at the office is a rather demanded service today. This is primarily due to the fact that calling the sysadmin into the office saves time and money. For a successful company, the services of a visiting system administrator are an integral part of the normal activities of the organization, since the on-call system administrator ensures the proper level and quality of service for the entire IT infrastructure of the company. It is important to understand that such an infrastructure is quite voluminous, so it cannot be provided by a single full-time administrator. Therefore, it is necessary to attract outside help in the form of highly qualified specialists. Today, a professional field system administrator has all the necessary knowledge and skills to work with an IT system.

A visiting system administrator is not only system administration, but also professional computer assistance. A visiting system administrator can offer you services such as replacement of a video chip, replacement of a video card, replacement of the south bridge. Also, the visiting system administrator is able to solve any other problems of the computer system.

Inbound system administrator: minimum presence while maximizing the optimization of the IT infrastructure network administrator

We recommend that you call the system administrator to the office if your company is small and the full-time system administrator cannot cope with the tasks. If a company has a sufficiently large fleet of computer equipment and there is an entire IT department, then usually such organizations do not need system administrator calls. In all other cases, the incoming system administrator is simply irreplaceable. First of all, you need to understand that the cost of the services of a visiting system administrator is much lower than the salary of an employee who works as a full-time system administrator.

System administrator call and service cost

Companies that are just starting their own business also need external services. Keeping a permanent employee on staff who will deal with all the problems is quite expensive. The advantage of this collaboration is that the system administrator can work in 4 modes. That is, he deals with almost everything related to the IT infrastructure of your company. The prices for the services of a visiting system administrator are significantly lower, even if the amount indicated in the contract seems large at first. The fact is that you will only need to pay for the actually paid services. At the same time, there is no need to pay taxes for such a specialist, although such a system administrator can work in your company all day, but this will not happen on an ongoing basis, but only as needed.

Calling a system administrator in Moscow and Moscow Region is a fairly common service today. It is important to understand that the on-call system administrator (Moscow) has much more reason to work better. The fact is that such a system administrator is responsible for his work not only to the customer, but also to his direct management. System administrator: call and administration services are all really relevant today. It is very important to know how to call the system administrator. The procedure for ordering the service is quite simple - you need to call the phones indicated on the site and voice the problems that have arisen. The services of a system administrator for our regular customers cost even less than with a one-time call of an incoming system administrator. The system administrator for regular customers provides all types of services, including the support and optimization of the company's computer system. All prices for popular services are indicated in the price list, so you do not have to find out the price tag for each service separately. If you need a system administrator in Moscow, then you should not postpone this solution to your problems until later. Call us, we will certainly advise you on any question of interest.

Monday 20 July 2020

System Administrator Toolkit

System Administrator Tool Kits

It is important to understand that the work of a system administrator requires more than certain skills and experience. The specialist must have a fairly large number of a wide variety of tools, thanks to which maintenance, installation, installation and other work will be carried out efficiently and quickly.

System administrator tools most often include a variety of screwdrivers, wire cutters, pliers, soldering equipment, cable testers and much more. The system administrator’s toolkits can have different content - it all depends on the amount of work that a specialist has to do, on customer service experience, and focus on activities. In some cases, you may need a minimum set of tools for the system administrator, but more often it is more advisable to choose a complete set, which will contain all the tools for repair, installation and maintenance.

It is worth noting that most often the tools for the system administrator are equipped with special cases or bags, which ensures the availability of the tool and the speed of work. It is important to understand that the daily work of an IT professional involves solving a huge number of tasks. Moreover, they can be associated with completely different directions - from mechanical cable damage to complex malfunctions in the software part of the equipment administers definition.

“System Administrator Toolkit” or “How We Work”

The set of tools of the system administrator also implies the use of specialized software. A specialist may need such useful programs for the system administrator as Kubernetes, Nextcloud, Docker, SystemRescueCD and many other program options. All of them belong to such a direction as open tools for the system administrator, and help to perform certain tasks. These can be utilities that allow you to partition disks, test various hardware, manage on several hosts at once, etc. Also, a specialist often uses Linux Open Source Software Technologies as a working operating system.

The set for the system administrator should also include a laptop with an Internet connection, with Bluetooth and a COM port. By the way, a laptop is practically the most important tool, since it can be used to test communication channels, configure switches, program PBX and solve problems with various communication channels. It is very important to have such a tool even if the system administrator carries out its activities in outsourcing or serves several companies at the same time.

