Aws Architect & Vpc Cloud Engineer Resume
TECHNICAL SKILLS:
- Network Operating Systems and Office Applications:
- Windows Server 2003, 2008R2, 2012 and 2012R2
- Windows 8.1 Pro (NT, 2000, XP, Vista and 7)
- Microsoft Exchange Server 2003, 2010 and 2013
- Microsoft SharePoint Server 2007, 2010 and 2013
- Microsoft Office 2007, 2010, 2013 and Office 365
- Microsoft Project Server 2010 and 2012
- Microsoft Visio Professional 2013
- VMware vSphere
- VMware Workstation 10
- VMware vCenter 5.5 and ESXi Host 5.5
- Amazon Web Services (AWS)
- VDI (Horizon)
- McAfee Endpoint Protection (e - PO)
- Symantec Anti-Virus Corporate Edition 10.2
- Webroot Spy Sweeper
- Windows Defender
- Symantec Client Firewall
- Microsoft SMS Server 2003/WSUS
- Altiris Deployment Server (DS)
- Altiris Notification Server (NS)
- Symantec GHOST Suite 2
- Microsoft SCCM 2012
- Octopus Deploy
- Cisco VPN Client & GoToMyPC
- Symantec PC Anywhere 12.0
- Remote Desktop Connection
- Citrix Assist
- Veritas NetBackup
- Symantec Backup Exec 12
- NetApp 7-Mode and CDOT 8.x
- Dell Compellent NAS
- Server & Network Health Monitoring:
- Zenprise
- What’s Up Gold (WUG)
- SolarWinds & IP Monitor
- HP System Management Homepage
- Splunk
- SCOM
- New Relic
- Gomez
- Credant Mobile Guardian 5.1.5
- WinMagic
- ActiveSync & Windows Mobile Device
- Blackberry Enterprise Server 4.1. & 5
- Outlook 2003, 2007, 2010 and 2013
- Lotus Notes 9
- Office Communicator & Lync 2013
- Cisco Unified Communications
- SQL Server 2005, 2008 & 2012
- Informatica
- WebMethods
- Crystal Reports
- Confidential Remedy ARS 7.6 and 8.1
- Confidential TrackIT
- SNOW
- TSRM
- WinRunner and Test Director
- NetCheck Protect 5.8
- Aports & Belarc Advisor
- SuperScan, NMAP FE & Nessus Client
- What's Changed
- Install Watch
EMPLOYMENT HISTORY:
Confidential
AWS Architect & VPC Cloud Engineer
Responsibilities:
- Architected the entire AWS virtual environment from Concept to Development to Production.
- Implemented DoD Standards by applying STIGs to the AWS virtual EC2 instances.
- Registered all AWS Web Domains using Route 53.
- Used OpenStack with AWS for enterprise management purposes.
- Created multiple Virtual Private Clouds (VPC) within the domain.
- Associated Elastic IPs with VPCs for the connectivity of our nodes via RDP.
- Initiated VPC Peering Connections for those VPCs authorized to talk amongst each other.
- Spun and configured multiple EC2 server instances using Windows 2008 R2 and Windows 2012 R2.
- Enabled a .PEM (Key Pairs) for strengthened security into our AWS Environment.
- Created fresh AWS Haystack Web/Application Servers.
- Provision AWS Storage via AWS S3 for various computing groups within our environment.
- Took EC2 Volume Snapshots for routine backups and archiving.
- Utilized Load Balancers for the EC2 nodes working as IIS Web Servers.
- Made use of Launch Configurations for repeatable EC2 Auto Scaling Templates.
- Worked with the Networking Team to create VPN Connections from AWS to the physical Data Center.
- Incorporated NAT Gateways for Private IP Address/Subnet connections.
- Put OpsWorks to use for the Application Developers to automate and manage their apps.
- Monitored all EC2 instances and applications via CloudWatch.
- Provided faster server deployments already configured and ready using CloudFormation templates.
- Archived all environment data in the form of a vault using Glacier as our SAN so to speak.
- Through RDS used SQL Server as the environment database of choice.
Technologies: AWS, S3, EC2, VPC, RDS, Route53, Direct Connect, Haystack, Windows 2008 R2, Windows 2012 R2, SQL Server 2012, OpsWork, CloudWatch, Cloud Formation, Docker, OpenStack, VMware, ESXi Hosts, vCenter, vMotion, Active Directory, IIS and Remote Desktop (RDP).
Confidential
NetApp Resident Consultant, Washington, DC
Responsibilities:
- Lead Architect for SiriusXM’s new “ Confidential Project” which will improve listening for 28M subscribers.
- Helped set - up and configure the new FAS 8020 filers in the DC Production Center for “ Confidential ”.
- Also set-up and configured the new “ Confidential ” 8020s for New Jersey and Atlanta offices as well.
- Created SVMs, Aggregates, and Volumes to filter the new musical content.
- Upgraded OnCommand Unified Manager (OCUM) from v6.1 to Version 6.3.
- Upgraded OnCommand Performance Manager (OCPM) from v1.0 to Version 2.0
- Sanitize, remove and replace failed NetApp hard drives.
- Used Virtual Storage Console (VSC) to quickly interact functionality between VMware and NetApp
- Utilized VMware Horizon desktops (VDI) to access my NetApp storage are in the Data Center for day-to-day administration.
- Developed SnapShot Schedules for data redundancy across multiple U.S. locations.
- SnapMirror Volume data on occasion for resizing efforts or placement onto new data shelves.
- Created HA Pairs and Clusters for 100% data availability and operational uptime.
