Virtualization Performance and Capacity

Company Name:
## Description
The purpose of this practice area is to measure, analyze, and report on the performance and capacity of virtualization hosting environments that have been built on solutions designed, engineered, and delivered as part of a centralized platform for the Allstate Enterprise. Scope of involvement includes all infrastructure components and related processes to support x86-based virtualization platforms. As new capabilities are identified, the virtualization team is responsible for system design, engineering, integration, capacity analysis, performance study, operational readiness and configuration support for the defined capability. The mission of the virtualization team is to provide a platform that will enable Allstate to rapidly develop and deploy new products and services that leverage our technology assets and process knowledge to enable business growth while optimizing the consumption of computing power.
By its nature, effective virtualization requires knowledge and context of complex technologies and their corresponding processes. The evolution of the platform is currently focused on continued expansion of the Platform offerings to a wider range of systems and applications, including those that are critical to business operations. With this expansion, additional focus will be required in all areas of Operational Management. Effective monitoring and event management, change management, release management and capacity planning are essential. System availability cannot be compromised. As a result, focus will be placed on the prevention of incidents through predictive analysis and yellow-to-green initiatives.
## Qualifications
1. Must have the experience and significant knowledge working with the industry technology standards and processes, as enumerated below.
Capacity and Performance Analysis
Operational Tenets of Virtualization Infrastructure, e.g. VMware vMotion, Resource Scheduling, Physical to Virtual Migrations, etc.
Infrastructure Provisioning
SDLC Methodologies
Reusable Frameworks
Security Standards (SOX, PCI, etc...)
2. The candidate must have the ability to lead and provide direction to enterprise-wide implementations of these technologies.
VMware vSphere 4.1 and higher (ESX and ESXi) - VCP4/5 or VCAP Certification a plus
VMware vCenter 4.1 and higher
vCenter Operations Manager 5.x or VMware CapacityIQ ver.
vCloud Director and Automation Center
VMware Site Recovery Manager (SRM)
Storage and Networking Technologies
IBM Tivoli Monitoring
SAS AG, Business Objects
3. Each member must have significant knowledge of the following infrastructure technologies; they must possess direct experience working on these platforms. Additionally, each member must have the ability to dive deeper into each of these technologies as it relates to virtualization infrastructure in support of advanced installation, configuration, and troubleshooting activities.
Linux - Red Hat Enterprise Linux
Unix - Solaris 9 and 10, Solaris Cluster, Solaris Containers/Zones
Microsoft Active Directory (LDAP technologies)
Windows 2003, 2008, 2008 R2, 2012, Clusters
Java / JVM technologies, Microsoft .NET Framework
Oracle DBMS and Microsoft SQL Server
Job: Information Technology
Job Type: Experienced
Primary Location: OH-Hudson
Req ID: UNI06877
Company Description:
We're more than insurance agents and claims representatives. We're individuals with hopes, plans and passions. The biggest of which is helping people live smarter, safer lives. Doing so means continuing to re-imagine how we do what we do, the impact we can make on the world, ways we can each succeed in our own careers and actions we can take as a company that are good for all. To do that, we need all kinds of people - including lawyers, accountants, building engineers, project managers, marketing professionals, human resource specialists and so many more.

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.