Patch cords, USB cable, PDA or even a banal paper organizer are also a must-have set for a system administrator, which is very difficult for him to do without. PC toolkits can also include portable hard drives and Hard Drive Docks that can be used by the technician to transfer data to and from another PC, as well as from one server to another. In addition, such a set of system administrators is also useful if you need to prepare a typical OS or software image.

Among the system administrator's tools, you can also highlight a portable printer that is used to print labels and stickers. Such a tool will be useful for those who are engaged in scaling networks, keeping records of equipment and lines. Do not forget that the set of tools for the system administrator should include a mobile phone with a camera and good connection quality. The specialist should always be in the access zone, and also be able to record certain moments of his work.

Thursday 16 July 2020

What is network administration? LAN Administration

Before network technologies were invented, all computers worked separately. But after the number of personal computers increased, the need arose to create a common working environment. At the same time, there was a need to provide management of various work processes, as well as the implementation of various tasks. These functions are assigned to the administration of computer networks.

Network administration is a set of tasks that are associated with the creation, configuration and maintenance of computer networks. In addition, administration involves technical support and support for various software.

The profession of system administrator includes the work of designing and supporting computer networks. He also carries out installation and configuration of equipment, is engaged in the protection of company information data. The tasks of computer network administration are presented within the framework of generally accepted network administration standards.

So, network administration is responsible for such functions as ensuring operability and eliminating any problems that interfere with the work. The network administrator also performs configuration management. In this area, OS settings are configured, and technical modernization of various system components is carried out. Additionally, it can be performance management. Statistics are being collected on how networks function in order to further rationalize network resources network administrators duties.

What is the responsibility of a computer network administrator?

Automation of network management, creation, configuration, modernization, change of computer networks - all this is done by the network administrator. Network administration includes the creation and maintenance of database health. The stability of such a network will also be ensured, the possibility of external attacks will be eliminated, and the access rights of various users will be differentiated. Additionally, backups are carried out, network operation accounting is created, user training, software monitoring, modernization of various computer networks are monitored.

How to become a system administrator

The work of a system administrator today is quite well paid, for many young people the prospect of working in a large company seems quite attractive. Moreover, the salary of a system administrator can sometimes exceed 100 thousand rubles, which today is more than a decent income, especially for people who have just graduated from a university.

The network administrator must have a large set of certain qualities, and this is not counting professional skills in this direction. Such qualities include sociability, analytical thinking, the ability to quickly make various decisions, responsibility, commitment, the ability to quickly make various decisions. In addition, a person should be able to concentrate, but at the same time have the ability to perform several important tasks at the same time. In general, it is very important for the system administrator to have a mathematical mindset, since it will have to solve complex problems, and too little time is allocated for their solution.

Wednesday 15 July 2020

Network engineer or system administrator

System administrator or system engineer? A young specialist, for whom at the beginning of his career there is a huge selection in various professions, wants to work in a successful company. Moreover, for him there is a choice in what exactly to choose from the vacancies that are offered by the employer. First of all, it all depends on what skills and knowledge such a specialist has. This can be support and configuration of computer equipment, network technologies, network support, and much more. Experience in any field is also very important. For example, it could be system administration.

You also need to understand that a young specialist does not always understand where exactly to move, if you think about the global direction and far-reaching prospects. That is why it is necessary to understand what prospects a system engineer has and what is the attractiveness of a system administrator network systems administrator job description.

From the first days of work as a system administrator, you can well prove yourself to the management and employees. In any company, a good administrator is very much appreciated, while he gets a good salary, can work with people who are completely not versed in everything related to computers. Therefore, having fulfilled his direct duties, which will take quite a bit of time, you can go about your own business. The main thing is that this does not annoy the management of the company and other employees.

But you might not like system administration for a number of reasons. First of all, quite young specialists work in this area, and work in such places in most cases for a short time - it can be only a few years. The second important point among the minuses is the salary, which can remain the same even after a long time spent as an administrator. In the best case, it can be increased by 10-20% in a few years, but it will not become too high, while the activities of the company will develop, the responsibilities of the administrator will grow. The administrator will be engaged in constant adjustment of equipment, network, problems of various technical nature, but for training you will have to use your own resources.

If this option is not suitable for you, you need to consider such an option as a system engineer. What can you like about such a profession as an engineer? This is an opportunity for continuous training, new skills, knowledge flow, and most importantly, it is a lot of customers and various projects. Customers will have their own team of administrators, and the engineer will deal with the technical side. He will receive one task, complete the project, and then proceed to the next task. An engineer can design one or several systems at once, and during the year he can have several projects. This may mean that a better system engineer, a system administrator worse? No, and such work may have its drawbacks. First of all - the place of work. It can be not only Moscow - business trips with a good specialist will be permanent. Secondly, a fairly large amount of time will have to be spent on project development. So, you have to write a lot. Third, continuing education cannot be avoided. That is, during work you will have to regularly increase your level of knowledge, learn something new from various fields and directions.

