Close this
Close this

Samuel Nadim

Development
FL, United States

Skills

Cloud Computing

About

Samuel Nadim's skills align with Consultants and Specialists (Information and Communication Technology). Samuel also has skills associated with System Developers and Analysts (Information and Communication Technology). Samuel Nadim has 6 years of work experience.
View more

Work Experience

Cyber Security Teacher, Remote

Chegg Skills
January 2023 - Present
  • * One-on-One Cyber Security Instruction: * Conducted personalized one-on-one teaching sessions with students. * Guided them through the intricacies of Cyber Security concepts. * Assisted students until they successfully completed the Thinkful Course Certificate program. * Delivered instruction during non-business hours to accommodate diverse schedules. * Technology and Career Guidance: * Acted as a resource for students, addressing their questions related to technology and career paths. * Provided insights into industry trends and best practices. * Skillset Enhancement and Industry Standards: * Assisted students with varying skill levels in mastering the latest IT industry standards. * Focused on security best practices to prepare students for successful careers in the field.

Senior Cloud Services Engineer, Remote

Humana
November 2020 - January 2024
  • Internally Promoted to Senior Cloud Services Engineer Senior Cloud Services Engineer May 2023 - January 2024 Hired as official employee of Humana from prior role at Brooksource Cloud Services Engineer 2 June 2021 - May 2023 Brooksource, Remote - Ashburn, VA, Full-Time Cloud Engineer November 2020 - June 2021 W2 Full time contractor of Humana at Brooksource Achievements * Internally Promoted to Senior Cloud Services Engineer (May 2023): * Demonstrated exceptional performance, leading to an internal promotion within the Azure Cloud Platform Team. * Contributed significantly to the team's success by leveraging cloud expertise and problem-solving skills. * Bug Discovery and Global Impact: * Identified a critical bug in User Defined Routes within the Azure Portal. * Collaborated with our Microsoft Customer Success Architect (CSA) to validate the discrepancy between the UI and API. * Successfully rectified the issue, benefiting not only Humana but also the global Azure community. * FHIR Private Endpoint Private Link (PEPL) Onboarding: * Uncovered inconsistencies in the Microsoft Documentation related to FHIR Private Endpoints. * Despite the discrepancies, skillfully onboarded FHIR PEPL for the enterprise, ensuring seamless connectivity for our application teams. * Incident Resolution and Critical Application Support: * As part of the L3 on-call rotation, promptly resolved incidents across various severity levels (P0 to P4). * Supported business-critical applications, including humana.com, go365.com, and centerwell.com, as well as internal-only applications. * Maintained service availability and minimized downtime during critical incidents. * AWS CloudFormation Template for EKS: * Published an AWS CloudFormation template specifically for Elastic Kubernetes Service (EKS). * Facilitated a play-and-learn environment, promoting an agnostic strategy for vendor-agnostic cloud solutions. Responsibilities * Reviewing Pull Requests (PRs): * Acted as a gatekeeper for PRs from L2 teams on behalf of both our internal application teams and your own L3 teams. * Provided valuable feedback and worked diligently toward approval. * Once approved, scheduled changes in ServiceNow and released them during the approved maintenance windows. * Cross-Functional Collaboration: * Collaborated with diverse teams, including application developers, infrastructure engineers, and security specialists, to design and implement a next-generation platform. * Represented the cloud platform team as an L3 (Level 3) SME (Subject Matter Expert) for enabling Azure App Service Environment (ASE) within our ecosystem. * Security and Compliance: * Ensured adherence to security controls and best practices by implementing robust security measures for our application resources. * Separated role-based access control (RBAC) between platform infrastructure and application team infrastructure, allowing app teams to focus on building applications without compromising security. * Infrastructure Resilience and Stability: * Designed and maintained a resilient platform that minimized risks to shared hardware components. * Prevented unauthorized modifications to network security groups (NSGs), route tables, and Azure DNS settings, ensuring platform stability. * Efficient Resource Allocation: * Orchestrated Azure App Service plans, optimizing resource allocation for application workloads. * Applied similar principles to Kubernetes namespaces, segregating platform infrastructure from application-specific resources. * Private Link Private Endpoint DNS Automation (PEPL): * Enabled Private Link and Private Endpoint DNS Automation for several Azure Services. * Facilitated internal routing of resources for both non-production and production environments. * Specifically, services like Azure Cosmos DB, Purview, Azure Data Explorer, and OpenAI were configured to allow application teams to set up private endpoints seamlessly I helped onboard successfully for the enterprise for our application teams. * Eliminated the need for ephemeral application team DNS zones by linking directly to our platform team-owned VNETs. * Complex conditional forwarders were set up, and automation ensured integration with our enterprise DNS solution. * Empowered application teams to focus on building applications without managing platform DNS intricacies. * VNET Expansion and IP Schema Management: * Expanded VNETs within an IP schema tailored to environment and region requirements (both non-production and production). * Updated the Cloud Platform IPAT tables to align with the approved IP schema. * Ensured balanced distribution across regions/environments, avoiding undue load on any specific area. * Meticulously avoided BGP overlap with on-premises networks. * Subnet Module Authoring and Versioning: * Authored, published, and versioned subnet modules for our platform infrastructure. * Semantic module versioning allowed for smooth patching and enterprise-wide changes. * These efforts were critical in maintaining a robust and reliable platform for our members and users. * UI Bug Resolution for UDRs: * Discovered and rectified a UI bug in User-Defined Routes (UDRs) that did not align with the corresponding API. This critical fix was made while validating Microsoft Zero Trust Architecture, and the corrected UDRs were rolled out globally after confirmation by Microsoft CSA. * FHIR Bug Discovery and Onboarding: * Identified a bug related to Azure PEPL (Private Endpoint Private Link) in an unused DNS Zone for FHIR (Fast Healthcare Interoperability Resources). Despite the issue, successful onboarding was achieved for the enterprise. * Azure Security Blueprint Expertise: * Provided expert guidance on setting security posture for Azure components, including Azure Function Apps and App Services. Addressed questions related to private endpoints for inbound traffic and separate VNET integration subnets for outbound private connectivity due to delegation. * PEPL Process Validation and Documentation: * Successfully proved out the PEPL (Private Endpoint Private Link) process for our team, leading to several successful implementations across critical services such as Purview, Azure Data Explorer, OpenAI, FHIR, and Cosmos DB. Documented the process for future teams. * Network Troubleshooting Documentation: * Created comprehensive documentation outlining network