Lang M.

Lang M.

Solutions Architect

, United States

Experience: 25 Years

Lang

Solutions Architect

192000 USD / Year

  • Immediate: Available

25 Years

Now you can Instantly Chat with Lang!

About Me

Lang has over 25+ years of I.T. experience and now serves as a Solution Architect.

...

Show More

Portfolio Projects

Description

  • Architected an entirely new Cyber Crime Unit (CCU) infrastructure for the U.S. Postal Inspectors Service (USPIS) called “CyberNet” to expedite forensic analysis and close criminal case investigations.
  • Responsible for running, maintaining and monitoring all CyberNet activities throughout 3 Data Centers.
  • Given the high level responsibility of “Evidence Custodian” to maintain all Federal Case data for court trials.
  • Played a key technical role with the FBI and the DOJ in the arrests and shutdown of a major website performing illegal activities. https://www.forbes.com/sites/larrymagid/2018/04/06/doj-seizes-backpage-com-weeks-after-congress-passes-sex-trafficking-law/#42d9c5ee50ba
  • Instrumental in the creation and maintenance of high-profile servers housing the “DarkWeb” and “Change of Address Fraud Activity” databases.
  • Used vRealize Operations for operations management across our physical and virtual environments.
  • Relied on vRealize Log Insight to collect, view, manage and analyze syslog data.
  • Heavily used Dell/EMC VXRail Manager for all functions of our enterprise VXRails.
  • Utilized NSX-T in support of our cloud-native applications (both public and private).
  • Actively used NSX-T for our Docker environment for the Dev and Dev-Ops Teams.
  • Ran Security Scans using Nessus, NMAP and Microsoft Baseline Analyzer for security testing and reporting.
  • Debuted brand new Change Management SOPs to clean up the political struggles within Operations.
  • Upgraded the VMware ESXi Host environment from Version 5.5 to Version 6.5.
  • Spun up both Windows and Linux based VMs using software media and ISOs.
  • Reduced our enterprise hardware footprint by converting older physical hardware into VMs via P2V.
  • Implemented GPOs and Military STIGs for server hardening standards.
  • Provided non-persistent virtual desktops (VDI) to users via VMWare Horizon.
  • For Infrastructure-as-a-Service (IaaS) I utilized vRealize Automation (VRA) for Cloud Automation of VMs and container-based applications.
  • Used Docker as the preferred software container for applications to run on a variety of platforms.
  • Relied on vRealize Operations (VRO) for capacity management and performance optimization.
  • For most DevOps deployments I used Terraform, Docker and Chef.
  • Utilize Python 3.7.2 API with Chef, Puppet and Docker for automation, deployment and containerized functions.
  • Administered an internal USPIS SharePoint site for Federal & Local Law Enforcement personnel to cross share and transfer case-related data.
  • Assumed all Architectural and Systems Administration duties for the new Undercover Cluster (UCC).
  • Used NetApp FAS 8000 series running on CDOT for Data Library and Replication.
  • Served as the HP 3PAR SAN Administrator for all enterprise storage needs as well as NAS devices.
  • Configured and maintained our HP 3PAR SAN for proper storage, provisioning and data replication.
  • Performed all scheduled Data Backups and on occasion Data Migrations from one data source to another.
  • In charge of Data Synchronization and Failover Testing between Headquarters and Disaster Recovery sites.
  • Set-up all of the new Disaster Recovery/COOP Procedures.
  • Established enhanced security through multi-form authentication via RSA Tokens and Account Audits.
  • With Symantec Endpoint I ensured a secure and virus free environment.
  • Tested new applications and ideas in our AWS VPC Cloud environment using Windows EC2 instances.
  • Via AWS Direct Connect we’re in the process of extending our Data Center to the AWS VPC Cloud.
  • Made highly detailed Visio network and rack elevation drawings of our private domain.
  • Monitored the private domain and provided security from possible intrusions.
  • Created the new Windows 10 Forensic desktops (upgraded from Windows 7 Enterprise) for both the Cyber Crime Investigators and Analysts.
  • In charge of following all USPS Change Management Controls by going through the EIR, TIPA and NCRB process for all new applications.
  • Work heavily with the ISSO to ensure all new applications meet the necessary security standards.
  • Responsible for over 90% of the I.T. Cost Proposals, Vendor Negotiations and Procurement Requisitions.
  • Responsible for all hardware/software quotes and submitting procurement requests via ADEPT or eBUY.
  • For Asset Management maintained records of all software, hardware and virtual members on the network.
  • As Team Lead, I was responsible to resolve all troubleshooting and emergency triage incidents.
  • Developed PowerPoint slide decks and high level documentation such as: SOPs, SLAs, MOUs, Technical Guides and more for Government Officials/Stakeholders, End Users and Technical Teams.
  • Maintained accurate and timely completion of projects using VersionOne and Project Server.
  • Attended meetings and worked closely with Federal Government Agencies such as the FBI, OIG, DEA, Secret Service, Local Law Enforcement and so on to devise new global strategies for storing and sharing criminal data in one central database location.
  • Attended Weekly and Bi-Weekly Meetings via WebEx.
  • Submitted “Monthly Status Reports”