If we take into account all of the above, then we can say that the engineer has a more interesting, bright and unusual work, but it will have to spend a lot of time on theory. Moreover, the vacancy for the engineer never gets smaller. The more experience a specialist has, the more he is in demand in the labor market. But here everything is individual, and now you can see a lot of vacancies where both an administrator and an engineer are required. Although many administrators, after several years spent in the same position, complain about their laziness and unwillingness to learn. After a few years, they believe that they would be better off learning the Cisco Packet Tracer, rather than spending time playing computer games.

It is worth noting that the work of a systems engineer (Moscow) today is pretty well paid. Field system administration can cost from 30-40 thousand rubles. If this is a Cisco systems engineer, then the salary may be 100 thousand rubles. and higher.

Tuesday 14 July 2020

Incoming System Administrator

System administration services are in great demand today. Such a specialist plays a very important role in the company. The services of a system administrator allow you to establish the correct operation of the entire computer park, and such a person will also help to eliminate failures and fix breakdowns. If the company has far-reaching plans or it already has a fairly large infrastructure, then the company employs several such specialists. If the work is not too much, then the incoming system administrator can handle the work. Serving when system administration services are provided remotely, or when there is an incoming system administrator, is becoming increasingly popular today.

Incoming system administrator. Main advantages

Choosing an incoming system administrator in Moscow has such advantages as the opportunity to reduce the cost of a full-time specialist, regular maintenance and monitoring of the normal operation of networks and equipment, prompt response to any technical problems, setting up and ensuring stable operation of computers, professional advice that relate to any field of IT -infrastructure of the enterprise network administrative tools.

The incoming system administrator clearly performs the amount of work that is prescribed in the contract. At the same time, he has at his disposal the professional support of the company in which he works. Thanks to this, he will be able to apply the most advanced and modern solutions. The services of the incoming system administrator will be required when it is not necessary to constantly monitor and control the network sector.

When ordering the "incoming administrator" service at HelpIT.me, you get a specialist with a high level of professionalism, who will guarantee the full availability of networks. Each of our specialists has a vast experience, which allows us to quickly respond to any threats and effectively eliminate them. In addition, system administration services include extensive technical support, optimization of methods and approaches for solving problems, ready-made sets of solutions and correctly selected software for each individual company.

What do system administrator services mean?

The services of the incoming system administrator in Moscow are always aimed at reducing the company's costs and at the same time leaving the quality of the provided service as high. As practice has shown, often the system administrator performs the service much better than a full-time employee who constantly works in the office of the company. The fact is that the system administrator on departure is interested in using his services further, and a specialist in the company’s staff often does not have motivation to improve their qualifications or improve service. Moreover, the prices for such system administration are quite reasonable, and often servicing computers and other equipment, which is included in the cost of the services of the incoming system administrator, is much cheaper than a full-time specialist. Those who do not believe in this,

The services of the incoming system administrator are not only the installation, configuration, maintenance of computers. This can be the setup and installation of the operating system, various software, project development, networking, maintenance, remote support and consulting. Prices are available for the system administrator’s services, so many companies choose the services of a system administrator in Moscow as a specialist who comes to perform a certain amount of work.

Monday 13 July 2020

Computer Network Analysis

A computer network contains several computers united in one network on a territorial basis. They are in the same room, in one or more adjacent buildings. Local networks are used to exchange information between participants and simplify the use of shared resources - printers, modems, disk drives.

Most of these are local computer networks located in the same building, which are based on the client / server model. The connection includes two computers and the path between them. The client computer sends a request to the server for information or services. The server responds to a client request.

In this case, the functionality of the client or server can move from one computer to another. Creating a local computer network, you need to choose equipment and software.

Analysis of an existing network administrator job

The computer network at the present stage is included in each business structure. The computer network of the enterprise is one of its parts, the composition of which complements the general architecture. Network architecture includes topology, access methods, standards. The topology is selected in connection with the layout of the premises and the technical requirements of the customer. The most common and at the same time productive structure is a star topology, in which all computers, including the server, are connected to the central switch with a separate cable. This topology has its pros and cons:

On the one hand, localization of failures caused by damage to the network cable or technical problems on one or another computer is provided. That is, such failures affect only the local segments in which they are located.
On the other hand, the requirements for the central element (network core) are increasing and this creates a single point of failure, failure of which actually blocks the entire network.
Therefore, when creating a network, competent design of all its nodes is of great importance, taking into account the requirements for availability and fault tolerance.

