Summary
Overview
Work History
Education
Skills
Projects
Timeline
Generic

Deepak Joshi

Brampton,ON

Summary

Results-oriented Endpoint Administrator with extensive experience in managing and maintaining endpoint devices in a corporate environment. Proven expertise in deploying, configuring, troubleshooting, and optimizing Windows and Mac devices. Skilled in implementing and enforcing endpoint security policies to protect against cyber threats. Strong knowledge of endpoint management tools, patch management, and software deployment. Excellent problem-solving skills and attention to detail, with a focus on delivering efficient and reliable endpoint solutions. Ability to work collaboratively with cross-functional teams to ensure smooth operations and optimal endpoint performance.

Overview

9
9
years of professional experience

Work History

Endpoint Administrator

Pearl Technologies Ltd
01.2023 - Current
  • Configuring and deploying endpoint devices, including operating systems, applications, and security settings, according to organizational policies and standards.
  • Monitoring and managing endpoint devices to ensure their optimal performance, security, and compliance with organizational policies. This may include applying software updates, patches, and security configurations, troubleshooting and resolving endpoint issues, and managing endpoint inventory.
  • Implementing and maintaining endpoint security measures, such as antivirus software, firewalls, and encryption, to protect endpoint devices and data from security threats and unauthorized access.
  • Providing technical support to end users for endpoint devices, including troubleshooting and resolving hardware and software issues, installing and configuring applications, and assisting with user access and permissions.
  • Configuring and deploying Microsoft Intune, a cloud-based mobile device management (MDM) and unified endpoint management (UEM) solution, for managing and securing endpoints such as Windows devices, macOS devices, iOS devices, and Android devices. This includes setting up Intune policies, profiles, and configurations to manage device settings, applications, security, and compliance.
  • Enrolling and provisioning endpoints into Intune, including registering devices, enrolling devices through different methods (such as user-based, device-based, or automatic enrollment), and configuring device profiles and settings during the enrollment process.
  • Monitoring endpoint devices for performance, availability, and security issues, and generating reports on endpoint metrics, trends, and incidents for management review.
  • Enforcing organizational policies and standards related to endpoint devices, such as password policies, data retention policies, and software usage policies, and ensuring compliance with regulatory requirements.
  • Implementing and enforcing security and compliance policies on endpoints using Intune, including configuring settings such as device encryption, conditional access, data loss prevention (DLP), and compliance policies based on organizational requirements and industry regulations. Monitoring and remediating security and compliance issues on endpoints using Intune's reporting and monitoring capabilities.
  • Managing endpoint patching and updating using Intune, including scheduling, deploying, and monitoring updates and patches for operating systems, applications, and firmware on endpoints to ensure they are up-to-date and secure.
  • Monitoring and reporting on endpoint health, performance, and compliance using Intune's reporting and monitoring features. Analyzing data and identifying trends to proactively address issues, optimize endpoint performance, and ensure compliance with organizational policies and regulations.
  • Collaborating with other IT teams, such as security, networking, and helpdesk, to ensure effective coordination and implementation of endpoint management strategies, policies, and procedures. Participating in cross-functional projects and initiatives related to endpoint management and security.
  • Configuring and deploying Amazon WorkSpaces, a cloud-based virtual desktop infrastructure (VDI) solution, for end users across an organization. This includes setting up WorkSpaces policies, configurations, and images to provision virtual desktops with appropriate settings, applications, and access permissions based on organizational requirements.
  • Managing user accounts, permissions, and access to WorkSpaces, including provisioning new users, modifying user configurations, and deprovisioning users who no longer require access. Ensuring that user accounts are properly managed and aligned with organizational policies and standards.
  • Monitoring the performance and health of WorkSpaces environments, using tools and features provided by Amazon Web Services (AWS), and troubleshooting and resolving issues related to WorkSpaces connectivity, performance, and availability. Proactively addressing issues and optimizing WorkSpaces performance to minimize downtime and disruptions.
  • Configuring and deploying Amazon AppStream, a cloud-based application streaming service, for end users across an organization. This includes setting up AppStream fleets, stacks, and applications, configuring access permissions, and managing user assignments based on organizational requirements.
  • Managing applications within the AppStream environment, including installation, updates, and removal of applications, and ensuring that applications are properly configured and available to end users according to their requirements.
  • Developing and implementing Zero Trust strategies and policies for an organization, including defining the principles, guidelines, and best practices for adopting a Zero Trust approach to cybersecurity. Collaborating with other IT and security teams to ensure alignment with overall security goals and objectives.
  • Implementing and managing access controls based on Zero Trust principles, including least privilege access, multi-factor authentication (MFA), and continuous authentication. Configuring and managing user access to systems, applications, and data based on the principle of "never trust, always verify" to ensure that only authenticated and authorized users are granted access.



