Sr. Windows Enterprise Systems Engineer Resume
SUMMARY:
Looking for a challenging and exciting position in Information Technology as a Windows Server Engineer, Windows Security Engineer or Server Admin to join and become a part of the team. Furthermore utilizing and enhancing my knowledge, skills and expertise to grow within the company.
TECHNICAL SKILLS:
Operating Systems: Windows Server 2016/2012/2008 , Red Hat Enterprise Linux 4/5, Ubuntu and CentOS
Virtualization: VMware ESX 6.0/5.5, ESXi, Veeam Backup, Confidential Hyper - V, Vmotion, Vsphere, Vclient, Confidential System Center Virtual Machine Manager (SCVMM), Failover Cluster Manager and Confidential Hyper-V Manager
Storage Technologies: Storage Area Networks ( Confidential Filers FAS 3270/EMC VNX 5500), Network Attached Storage ( Confidential EVA 8000, Dell Equallogic, Qumulo Shared Storage)
Miscellaneous: Active Directory, DHCP, DNS, Cisco UCS Manager, Group Policies, Confidential Systems Center Operations Manager (SCOM), SCCM, Amazon Web Services (AWS), Comvault Galaxy Backup, Veritas Backup Exec, Confidential NetBackup, Remedy Case Management and Change Management, Unitrends Enterprise Backup, Pfsense Firewall
PROFESSIONAL EXPERIENCE:
Confidential
Sr. Windows Enterprise Systems Engineer
Responsibilities:
- Migrating technology and confidential data between various sites involving virtual machines running Windows server 2016 and Windows Server 2012 using manual Robocopy and Windows Powershell scripts
- Performed firmware and BIOS updates on VMware hypervisors running VMware ESX 6.0 and 6.5. This was part of scheduled maintenance on Las Vegas Confidential Corp Confidential Acropolis Production and QA clusters. Maintenance involved scheduling Service Now Change Requests, attending weekly CAB meetings, Email notifications and hands on work on Windows and Linux virtual servers
- Assisted in implementing monthly Patching of Windows servers using Confidential SCCM (Systems Center Configuration Manager). Worked on recent Intel Spectre/Meltdown vulnerability by applying windows patches and critical updates on physical and virtual servers (including File Servers, Application, Database and Exchange servers)
- Configured Software Deployment packages and Windows updates packages thru SCCM 2012 Configuration Manager. Integrated Confidential Deployment Toolkit (MDT) in SCCM 2012, to push out Windows OS Images to application, development and Test servers
- Scheduled maintenance downtime using Service Now Incident and Change Management for configuring Dell IDRAC on physical standalone servers located in Mountain View, Sydney and Bangalore. IDRAC configuration involved creating DNS records, DHCP reservations, getting IP information and cabling servers to patch panels and access switches
- Created BOM’s (Bill of Material) for Application and Exchange Production servers involving working with vendors (including Confidential and Dell), doing research on server hardware specs(for memory, processors and storage) and requesting quote updates from vendors
- Provided Operational support for Confidential ’s Production environment by attending 5 day Peak Tax season war room in San Diego corporate office. Work involved hourly updates on Total Email count, running commands on Linux servers using Putty to report performance of Top 4 hosts and daily progress updates to Production team and Management
Confidential
Sr. Windows Systems Administrator
Responsibilities:
- Worked with Confidential Backup Exec 7.5 and 7.6 with regards to adding master and media backup servers, creating backup policies, restarting backup jobs and troubleshooting failed backup jobs. Performed test restores for Tape Backups and worked on Backup to disk with EMC Data Domain
- Installed and configured Remote Desktop Services including connection broker and web access gateways on servers running Windows Server 2016 R2. Added various roles and features to support VDI deployment with Remote Desktop Services
- Worked on backing up Active directory data including system state on all the domain controllers for California and New Jersey
- Migrated virtual infrastructure including clusters, hosts and VM's from Vcenter server 5.1 to Vcenter Server 5.5
- Worked on configuring Active Directory integrated DNS zones for California and New Jersey domains and fixed issues related to multiple DNS records
- Built new Primary and sourced Backup virtual servers for Unitrends Enterprise Backup (UEB) and configured backups. Enabled replication among 2 servers and created .vhd’s using Powershell commands
- Created new scopes for various subnets and configured DHCP server on server running Window Server 2016 R2. Configured load balance failover for DHCP cluster