- Upgraded Filer, ACP and Disk Shelf firmware as needed based on NetApp Best Practices.
- Maximized storage capacity and utilization on our DS4246 (SATA) and DS2246 (SAS) shelves.
- Made VLANs and Broadcast Groups for our Storage Virtual Machines (SVMs).
- Worked with Networking to capture optimal 10Gbps speed via trunking plus redundancy using LACP.
- Racked, stacked and cabled NetApp disk shelves in the Data Center from time to time.
- Performed test failovers.
- Designed rack elevation drawings using Visio and NetApp stencils for real-time illustrations.
- Completed weekly “Resident Activity Reports” for NetApp.
- Resize FlexVolumes as needed to increase storage capacity.
- Provision storage (thick or thin) based on the client’s needs for various applications.
Technologies: CDOT 8.2, 7-Mode, OnCommand System Manager, Putty, VMS, CIFS, NFS, Red Hat Linux, Windows 7 Enterprise, SnapManager, SnapMirror, SnapDrive, VMware, vCenter, ESXi Hosts, vMotion, vSphere, VMware Horizon, VDI, Windows Server 2008 R2, Windows Server 2012 R2, Oracle, SQL, Hadoop and AWS.
Confidential
Sr. NetApp Administrator / Sr. Windows VMware Administrator
Responsibilities:
- Performed regularly Filer, Shelf and Disk Firmware upgrades to the latest NetApp proposed versions.
- Completed storage tasks using both Putty CLI commands and GUI-based OnCommand Manager.
- Resolved Incident, Problem, Change Request and Emergency Change Tickets for the client.
- Created, Deleted and Resized NetApp LUNs using SnapDrive.
- Added and removed certain NetApp licenses to enable or disable certain functions and features.
- Sanitize failed hard drives immediately to ensure internal data is never exposed or compromised.
- Perform Root Cause Analysis (RCAs).
- Built or expanded filer Aggregates based on the current IOPs reading to stay below the 10ms margin.
- Used PerfStat on occasions to track performance or latency issues.
- Broke disk ownership within HA Pairs and reassigned the disks to it’s partnering NetApp Controller.
- Set User Permissions and Controls on Windows Network Shares for domain users.
- Attended SWAT Bridge Conference Calls in case of customer NetApp Emergencies.
- Resized NetApp Storage Volumes as needed to stay below the 85% Utilization Warning.
- Coordinate with the NOC for NetApp visits for the delivery of replacement equipment and hard drives.
- Utilize my NOW (NetApp Support Account) for the latest upgrades and documentation.
- Developed Standards of Procedure (SOP) and other Technical Documentation
- Used SnapMirror to copy and transfer data.
- Interfaced with VPs and other high level Contract Officials for Board Approval of my storage changes.
Technologies: Red Hat Linux, Putty, CyberArk, Confidential Lotus Notes, ServiceNow (SNOW), Tivoli Storage Manager, SnapManager, SnapMirror, SnapDrive, 7-Mode and CDOT, VMware 5.5, vCenter 5.5, ESXi Hosts, vMotion, Storage vMotion, vSphere, NFS, CIFS, OnCommand System Manager, Windows 7 Enterprise, VDI, Windows Server 2008 and 2012 R2, Active Directory, PowerShell, SharePoint, Oracle and SQL.
Confidential
Project Manager
Responsibilities:
- Provided technical insight on the HP Enterprise Services ( Confidential ) A1A3: Confidential POD Move at DC2
- Served as the PM dedicated to managing the Data Conversion and Data Migration aspects.
- Ensured that Industry and Vendor Best Practices were being utilized and put forward.
- Met all deadlines, milestones and deliverables for the customer.
- Performed project planning and support services.
- Maintained a close technical and professional working relationship with Le-Arnold, Confidential, other Confidential contractors and Confidential ’s OED Engineering/Test/Operations Teams.
Technologies: NetApp, EMC, VMware, vCenter, VSC, ESXi, Cisco, Windows 8, Office 365 and Visio.
Confidential
Exchange Operations Center Security Analyst, Columbia, MD
Responsibilities:
- Monitor the security, health & uptime of Confidential 's Obamacare website at: Confidential
- Standup the Confidential Bridge so all teams supporting the website can report their progress, completion or any issues they encounter so we never experience any downtime from lack of communication.
- Maintain a rolling record of all activities in the Shift Log.
- Quickly try to resolve any SEV-1 or SEV-2 issues.
- Send out the daily Confidential GovDelivery Healthcare.gov notifications.
- Submit the “Activity Bundle” which is vital to all stakeholders and key contacts for rolling status updates.
- Based on ITIL Best Practices effectively use the Incident, Change and Problem Management controls.
- Research logs, user web activity and network traffic activity using Gomez, New Relic and Splunk,
- Participate in the Confidential Standup Calls.
- Watch a number of large screen monitors to explain possible spikes or high utilization issues.
- Work with other government agencies in support of the Confidential website such as the Confidential, Internal Revenue Service and Social Security Administration to discuss outages, upgrades, maintenance, fixes, etc..
Technologies: VMware, Splunk, Gomez, New Relic, Tivoli, ARS Remedy and Windows 7.
Confidential
Data Center Manager, Suitland, MD
Responsibilities:
- Served as the Infrastructure Environment Manager for the JPSS Project which is a collaborative program between Confidential and its acquisition agent Confidential .
- Created and submitted PCRs and ECRs for corrective actions to our JPSS Environments covering software discrepancies, image builds, network upgrades, VMware server builds, system patching, etc. Basically anything Change Management related I was involved.