Show More Show Less

Description

  • Provided critical technical guidance and support to major divisions within the IRS as:

o SPMO

o Enterprise Operations (EO)

o Data Management Services & Support (DMSS)

o Enterprise Storage Services (ESS)

  • Created PowerPoint slide deck presentations and technical recommendations in the areas of:

o Next GEN Storage Solution

o Tapeless Backup Strategy

o Backup Assessment & Recommendations

o HSM (Hierarchical Storage Management)

  • Conducted research to transform innovations into current operating standards at ESS such as: Thin Provisioning, Compression, Deduplication, Data Migration, DevOps, etc.
  • Tasked to be the VMware Horizon Desktop Subject Matter Expert (SME)
  • Provided the latest DoD STIGs for server hardening standards and controls.
  • Fixed Windows Certificate issues within VMware.
  • Helped create VMware DevOp scripts to automate VM template replications. (now vRealize Automation)
  • For most DevOps deployments I used Terraform, Docker and Chef.
  • Utilize Python 3.x API with Chef, Puppet and Docker for automation, deployment and containerized functions.
  • Made key recommendations to cure current enterprise-wide problems.
  • Supplied pro and con deltas for migrating to a converged, hyper-converged or software-define solution.
  • Identified 18 critical pain points within the IRS ESS Data Center (both technical and financial).
  • Gave insight on Amazon Web Services (AWS) and how to integrate the Cloud into the current architecture.
  • Attended high-level daily and weekly meetings such as: Bi-Weekly EA, Daily Storage/Backup Status, ESS Benchmarking and ST5 All Hands Meeting.
  • Developed the "Future State" blueprint/architecture that will minimize costs and maximize efficiency.
  • Performed a trending analysis each month called the "Bottom Talker Reports".
  • Designed valuable "Use Case Diagrams" to bring the IRS JIL Laboratory into the Future State.
  • Reviewed current RFPs/RFIs and tweaked the contract renewal language in each so Offerors and current incumbents can meet all of our new technology standards.
  • Intricate in the new ESS Statement of Work (SOW) Contract Language modifications.
  • Assisted in the revisions for the new Draft SLO Tables now with Primary & Secondary Classes.
  • Updated the PWS Contract Language with legal revisions and technical modifications.
  • Redefined the IRS Tier Storage Classes by removing Iron now making them: Platinum, Gold, Silver, Bronze and CI.
  • Used NetApps running on CDOT for Data Retention and Replication.
  • Developed updated SLO Tables with more Future State goals for the “PWS - IRS Enterprise Storage Acquisition (ESA)”
  • Performed the 2nd Round of ESS Contract edits and making key comments on both technical and administrative deficiencies.
  • Created PowerPoint slide decks for technical presentations and workflow overviews.
  • Took "Meeting Minutes" to define tasks and ensure understanding of certain topics by attendees.
  • Designated to sit in on all Proof-of-Concept Meetings where vendors can demo their hardware and software.
  • Generated PowerPoint slide decks on various topics regularly.
  • Submitted “Weekly Status Reports"
  • Attended valuable demo presentations from such vendors as: Dell, Oracle, PureStorage, Hedgewig, IBM, Nutanix and many other of today's leading SAN and storage suppliers.
  • Formulated Baseline Requirements for ESS.
  • Outlined the Hardware & Software requirements for the upcoming new JIL Lab.

