Technical Consultant Resume
3.00/5 (Submit Your Rating)
Fairport New, YorK
SUMMARY
- Experienced UNIX/HP - UX and Linux Systems Engineer. Self-motivated, listener, excellent problem solver and collaborator, strong scripting and programming experience, customer-centric focused, time management, interpersonal communications, detail-oriented, hard-working, open to challenge, eager and willing to learn and take on new tasks, solid team player, and ability to participate in cross-functional initiatives.
- Automated Regression Testing.
- Experience working in a virtualized Linux environment
- Perform system and mysql database backups and recovery.
- GIT, Subversion/SVN, and RCS Version and Configuration Control Management.
- Automate common and repeatable tasks/processes via Ansible and shell scripting.
- Excellent problem solving, Interpersonal communications, and Hard-working.
- Self-motivated, Solid Team player, and Open to challenge.
- Willingness to learn and take on new work/tasks.
- Linux Internals.
- HP-UX Internals.
- Linux/HP-UX Down Systems, and Crash Dumps Analysis.
- Linux Containers (LxC) and KVM.
- Linux server hardening/security.
- Linux Cgroups, Linux Namespaces, and Linux FileSystem Virtualization.
- Securing/hardening web-servers (Apache, Nginx) with HTTPS forward secrecy and ModSecurity.
- Extensive experience with Linux/Unix shell scripting (ksh, bash, Perl, Python, sed, awk).
- Logical Volume Manager (LVM)
- Filesystems and LVM Volume Snapshot
- HP-Ux Veritas Volume Manager (VxVM)
- HP-UX Veritas Cluster Volume Manager (CVM)
- MirrorDisk/UX for host-based software mirroring
- Storage Area Network (SAN)
- Cloud Computing using OpenStack
- Parallax Virtual Private Server (VPS)
- TCP/IP Stack and Networking applications using BSD sockets
- Client/Server system management applications
- Relational Database Management System Design (RDBMS)
- Internet/Intranet Applications
- Confidential PA-RISC and IA Architectures, System Interrupts, and Crash Dumps Analysis
- High Availability ServiceGuard Cluster (MC/SG)
- High Availability ServiceGuard extension RAC (SGeRAC)
- High Availability ServiceGuard Cluster File System (SGcFs)
- High Availability ServiceGuard extension SAP (SGeSAP)
- High Availability ServiceGuard Extended Cluster (XDC)
- High Availability ServiceGuard Metro Cluster (MC) and Continental Cluster (CC)
- HP-UX Containers (formerly Secure Resource Partition - SRP)
- System Performance Tuning
- HTML5, j Query, and AJAX scripting
- HP/HPE Virtual Partitions (vPars)
- HP/HPE Virtual Machine (HPVM/IVM)
TECHNICAL SKILLS
- Linux (RedHat/CentOS, Debian, Ubuntu, Gentoo, SuSE), HP-UX, Windows Confidential PA-RISC/9000, Confidential IA64, IBM PC and Compatibles
- C, C++, Java, Perl, Swift, JavaScript, SQL, Python, Shell Script (sh-posix, bash, Korn shell)
- Oracle RAC/OPS, MySQL, PostgreSQL, Redis, SQLite
- ServiceGuard, SGeRAC, SGCFS, HA Monitors, MC, CC, SGeSAP, CRS, VCS
PROFESSIONAL EXPERIENCE
Confidential, Fairport, New York
Technical Consultant
Responsibilities:
- Performed system requirements analysis and validation of 32 VMWare guests servers as required by Confidential Enterprise ServiceGuard for Linux (SGLX) High Availability cluster software
- Installed, re-validated, and configured all 16 ServiceGuard for Linux (SGLX) High Availability clusters (2 nodes/guests per cluster) and packages (2 packages per cluster for the SAP ASCS and ERS instances).
- Created repeatable implementation plans for deploying the ServiceGuard for Linux (SGLX) clusters
- Designed and performed detailed ServiceGuard for Linux (SGLX) failover scenarios for the packages.
- Assist with clients to adjust customized scripts/applications applications to use ServiceGuard.
- Ensured proper startup, monitoring, and halt/stop of the SAP instances
- Tested, verified, and validated the startup, halting, and automatic failover of the SGLX/SGeSAP packages including the follow-and-push failover scenarios of the SAP NetWeaver instances ASCS/ SCS and ERS for GRC, BW, CAR, Fiori, ECC, SLT, and PO.
- Provide root cause analysis of failures/errors of the cluster and package configurations, startup, halt, and service monitors.
Confidential, Herndon, Virginia
Linux Hosting Platform Engineer
Responsibilities:
- Provided technical break-fix incidents support for the Linux hosting platform.
- Used the Atlasssian JIRA Service Desk ticketing system for managing escalation incidents and team projects for the Linux hosting platform.
- Troubleshoot Linux panics and hang issues on the hosting platform servers.
