Systems Engineer Resume
Phx, AZ
SUMMARY:
Supporting UNIX/Linux VMs, physical servers and storage infrastructure as a systems administrator or solution architect.
EMPLOYMENT:
Confidential, Phx, AZ
Systems Engineer
Responsibilities:
- Confidential ServiceGuard Metro cluster package application rolling upgrades.
- Data migration from Confidential XP storage to Confidential 3PAR storage.
- VM and Physical server migrations from legacy Confidential EVA & XP storage to 3PAR.
- SAN fabric (Brocade) zoning / storage presentation from storage arrays.
- Patching servers, SOX auditing and reports.
- Ignite and Golden image creation for fast VM deployments.
- Setup and configuration of Confidential C7000 blade chassis with Confidential Virtual Connect.
- P2V migrations of legacy systems to SuperDome
- A lot of LVM work adding LUNS increasing LVOLS & F/S on UNIX & Red Hat.
- Logical Volume Management (LVM), Clustered file systems, shared Volume Groups. Creation and troubleshooting.
- LUN presentation from Netapp Filers to new physical servers and VMs.
- Confidential 3PAR provisioning, replication for remote copy of storage. Configuration of Virtual Volume Sets, Host sets.
- Rack & stack of new servers, C7000 enclosures, SuperDome and storage array installations.
- Performance tuning for Oracle Linux servers; sysctl, huge memory pages, etc.
Confidential, Orlando, FL
UX L3 Administrator
Responsibilities:
- Replaced the legacy rp3440 ignite servers and virtualized them on BL860 blades.
- Automation tasks via shell scripting (BSH, KSH).
- ServiceGuard updates. New VM clustering.
Confidential, Chicago, IL
Contractor
Responsibilities:
- Confidential ServiceGuard maintenance on the production Confidential - UX 11.iV3 servers.
- Configuring new storage - LVM configuration on Confidential -UX & Red Hat servers.
- Rolling out system patches to application servers and Confidential DB servers.
- Setup and configuration of Confidential C7000 blade profiles with Confidential Virtual Connect.
- Extensive shell scripting. (KSH, BASH).
- Built hundreds of Integrity & VMware Red Hat VMs for the Confidential Company.
Confidential, Orlando, FL
Contractor
Responsibilities:
- L3 Break/Fix on Confidential -UX and Red Hat, CentOS servers.
- Confidential ServiceGuard rolling upgrades on Confidential -UX 11.iV3, 11.23, 11.11 servers.
- Configuring new storage as presented from the SAN team; and subsequent LVM work on the Red Hat and Confidential -UX servers. Server builds using Ignite.
- Documenting procedures & training off-shore L1 & L2 Linux administrators.
- Performance tuning / troubleshooting PA-RISC / Itanium. Core dump analysis.
- Rolling out system patches, Confidential -UX physical and virtual server builds on Confidential blades. Confidential -UX container creation on virtual machines for Confidential -9000 legacy apps
- Data Protector 8.02 for backing up the DC windows, Linux and UNIX servers.
- Configuration of Confidential C7000 blade chassis with Confidential Virtual Connect
Confidential, Minneapolis, MN
Contractor
Responsibilities:
- Documentation of existing server and SAN environment.
- Middleware (Apache & Tomcat) and Oracle application support on C7000 chassis racked BL870c servers running HPUX 11iV3.
- Ignite/UX installation & updates. Created Golden Images of the production Confidential -UX servers and rapidly deployed a new test and QA environment on Virtual Machines with no down time. .
- Confidential ServiceGuard v11.20 maintenance on servers, Integrity Virtual Machines running Confidential -UX 11i.V3.
- Iptables modifications on RHEL 5.8, 6.2, 6.3 for programmers and Oracle DBAs.
- Logical Volume Manager (LVM) work on Red Hat RHEL 5.8, 6.2, 6.3.