- Submit “Weekly Data Center Status Reports” to teams on Current, Pending and Resolved technical issues I’ve personally discovered or had reported to me.
- On a daily basis work with Integration, Deployment and Testing Teams to ensure project progress.
- Oversee configuration, optimization, capacity planning, and troubleshooting of server systems.
- Personally inspect all JPSS Block 2 Data Center’s server racks for hardware failures, security breaches, unscheduled outages and other potential problems at least twice a day. (arrival and departure times.)
- Attend all daily Tag-Up and Ad-Hoc Bridge Conference calls to ensure SLAs, Deliverables and Deadlines are being successfully met and on pace.
- Produced Weekly System Monitoring and PMR Charts for Raytheon & Confidential officials.
- Work with Confidential point-of-contacts to ensure satellite data is synchronized and readily available 24/7.
- In charge of Waiver Approvals during Data Center Soft Freezes, Hard Freezes and Lockdowns
- In charge of all aspects of equipment deliveries and on-site installations within the NSOF Data Center.
- Ran JINX Reports to capture a status of environment nodes which are up or down. (Ping Report)
- Verified and updated Data Center Rack Drawings from hardware to cable audits.
- Maintained U.S. Government Standards and Data Center Best Practices.
- Ensured that all teams have what they needed from network access to Hardware to IPs to VMs, etc.
- Maintained .NET version consistency of our Confidential and proprietary applications via Octopus Servers.
- Key point-of-contact for all Data Center Shutdown/Startup efforts and Scheduled Maintenance.
- Coordinate various technical operations and communication across multiple outside military and government agencies. This also includes multiple I.T. Teams internally as well.
- Met with Vendors and Service Technicians for repair efforts.
- For data security degaussed all damaged hard drives.
- Produced Visio diagrams for both Site and Rack Elevations to make server, network and environment storage locations easily identifiable.
- Delegate work as necessary to all Systems Administrators for environment resolution.
- Oversaw all on-site Asset Management and Inventory Controls for the Prime.
- Audit any environment discrepancies and bring it to the attention of the System or Networking Teams.
- Maintain a running log of known issues and see that they are prioritized and delegated for resolution.
- Able to work collaboratively to create a results-driven, team-oriented workplace.
- Responsible for maintaining good client and vendor relationships.
- Analyze and document business rules, policies and other governance areas.
- Analyze, define, and document workflow and process flow.
- Coordinate with other projects related to SOA initiatives to ensure overall SOA compliance.
- Document processes, procedures, create user guides and training guides.
- Coordinate Service Oriented Architecture (SOA) Change, Incident and Release procedures.
Technologies: Confidential Q-Radar, Confidential Tivoli, Confidential Lotus Notes 8.5, Confidential Rational ClearCase, AWS, HP 3PAR Arrays, VMware 5.5, vCenter 5.5, ESXi Hosts, VDI, HA (High Availability), DRS, vMotion, Storage vMotion, SCCM, Windows 7 Enterprise, Windows Server 2003, Windows Server 2008 R2, Windows Server 2012 R2, PowerShell, Microsoft Office, Visual Studio, .NET, Octopus Deploy, Active Directory, DNS, SQL Server 2008, SQL Server 2012, Linux and Oracle.
Confidential
SCSM & SCCM Consultant
Responsibilities:
- Responsible for leading up Confidential new Change, Incident and Emergency Mgmt. processes.
- Generated custom workflows to automate the day-to-day Change Mgmt. Request (CMR) processes.
- Converted their international tracking operations over from Serena to SCSM for their CMRs
- Created User Guides and Training documentation.
- Using Octopus the applications in Production were identical in Testing for Developers to test against.
- Via SCSM I was able to create an easier and more robust Change Management alternative.
- Utilized SCSM’s Authoring Tool to create custom forms.
- Provided technical guidance to their SCCM Patch Management issues. (latency, failures, etc.)
- Attended in person meetings and Bridge Conference calls to discuss high level matters.
- Monitored enterprise servers/peripherals via SCOM..
- Constantly reviewing and revising technical documentation for process improvements.
Technologies: Serena, Confidential TrakIT, VMware 5.5, vCenter 5.5, ESXi Hosts, vMotion, Storage vMotion, SCSM, SCCM, Windows 7 Enterprise, Windows Server 2003, Windows Server 2008 R2, Windows Server 2012 R2, PowerShell, Microsoft Office Professional, Visio, Active Directory, Visual Studio, AWS, Octopus Deploy, DNS, SharePoint, SQL Server and SCOM.
Confidential
NetApp Storage Administrator / Level 4 Architect, Fairfax, VA
Responsibilities:
- In charge of all NetApp Storage Enterprise operations supporting the Confidential Project at SA-43 & APS.
- Via SCSM monitored and controlled all Incident, Change and Release Management to ensure uptime.
- Racked, Installed and Configured the FAS3270s and FAS2240s into Production for enterprise use.
- Totally redesigned the NetApp Storage Infrastructure from the ground up. (literally a complete overhaul)
- Wrote very high-level technical documentation for Government VPs in addition to created detailed Visio diagram workflows and Data Center Rack Elevations.
- Worked heavily in setting up the new Datastore Environments for the new VMware (VI) efforts.
- Utilized countless math calculations, formulas and storage calculators for creation of the right arrays.
- Performed FAS Controller upgrades from 7-Mode to CDOT 8.2. (versions 8.0.x and 8.1.x to 8.2.1)
- Created a standardized uniformity by upgrading all DS4243 SATA disk shelves to the same firmware.
