Matthew A. Hamous
• Information Security • Operations • Automation
• Powershell • Windows Administration • GCP Management
•U. S. Army Information Technology Specialist Advanced Individual Training
•10 Years of Work Experience
Powershell code available upon request.
2018 - 2020 IT Systems Administrator; Intellimagic Inc.
•Windows server administration of over 50 instances utilizing Google Cloud Platform.
•Desktop Support for local coworkers including LAN, Cisco Routers/Switches, Printers, WLAN, and other peripherals.
•Provisioning and management of Windows computers via open source software Clonezilla and Group Policys.
•Management of server and operating system patches using Microsoft Windows Server Update Services (WSUS).
•Design, implementation, and administration of file storage services using Windows Distributed File System (DFS).
•Created a web portal for employee initiated changes utilizing LDAP in Powershell using Universal Dashboard.
•Experience using various APIs from several vendors to create working automation for GCP instaces and proprietary software.
•Experience with GCP and instance automation based upon requests from customers.
•Knowledge/education on several modern web technologies including Zabbix, Powershell, FTP, Jenkins, Git, Salesforce and others.
•Decreased turnaround time for customer onboard from 8+ hours to 20 minutes.
2016 - 2018 Sr. Computer Support Analyst; ESAB Manufacturing
•Personally managed the IT transition of the largest distribution center within the company in the first 60 days of employment.
•Assisted in the creation of a new distribution center including wireless RF scan guns, printers, label printers, access points, and switches.
•Co-site administrator for over 700 users consisting of office, production plant, and distribution center users.
•Co-creater and member of a team for the implementation and administration of the System Center Configuration Manager (SCCM) system that had been neglected for over 2 years.
•Created and implemented the operating system deployment (OSD) and application deployment through SCCM for users across North America.
•Created a development network to assist in testing new SCCM deployments outside of the production environment.
•Authored and implemented a project for the creation of a documentation wiki portal to ensure adequate documentation of the environment and processes was kept.
2012 – 2015 Network and Computer Administrator; U.S. ARMY
•Provided leadership for a team of two in the management of over 400 users separated over 7 locations.
•Managed email accounts of over 200 users through Microsoft Exchange and Outlook.
•Managed User and Computer accounts and permissions with Microsoft Active Directory using MMC and Group Policies for over 400 users.
•Created and maintained property tracking database for all automations equipment worth over three hundred thousand dollars.
•Created and maintained IAVA database for all user and computer accounts.
•Applied all STIG and IAVA guidelines to user and computer accounts.
•Regularly recovered and transferred media from faulty drives for users.
•Effectively trained three managers in automations and administration, facilitating the smooth transition of responsibility between management, affecting a 0% drop in work order completion.
2010 - 2012 Information Technology Specialist; U. S. ARMY
•Systems administrator for network consisting of over 400 users in seven locations.
•Imaged over 300 computers with Windows Vista using Norton Ghost and through VM deployment over network.
•Installed and maintained all Cisco VoIP phones over multiple locations.
•Wrote and implemented network configurations of routers and switches worth over $200,000.
•Maintained over two million dollars of equipment with a zero loss over a 2-year period.
•Created and implemented new Tenant Security Plan and Standard Operating Procedure for all users on network.
•Personally maintained all upper management automations with <1% downtime.
•Recognized as the best IT Specialist in the unit consisting of over 2,000 personnel, causing other units to implement our policies for their networks.