Description of the computer network

An important characteristic of a network is the access methods of a workstation to network resources and methods for exchanging data between computers.

The method by which all computers have equal access to the network is called CSMA / CD. Before the transfer of information to the workstation, the channel availability is determined. After the transfer, the success of receipt. In case of failure, a retransmission is made, if necessary several times, until the information reaches the addressee.

The enterprise computer network uses Ethernet, a network architecture developed by Xerox in the 70s of the 20th century. Subsequently, the project was supported by Intel and DEC. In 1999, support for twisted pair transmission appeared.

Friday 10 July 2020

The 5 best ways to strengthen a security architecture

Tribune by Keith Bromley, Senior Solutions Marketing Manager at Ixia - In terms of regulatory compliance for PCI-DSS and HIPAA, the deployment of inline security tools is not essential but is imperative for a security architecture by which tries to maximize its defenses.

Here are the top five actions IT professionals can take to improve their organization's online security architecture: Website architect job description

Insert external bypass switches between the network and security tools to improve network availability and reliability.

Bypass switches are generally a good starting point for improving the security and reliability of a network. While direct deployment of online security tools can create an improved defense, they can lead to point failures. Internal bypass in the tool can minimize this risk. However, it could create another interruption in service, if the device were to be removed later.

An external bypass switch has the advantage of its internal counterpart, with the difference that it eliminates the problems of direct deployments of inline tools by offering automatic and on-demand switching capabilities with barely perceptible impact (milliseconds) on the network. Because the switch always remains in the network, it can be placed in bypass mode on demand, to allow adding, removing or upgrading security and monitoring devices as needed

Deploy threat intelligence gateways to network entry / exit to reduce false positive security alerts

Threat intelligence gateways are a good second strategy because they eliminate traffic from and to the wrong IP addressesknown. Even with firewalls, IPS, and a wide range of security tools in place, businesses still lack clues and suffer from major vulnerabilities every day. Why ? Because the volume of alerts generated represents a huge processing burden for the security team, as well as for the infrastructure itself. A threat intelligence gateway helps to automatically filter traffic entering a network that needs to be analyzed. Some companies have seen a 30% or more reduction in false IPS alerts by removing known bad traffic, allowing network security teams to focus on the remaining potential threats.

Download SSL decryption from existing security devices (firewall, WAF, etc.) to network packet brokers (NPB) or devices specially designed to reduce latency and increase the efficiency of security tools.

Although many security tools (firewalls, WAF, IPS, etc.) include the ability to decrypt traffic so that incoming data can be analyzed for security purposes, they also have an impact on CPU performance and can considerably slow down (up to 80%) the processing capacity of a security application. This is because the processors of these devices perform other tasks such as analyzing data packets to detect security threats, such as inter-site scripting (XSS), SQL injection, programs hidden malware and security threats. SSL decryption can be a huge job, reducing the effectiveness of security tools and increasing costs if network data is to be inspected.

One solution is to use a network packet broker to perform the data decryption itself or to unload the function on a separate decryption device. Once the data has been decrypted, the NPB can transmit it to one or more security tools for analysis.

Perform a tool chain for suspicious data, in order to improve the inspection process.

Another tactic to consider is chain of tools in series. This method improves the inspection of data by using predefined sequences for their analysis. They are routed to multiple security tools for additional inspections and resolution. This ensures that actions take place in the correct order and are not overlooked. Security and surveillance tools can be linked together through software provisioning within an NPB to control the flow of data across selected services. This effectively automates the inspection process to make it more efficient and better follow up on alerts.

Insert NPBs to improve the availability of security devices using n + 1 or high availability technology.

Bitdefender
The fifth way to strengthen a security architecture is to improve the availability of devices by inserting an NPB that promotes long-term survival. A good NPB will have two options:

The first, which is called n + 1, is deployed in a load sharing configuration. This is the situation where we have an additional safety device in the event of a failure of one of the main ones (IPS, WAF, etc.). However, instead of being on standby and ready to go off if necessary, the device operates at the same time as the others and shares the load normally. If one device fails, then the total load can be handled by the other devices. Once the faulty tool is back online, the remaining tools return to a load sharing configuration.

While this can be done without the NBP, it is often a complicated process with load balancers and other efforts. An NPB is programmed to manage the load balancing as well as the messages on the correct functioning of a tool (when it has failed and when it is available), so as to ensure a “self-healing” architecture Profitable.