- Collaborated with Linux System Administrators to provide updates and upgrades to Linux (Gentoo and RedHat), MySQL, PhP/PHP-FPM, and WordPress.
- Developed scripts to restore single sites from WordPress Multisite environment.
- Provided root cause analysis of failures of the open-source hosting packages on the Linux platform and implemented remediation actions.
- Modified existing platform scripts written in perl for the startup and regression testing of the Virtual Machines (VM) for the web servers (Apache and Nginx) running Ruby, JServ, and Wordpress applications. The specific features of the above applications were automated via the perl scripts and sometimes done manually.
- Collaborated with teammates to maintain and monitor data files and system configuration via ansible to ensure data integrity.
Confidential, Pittsburgh, PA
Senior Professional HP-UX System Administrator
Responsibilities:
- Provided online and offline technical break-fix HP-UX incident (IN) support for Boeing and University of Pennsylvania Healthcare System (UPHS).
- Provided online and offline technical support for Boeing HP-UX Service Request (SR).
- Used Remedy IT Service Management (ITSM) ticketing system for managing UPHS incidents.
- Used Confidential Service Manager (HPSM) ticketing system for managing Boeing Incidents (IN) and Service Requests (SR).
- Performed HP-UX Operating System and HPVM/IVM installations and upgrades from versions 11.00 to 11.11, 11.11 to 11.23, and 11.23 to 11.31 (or any combination of those as supported by the target HP-UX release) using Boeing customized scripts/tools depending on the requirements by the respective Boeing system managers. All work involving the Boeing PII servers were strictly subjected to the SOX security guidelines.
- Performed HP-UX Operating System recovery via ignite-UX, kernel and application parameter tuning.
- Performed ServiceGuard cluster installation, configuration, and upgrades to the latest revision of 11.20 on the respective HP-UX versions.
- Troubleshoot and resolved issues in/out of the Confidential ServiceGuard clusters involving LVM volume groups, VxFS filesystems, package failover, and LDAP.
- Installed and enabled printers on the HP-UX print servers for both Boeing and University of Pennsylvania Healthcare System (UPHS).
- Using Boeing test scripts written in Perl, C, and ksh/bash to automate the installation and validation of the HP-UX core and application installation, patching, and upgrades. In addition, manually troubleshoot the installation+upgrades issues including recovering the system as needed.
Confidential, Fairport, New York
Business Critical Systems Technical Consultant
Responsibilities:
- Provided on-line and off-line technical support for the Confidential High Availability (HA) software namely MC/ServiceGuard, MC/SGeRAC (aka Mc/SG-OPS), MC/SGeSAP, Event Monitoring Service Hardware Monitors (EMS HW Monitors), Event Monitoring Service High Availability Monitors (EMS HA Monitors), Switchover, HP-UX, HPVM/IVM, HP-UX Containers (Formerly SRP), and Linux. Also provided technical support for the HA consultants in the areas of ServiceGuard, SGeRAC, and SGeSAP cluster configuration (including CVM in ServiceGuard & SGeRAC cluster environments).
- Troubleshoot/Analyzed down systems (with boot partitions being whole disk partition, LVM and/or VxVM) including boot failures, HPMCs, hangs, and panics. Troubleshoot HP-UX Trusted System and ACL related problems.
- Troubleshoot and implemented Disaster Recovery and Fault Tolerance for HP-UX systems using ServiceGuard Metro and/or Continental Cluster.
- Performed system installation, configuration, upgrades, and administration of HP-UX and Linux operating systems. Also used VxVM and LVM.
- Assisted other solution center peers to troubleshoot and resolve down systems (boot failures, hangs, panics), system crash dumps (online and offline crash dumps analysis), High Availability ServiceGuard clusters, Confidential Event Monitoring Service (EMS HW), and Confidential EMS High Availability Monitors ( Confidential EMS HA) software problems.
- Resolved complex business issues/problems where information may be incomplete or conflicting.
- Established policies to improve customer processes/satisfaction, provided expertise to functional teams, and participated in cross-functional initiatives.
- Wrote scripts in perl, bash/ksh, and javascript to help with my team's diagnostic and web servers.
Confidential, Mountain View, CA
Software Development and Support Engineer
Responsibilities:
- Performed investigation, analysis, design, programming and testing activities utilizing the Confidential development platforms and tools for SIDO/SD projects namely Osprey and RAPID.
- Provided on-line and off-line technical support for SIDO tools, Cus9K/SD and RAPID (Release And Publishing Information Depot)
- Performed Current Product Engineering (CPE) in collaboration with teammates, developing patch releases to provide bug fixes and enhancements for the Osprey and RAPID projects’ tools.
- Automated regression testing of the Osprey and RAPID project tools for processing the Confidential Software Distributor (SD) software depots/repositories and media (tapes and CDs) mastering of ISV software and documentation.