- Based on IOPs estimations I was able to strategically offload heavy Confidential workloads onto the new controllers through successfully planned Aggregate creations and spindle performance counts.
- Cured problematic customer latency complaints by creating new and improved SQL 2012, Oracle, Citrix, VMware, SharePoint and Exchange Aggregates, LUNs and Volumes.
- Prepared all SAN backend configurations for our VMware environment.
- Designed Backup and COOP environment utilizing SnapManager, Snapshots and Snap Vault.
- Was able to move data on the fly internally using NDMPCOPY and SnapMirror functionalities.
- Configured iGroups (iSCSI Initiator Groups) for both our VMware and physical server environments.
- Made expandable Volumes via Thin Provisioning for VMware and thick provisioned Volumes for our Oracle and SQL 2012 databases.
- Implemented and utilized SnapProtect in our backup and replication process.
- Performed data migrations from SATA to both SAS and FLASH storage for faster IOP performance.
- Monitor NetApp network health and activity via SolarWinds Storage Manager and NetApp DFM.
- Provided shared drives to network users via NetApp’s CIFS and NFS protocols.
- Assisted in the Pure Storage design planning for our VMware upgrade from Version 4.1 to 5.5.
- Cured problematic latency and slow performance issues reported by the customer.
- Heavy VMware and NetApp reading and implementation of all industry “Best Practices”.
- Utilized deduplication for faster data backups and faster data restorations when needed.
- Used Lync for our inner-office chat tool to quickly collaborate over projects.
- Ensured data uptime using RAID-DP (fault tolerance) +2 configurations.
- Set-up new redundant environments by making our (2) 3270s and (2) 2240s run as HA Pairs.
- Worked heavily on data encryption and archiving.
- Utilized 256-bit RSA encryption tools for network access and secure data transmissions.
- For the Government VPs and the Security Teams I was able to convert conceptual designs and bring them to actual physical designs in both hardware/software environments.
- Environments and Applications were monitored and made equal via Octopus.
Technologies: Remedy ARS, VMware 4.1, VMware 5.5, vCenter 5.5, ESXi Hosts, NetApp Storage, 7-Mode, CDOT 8.2, SAS, iSCSI, RAID-DP, Fibre Channel, LUNs, Aggregates, HA (High Availability), DRS, vMotion, Storage vMotion, SAN, NAS, NFS, CIFS, Multistore, SnapManager, SnapMirror, SnapProtect, SnapLock, SnapVault, SnapRestore, OnCommand System Manager 3.1, Data Fabric Manager (DFM), VMFS-5, 7-MTT, DataStores, Linux, Windows 7 Enterprise, Windows Server 2003, Windows Server 2008 R2, Microsoft Office, Active Directory, DNS, Lync, PowerShell, AWS, SCCM, SCSM, SharePoint, SQL 2008, SQL 2012, Oracle 11, Visual Studio, Octopus Deploy, SCOM and SolarWinds.
Confidential
Sr. Data Center Engineer & COOP Administrator, Washington, DC
Responsibilities:
- Lead Point-of-Contact for the CIO and the OIG for technical matters involving the Confidential ’s COOP/DR.
- In charge of all of Confidential ’s data backups citywide for all 5 Data Centers.
- Served as the Lead Backup Exec 12 Administrator for Confidential using our Dell Storage Pools.
- Created Confidential ’s new Data Backup Standard of Procedures (SOP)
- Heavy use of SAN and NAS technologies for storage. (police surveillance, interrogation videos, closed circuit camera feeds, end-user home directories, VM Datastores, etc.)
- Configured the NetApp storage components and backend configurations for the new Cisco FlexPod.
- Worked heavily on encryption testing, deployment and monitoring.
- Utilized 256-bit RSA encryption tools for secure data transmissions in and out of the network.
- Converted conceptual designs into actual physical designs in both hardware/software environments.
- Developers were able to test Production level applications via Octopus for new patches/upgrades.
- Had to develop optimization standards for the NetApp storage in support of Test and Production.
- Made specialized LUNs, Aggregates and Volumes within the Cisco FlexPod to support not only VMware, Sharepoint, Exchange, Oracle and SQL. (databases and applications)
- Was able to manage both NetApp and Dell storage pools using OnCommand Insight.
- Designed Visio diagrams and Data Center Rack Elevations.
- Used NetApp OnCommand (GUI) and Putty (CLI) for day-to-day NetApp Administration.
- Ensured mission critical data stored on the NetApps were in an HA Pair configuration.
- Used NDMPDCOPY for “real-time” data transfers and SnapMirror for repository copies.
- Maintained Confidential ’s physical and virtual citywide Data Center inventory.
- Implemented and utilized SnapProtect in our backup and replication process.
- Utilized SnapShots for backups and used SnapVault for data archives.
- Ensured the FAS2240s were up-to-date with all updates and firmware as well as the storage shelves.
- Monitor system performance and troubleshoot failed peripherals citywide using SolarWinds.
- Virtualized and re-designed most of the Data Center through use of vCenter, ESXi hosts and P2V.
- Served as the Sr. VMware Administrator for the Data Center handling all aspects of virtualization.
- Converted older servers and workstations into VMs via P2V using vConverter.
- Simplified the network environment by departmentalizing VM Servers to specific ESXi hosts.
- Used vSphere 5.5 to access vCenter 5.5 which was a GUI overview of the entire network’s VMs and ESXi Hosts.
- Able to maintain vital Data Storage uptime in case of an emergency using Storage vMotion.
- Performed data gathering, fact finding, technical recommendations and submit vendor quotes.