A more robust, but also more expensive, option is to implement high availability. It is an n + n option in which there is a set of completely redundant equipment. Despite the cost, it might be the best option, depending on the needs of the business.

Using these five use cases can significantly improve an online security architecture, including the reliability of the solution, as well as the ability to detect and prevent / limit security threats.

Thursday 9 July 2020

INDUSTRIAL AUTOMATION AND QUALITY CONTROL

Training aims
This option allows you to offer a double skill in automatic control and quality control. It aims to train high-level executives with transversal skills ranging from automation and organization of a production unit, supervision of an industrial production chain, implementation of a quality process, drafting of quality procedures, quality control.

Opportunities
There are many and varied outlets given the program, for example: Network security architect

Automation designer
Technical Director of an industry
Production manager in an industry
Quality department manager
Head of industrial IT department
Quality project manager
Training managers
For more information please contact:

Center I S GA Rabat: M. HARCHI Said
Center I S GA Casablanca: M. Nabil CHERKAOUI
Center I S GA Marrakech: M. Yassine SAFSOUF
Center I S GA Fès: M. Rachid NAOUAL
Center I S GA ElJadida: Mr. Sabri Yassine
Programs
1st YEAR2nd YEAR3rd YEAR4th YEAR5th YEAR
1st YEAR
Semester 1:
Culture and communication
English
Algebra
Analysis
Boole algebra
Combinatorial logic
Algorithmic
Matlab programming
Mini projects
Semester 2:
Culture and communication
English
Analysis
Algebra
Electrical circuits
Sequential logic
Algorithmic
Programming C
Mini projects
Optional internship

Wednesday 8 July 2020

Architect - Pre-Sales Engineer Cybersecurity

The mission
About SPIE ICS SPIE ICS, a digital services subsidiary of SPIE France, supports the digital transformation of its ETI and large account customers through a global offer of ICT solutions. SPIE ICS puts its digital expertise and know-how at the service of the performance of its customers and the well-being of users.

With 3,200 employees and 60 sites in France, SPIE ICS has a close relationship unique on the market, which allows it to build tailor-made solutions with its customers. Building on its historical skills in integration and outsourcing for infrastructures and the digital work environment, SPIE ICS integrates new expertise and innovates in the fields of Datacenter, Cloud, Cybersecurity and SmartData & Iot. architect description.

More information on: www.spie-ics.com

Uniting our differences: SPIE is committed to promoting diversity. The recruitment of employees with disabilities is an important axis of our HR policy.

In collaboration with the Business Engineer, the Architect contributes to the success of the project by analyzing and qualifying the challenges and needs of the client and by designing a global solution, for which he is the guarantor. He is responsible for the feasibility of the implementation (engineering, production, operation). He controls the risks and costs associated with the proposed solution, while coordinating the internal and external expertise required for the design. He ensures the transition of the solution to the production teams.

Interlocutor privileged of the General Directorates and the Directorates of the Computer systems, your main missions will be the following:

- To bear the responsibility of engineering (elaboration of the material solution and service, planning, adapted methodology, services memory technical, participation in the defenses ... .).
- Control the risks and costs associated with the proposed solution.
- Coordinate the internal and external expertise necessary for the design.
- Listening to the market and ensuring technological watch.
- Ensure the transmission and / or transition of the solution to the production teams.

The expected profile
Engineer or equivalent training, oriented towards telecoms / networks / IT techniques, you have significant experience as an Architect in complex environments.

You also demonstrate good interpersonal skills, an analytical mind, and real writing skills.

Tuesday 7 July 2020

COVID-19: a turning point for brand customer service

The same is true everywhere in the world: the crisis caused by COVID-19 has changed consumer habits. Whatever the sector of activity, companies have been impacted and had to adapt to cope with significant demand from customers. As a result, in just two months everything changed internally, but also on the consumer side, namely the customer experience, customer relationship management and the way customers communicate with brands. An evolution which is not only ephemeral! Two-point explanation with Zendesk senior security engineer job description.

1. How did the COVID-19 crisis impact the customer experience?
With the context of COVID-19, companies had to answer a complex equation: how to do more with less? More customer requests, but fewer employees, less time, less income.

Zendesk, a worldwide CRM software publisher with more than 160,000 customers in 160 countries, analyzed the impact of the COVID-19 crisis on more than 23,000 corporate customers between the last week of February and may's beginning. According to this study, the Zendesk Benchmark , companies of all types are seeing the number of tickets increase due to the global impact of the virus on operations. Customer service demands are at their highest level. Since the start of the crisis, there has been a 24% increase in the average weekly volume of tickets processed by assistance teams in the first week of May, compared to the same period last year.