- Upgraded Citrix Xen Desktop infrastructure from 7.6 to 7.13 including upgrading Provisioning servers and Delivery controllers. Created master images for Accounting, Purchasing and Medical departments for rollout of VDI static desktops based on Nvidia GPU computing
- Configured Veeam backup on server running Windows Server 2012 R2 to configure backup jobs and schedules for virtual servers. Added new virtual machines to existing jobs and recalculated storage
- Added new Domain Controller to existing domain and configured DNS replication on server running Windows Server 2016 R2. Worked on backend storage for servers which was on ISCSI SAN and had ISCSI initiators
- Created new volumes and aggregates on Confidential 6280 Filer and provisioned storage for HLab Application servers. Installed EMC powerpath on servers and initialized the allocated disks
- Logged into EMC VNX 5500 and gathered support logs to fix the down node on EMC Centera. Connected to EMC Centera using unisphere to run diagnostics on various nodes
- Worked on managing reporting for package deployment in SCCM 2012 using configuration manager
Confidential
Windows Security Engineer
Responsibilities:
- Worked with Mcafee E - Policy Orchestrator (EPO) in fixing compliance issues for production servers. Remediation of pattern updates with regards to DAT versions and HIPS versions
- Participated in weekly Patching of Test and Production servers running Windows Server 2012 R2 using Altiris (SMC - Confidential Management Console) for security updates and hotfixes
- Worked extensively on compliance scorecard hardening security on virtual machines running Windows Server 2012. Pushed out agent updates and definition updates using Mcafee EPO. Created new security policies and modified existing policies for Database and QA servers
- Created task sequences using .Wim file in SCCM 2012 using configuration manager and created Boot images for PXE boot of
- Windows OS Images. Added NIC and video drivers for x86 and x64 boot images
- Worked on weekly emails for compliance scorecard for issues related to SNMP failures, CPU, memory and disk usage alerts
- Built new physical and virtual servers running Windows Server 2008 and Windows Server 2012 R2 Enterprise 64 bit
- Added additional ESX hosts running VMware ESX 5.5 to existing Vcenter Server using Vsphere client and configured replication of virtual machines using vsphere replication
- Managed Server monitoring environment using Nimsoft Nimbus monitoring. Installed nimbus agents on several Application and QA Production servers and configured modules for different robots including CPU, memory, disk, network and other application related modules
- Modified existing admin scripts using Powershell to change admin passwords on Application and Database servers in Production environment
- Worked with IT Manager with regards to the implementation of Server Refresh program to upgrade the old testing and production servers in the environment
- Maintained server and workstations logs for security, network and application issues arising out of testing and production errors on the floor
- Added various different folders and configured permissions for groups and individual users on SFTP server using secure FTP
- Configured blade server profiles using Cisco UCS manager in terms of Storage, networking and capacity for server provisioning
- Worked with various Cisco tools including EMAN, Active Directory Account Manager (ADAM) and Onramp (Group access to shared resources) to remediate server access and location for physical and virtual servers
- Worked with Windows 2012 Remote Desktop Services to login into Jump hosts to connect to various servers located in different sites for the issues related to Activeclient SSO (Single Sign On) Smartcard authentication
- Worked with Remedy Incident Management to solve and troubleshoot incident tickets for Server Engineering Group including but not limited to issues related to access and backend storage for virtual machines
Confidential
IT Lab Administrator
Responsibilities:
- Physical and Blade server provisioning using Windows Deployment Services (WDS) for MTC located in Mountain View center. Servers used in environment including Dell Poweredge 1850, 1950, 2970, 3950, 805 and 900, Confidential Proliant DL 380, DL 480, DL 580, BL 680
- Building physical and virtual infrastructure for POC engagements, Strategy Briefings, and Active Design Sessions (ADS) for various vendors, partners and customers
- Fine-tuned SCOM 2007 by upgrading all management packs including Active Directory, Exchange, IIS and SQL servers. Created new management groups to administer alerts on various activities for servers
