We provide IT Staff Augmentation Services!

Deployment Engineer Resume

SUMMARY:

  • Highly skilled Openstack Engineer/Architect with extensive experience in all major Linux and Windows platforms from administration to solutions architect producing the desired results.
  • Deployment Engineer for Confidential Openstack on Redhat/Ubuntu platforms. Worked on site at customer locations such as ATT, Comcast, and others. Interfaced with customers to determine deployment requirements and implement as necessary.
  • Deployment of Cloud Infrastructure platform (built on Confidential OpenStack) using Confidential Fuel and configurations management tools like Ansible and Puppet.
  • Built, deployed and managed OpenStack Environment using Confidential Fuel and experience working with Contrail, NFV, Vmware, Ansible, Linux, Confidential, Git, Jira with Openstack and AWS cloud computing.
  • Installed configured and tested Openstack (Juno, Nova, Keystone, Cinder, Swift) POC Openstack and VMware. Managed WMQ for dev teams. Ensure services are running, configure new MQ queue managers, and configure monitoring for WMQ instances.
  • Configured and managed and deployed Openstack components such as keystone, nova, neutron, glance, swift by Confidential Fuel.
  • Cloud experience: Have been working with Softlayer Cloud with Confidential for the past two assignments with Confidential spanning the past 4 years.
  • As a Confidential Architect written many plugins to monitor system information, jobs completions, and system and application status. Also used Confidential to schedule OS updates to run as Confidential jobs. Recent experience running Confidential was with the Confidential Phoenix project.

TECHNICAL SKILLS:

Operating Systems: Confidential & OpenSUSE (9.x,10.x,11.x Enterprise), Fedora (Core up to FC20), Red Hat (7.x,8.x,9.x) RHEL (3,4,5,6), CentOS (4,5,6), OEL (456), Windows (3.51, 2000, 2003, 2008, 2010), Mac OS X, Solaris (9,10), Confidential Netware 2.15, 3.12, 4.x, OEL, VMware Server

Directory Services: OpenLDAP, Active Directory, Confidential NDS

Application Servers: Apache, IIS, Tomcat, JBoss, Citrix NFuse, Citrix, Tarantella

Email\Groupware Servers: Sendmail, Postfix, Microsoft Exchange, GroupWise, CommuniGate Pro, EGroupware, Microsoft CRM

Database Servers: Postgres, MYSQL, Microsoft SQL, Oracle 9i

Network Monitoring: Confidential, Cacti, SNMP, Confidential Opsware, BMC Patrol, BMC Perform, Zenoss, Zabbix, Tivoli

Scripting / Programming: RPM creation, Bash, Python, Visual Basic, Turbo Pascal, Microsoft VBA, bashOther Proficiencies DNS, DHCP, DDNS, TCP/IP, VPN, SSH, SCP, RSYNC, BASH, SNMP, CRON, IMAP, POP3, SNMP, Snort, Scripting, PXE, Network Boot and Network installation, vi, sed, etc., spamassassin, clamAV, high availability, Samba, server clustering, Linux Network booting.

Package & Automation: RPM, Yast, Yum, Apt, Confidential Opsware. Confidential BigFix, puppet, Confidential Satellite Server, Spacewalk Server, OpenStack

Version Control: Subversion

Hardware: Confidential Blade Centers, Confidential, Confidential, Oracle Exalogic, Cisco UCS

Virtualization: QEMU, VMWare Server, VMWare ESX, Virtual Center

System Imaging: Symantec Ghost, Site Imager, G for U.

NAS / SAN Technologies: ISCSI, OCFS, GFS, EqualLogic, Snap Server, Multipath, Boot from SAN methods

Backup Solutions: Veritas NetBackup, Veritas BMR, Tivoli

Management systems: BMC Remedy

Message Brokers: Confidential MQ, Confidential Message Broker, Rabbit MQ

Cloud Services: Confidential Softlayer; Openstack

PROFESSIONAL EXPERIENCE:

Confidential

Deployment Engineer

Responsibilities:

  • Deployment Engineer for Confidential Openstack on Redhat/Ubuntu platforms. Worked on site at customer locations such as ATT, Comcast, and others. Interfaced with customers to determine deployment requirements and implement as necessary.
  • Deployment of Cloud Infrastructure platform (built on Confidential OpenStack) using Confidential Fuel and configurations management tools like Ansible and Puppet.
  • Built, deployed and managed OpenStack Environment using Confidential Fuel and experience working with Contrail, NFV, Vmware, Ansible, Linux, Confidential, Git, Jira with Openstack and AWS cloud computing.
  • Configured and managed and deployed Openstack components such as keystone, nova, neutron, glance, swift by Confidential Fuel.
  • Experience working with cloud Open source platform OpenStack (Juno, Confidential and Kilo)
  • Confidential OpenStack components (Keystone, Neutron, Ceilometer, etc.)
  • Experience with Kubernetes and Docker containers
  • Linux (Ubuntu, CentOS, RHEL) networking & system administration
  • On site consultant to implement Confidential Manager at Confidential corporate headquarters. Short project, lasting only one (1) month. The scope of the project was to implement Confidential Manager for patching the over 1400 store servers and registers. This project also included provisioning for datacenter servers.