Companies in essential sectors are those which feel the impact of the crisis more heavily. On-demand supermarkets recorded the largest increase in requests for assistance, with a 133% increase in weekly tickets from late February to early May. Other sectors that have become essential for confined consumers also recorded a significant increase, 85% for teleconferencing platforms and 66% for game companies over the same period. On the other hand, containment measures particularly hit car-sharing companies, airlines and hotels. Carpoolers, for example, had experienced a 60% drop in weekly tickets in early May.

2. Invest in omnichannel to get through the crisis smoothly: self-service, messaging and chat are the new preferred communication channels
“ Self-service has been fundamental in responding to this problem," explains Gabriel Frasconi, Senior Director Enterprise Sales Continental Europe at Zendesk. For good reason, online help centers have enabled any customer to find the answer to many questions easily and by itself. Results: " Between 10 and 20 questions accounted for 80% of customer calls or messages. Managing incoming call volumes quickly became complex. To reduce the workload and relieve the telecommuting teams, the companies have naturally enriched their help center with a maximum of content adapted to recurring questions.”Content which has increased by almost 65% since the end of February and which has even exploded barometers in certain sectors: + 376% for teleworking and distance learning companies, + 101% for fitness companies ...

“A CRM platform with a help center worthy of the name has enabled brands to satisfy customers by rapidly absorbing all new requests. It also helped reduce the pressure on support teams. A real competitive advantage during this period of crisis! ” Gabriel Frasconi, Senior Director Enterprise Sales Continental Europe, at Zendesk.

Monday 6 July 2020

ISO / IEC 27001

The ISO / IEC 27001 certification demonstrates that the information security management system complies with the international reference standard. It also proves that all necessary steps have been taken to minimize the risks to which the managed information is subjected.
 
ISO / IEC 27001 is an international standard, promoted by the ISO (International organization for standardization) and by the IEC (International electrotechnical commission), for the management of information security. ISO / IEC 27001 is applicable to any organization and defines the requirements to plan, implement, operate, monitor, review, maintain and improve. The management system for the information security of companies security job description duties.

Protect your capital
The standard allows an overall approach to information security in all the areas concerned: from documents in digital format to those in paper format, to hardware instruments (computers and networks) to personnel skills.
The information security management system demonstrates that you have systematically and comprehensively analyzed and assessed all the risks related to information security, deriving from attacks from outside or from inside, IT and non-IT, from errors or from failure compliance with current applicable legislation.
ISO / IEC 27001 helps your company to ensure, for your information (including those relating to your customers and trade secrets), the appropriate levels of confidentiality, integrity and availability, balancing the needs for protection and investments.

In line with other management system standards
ISO / IEC 27001 integrates consistently and effectively with other management systems, such as those relating to quality ( ISO 9001 ), the environment ( ISO 14001 ) and the management of IT services ( ISO / IEC 20000 ). This allows not only continuous improvement of management systems but also effectiveness and efficiency of improvement processes. 

Friday 3 July 2020

In the right place at the right time?

When a contact tracking application contacts another device that is running the same application, a handshake and key exchange occurs. These keys generally change continuously and are generated based on and exclusively for the device. When device A is in front of device B, they share keys based on a predetermined distance and time requirement; for example, within 2 meters for 15 minutes. The device retains the keys or passes them to a central server. When users confirm that they can be positive for the infection, all the keys they have generated are added to a cloud system. All other devices will collect this information at a certain frequency to see if there is a match to the keys that have been collected or if alternatively this match will be processed in the cloud. If there is a match, then those users are warned that they have been in contact with another device that is now reporting being positive; They have no idea which device though.

If the user is identifiable and all data is centrally stored and processed, then clearly there is a privacy problem; however, if the user is not identifiable and the central cloud system is only processing matches, this could be more efficient than asking the local device to perform this processing, especially if the end device has limited resources… which could be the case in some areas of the world. This approach also gives the centralized system the ability to identify potential false positives, where some malicious users say they are infected, but in reality they are not, and are only trying to cause chaos for users, businesses, and society in general architect tasks.

One benefit of partial centralization is that the portion of centralized data being processed could be used to inform scientists how the population as a whole is moving and to quickly identify critical points to allow for the allocation of medical resources. If, for example, a postal code is requested at the time of installation, data scientists can predict the spread of the disease. This is unlikely to identify the user, as hundreds or thousands of people use the same postal code.

Each country has adopted either its own framework or one of the nine that have been developed; each of which provides a different balance between efficiency and privacy. Using different frameworks can cause problems: for example, most European countries have adopted the Exposure Notification API from Google and Apple, while France has not centrally processed the data. When the borders between countries are opened, there is unlikely to be a synchronization between an application from Germany and an application from France.