- In charge of Confidential Headquarter and UCC hosted servers for Monthly Microsoft Patching.
- Responsible for creating numerous new Standard of Procedures (SOP) for Confidential to adopt and enforce.
- Avoided downtime and unscheduled outages via SCSM through controlled Incident, Change, Asset and Release Management.
- Serve as the Lead WSUS/SCCM Administrator in charge of all Microsoft server-related patch pushes.
- Developed official SCCM SOP (Standard of Procedures) for citywide patch operations. ( HQ, NOC, etc.)
- Designated as the SCCM point-of-contact for designing, testing and implementing upgrades into Prod.
- Key point-of-contact in the environmental replacement of Confidential ’s iLEADs application over to Mark43.
- Successfully provided both remote & onsite technical support.
- Configured Storage Pools using Dell Compellents for on-site Dev/Testing Environment server storage.
- Performed data backups (Full & Deduplication) on a daily cycle along with restorations when needed.
- Granted authorization for handling budget issues, purchase requirements and vendor relations.
- Implemented iDRACs on our Dell servers for remote management.
- Assisted with the creation of new Confidential citywide Print Queues for each district.
- Create and maintain documentation and diagrams on network infrastructure, hosting infrastructure and backup and network monitoring.
- Successfully performed application migrations from one server to another or performed upgrades of the current application version without disruption to daily operations.
- Worked independently as well as effectively with the Net-OPS Team.
- Support various teams (Application, Database and Confidential End-Users) by providing hardware/software support at the operating system, application and network levels.
- Actively participated in the one week on-call rotation.
- Maintained the Exchange and Lync Office Communicator Servers for internal conversations.
Technologies: NetApp, VMware, vSphere 4, vSphere 5.5, ESXi Server, VMware Workstation, vMotion, Storage vMotion, Data ONTAP 8, OnCommand Report, OnCommand Insight, Hyper-V, Project Server, Sharepoint 2010, Windows Vista Professional, Windows 7 Professional, Windows Server 2003, Server 2008 and Server 2012 R2, Linux, AWS, .NET, Visual Studio, PowerShell, Exchange Server 2007 and 2010, Microsoft Office Professional, Active Directory, SQL Server 2008, McAfee ePO, Cisco FlexPod, Confidential COGNOS, Remedy ARS, LPR, FilesOnQ, WALES, iLEADS, Shot Spotter, Octopus Deploy, AFIS, WINS, DNS, DHCP, Print Servers, Lync, WSUS, SCSM, SCOM and SCCM.
Confidential
Sr. Systems Engineer & Implementation Manager, Washington, DC
Responsibilities:
- Serves as the Implementation Manager on many Confidential enterprise-wide solutions both in physical and VMware virtual environments which effects 20,000+ users.
- Through Hyper-V (10%) and VMware (90%) we were able to create a recyclable virtual Test Lab Environment running on Windows Server 2008.
- In charge of all of Confidential HQ, HOC and NOC Microsoft Monthly Patching.
- Served as the Lead SCCM Administrator in charge of patching and patching notifications to the Confidential as a whole but specifically the GWO and NOC for maintenance window progress.
- Avoided downtime and unscheduled outages via SCSM through controlled Incident, Change, Asset and Release Management.
- Assisted in the development of the new Confidential SCCM SOP (Standard of Procedures).
- Designated as the SCCM point-of-contact for designing, testing and implementing upgrades into Prod.
- Created VMware machines for validation and testing purposes using vSphere.
- Through VMware templates we were able to create and validate POAM and FDCC for Windows 7.
- Member of Confidential ’s OCIO Surge Team. (government essential personnel)
- Member of the Confidential ’s Disaster Recovery/COOP Team in case of emergency.
- Nightwatch Manager at the HOC for Confidential Engineering Team.
- Migrated Windows Server 2003 Domain Controllers to Windows Server 2008 R2 Domain Controllers.
- Maintained the Exchange and Lync Office Communicator Servers for network chat communications.
- Performed various application migrations critical to enterprise Operations & Maintenance.
- Prepare and submit official government endorsed reports requesting upgrades, changes, fixes etc. in the form of Change Requests, Emergency Change Requests, Break/Fix and Implementation Plans.
- Operate as the Technical Liason for after hour issues that may impact GWO or the HOC operations.
- Submit Weekly Status Reports of progress and currently pending issues.
- Has headed up multiple I.T. Pilot Programs which turned into successful enterprise wide implementations.
- Utilize Project Server 2010 to stay on track with projects, milestones and deliverable schedules.
- Provide rotational weekly 24/7 coverage for all Operations & Management technical issues remotely.
- Attend Weekly Conference Calls (RAC & ICCB) for government presentation and approval of new technologies or current network modifications.
- Serving as the Technical Lead for Confidential ’ new Blackberry I.T. Policy Changes.
- Worked heavily on encryption testing, deployment and monitoring.
- Utilized 256-bit RSA encryption tools for secure data transmissions in and out of the network.
- Even used encryption tools like Credant for handheld mobile devices to prevent mobile intrusions.
- For the Government VPs and Security Team I was able to convert conceptual designs and bring them actual physical designs in both hardware/software environments.
- Enabled data masking for our highly sensitive back end areas. Upgraded Windows Domain Controllers from Server 2003 to Server 2008.
- Document step-by-step the baseline build and upgrade process as technical documentation.
- Upload, check-in and check-out documents in Sharepoint for enterprise sharing and revisions.
- Built and configured Project Server 2010 to stay aware of all assigned projects.