- Designed a solution to migrate the “boot from SAN” Blade servers from Confidential ’s EVA storage to EMC without any down time.
- Writing shell scripts to automate complex procedures such as SNAP mirror volume groups exports & imports, shutting down Oracle and refreshing TEST and QA environments.
Confidential, Phoenix, AZ
Contractor
Responsibilities:
- Shell scripting for auditing tasks and user productivity.
- SOX compliance for the Bank’s RHEL servers.
- Patching and updates on Confidential DL380 servers running Red Hat Enterprise Linux.
Confidential, Phoenix, AZ
Solutions Architect
Responsibilities:
- Confidential servers, EVA storage and networking products.
- NetApp FAS and V class storage products.
Confidential, Phoenix, AZ
UNIX/Linux Administrator
Responsibilities:
- Remedy Help desk level 3 critical support break/fix.
- ILO configuration and remote administration on ML370 and DL380 Linux servers.
- NIS, Sendmail, Secure FTP. VMware ESX in a Confidential DL380 server environment.
- NetApp filers presenting LUNS via dual fabric A/B Brocade SAN.
- Rolling upgrades of ServiceGuard on rx6600 Confidential -UX 11.iV3 servers.
- Troubleshooting existing shell scripts and writing new scripts for automation.
- ASM Oracle raw volume multipath environment mapping back to NetApp. FAS3020 and FAS2040 filers under Data Ontap 8.0.
- NetApp deduplication, FlexCache, FlexShare (thin provisioning) SnapMirrors for backups and SnapClones for QA environment testing.
- Supporting application developers Tomcat and Apache Linux Virtualized servers.
- IBM FastT DS4100, DS8100 SAN storage under IBM’s Storage Manager.
- VMware ESX and Vsphere 4 for Linux deployment of virtual machines.
Confidential
UNIX/Linux Administrator
Responsibilities:
- Responsible for data consolidation and application migration to Red Hat servers.
- Itanium and PA-RISC Confidential -UX servers Confidential ServiceGuard vPar environment. iSCSI Aggregate/Volume/LUN presentation from the Network Appliance filers to the production and development PeopleSoft environment.
Confidential, Alpharetta, GA
Sr. Systems Engineer
Responsibilities:
- Deploying Confidential Storage works EVA (Command View EVA) and MSA Storage.
- Business copy, Secure Path, and OpenView Storage Area Manager Installations.
- Enterprise backup solutions using Confidential ’s Data Protector.
- Installing and configuring Confidential VLS Virtual Tape Libraries, Including deduplication.
- ServiceGuard clusters including SAP integrations (SGeSAP).
- Integrity Virtual Machines, Virtual partitioning (vPars and nPars)
- SAN switch zoning on Brocade and Cisco hardware.
- Migrations from Legato, TSM and other backup products to Confidential ’s Data Protector.
- Troubleshooting existing server environments including performance tuning.
- Building virtualized partitions (vPars) on initial nPars with Integrity cell based servers; Integrity virtual Machines deployment.
- Installing Enterprise Red Hat Linux on Integrity Confidential servers such as the rx6600 through version 5.2 using Kickstart PXE boot.
- TiCAP (Temporary Instant Capacity) memory and processor activation during varied server loads;
- WLM (Work Load Manager) for resources moved between virtual partitions.
- Ignite/UX including building “Golden Image” images for fast server recovery.
Confidential
UNIX Administrator
Responsibilities:
- Confidential RP-7410 MC/ServiceGuard clustered Oracle DB servers.
- LSI Logic E460 Disk Arrays and IBM FastT (DS4000) under Santricity and IBM’s FastT Storage Manager.
- Confidential SureStore (Brocade Silkworm) Fabric SAN utilizing Confidential ’s SecurePath.
- Developing DR (Disaster Recovery) procedures and documentation for the corporate servers and storage.
- Linux (Red hat) for PeopleSoft Application (tuxedo) servers on X86 servers.