Employer Active
Position: Lead Storage Architect
Location: Charlotte NC 3x a week
Contract Length: 12 months
Top Requirements:
1. Network Attached Storage (NAS) architecture.
2. Creating and documenting processes
3. Prior experience with migrating data
4. ETL Data lake or warehouse is not as applicable this project is around user data and shared files
5. Windows
Plusses
1. Nasuni (AWS product)
Day to Day Responsibilities/project specifics: This person will lead the entire project from technical perspective to move a network/file storage platform containing user and application data from an onprem location to the cloud. This person will work on the architecture creating script or automation tools needed to synchronize data from the onprem location to the final destination. There are several thousand users that will be included in this migration but the cutover between platforms needs to be seamless without interruption to the business. This person should be hands on and will also be involved in recommendations as related to process improvement.
This person will lead the entire project from technical perspective to move a network/file storage platform containing user and application data from an onprem location to the cloud. This person will work on the architecture creating script or automation tools needed to synchronize data from the onprem location to the final destination. There are several thousand users that will be included in this migration but the cutover between platforms needs to be seamless without interruption to the business. This person should be hands on and will also be involved in recommendations as related to process improvement.
Creating and documenting processes
Prior experience with migrating data
Need HEAVY NAS experience not necessarily SAN Storage.
Need someone with file permission level security having designed file level security for an enterprise
Powershell & Bash scripting
Isilon Need someone with strong experience
Remember that this person has to create individual migration plans for individual applications then underlying permissions have to be created Then the person must understand how to reorganize the data into different locations where security was not done correctly in original location
There must be a security separation from other parts of data person needs to do analysis to ensure proper access
Regards
Follow us on
Full Time