- Manage user accounts and maintain mail flow on the Confidential Exchange 2007 and 2010 Servers.
- Observe real-time Confidential network enterprise health from servers to routers using What’s Up Gold.
- Determine Confidential handheld, PDA and Blackberry health using Zenprise.
- Build, re-image and configure Dell servers with various OS versions for various Confidential site locations.
- Made the Symantec E-Vault Admin for backing up and restoring all archived e-mails.
- Perform a wide variety of Server Remediations in conjunction to security scan findings found by PVG (Patch Vulnerability Group).
- Has become the key point-of-contact for many vendors for software and hardware related issues.
- Involved with off-site Power Outages which includes bringing servers both down and up properly.
- Appointed the Oratio/Blackberry Technical Lead for handicap and hearing impaired gov’t workers.
- Back-up network data and schedule instances via Netback-up.
- Created Test Cases and formulated a Pilot Test Group to try new policy changes on and capture feedback and suggestions before rolling the policies into Confidential Production.
- Assigned to the Smart Card Read Pilot Team for Blackberry to integrate usage only with CAC Cards.
- Join and decommission servers from the network as needed.
- Perform OS Service Pack upgrades which require updates and validation of our Dell server HALs, BIOS, DRAC, NICs and video card firmware, etc. before performing the upgrade officially.
- Address and resolve all technical issues assigned in my Remedy ARS queue.
- 1 of 2 direct point-of-contacts for WinMagic keys and licenses for Confidential operating system encryptions.
- Able to rack and re-rack servers and control them via KVM.
- Performs hands-on system monitoring, troubleshooting, administration and maintenance.
- Generated product/cost comparisons to find the most advantageous and cost effective solutions for our client to improve their current I.T. environment.
- Knowledge of the U.S. Department of Homeland Security ( Confidential ) Enterprise Architecture standards.
- Knowledge of the Confidential Systems Engineering Life Cycle methodology.
- Familiarity with the complexities of working with the Confidential Data Centers.
- Virtualization saved the client thousands of dollars from having to buy all new hardware for testing.
- Work independently with minimal supervision.
- Verbally and physically interact with clients and users to maintain good working relations.
- Successfully meets scheduled deliverables, milestones and ensure proposed project deadlines.
- Very capable of being a team player.
- Known for working independently and efficiently.
Technologies: EMC SAN, VMware, Hyper-V, Project Server, Sharepoint 2010, Windows Vista Professional, Windows 7 Professional, Windows Server 2003 and 2008, Exchange Server 2007 and 2010, Microsoft Office Professional, Active Directory, SQL Server 2008, McAfee ePO, Visual Studio, Remedy ARS, Mobile Handhelds (Blackberry, Android and iPad), Linux, EVault, Zenprise, WSUS, PowerShell, SCCM and SCSM.
Confidential
Sr. VMware & ARS Remedy Engineer
Responsibilities:
- Served as the Development Project Manager on behalf of Confidential to Confidential and Confidential .
- Assigned to work directly with the Confidential Cloud Services Team on all DC1 projects.
- Staged an all new Remedy ARS Environment for the HSDN Network Environment inside Confidential ’s ( Confidential ’s) DC1 environment in Stennis, MS.
- Used SCCM to push our Monthly Patch cycles.
- Did the Provisioning for the new DSA. Confidential Remedy ARS environment using Remedy ARS version 8.1.
- Configured all host files, config files, ATRIUM SSO settings and more to create cross communications between the Remedy ARS Application Server, Mid-Tier and Database Servers.
- Installed vital Remedy ARS services such as Tomcat and other necessary add-ons.
- Restored SQL databases (.bak files) for Remedy ARS Database Server testing.
- STIG’d and hardened all Microsoft 2008 R2 VM Servers to meet all government security standards.
- Acted as the Technical Lead and liason between Confidential and the Confidential Federal Government VIPs.
- Upgraded/migrated the Remedy ARS application version 7.6 to 8.1 in a Test Environment.
- Stood up bridge conference calls with BMC, Confidential and Confidential to discuss and resolve all technical issues.
- Write vital “As-Built” documentation for the Confidential Data Center Administrators and the Security Groups.
- Performed System Validation Testing after the new environment passed Confidential Security Audits.
- Although hired by Confidential I was also asked to remotely assist Dell’s Wintel Team in the Stennis Data Center too to handle their Systems Administration issues as well,
- Utilized BMC’s vCenter 5 environment to maintain and operate their Confidential ’t client’s servers.
- Worked and communicated very well with others.
- Very capable of working independently considering I worked remotely 95% of the time.
Technologies: Remedy ARS, ITSM Suite, NAS, SAN, WebEx, VMware, vCenter, vSphere 4, vSphere 5, ESX Server, Linux, VMware Workstation 9, vMotion, Windows 7 Professional, Windows Server 2008 R2 and Server 2012, Exchange Server 2010, PowerShell, Visual Studio, Microsoft Office Professional, Active Directory, SCCM and Microsoft Lync.
Confidential
SME for FMIS Configuration/Security Specialist, Reston, VA
Responsibilities:
- Used VMware nodes to test application functionality on various OS platforms.
- Served as the designated FMIS Configuration/Security Specialist on the Confidential ’s ILMS Project.
- Utilize Project Server to stay on track with projects, milestones and deliverable schedules.
- Provide expertise and direct management of data in all phases of the Software Development Life Cycle.
- Kept all stakeholders and Government Subcommittees informed of progress against Service Level Agreements, Milestone Schedules and proposed Deadlines.