Show More Show Less

Description

  • Architected the entire AWS virtual environment from Concept to Development to Production.
  • Implemented DoD Standards by applying STIGs to the AWS virtual EC2 instances.
  • Registered all AWS Web Domains and DNS Records using Route 53.
  • Use Identity Access & Management (IAM) to enforce Multi-Factor Authentication (MFA) user authentication into the AWS network.
  • Enabled a .PEM (Key Pairs) for enhanced security into the AWS Environment.
  • Created multiple Virtual Public & Private Clouds (VPC) within the AWS domain.
  • Initiated VPC Peering Connections for those VPCs authorized to talk amongst each other.
  • Associated Elastic IPs with VPCs for the connectivity of our nodes via RDP.
  • Spun and configured multiple EC2 server instances using Windows 2008 R2 and Windows 2012 R2.
  • Created fresh AWS Haystack Web/Application Servers.
  • For most DevOps deployments I used Terraform, Docker and Chef.
  • Provision AWS Storage via AWS S3 for various computing groups within our environment.
  • Took EC2 Volume Snapshots for routine backups and archiving.
  • Utilized Load Balancers for the EC2 nodes working as IIS Web Servers.
  • Made use of Launch Configurations for repeatable EC2 Auto Scaling Templates.
  • Worked with the Networking Team to create Direct Connect VPN Connections from AWS back to the physical Data Center for data exchanges or migrations.
  • Incorporated NAT Gateways for Private IP Address/Subnet connections.
  • Put OpsWorks to use for the Application Developers to automate and manage their apps.
  • Learning to program automated scripts in Python and Scala to create seamless workflows.
  • Monitored all EC2 instances and applications via CloudWatch.
  • Provided faster server deployments already configured and ready using CloudFormation templates.
  • Archived all environment data in the form of a vault using Glacier as our SAN so to speak.
  • Through RDS used SQL Server as the AWS environment database of choice.
  • Migrate VMs instances from VMware over to the AWS Environment.
  • Use WorkDocs as the AWS alternative to SharePoint for shared documents, software, license keys, etc.
  • Use WorkMail as the AWS alternative to Microsoft Exchange for all e-mail communication.
  • Regularly check Trusted Advisor to ensure the AWS environment is running both in cybersecurity compliance and optimized performance mode at all times.
  • Used Amazon Redshift as our Data Warehouse.
  • Through the use of DevOps created my AWS stacks
  • Able to mass produce my EC2 instances using Chef Puppet.

Show More Show Less

Description

  • Lead Architect for SiriusXM’s new “MyMix Project” which will improve listening for 28M subscribers.
  • Helped set-up and configure the new FAS 8020 filers in the DC Production Center for “MyMix”.
  • Also set-up and configured the new “MyMix” 8020s for New Jersey and Atlanta offices as well.
  • Created SVMs, Aggregates, and Volumes to filter the new musical content.
  • Upgraded OnCommand Unified Manager (OCUM) from v6.1 to Version 6.3.
  • Used OCUM to monitor enterprise filer’s LUNs, Volumes, Aggregates, SVMs, etc.
  • Upgraded OnCommand Performance Manager (OCPM) from v1.0 to Version 2.0
  • Sanitize, remove and replace failed NetApp hard drives.
  • Used Virtual Storage Console (VSC) to quickly interact functionality between VMware and NetApp
  • Utilized VMware Horizon desktops (VDI) to access my NetApp storage are in the Data Center for day-to-day administration.
  • Developed SnapShot Schedules for data redundancy across multiple U.S. locations.
  • SnapMirror Volume data on occasion for resizing efforts or placement onto new data shelves.
  • Created HA Pairs and Clusters for 100?ta availability and operational uptime.
  • Upgraded Filer, ACP and Disk Shelf firmware as needed based on NetApp Best Practices.
  • Maximized storage capacity and utilization on our DS4246 (SATA) and DS2246 (SAS) shelves.
  • Made VLANs and Broadcast Groups for our Storage Virtual Machines (SVMs).
  • Enabled AWS VPC Clouds so the Hadoop Team could run XM Subscriber analytics.
  • Worked with Networking to capture optimal 10Gbps speed via trunking plus redundancy using LACP.
  • Racked, stacked and cabled NetApp disk shelves in the Data Center from time to time.
  • Performed test failovers.
  • Designed rack elevation drawings using Visio and NetApp stencils for real-time illustrations.
  • Completed weekly “Resident Activity Reports” for NetApp.
  • Resize FlexVolumes as needed to increase storage capacity.
  • Provision storage (thick or thin) based on the client’s needs for various applications.


Show More Show Less