troubleshooting steps for our internal team and L2 support teams. Leveraged my CCNA expertise to ensure effective troubleshooting practices. * NSG Patching and Semantic Versioning: * Collaborated with network threat security to patch Network Security Groups (NSGs) using Infrastructure as Code (IaC) Terraform. Ensured smooth rollouts for public and internal subnets by maintaining semantic versioning. For instance, we incorporated approved public IPs from our DDOS/WAF vendor into the versioning process, minimizing manual updates and potential errors. * Module Management and Collaboration: * Maintained semantic versioning for NSGs and ensured that subnet modules consumed child NSG and route table modules. Smoothly applied patches for minor versions without breaking changes. Major version changes were carefully published, and these modules were made available for Tier 2 teams submitting pull requests to our platform landing zone repositories. These repositories support application team subnets within our Cloud Platform Team's landing zone * Custom Public IP Requests Management: * Proactively deny custom public IP requests from our L2 teams and redirect them to the EIP (External IP) security exception team. Ensuring adherence to security policies and best practices. * NSG Patching for L3 Teams: * Regularly patch Network Security Groups (NSGs) for other L3 teams, including the SCCM team. Whether adding new servers or removing existing ones, I follow approved ITSM standards and meticulously log changes in ServiceNow. This process spans both non-production and production environments. * L3 Escalation Support and Incident Review: * Provide critical support during L3 escalations for various resources, such as Azure Kubernetes Service, Azure App Service Environment, and Azure IaaS VMs. Conduct thorough reviews of logs in Splunk and activity logs to investigate incidents. Serve as an L3 escalation point for L2 incidents. * Service Limit Increase Requests: * Advocate for service limit increases when necessary, especially while enabling new services in specific regions. Ensuring scalability and smooth service deployment. * Vendor-Agnostic Cloud Strategy Implementation: * Collaborate with teams to meet the next-gen Cloud Platform strategy by adopting vendor-agnostic patterns. Avoiding proprietary models mitigates risks for the enterprise. For instance, if Microsoft raises prices on IaaS, we safeguard against reliance on proprietary ARM/Bicep or Azure Functions for all applications. * CloudFormation Play-and-Learn Environment Setup: * Successfully established a CloudFormation play-and-learn environment for Elastic Kubernetes Service (EKS) as part of our vendor-agnostic initiative. The template was approved by our learning partner and made available to application and technical teams. * Cross-Functional Migration Support: * Actively participate in cross-functional teams to determine optimal placement (on-premises vs. cloud) for specific applications. Collaborate to achieve successful migrations based on suitability assessments. * L3 Engagement in Program Increments (PIs): * Join cross-functional teams as an L3 member during Program Increments. Engage with vendor teams, contractors, L2 teams, and L3 partner teams. Attend daily standups, report blockers, and execute assigned tasks. * Firewall Log Review and Connectivity Troubleshooting: * Proficiently review firewall logs across multiple platforms, including Azure Firewall, Panorama, and Splunk. As an L3 escalation point, I troubleshoot connectivity issues for critical applications (P0 incidents). My expertise spans various Azure resources, such as Application Gateway, NAT Gateway, App Service Environment, Function Apps, Azure Kubernetes Clusters, Azure Storage, Private Endpoint Private Link, and internal reachability configurations (e.g., Snowflake).