- Designed concept and developmental enhancements that would impact the Foreign Embassies and Business Units Asset Management for over 28 countries. (Vehicle Fleet Management)
- Sanitized the Oracle/Peoplesoft vehicle database through data normalization and logic mappings.
- Asked to conduct Peer Reviews of other team member’s work to ensure accuracy to client specs.
- Created test scripts for use in the TESTP environment before making official changes in Production.
- Utilized Sharepoint extensively for the uploading and retention of all formal documents, scripts, etc..
- Participate in various internal or client initiatives and may also serve as a Workflow Coordinator to arrange for work completion during peak processing activities.
- Used SCCM for to keep our images updated for testing.
- Establish knowledge of relevant processes and related systems to effectively perform responsibilities.
- Assist team members in the identifying, assessing and resolving complex issues and problems.
- Resolve non-standard/standard issues/problems largely on my own independent initiative.
- Perform data entry and research in various systems and tracking tools.
- Apply procedures to ensure accuracy of output and adopts continuous improvement approach.
- Monitor and maintain requests via request tracking system and ensures requests are completed in a timely manner.
- Established Disaster Recovery/COOP measures.
- Offer cost effective solutions or revisions that would control budget expenditures.
- Worked with external vendors, site personnel, shared services teams, etc. to complete work.
Technologies: VMware, WSUS, Oracle 10g/11i, EMC SAN, Project Server, Sharepoint 2010, Windows Vista Professional, Linux, Windows Server 2003 and 2008, Exchange Server 2007, Microsoft Office Professional, Active Directory, SQL Server 2005 and 2008, SCCM and Symantec Anti-Virus.
Confidential
Infrastructure Architect/Test Engineer, Reston, VA
Responsibilities:
- Asked to serve as the Technical Lead on numerous Engineering and Confidential /GOTS projects for Confidential .
- Designated as the Altiris point-of-contact for OS deployments and software distributions.
- Has tested over 400 Confidential /GOTS applications via Sanity, Regression and Exploratory Testing.
- Utilized Altiris to push PC/Workstation images via MAC Address throughout the network via PXE.
- Used SCCM to push application packages and Monthly Microsoft Patches.
- Pushed packaged applications in the Confidential environment via Altiris.
- Tracked network PC asset management using Altiris Asset Management Suite.
- Able to replicate physical testing through virtual testing via VMware. (our SAN stored the images.)
- Used VMware workstation templates heavily to test various government applications on a number of Windows XP and Window 7 images that would impact 40,000+ users at government agencies and airports.
- Used vSphere 4.0 as the configuration tool for creating new templates from the VMware Server
- Assisted in the implementation of getting all nodes up to FDCC and POAM compliance ready.
- Manage all users, computers, servers and peripherals via Windows Server 2003 Active Directory, Group Policy OUs, Symantec Anti-Virus Agents and Altiris Agents.
- Tested a variety of applications designed from an array of program languages such as: VB,, NET, .ASP, Java, Javascript, HTML, XML, Python, Perl, Basic, COBOL, Visual Basic and more.
- Made a key member of the “End User Test Team” to create the official Test Cases used for integration scenarios, client/server OS images, and application testing.
- Only Test Engineer assigned to be in charge of the Confidential 's vital TRX, TRM and ORM application for testing and certification covering all U.S. airport locations.
- Produce all formal test result documentation for Confidential Executives detailing the success, risks and failures of all proposed application and network design implementations.
- Effectively manage all Testers, Software Packagers and Network Engineers assigned to my Test Team.
- Successfully met scheduled milestones and their proposed project deadlines.
- Worked in Wintel and Linux/UNIX environments.
- Built and configured Project Server 2010 to stay aware of all assigned projects.
- Deemed responsible for preparing and staging the entire Test Environment with Confidential approved images 3.x and above for formal testing.
- Responsible for all wireless and VPN testing which includes Blackberry, Microsoft PDAs, cellular wireless cards, tethering and wi-fi.
- Assigned to handle all PDA security testing via Credant encryption implementations and monitoring.
- Worked heavily on encryption testing, deployment and monitoring.
- Utilized RSA encryption tools for secure entry and data transmissions in and out of the network.
- Even used encryption tools like Credant for handheld mobile devices to prevent mobile intrusions.
- Converted conceptual designs and created physical designs for the customer.
- Selected to oversee Confidential 's 20 top secret TOP Applications and work with their Developers and DBAs.
- Each month push new Microsoft Patches to all workstations and servers in the ITE Lab environment.
- Perform critical network Security Scans using specialized Windows/UNIX based tools to uncover potential hacker attack vulnerabilities, port intrusions and identify internal application TCP/UDP dependencies.
- Via teamwork successfully migrated over 50 Production and Data Center applications.
- Work directly with other teams such as the Developers & Packagers to enhance operations.
- Chosen as the direct point-of-contact for collaboration with Lockheed Martin in working on the TRX Airport Screening projects.
- Has served as the Technical Lead on such server projects involving Windows Server 2003, Altiris Server 6.8, Blackberry Server 4x, Symantec Anti-Virus Server 11, Project Server 2005, Live Communicator 2005, SABRE, Credant Server 5x, Cisco Unified Communicator and Sharepoint 2005.
- Migrated all active and passive Blackberry Enterprise Servers from Version 4.1.3 to 4.1.4 MR3.
- Validate software versions and repackaged application updates using Checksum verifications. (critical)
- Responsible for Disaster Recovery implementations.
- Determine hardware requirements and suggest OS standards for optimum performance and security.
- Performs hands-on system monitoring, troubleshooting, administration and maintenance.