Confidential

Linux Patching Engineer

Responsibilities:

  • Linux deployment and patch management. Responsible for patching RHEL, EOL, and Solaris servers.
  • This project had a rolling quarterly patch schedule of over 2200 servers. My role was to coordinate and schedule patch events with customer teams, create change tickets, and apply patches based on schedules established.
  • Installed configured and tested Openstack (Juno, Nova, Keystone, Cinder, Swift) POC Openstack and VMware.

Confidential

Linux Deployment, Patching, Automation and Support

Responsibilities:

  • Linux deployment and patch management, responsible for all Linux deployment and patch management for Confidential Government Services group. Worked to standardize infrastructure to Confidential Linux. Worked with Oracle, Red Hat, Ubuntu, and Debian Linux distributions within the environment to ensure patching and deployment based on business needs.
  • Installed configured and tested Openstack (Juno, Nova, Keystone, Cinder, Swift) POC Openstack and VMware. Managed WMQ for dev teams. Ensure services are running, configure new MQ queue managers, and configure monitoring for WMQ instances.
  • Deployed Confidential to Monitoring approximately 700 systems (Windows, Linux, and Solaris) using both active and passive checks. Wrote numerous custom plugins to monitor specific application parameters as requested by the team leads. Custom notification groups and integration into the Unicenter helpdesk system.
  • Architected, installed, and configured a Spacewalk \ Puppet solution (the upstream open source version of Satellite server) to manage patching on various Linux distributions (CentOS, Confidential Linux, Red Hat, OEL Linux) and Solaris.

Confidential

UNIX Consultant

Responsibilities:

  • Worked with Confidential of Canada to migrate recently acquired Algorithmics Linux environment to Confidential standard data - center. Responsibilities included both pre and post deployment activities, data collection, identify and implement client requirements in new data centers within a Confidential 6 environment.
  • Deployed Confidential to monitor approximately 300 Linux systems. Wrote numerous custom plugins to monitor specific application parameters as requested by the team leads. This solution was a tool for migration and application deployment. The Confidential checks were geared toward confirming configuration items, software dependencies, and client requirements on application server pods.

Confidential

DevOps Linux

Responsibilities:

  • Supported development teams in Linux environments. Established monitoring Dev environments with Confidential TEM (Tivoli Endpoint Management) and Confidential . Supported LAMP stack, WebSphere, Tomcat, JBoss, and Oracle Databases. Some of the Dev environments were on Exalogic server. Minimal work with Puppet consulting with the deployment\automation team.
  • Administered Confidential WebSphere MQ, and message broker. Activities included installing Confidential WMB and WMQ, ensuring services were running, configured Confidential monitoring scripts to check the health of various WMQ or WMB instances.

Confidential

UNIX Consultant

Responsibilities:

  • Member of the SOA deployment team. Responsibilities included providing solutions to the SOA management team to meet Confidential and HIPPA standards for Linux infrastructure. This role was highly visible with Harris Technologies and the Confidential . Provided written proposals and procedures to comply with Confidential, VA, and HIPPA standards.
  • Role also involved building servers, designing solutions to allow patching of systems that are isolated from the public internet through the use of Confidential Satellite server or other methods depending on environment and level. Supported multiple hardware environments including Confidential, Confidential, and Oracle Exalogic. Implemented Confidential to monitor critical system as requirements dictate.

Confidential

Consultant

Responsibilities:

  • Stabilized the Ubuntu Linux infrastructure and compute environments which involved redeploying compute servers to serve the needs of the bioinformatics team. Generated documentation and proposals for management team.

Confidential

UNIX Consultant

Responsibilities:

  • Responsibilities included building servers for multiple State of Texas agencies.
  • As a member of the build team, created processes to quickly deploy many Linux Servers simultaneously.
  • Deployed physical machines and VMs on a regular basis. Many of the systems deployed were boot from SAN in either Confidential or Confidential Linux. On a few occasions also built Windows 2008 servers. Supported client on various hardware platforms including Exalogic.
  • Traveled to remote offices of various State of Texas agencies to provide onsite support.
  • This is a continuation of the Confidential contract when Confidential won the state contract.
  • Member of the Confidential team (Distributed Network Operations Center).
  • Responsible for 2nd shift operations.
  • Responded to both internal and external customer requests/tickets.
  • Other responsibilities included imaging and configuring simulator servers.
  • Migrating “worlds” between servers and data centers. Regularly worked with various data center staff to address hardware issues, request reimages and reboots.