IT Support Technician III

Pearl Technologies Ltd
02.2022 - 12.2022
  • Diagnosing and resolving complex technical issues related to hardware, software, network, and other IT systems. This may involve analyzing logs, running diagnostics, and performing in-depth technical investigations to identify the root cause of problems.
  • Managing and maintaining servers, databases, and other IT infrastructure components. This may include installing, configuring, and upgrading systems, monitoring performance, and ensuring security compliance.
  • Managing user accounts, groups, and security groups in Active Directory, including creating, modifying, and deleting user accounts, managing group memberships, and assigning appropriate permissions and access rights based on organizational requirements.
  • Managing incoming tickets through the Zendesk ticketing system, including monitoring ticket queues, assigning tickets to appropriate teams or individuals, and prioritizing tickets based on urgency and impact.
  • Investigating and resolving customer or internal inquiries, issues, or problems as documented in tickets. This may involve troubleshooting technical issues, providing information or guidance, coordinating with other teams or departments for resolution, and ensuring timely and satisfactory resolution of tickets.
  • Monitoring and tracking ticket progress, ensuring tickets are updated with relevant information, and maintaining accurate and up-to-date ticket records. Generating reports on ticket status, trends, and performance metrics to analyze data and identify areas for improvement.

IT Technician

Vantage Logistics
10.2020 - 12.2021
  • Providing advanced technical support to end-users, this may involve assisting with software installations, resolving hardware and software issues, troubleshooting network connectivity problems, and providing training or guidance on IT systems and tools.
  • Implementing and maintaining security protocols and measures to protect IT systems and data from unauthorized access, malware, and other cyber threats. This may involve configuring firewalls, antivirus software, and other security tools, conducting vulnerability assessments, and implementing security best practices.
  • Creating and maintaining documentation such as user manuals, technical guides, and knowledge base articles. Generating reports on IT system performance, incidents, and other metrics to track and analyze trends, identify areas for improvement, and provide updates to management.
  • Participating in IT projects such as system upgrades, migrations, and deployments. This may involve planning, coordinating, and executing project tasks, collaborating with cross-functional teams, and ensuring project deadlines and deliverables are met.
  • Liaising with IT vendors and service providers to resolve technical issues, coordinate maintenance activities, and manage hardware and software procurement.
  • Developing, implementing, and enforcing IT policies, procedures, and standards to ensure compliance with industry best practices, regulatory requirements, and company guidelines.
  • Identifying opportunities for process improvements, automation, and optimization of IT systems and workflows to enhance efficiency, reliability, and user experience.
  • Providing guidance, coaching, and training to junior IT staff, as well as conducting workshops or presentations to educate end-users on IT best practices, security awareness, and other relevant topics.

Computer & Mobile Technician

RV Repairs
02.2017 - 08.2018
  • Identifying hardware and software issues in computer systems and peripherals by using diagnostic tools, testing equipment, and customer input. Determining the root cause of the problem and devising solutions to resolve it effectively.
  • Repairing or replacing defective hardware components such as motherboards, CPUs, RAM, hard drives, graphics cards, and peripherals like keyboards, mice, and monitors. Installing and configuring hardware upgrades, drivers, and firmware as needed.
  • Troubleshooting and resolving software-related problems such as operating system errors, software conflicts, malware infections, and driver issues. Performing software installations, updates, and patches.
  • Conducting data backup and recovery operations to protect and restore data on computers and other devices. Assisting customers in recovering lost or deleted files, folders, and data from backups or other recovery methods.
  • Diagnosing and repairing mobile devices that have been damaged by water or other liquids. Cleaning and drying components, replacing damaged parts, and testing for proper functionality.
  • Repairing or replacing cracked or damaged screens, digitizers, and LCDs on mobile devices. Calibrating touchscreens and ensuring proper functionality.
  • Repairing or replacing faulty microphones, speakers, and audio components in mobile devices. Testing audio quality and ensuring proper functionality.
  • Managing and maintaining inventory of mobile device parts, tools, and equipment. Ordering and restocking supplies as needed.
  • Maintaining accurate records of repairs, services performed, parts used, and other relevant information. Generating reports, documenting procedures, and updating knowledge base articles for future reference.