Technologies: VMware, Altiris 6&7, Wintel, Project Server, Blackberry, Credant Encryption, Cisco Unified Communicator, UNIX, Windows XP Professional, Windows Server 2000, 2003 and 2008, Exchange Server 2003 and 2007, Linux, Microsoft Office Professional, Sharepoint, WSUS, SCCM, Active Directory, SQL Server 2005 and 2008, EMC SAN, SCCM, Remedy ARS and Symantec Anti-Virus.
Confidential
I.T. Consultant / Sr. Project Manager
Responsibilities:
- Responsible for all Fiscal Year Budget and Funding allocations.
- Key point-of-contact to approve or deny Information Technology hardware/software procurement requisitions and/or licensing.
- In charge of Administrative Affairs and all corresponding contract paperwork.
- Utilize ITIL Project Management principles and business system practices.
- Architect infrastructure designs that will improve our client’s overall operations.
- Make technical recommendations and provide vendor Price Quotes to begin conceptual overviews.
- Generate Daily & Weekly Status Reports to stay on track with all projected Milestones, Control Gates and Project Deadlines.
- Assigned the RFP, RFI and IFB lead for response writing for new contract vehicle opportunities.
- Ensure new contracts are created through the use of the company’s GSA Schedule 70 I.T. contract.
- Responsible for securing new business and clients.
- Manage, coordinate and direct over 250 Tier 1 Subcontractors.
- Make certain through E-Verify all employees, contractors and H-1Bs are legally eligible to work in the U.S. based on Confidential and Confidential standards.
- Successfully find new workplace improvements through the enforcement of 360 degree feedback.
- Develop SOPs (Standards of Procedures) for clients.
- Oversee invoice, payroll, health insurance and employee benefit functions.
- Run all necessary clearance, credit, employment, education and criminal background checks.
- Screen and interview potential candidates/employees.
- Create technical documentation for clients as a Knowledge Base.
- Construct network computing diagrams, rack elevations and more in Visio.
- Provide a host of technical services to clients from Project Management, Technical Lead roles, Virtualization (VMware), Storage Administration (NetApp, Dell, EMC), Systems Administration, Help Desk, Network Engineering, Database Administration, Citrix Farm Administration, Backup Administration, DR/COOP Site Development, Amazon Web Services (AWS) and so much more.
- Cut costly overhead for clients and reduce budget spending so they incur greater savings/profits.
- Maintain strong vendor relationships and negotiate the best deals and on-site proof of concepts.
- Created and maintained both Windows and Linux VMs.
- Used Splunk to analyze and monitor network traffic data for reporting.
- Watched peripheral (PC and Server) uptime via SolarWinds.
- Use SCSM are our Change Control utility.
- Use SCCM as our tool for Microsoft Monthly Patches and application broadcasts.
- Excellent communication skills both written and verbally.
- Fully committed to a project until it’s successfully completion.
- Created technical documentation both high level and general overview guides.
Technologies: Visio 2013, Project Server 2012, Windows 8.1 Pro, Windows Server 2008 R2, Windows Server 2012 R2, Exchange Server 2010, Sharepoint, Microsoft Office Professional 2013, Active Directory, SQL Server 2008, Remedy ARS 8.1, Linux, Symantec Anti-Virus, Splunk 6.2, WSUS, SCCM, Active Directory, DNS, Virtual Storage Console, SolarWinds, Remedy ARS, VMware 5.5, vCenter 5.5, ESXi Hosts, NetApp Storage, CDOT 8.2, SAS, iSCSI, RAID-DP, Fibre Channel, LUNs, Aggregates, HA (High Availability), DRS, vMotion, Storage vMotion, SAN, NAS, NFS, CIFS, Multistore, SnapManager, SnapMirror, SnapProtect, SnapLock, SnapVault, SnapRestore, OnCommand System Manager 3.1, Data Fabric Manager (DFM), VMFS-5 and DataStores.
Confidential
Informatica Consultant, Mechanicsburg, PA
Responsibilities:
- Designed disaster recovery and failover policies to ensure low-side/high-side continuity of operations.
- Communicate with contract officials with regards to productivity, status updates, and the direction.
- Assigned as the I.T. resource for all Informatica issues in PA plus given the task of training others.
- Create Server 2003 clusters in Active Directory environments for software/hardware redundancy.
- Administer DNS, TCP/IP, DHCP, WINS, VIP, and Firewall Security settings for project operations.
- Implement enterprise-wide application deployments to all designated Disaster Recovery/COOP environments.
- Assist in the Project Management and design of a new global payroll system that integrates all branches of the U.S. Military into one unified accounting system.
- Responsible for the build, hard drive array, RAID set-up, OS installation, configuration, testing, maintenance, and performance monitoring of all Windows Server 2003 nodes.
- Migrate new universes, DDLs, and codes as changes occur in the SQL, DB2, and Oracle databases.
- Handle the troubleshooting of all escalated issues both application and system related.
- Prepare in-depth failover technical documentation for input into the client’s LDRPS knowledge base.
- Revised and created technical documentation surrounding Active Directory, Security and Clustering.
- Communicated well with others.
- Built strong interpersonal client relationships.
Technologies: Informatica, Cisco Firewall, Oracle 9i, SQL Server 2005, DB2, Windows XP Professional, Windows Server 2000, Windows Server 2003, Exchange Server 2003, Sharepoint, Confidential COGNOS, Microsoft Office, Active Directory, VPN, SQL Server 2005, Visio 2003, Linux, Remedy ARS and Symantec Anti-Virus.