Cloud Network Engineer

US SBA at Red Cedar Consultancy
January 2019 - September 2020
  • Achievements * Obtained Security Clearance: * Successfully obtained and maintained a security clearance, demonstrating trustworthiness and adherence to strict protocols in handling sensitive information. * Supporting Small Businesses During COVID: * Actively contributed to supporting small businesses across the country during the challenging times of the COVID pandemic. This involved providing technical assistance, troubleshooting, and ensuring seamless network connectivity for these businesses. * Large-Scale Cloud and Network Projects: * Engaged in significant cloud and network projects, contributing to the advancement of SBA's cloud and network capabilities. This included designing, implementing, and optimizing cloud-based solutions to enhance efficiency and reliability. Responsibilities: * Cloud Administration and Network Monitoring: * Played a crucial role in cloud administration, ensuring smooth operations and efficient utilization of cloud resources. Additionally, actively monitored the network infrastructure, promptly addressing any issues or anomalies. * Network Reporting and Anomaly Detection: * Generated daily network reports, highlighting significant issues and anomalies observed. Leveraged network monitoring tools to identify inconsistencies in data generation or stagnation, ensuring data accuracy. * Quantified alert counts and provided qualitative visuals (such as NetFlow and Top Application Usage) to capture and report anomalies from historical data. Summarized findings for weekly and monthly network reports. * Consistently uploaded these reports to the government's shared drive for historical tracking and reference. * Implementation Documents: * Delivered essential implementation documents, including: * Minimum Viable Product Sheet: Created a detailed sheet for a network monitoring tool based on the current working model. Collaborated with Fed leads to finalize and implement the solution. * Sys Logs Integration Plan: Documented the process to connect existing network monitoring alerts via Sys Logs, forwarding them to the Cloud Analytics Workspace for centralized event tracking. * VM Disk Encryption Remediation Strategy: Developed a sample output and backup strategy for VM disk encryption, ensuring data security. * SQL Vulnerability Assessment Results: Transformed scan results from JSON to CSV using PowerShell scripting. * Collaboration with SBA SOC: * Worked closely with the SBA Security Operations Center (SOC) to obtain relevant network appliance sys logs for analysis and proactive security measures. * Evaluated command structures in a contractor lab environment, documenting findings and providing sample outputs as requested by the SBA SOC. * Node Down Alerts Implementation: * Tasked with implementing various node down alerts, including those for the SBA SOC. * Defined trigger conditions based on the environment and purpose (e.g., distinguishing network gear from other types of nodes). * Evaluated alerts and fine-tuned thresholds to prevent false positives (e.g., network flaps) while ensuring legitimate outages were detected. * Added static email notifications for the NOC/SOC POC/Distribution Email. * Configured trigger actions to automatically push alerts to the ITSM tool for incident automation. * Successfully evaluated and deployed alerts to production following rigorous testing. * Provided status updates to the Federal lead and delivered concise work steps summaries, receiving appreciation upon completion. * Cloud Security Vulnerability Remediations and NIST Compliance: * Actively worked on cloud security vulnerability remediations. * Conducted thorough testing, generated sample output, and documented findings. * Presented results to the Federal team before submitting change requests. * Collaborated with the team to address security recommendations and align with NIST compliance standards. * Network Issue Troubleshooting in Cloud Tenant: * Leveraged cloud network troubleshooting tools to identify and resolve connection issues or performance degradation. * Played a key role in maintaining optimal network performance within the cloud environment. * Circuit Utilization Analysis: * Regularly captured circuit utilization data each month. * Compiled comprehensive reports and shared them with the team. * Generated consistent visuals depicting WAN interface utilization and response times. * Adding Missing Switches to Network Monitoring Tool: * Assisted in adding missing switches to the network monitoring tool. * Created an Excel sheet to log success/failure of nslookup on IP addresses within the branch site network address space. * Verified DNS names and collaborated with network engineer SMEs before adding switches to the monitoring tool. * Separate Dashboard for Network Performance Monitoring: * Contributed to the creation of a separate dashboard within the network performance monitoring tool. * Added relevant widgets tailored to the needs of the specific team * Adding Locations to ServiceDesk System: * Integrated locations from the SBA website into the ServiceDesk system. * Addressed any discrepancies or inconsistencies to ensure accurate and up-to-date information. * Created an Excel document outlining the details and shared it with the team and Federal stakeholders. * Upgrade Network Devices OS Project Contribution: * Extracted data from the network tool report, encompassing all nodes. * Filtered the data in Excel to distinguish routers from switches and categorized them by vendor type. * Compiled essential information, including End-of-Life (EoL) status, current OS image, and vendor-recommended OS image (recognizing that the newest version isn't always the most stable). * Authored step-by-step instructions for upgrading the OS of specific vendor nodes (routers and switches) based on official vendor documentation, citing reliable source data. * Requirements Gathering and Collaboration: * Actively participated in meetings to gather requirements for various tasks, projects, Proof of Concepts (PoCs), and assignments. * Attended bi-weekly stand-up meetings to stay informed and aligned with project progress. * Project Progress Reporting: * Regularly communicated project progress to the project manager. * Provided daily and weekly status updates, ensuring transparency and effective project management.