Confidential

Linux Engineer

Responsibilities:

  • Provided engineering consulting to application teams developing and deploying Linux based technologies in the enterprise.
  • Responsibilities included development of technical documentation, deployment of new servers, assisted application teams in sizing Linux environments, including project to migrate SAP from AIX to Linux technologies. Worked with external and internal vendors/consultants to manage the design and deployment process.

Confidential

Confidential engineer

Responsibilities:

  • Responsibilities were to write a system whereby the open source Confidential -core system was incorporated redundancy and failover.
  • Created a system using a series of scripts where if a Confidential server fails, all checks are migrated to a backup Confidential server, the IP's are changed on the backup server (due to the dependency on NPRE) and the checks would pick up on the secondary server.
  • This solution also allowed for monitoring “roles” to be migrated between slave Confidential servers without disruption.

Confidential

UNIX Consultant

Responsibilities:

  • Responsibilities included building servers for multiple State of Texas agencies. As a member of the build team, created processes to quickly deploy many Linux Servers simultaneously.
  • Deployed physical machines and VMs on a regular basis.
  • Many of the systems deployed were boot from SAN in either Confidential or Confidential Linux.
  • On a few occasions, also built Windows 2008 servers.
  • Responsibilities also included traveling to remote offices of various State of Texas agencies to provide onsite support.

Confidential

Responsibilities:

  • Responsibilities included supporting the Confidential engineers as related to Confidential Hardware and Confidential Linux on production networks. Provided patch management, custom RPM's, and repository maintenance.
  • Designed Autoyast build process to cover various server roles on various enclaves in the network. Built a standalone CD and process to generate CD's on demand based upon the current Autoyast installation. This was useful when deploying to environments that were not connected to the Confidential network.
  • Develop Confidential plugins for Confidential client (Comcast) to monitor and report on the Confidential Zimbra mail system.
  • Engineered the Development environment for the Phoenix Project. Deployed an environment consisting of Confidential Linux 10.2 and 11, Oracle Unbreakable Linux, VMWare ESX 3.5 with VSphere and VMotion, and Confidential Enterprise Linux 5. Created Autoyast and Kickstart processes for these environments. Implemented system monitoring via Confidential and Cacti, created various Confidential plugins to monitor VMware statistics. Responsible for firewall security, OpenVPN, and HA.
  • Supported a development environment of Confidential Linux, WebSphere, ATG, Confidential Storage Works, Blade Systems, and LDAP

Onsite Consultant

Confidential, Eagan, MN

Responsibilities:

  • Served as the interface between Confidential, Confidential, and Confidential for various technical and management issues. Worked closely with all levels of the Confidential engineering team to solve issues or satisfy requests as needed. Escalated issues to level 3 Confidential support or to Confidential directly.
  • Created and documented scripts, rpms, and procedures to be used by Confidential . Engineered a process to merge the process of updating Opsware from the Confidential SMT server. Remotely support a standalone development environment located in Colorado Springs.

Confidential

Systems Engineer

Responsibilities:

  • Supported Linux/Oracle Manufacturing Environments. Acted as a project consultant to application teams recommending the appropriate Linux configuration or solution according to established Confidential Standards.
  • On-call production support of Confidential Manufacturing Systems. Script automated installs and configurations. Wrote configuration management scripts and processes to manage approximately 2000 servers. Served on the reliability engineering team.

Confidential

Solaris Systems Manager

Responsibilities:

  • Provided day-to-day operational support of Solaris 9 and 10 servers. Updated existing documentation and provided “gap” support until full time employee is hired.

Confidential

Linux Admin / Disaster Recovery

Responsibilities:

  • Monitored and recovered Linux servers during a 96 hour disaster recovery tests. Followed up with documentation to improve the disaster recovery procedures.
  • Defined an automated server build process for development, disaster recovery, and production by combining Confidential kickstart and external scripts to prepare servers to the desired configuration.

Confidential

IT Director

Responsibilities:

  • Responsible for developing, implementing, and supporting solutions to meet the company’s business goals.
  • Provided support for the existing production environment of approximately 70 servers.
  • Standardized the environment to a single Linux distribution ( Confidential 10.1). Standardized the development environment to Confidential 10.1 with Tomcat and Eclipse. Implemented an opensource groupware solution (EGroupware).
  • Optimized the Confidential monitors to be “intelligent” in the way it sends alerts by creating shell scripts to query systems via SNMP, DNS, etc. Built a second data center with 2 Confidential Blade Centers (17 LS20's) running Confidential 10.1, JBoss, Apache, etc. connected to an ISCSI EqualLogic SAN.
  • Implemented openHA high availability. Created a method of applying SVN version control Linux configuration and deployment.

Confidential

Owner / President

Responsibilities:

  • Confidential Technologies was a technology service provider servicing clients with enterprise level technology support and solutions nationwide.
  • Responsible for planning and executing projects for many clients on a broad range of technologies.
  • Provided remote management of Windows and Linux servers. Responsible for maintenance of service packs, periodic security audits. Maintain WatchGuard Firewalls and Microsoft Exchange Email Systems.

Hire Now