Even the solutions that claim to be the most sensitive to privacy are open to abuse - consider the extreme scenario where video surveillance is used in conjunction with capturing Bluetooth signals emitted by devices and capturing the keys that are exchanged. Combining it with facial recognition technology and the location of the device at any given time could mean that the user is identifiable. While this may seem extreme, it shows that no system offers a guarantee of privacy.

Can work?
Many problems for such a short time. There is no perfect solution considering the deadlines that exist in the face of the need to bring a solution to the market. The uncertainty of what data may be useful in the future, what data users may be willing to share, the emerging technological frameworks, the challenges of the approximate distance and the immense pressure that exists for applications to be delivered do nothing more than demonstrate the challenges facing developers and governments alike to bring a solution that works efficiently and is acceptable from a privacy perspective. As this has never been done before, it is to be expected that mistakes will be made and that some projects will change direction; It is through trial and error that the best solutions will be found.

There are key factors that should be considered by both an application developer and a government requesting the development of an application. The protocols that have been developed with privacy in mind are as good as the developers' willingness to adhere to just collecting and transmitting the minimum amount of data. Therefore, do not hide behind a framework and a state that claim to be concerned about the privacy of users if they are actually collecting other identifying data and storing it centrally. If there are elements of centralization, clearly state the reasons for the collection and how it will be used, and post the limits on how long the data will be kept and who has access. The concept that unidentifiable data,

For the benefit of public confidence: all governments, in my opinion, regardless of their approach to this issue, should legislate on the basis of the acceptable use of data and establish criteria on when an application will reach the end of its useful life and will be removed from devices. No more infections, no more apps or data.

Would you run a contact tracking app? Yes, under the conditions of anonymous use and that the data is not used for anything other than stopping the spread of this specific disease and continuing to wreak havoc. In the event that widespread location information such as zip codes can help science beat this disease and put medical resources in the right place at the right time, my desire for absolute privacy is outweighed by my will. to do my part.

Wednesday 1 July 2020

Bilingual Cloud Solutions Architect / Architect

Onica is the world's largest dedicated AWS consultant partner. As an AWS integrator with a full range of services, we are helping hundreds of businesses leverage the capabilities of the cloud. We support our clients in their digital transformation process, helping them to use cloud technologies as a lever for innovation - from migration strategy to operational excellence.

If you like challenges, you will love working with us! We develop innovative solutions to complex problems every day to help our customers change the world. In addition, we are committed to you and your growth, both professionally and personally.


Overview architect profile

We are expanding our team of motivated technologists who have a proven track record in delivering or selling software / infrastructure solutions. Onica is looking for a bilingual cloud architect (solutions architect bilingual French and English) who is passionate about creating large-scale customer solutions. As an experienced technologist with deep technical knowledge and interpersonal skills, you will work directly with clients. As part of a service delivery team dedicated to innovation through continuous delivery, you will create robust solutions aligned with our clients' objectives. Your knowledge and experience will help Onica and our service delivery teams to build architectures and set standards for excellence covering networking, storage, operating systems, virtualization, RDBMS and NoSQL databases, security and automation. In addition, you will work with middle layer technologies such as application integration, memory caches, security and much more!

The qualified solutions architect will have demonstrated his ability to think strategically about companies, to produce technical definitions according to the client's objectives in complex situations, to develop solution strategies, to motivate and mobilize resources and to produce results. The ability to connect technology to measurable business value is essential to succeed in this role. We are looking for motivated, collaborative team members who are passionate about AWS and who want to have a direct positive impact on the activities of our customers. Strong communication skills (in French and English) and a good emotional intelligence are also necessary to develop the full capabilities of your team.

To succeed in this role, you must have:
Extensive experience as an AWS cloud architect
Good communication and presentation
skills Leadership experience in technical projects
Experience and / or willingness to work with pre-sales teams if necessary
Bilingual in French and in English

Responsibilities

As a solutions architect, your concentration will be mainly technical, but you will also have to participate in activity planning ceremonies.
Be the main technical link between customers and technical resources
Provide tactical scope and work directly with sales representatives and customers to understand the functional requirements of a solution
Communicate effectively with colleagues throughout projects
Ensure that all appropriate questions are asked and verify that nothing crucial to project success is not forgotten
Become an AWS evangelist by educating a variety of customers about the value of AWS
Help your customers migrate to the cloud with a high value-added migration approach that leverages the best designs and best practices offered in an agile model
Working with clients to create a DevOps culture and modernize operations and delivery strategies
Establish credibility and build relationships with our customers to enable them to become cloud champions in turn
Lead and participate in in-depth architectural discussions to build trust and ensure customer success during migration or new creation applications, software and services on the AWS platform.
Organize hands-on training sessions to transfer knowledge to customers interested in AWS
Capture and share industry best practices within the Onica community
Create and contribute to publications for Onica and AWS customers, such as white papers, tutorials, blog posts, etc.
Attend and present at industry events
Travel up to 50% of the time