- Managing virtual clusters and hosts using Confidential SCVMM (Systems Center Virtual Machine Manager). SCOM Systems Center Operations Manager, SCCM (Systems Center Configuration Manager) and Systems Center Orchestrator
- Created scripts using Windows Powershell to automate the Production environment by deploying the same scripts on virtual servers to upgrade VMware tools
- Working extensively on showcasing Windows 7 and upcoming windows releases on several tablet PC’s, Slates and Ipad based computing
- Storage provisioning to physical and virtual servers thru Confidential FAS 3270A and FAS 3270B Filers and EMC SAN (Clarion and Symmetrix VNX 5500) comprising of 60TB of storage
- Worked on Flex Fabric 10 GB converged network technology by Confidential on the blade infrastructure for Ethernet and SAN provisioning for servers. This was done on Confidential c7000 enclosure blade chasis
- Network Administration and management in terms of VLANS, Tunneling and LACP configuration on Confidential and Cisco Ethernet Switches. Moved physical and virtual servers between different VLANS to accommodate client engagements
- Installation, Upgrades and Administration of Brocade SAN Switches in terms of Aliases, Zoning and Configuration for storage provisioning for physical and virtual servers
Confidential
Windows Server Administrator
Responsibilities:
- Participated in the data center decommission and migration from California to Tucson, Arizona in terms of server decommissioning, un-racking, and shipping
- Migrated user’s data among different windows servers for data center migration project. Mapped shared drives for user data after data migration. Data migration was done using tools like Robocopy/Richcopy and scripts as well
- Wiped servers according to company standards using DOD Wipe (Gdisk32.exe) as part of Server decommission process. Shipped USB drives to other data center containing encrypted data
- Worked with VMWare ESX 3.5 VIC client to monitor virtual machines running SQL and IIS servers in a clustered and non clustered environment. Performing various tasks on virtual machines including configuring SQL parameters and IIS website publishing jobs and IIS security
- Decommissioning of physical and virtual servers (dedicated and shared web servers) in order to put existing usable servers into GAP Pool and retire old servers from pool to manage data center inventory. Servers included Confidential Blade servers Proliant BL 50, and BL 680, and Dell Poweredge M1000E
- Worked as a GAP Analyst to support internal customers with SOW’s (Statement of Work) regarding new server builds (Win32bit and Win64bit, clustered and standalone, physical and virtual), existing server upgrades, Admin access, Active directory OU creation, and AD group creation
- Worked on Confidential EVA 4000 and Confidential EVA 8000 NAS to provision storage for physical and virtual servers using Brocade SAN switches. Switches included Brocade 300, 400 and SG 48000 Silkworm Chasis FC 24 4G Switch
- Installed Windows Server 2008 R2 Enterprise on 2 new Systems Center Configuration Manager (SCCM) servers and created collections on SCCM 2007 servers
- Participated in On-Call rotation for GAP team to work on customer’s critical issues including application upgrades, patch management, GIL(Global Information Link) updates, database service pack upgrades and patches, and IIS upgrades
- Monitored GAP Design Inbox on monthly basis to work on tickets related to alerts with regards to disk usage, CPU usage, memory usage, webusage reports. Also responding to emergency tickets created by application groups for server down, reboots and hardware failures
Confidential
Backup/Windows Administrator
Responsibilities:
- Worked with multi domain infrastructure and moving physical dedicated, physical shared and dedicated virtual servers from one domain to second domain in order to better support customer environment with integrated applications
- Worked with VMWare VIC sphere client to monitor virtual machines running SQL and IIS servers in a clustered and non clustered environment. Performing various tasks on virtual machines including configuring SQL parameters and IIS website publishing jobs and IIS security
- Decommissioning several physical and virtual servers (dedicated and shared web servers) in order to put existing usable servers into GAP Pool and retire old servers from pool to manage data center inventory
- Worked as a GAP Analyst to support internal customers with SOW’s (Statement of Work) regarding new server builds (Win32bit and Win64bit, clustered and standalone, physical and virtual), existing server upgrades, Admin access, Active directory OU creation, and AD group creation