IT Services & Support Technician/Helpdesk Support

Kings College
02.2014 - 03.2017


  • Commission, configure, image (using MDT, Deploy Studio & Casper), deploy and maintain all desktops PCs, workstations, printers, and peripherals within the home region and elsewhere as required providing agreed services to users.
  • Managing staff's phone accounts and Mobile phones.
  • Making decisions on ordering new mobile phones for staff and making changes to their calling plans according to phone usage and requirement.
  • Troubleshoot hardware and software issues related to Windows, Mac, Printers, Scanners, Projectors, and Video Conference units etc.
  • Create and decommission staff, students and visitors account in AD, Exchange and college Wi-Fi.
  • Troubleshoot issues related to user's profile, security groups, Email accounts, Distribution groups, Calendars etc.
  • Managing staff access to VPN systems, Wi-Fi and terminal servers.
  • Managing users access to file server or shared folders.
  • Provide IT Induction to new staff & students.
  • Maintain user identity management systems in accordance with security and identity policies.
  • Monitor IT consumables and raise requisitions as required.
  • Use the IT Service's shared tools to maintain up-to-date, accurate, and complete documentation and configuration data for assigned services and systems, in accordance with the approved Change Management and Configuration Management processes.
  • Respond to urgent after-hours calls with remote support, returning to the site if needed.
  • Respond to urgent incidents and requests immediately and routine requests within a day.
  • Aim to resolve urgent incidents and requests within three hours of users logging them.
  • Respond to assigned incidents and requests in accordance with their defined priority (based on impact and urgency).
  • Closed 95% of trouble tickets on the first call without escalation.
  • Commended for quickly resolving complex issues including system crashes, network slowdowns, connectivity problems, security breaches, virus infections and more.
  • Set up secure WIFI, LAN and VoIP networks at remote locations, leading client/server configuration and performance-tuning of crucial infrastructure to ensure seamless business operations.
  • Use the IT Service's shared tools to track issues and solutions, thus ensuring that the Service Desk can keep affected users informed during diagnosis and resolution.
  • Managing Users permission and issues related to VPN connection.
  • Setting up users CISCO phone accounts and IP phones.
  • Assisting Staff with setting up and troubleshooting Smartphones, iPads, Tablets etc.

Education

Diploma - Web Development & Digital Marketing

Montreal College of Information & Technology
Montreal, QC
11.2021

Diploma - Computer Network And System Engineering

Avonmore Tertiary Institute
Auckland, NZ
11.2015

Skills

Microsoft 365

Microsoft Intune

Airwatch

Amazon Workspaces

Amazon AppStream

Box

OKTA

BeyondTrust

SysTools Migrator

Quest

Cisco Unified Communications Manager

CloudFlare

Bitdefender Endpoint Security

Deep Freeze Cloud

Dameware

Fortinet VPN

AD Manager

WDS, MDT, WSUS, & Failover-Cluster

Advanced virtualization skills using Hyper-V, VMware, Virtual Box, Parallel Desktop etc

Casper Jamf Mobile Administrator, Casper Computer Administrator, Citrix, and Synergetic

Window Server 2008, 2012, & 2019 Exchange Server 2007, 2013, Citrix Server, Mac OSX Server

Projects

CloudFlare Zero Trust                February 2023 - Current

Amazon AppStream                   January 2023 - Current

Domain Migration                       March 2023 - Current

Tenant Migration                        November 2022 - December 2022

Deep Freeze Deployment          August 2021 - August 2021

IT Infrastructure Setup              October 2020 - December 2020


Timeline

Endpoint Administrator

Pearl Technologies Ltd
01.2023 - Current

IT Support Technician III

Pearl Technologies Ltd
02.2022 - 12.2022

IT Technician

Vantage Logistics
10.2020 - 12.2021

Computer & Mobile Technician

RV Repairs
02.2017 - 08.2018

IT Services & Support Technician/Helpdesk Support

Kings College
02.2014 - 03.2017

Diploma - Web Development & Digital Marketing

Montreal College of Information & Technology

Diploma - Computer Network And System Engineering

Avonmore Tertiary Institute
Deepak Joshi