NOC Engineer

MegaPath Cloud Company
February 2018 - March 2019
  • * Layer 1-4 Support for Network Troubleshooting: * Proficiently handled network troubleshooting across layers 1 to 4 of the OSI model. This involved diagnosing issues related to physical connections, data link protocols, network addressing, and transport layer protocols. * T1, EoC, Fiber, DSL Circuit Support: * Troubleshot connectivity issues for various circuit types, including T1, Ethernet over Copper (EoC), fiber, and DSL. * Conducted unplugged loop tests to verify circuit integrity. * Checked DSLAMs for errors and assisted in assigning static IPs to validate synchronization and internet access. * Remote Equipment Access: * Remotely logged into network equipment using secure protocols. * Performed ICMP echo (ping) tests and traceroutes to diagnose connectivity and latency issues. * SSH Access and Equipment Inspection: * SSHed into network devices to perform in-depth inspections. * Checked bandwidth utilization, examined ARP tables, and captured TCP dumps for analysis. * Utilization Snapshots: * Regularly captured utilization snapshots to monitor resource usage and identify potential bottlenecks. * IP Monitoring Tasks: * Enabled monitoring tasks on specific IPs, including WAN IPs and static LAN IPs. * Monitored performance metrics and responded proactively to anomalies. * Network Equipment Troubleshooting: * Troubleshot network equipment, including: * Edgewater Edgemarcs (via SSH and GUI) * Adtrans (via SSH) * Fortinets * Diagnosed and resolved issues promptly. * Managed Firewall and SD-WAN Appliances: * Administered and maintained Cisco Meraki MX and MR firewalls. * Managed VeloCloud SD-WAN appliances via their respective GUI dashboards. * SD-WAN Appliance Management: * Expertly handled Cisco Meraki appliances (via GUI dashboard) and VeloClouds (also via GUI dashboard). * Reverse DNS: * Configured reverse DNS records for IP addresses. * Firmware Upgrades for Edgewaters: * Remotely upgraded Edgewater routers' firmware using the GUI over HTTP/HTTPS. * Voice Configuration for Edgewater Routers: * Utilized specialized tools to configure Edgewater routers for voice services. * VoIP Troubleshooting: * Diagnosed and resolved VoIP-related issues, ensuring optimal call quality and reliability. * IP Phone Enrollment and Troubleshooting: * Enrolled and troubleshooted IP phones from various manufacturers, including Polycom, Cisco/Linksys, Yealink, and Panasonic. * Tunneling into IP Phones via SSH: * Established secure SSH connections to IP phones for advanced troubleshooting. * Port Mapping and NAT: * Configured port mapping and performed 1:1 NAT on Edgewater routers and Cisco Meraki devices. * DHCP Range Management: * Adjusted DHCP ranges on Edgewater routers as needed. * Voice Administration: * Troubleshot call flows, including auto attendants, hunt groups, and business hours/after-hours routing. * Updating IP Information for Edgewaters: * Ensured that IP information for Edgewater routers was accurately maintained. This allowed for seamless movement of routers to other circuits when necessary. * DNS Settings Updates: * Regularly updated DNS settings on both Edgewater routers and Cisco Meraki devices. This ensured reliable name resolution and efficient network operations. * SIP Stack Debugging: * Conducted thorough SIP stack debugging on Adtran voice routers. This process verified successful handoff to PBX systems, ensuring smooth communication for VoIP services. * MOS Score Monitoring: * Monitored Mean Opinion Score (MOS) to assess voice quality. Addressed any issues promptly to maintain excellent call quality. * VLAN Configuration Assistance: * Assisted customers in configuring VLANs and ensuring proper VLAN tagging for phones. This streamlined network segmentation and optimized traffic flow. * Topology Diagram Best Practices: * Collaborated with the team to ensure adherence to best practices for network topology diagrams. If needed, provided guidance on optimizing the diagram for clarity and accuracy. * Linux Command Line Proficiency: * Demonstrated proficiency in using the Linux command line for various network tasks. This included troubleshooting, configuration, and system management. * Effective Communication: * Actively participated in team channels, promptly responding to inquiries and providing valuable insights. * Maintained efficient email communication, ensuring timely updates and collaboration. * Ticketing and CPNI Protection: * Managed tickets across various ticketing portals, addressing technical issues and user requests. * Adhered to CPNI (Customer Proprietary Network Information) protection procedures, safeguarding sensitive information, and ensuring compliance. SAMPLE WORK * Website: Built using Hugo and deployed via Azure Static Web Apps. * Leveraged my own GitHub repository (GitHub/wnadim92). * Configured DNS using AWS Route 53. * https://www.samuelnadim.com * https://www.rockstarcomputing.com My mission is to continue to deliver value and deliver good solutions for progress. Cloud Platform DevOps Engineer Verify on Pearson's Cradley: https://www.credly.com/users/samuel-nadim

Education

Northern Virginia Community College

Associates of Science

Broad Run High School

HS Diploma