Linux Administrator Affiliated Engineer Resume
4.00/5 (Submit Your Rating)
SUMMARY:
- UNIX/Linux, Red Hat Enterprise Linux, Community Enterprise Linux (CentOS) administrator with over 15 years’ experience.
- I have experience with TCP/IP networking, nfs, iSCSI, dns, ssh, mysql, Apache, yum repository configuration, KVM, bash scripting, kernel patch updating via yum, rpm and source code.
- Packet analysis performed through tcpdump and Wireshark. Adept at trouble isolation in operating systems and hardware.
- I am proactive professional able to anticipate and circumvent problems preventing critical failure while promoting client satisfaction.
- Expertise in Red Hat Enterprise Linux 7.x/6.x, CentOS 7.x/6.x, ESXi Hypervisor 6/5, Fedora 17 - 23, Ubuntu 1004 through 1604 and Solaris 10 update 2 to Solaris 11 update 3.
PROFESSIONAL EXPERIENCE:
Confidential
Linux Administrator Affiliated Engineer
Responsibilities:
- Restored a critical linux run cooling monitor controller used to monitor cooling of major customers’ computer racks throughout the data center by breaking into its root user account to change the ifcfg-eth0 network configuration file to read write to setup a static IP address.
- Reduced rack space use by over 50 percent through consolidation of 5 Linux systems onto one PC using virtualizing software for greater efficiency of lab space eliminating the work of 5 individual 1U high rack servers running Red Hat Linux Server Enterprise 6.x/7.x, Community Enterprise Linux 6.5-7.0, Fedora 17-22 and Ubuntu 1404.
- Successfully recovered damaged a critical gnome terminal console in Linux environment instance that had failed during an update process that left it with exclusively with multi-user command shell only access.
- Recovered a Linux operating system instance by recovering a full filesystem from 95% disk utilization to 40% disk utilization by extending the existing logical volumes size through the vgextend in a new physical volume to avoid a destructive reinstall of the Linux OS.
Confidential
Linux Administrator and Lab Manager
Responsibilities:
- Reduced time to setup server test beds by a factor of 5 times configured to the requirements of the engineers by server model, operating system vendor (Solaris 10.x RHEL 5.x/6.x, SuLES 11.x, CentOS 5.x Windows 2008 64/32 Enterprise/Datacenter/Core, 2003,)
- Recovered an Confidential DL320 G5 server with a broken power switch by detecting its MAC address through Wireshark packet analyzer in order to initiate power up through Wake on Lan feature.
- Lowered downtime for an Confidential vendor from 2 days to 2 hours by setting up a vnc remote console configuration on an Confidential DL360 G7 so he could access a Red Hat Linux Enterprise 5.6 server to conduct Root Cause Analysis investigation in order to avoid a trip to the site.
Test Engineer
Confidential
Responsibilities:
- Verified reliability of the Onboard Administrator firmware features based on personally created testplan fabrication with a variety of configurations in the blade racks on the Onboard Administrator firmware in the areas of sanity testing, stress testing, new features, integration with Confidential Virtual Connect module and Confidential iLO management.
- Discovered and reported 20 test failures out of 100 in issue tracking database with complete information based on model, firmware revisions, log files and inventory of hardware installed in blade enclosure to allow for the Onboard Administrator development team to provide a fix.
Test Engineer
Confidential
Responsibilities:
- Led the Python test planning team to establish test plan protocols for Confidential Python scripts.
- Headed a test team that confirmed Confidential agent functionality in an experimental project implemented from a test plan under Community Enterprise Operating System (CentOS 5.x, Fedora 5.x, Asianux, Debian).
Linux Test Engineer
Confidential
Responsibilities:
- Initiated an investigation into after Solaris 10 stess tests revealed a critical failure in firmware on an Confidential DL380 G6 server pre-release when testing from other teams missed this critical issue.
- Inserted RAID and non-RAID host adapters, network adapters and Fibre Channel cards that were added in Red Hat and SuSE Linux Enterprise Servers on Confidential in test plans under SIOS.
- Created test plans that verified the functionality of Confidential agents and management apps on mounted Confidential MSA, Confidential EVA SAN and Confidential XP Fibre Channel Storage Arrays Storage drives on Linux, Solaris and Windows servers.
Confidential, Houston, TX
Instructor
Responsibilities:
- Provided instruction services in Solaris 8 operating system covering: creation and maintenance of Veritas Volume Manager file systems, implementation of system security maintenance of NIS servers to students.