Qualifications & Experience

Mandatory fields:
More than 7 years of experience in the design and implementation of distributed applications
At least 5 years of experience in network, infrastructure or of databases
Demonstrated knowledge of software development tools and methodologies
Presentation
skills with a high degree of comfort for speaking with managers, IT managers and developers Excellent communication skills
Demonstrated ability to adapt to new technologies and learn quickly
Leadership skills to effectively communicate and manage a technical team

Strengths:
More than 5 years of experience in software / technological development or customer-oriented consulting
Minimum of 3 years of experience in migrations to the cloud or in IT transformations
Minimum of 3 years of experience in architecture and operating solutions based on AWS (ideally) or on other cloud platforms
Technical diploma. IT or related
AWS Certifications: eg AWS Certified Solutions Architect

If you like working with advanced technologies and like solving your customers' problems, we want to hear from you! It is time to redefine the possible. Are you ready?

-

Onica is an APN Premier Consulting Partner. As a full spectrum AWS integrator, we assist hundreds of companies to realize the value, efficiency, and productivity of the cloud. We take customers on their journey to enable, operate, and innovate using cloud technologies - from migration strategy to operational excellence and immersive transformation.

If you like a challenge, you'll love it here, because we're solving complex business problems every day, building and promoting great technology solutions that impact our customers' success. The best part is, we're committed to you and your growth, both professionally and personally.

Overview

We are expanding our team of motivated technologists with a proven track record of delivering results in software / technology sales or consulting. Onica is looking for an AWS Cloud Architect (Bilingual, English & French) who's passionate about helping customers build applications at scale. Being an experienced technologist with technical depth and breadth, aided with strong interpersonal skills, you will work directly with customers as part of a delivery team helping to enable innovation through continuous delivery across technology stacks and creating robust solution designs that align to business goals. Your insight and experience will help Onica and our delivery teams build architectures and provide prescriptive guidance across network, storage, operating systems, virtualization, RDBMS & NoSQL databases, security, and automation.

The qualified Cloud Architect will have demonstrated the ability to think strategically about businesses, create technical definitions around customer objectives in complex situations, develop solution strategies, motivate & mobilize resources, and deliver results. The ability to connect technology with measurable business value is a critical component to be successful in this role. We seek team members who are self-motivated, driven, collaborative, passionate about AWS and want to have a direct positive impact on our customer's business. Strong communication skills and emotional intelligence are also needed to help develop a team reporting to you.

In order to be successful in this role, you must have:
Solid AWS cloud architect experience
Strong communication and presentation skills
Leadership in technical projects
Experience and / or willingness to work with pre-sales teams when necessary
Bilingual English and French is a requirement

What you'll be doing

As the solutions architect, you will be technically focused but also will understand business planning
Be the technical liaison between customers and engineering resources
Provide tactical scope and work directly with the business representatives / customers to understand the requirements driving the need for a solution to be developed
Communicate effectively with both business and technical colleagues throughout the course of the project
Ensure that all the appropriate questions are asked and verify that nothing crucial to the success of the project is overlooked
Be an AWS evangelist by educating a variety of customers on the value of AWS
Help customers transition to the cloud in a high-value migration approach that best of breed designs and practices leverages delivered in an agile model.
Work with customers to enable a DevOps culture and modernize operations and release strategies
Establish credibility and build impactful relationships with our customers to enable them to be cloud advocates
Lead and participate in deep architectural discussions to build confidence and ensure customer success when building new, or migrating existing, applications, software and services on the AWS platform.
Conduct deep-dive "hands-on" education / training sessions to transfer knowledge to customers interested in AWS and to ensure our SAs are up to date
Capture and share industry best practices amongst the Onica community
Author and contribute to Onica and AWS's customer-facing publications such as whitepapers, tutorials, blog posts, etc.
Attend and present valuable information at Industry Events
Traveling up to 50% of the time

Cisco Updates Certified Network Design Engineer Curriculum

Cisco has updated its CCDA® Associate Certification Preparation Program in Network Design. Updating curricula and exam requirements will ens...