Casey Nakamura System Administrator
Denver, CO • sysadmin@gmail.com • +1 3035-2222
Profile Summary
- System Administrator with 8 years of experience operating enterprise IT environments across aerospace engineering, telecommunications, and enterprise IT, specializing in Linux + Windows administration, virtualization, and enterprise security hardening.
- Solid technical background across operating systems (RHEL, Windows Server), virtualization (VMware vSphere), automation (Ansible, PowerShell), monitoring (Datadog, Nagios), and languages (Bash, Python) with strong fundamentals in networking fundamentals, change management, and audit-grade documentation.
- Deep expertise in enterprise-grade reliability, defense-in-depth security, configuration management, and zero-touch provisioning, leveraging methodologies such as change-management workflows and quarterly DR drills to drive stable, secure, and well-documented infrastructure.
- Engaged collaborator working cross-functionally with Engineering, Security, and Help Desk teams in ITIL-aligned environments, contributing to change-advisory boards, audit prep, and post-incident retrospectives with a pragmatic, ownership-first mindset.
- Emerging leader who shares technical excellence and fosters a culture of operational rigor and documentation discipline through PR reviews and runbooks, while leading IT-ops guild sessions and authoring widely adopted runbook and SOP templates.
Technical Skills
- Operating Systems:
- RHEL, Ubuntu, CentOS, Debian, Windows Server 2019/2022
- Virtualization & Containers:
- VMware vSphere, Hyper-V, Proxmox, KVM, Docker
- Networking:
- Cisco IOS, VLAN, DNS, DHCP, VPN (IPSec, OpenVPN), pfSense, Palo Alto firewalls
- Security & Compliance:
- CIS benchmarks, CrowdStrike EDR, Tenable, MFA, SOC 2, ISO 27001
- Monitoring & Backup:
- Datadog, Nagios, Zabbix, SolarWinds, Veeam, Commvault
- Automation & Config:
- Ansible, Puppet, Chef, PowerShell DSC, Terraform
- Scripting Languages:
- Bash, PowerShell, Python, Perl
- Storage & Identity:
- NetApp SAN, Dell EMC, NFS/SMB, Active Directory, Okta SSO, LDAP
Education
Work Experience
- Owned server and OS administration for the Space Systems engineering environment supporting 2,500+ engineers, leading day-to-day operation across Linux fleet maintenance, Windows Server administration, and VMware virtualization for 600+ servers in a hybrid on-prem + Azure environment.
- Managed user, group, and access policies for 8,000+ accounts across Active Directory and Okta SSO, applying role-based access control, least-privilege provisioning, and automated joiner/leaver workflows, reducing access-related help-desk tickets by 48%.
- Configured and maintained enterprise networking including VLAN segmentation, DNS and DHCP servers, site-to-site VPNs, firewall rule policies, and 40+ Cisco switches, holding 99.98% LAN uptime across 3 office sites.
- Owned security hardening and patch management including monthly OS patch cycles on CIS-benchmarked baselines, CrowdStrike EDR rollout, and vulnerability remediation via Tenable, closing 180+ critical CVEs and lifting compliance posture from 78% to 97% for SOC 2 audit readiness.
- Built centralized monitoring on Datadog and Nagios for 600+ servers and 150+ services, defining SLO-style alert thresholds, on-call rotation rules, and alert-fatigue review cadence, reducing mean time to detect from 24 minutes to 2 minutes.
- Administered enterprise storage and virtualization including NetApp SAN, 120TB of file shares, and VMware vSphere clusters running 180+ VMs, applying RAID-10 layouts, automated tiering, and vMotion migrations for zero-downtime maintenance.
- Reduced operational toil from 38% to 14% through Ansible playbooks for OS provisioning and patching, PowerShell DSC for Windows Server configuration, and Python scripts for inventory and audit reporting, reclaiming 480+ engineer-hours/quarter.
- Designed and operated the enterprise backup and disaster recovery program including Veeam-based image backups, Commvault for application data, and quarterly restore drills, lifting recovery point objective from 24h to 4h and successfully recovering all 5 inadvertent data-loss events without impact.
- Led incident response across 42 SEV1/SEV2 outages during on-call rotations, performing systematic root-cause analysis, documented postmortems, and owner assignment for follow-ups, cutting mean time to resolve from 3.5 hours to 42 minutes within the first year.
- Maintained the team's operational documentation library including 180+ runbooks, network and topology diagrams in Lucidchart, asset inventories in Snipe-IT, and standard operating procedures, achieving 100% pass on 2 SOC 2 audits without finding.
- Worked closely with Engineering, Security, and Help Desk teams across 5 office locations to coordinate change-management windows, patch cycles, and infrastructure projects, authoring 9 operational SOPs that shaped the org's IT-ops standard and onboarding 6 new sysadmins.