- Participated in Monthly outage to patch Hyperion HFM servers with new patches, upgrades and GIL options panel required and mandatory updates for servers located in San Ramon and servers located in Houston (including physical and virtual servers)
- Participated in On-Call rotation for GAP team to work on customer’s critical issues including application upgrades, patch management, GIL(Global Information Link) updates, database service pack upgrades and patches, and IIS upgrades
- Monitored GAP Design Inbox on monthly basis to work on tickets related to alerts with regards to disk usage, CPU usage, memory usage, webusage reports. Also responding to emergency tickets created by application groups for server down, reboots and hardware failures
- Worked with IGS Team to build new server build process, move servers from one rack to another, putting in tickets for LAN drops, putting in tickets for network configuration and working with new process of Windows 2008 Server clustering
Confidential
IT/System Administrator
Responsibilities:
- Worked with Confidential Systems Center Operations Manager to monitor servers including servers in Citrix Farm, Exchange Clusters, VM Ware servers and SQL Clusters
- Fine tuned SCOM 2007 by upgrading all management packs including Active Directory, Exchange, IIS, SQL and virtual server support as well. Created new management groups to administer alerts on various activities for servers
- Decommissioned old Confidential 3000 and Confidential 5000 net servers from Data Center and installed Avocent KVM switches for remote management using console port and ILO
- Worked with Citrix Presentation Server 4.0/4/5 to reset user sessions for various distributed applications including Misys Radiology, Picis, EPIC and SRC patient records application
- In Active Directory, created new users, groups and distribution lists in multi domain infrastructure with one way transitive trust relationship. Created exchange mailboxes for users and moved mailboxes among several exchange servers based on standard naming conventions
- Racked several Confidential and Dell servers in Data center with regards to power, network and console cable management
- Worked with Remedy 8.0 in resolving IT Server Operations tickets and work orders. Worked with several vendors including Confidential to provide after hour support for application upgrades, hardware repairs and scheduled reboots
- Participated actively in On-Call rotation of Server Operations group to provide off hours support for medical application servers including Dictaphone and Voicemail
- Participated actively in Change Management Process to schedule regular and emergency changes for maintenance, reboots, patches and upgrades
- Carried company provided blackberry and laptop to remote in thru Citrix for application management and support. Created roaming and terminal services profile using Active Directory and Citrix
- Managed internal Confidential support web site and configured ftp site for in house and outside vendors
- Supported production, engineering and storage operation groups using Active Directory and Terminal Services.
- Managed Distributed File Systems on file servers and configured NTFS and share permissions
- Monitored Confidential Proliant servers with Confidential Insight Manager and Integrated Lights Out (ILO) management system in terms of hardware change, memory thresholds, system temperature, and system health and process management.
- Worked closely with Operations Team to create and coordinate various change requests for downtimes to perform regular maintenance on web servers and application servers
- Installed and upgraded several Operating Systems including Windows Server 2003 Standard, Windows Server 2003 Enterprise, Red Hat Enterprise Linux ES, Red Hat Enterprise Linux AS, Cisco Enterprise Linux 4.33 and 4.34
- Managed ticketing system using Remedy client to reflect the activity, priority hrs worked and resolution status
- Installed Confidential Proliant servers including but not limited to DL 380, DL 380 G2/G3/G4, DL 580, DL 585
- Configured Catalyst 4948 and Catalyst 6500 switches with multi modules for public and private networks. Created vlans for different departments within production teams for their project related lab environments.
- Upgraded firmware revisions, BIOS releases, Support Packs and Remote Management software and patches on Confidential and IBM servers.
- Configured hardware RAID and software RAID using SCSI and Ultra Wide SCSI hard drives in Windows and Linux environment.
- Assembled Racks with regards to PDU’s, servers, rail kits and supporters and moving the racks with regards to their location in data centers