It Engineer Resume
2.00/5 (Submit Your Rating)
SUMMARY
- An I.T. security professional with seventeen - plus years of experience in Systems Administration, specializing in Linux/Unix and network security, with a proven record of accomplishment for analyzing and adapting to ever-changing IT challenges, while exceeding customer service requirements, demonstrating excellent written and oral communication skills, and working as an effective team player and leader that works to make sure everyone reaches the finish line together.
PROFESSIONAL EXPERIENCE
Confidential
IT Engineer
Responsibilities:
- Deploy and configure encryption and cryptographic key management solutions utilizing Confidential and Thales/nCipher HSM products.
- Collaborate with various teams such as engineering, networking, database administration, enterprise data management, enterprise architecture, data center operations, application owners, project management, compliance and information security to implement encryption solutions as well as implement data encryption.
- Coordinate with other teams to ensure high quality of encryption services.
- Implement enhancements to existing encryption technologies.
- Prepare encryption and key management related technical documents, manuals and guidelines.
- Perform encryption systems maintenance and provide support for daily operations as needed.
- Administer encryption infrastructure and operations to ensure 99.99% availability of the encryption infrastructure.
- Develop and maintain encryption metrics for security operations reporting using Venafi.
- Ensure that the central key repository is well-protected from malicious attacks.
- Document and maintain encryption standards in line with best practices and information security guidelines.
- Develop and maintain enterprise-wide encryption monitoring that ties into the MoogSoft dashboard.
- Develop and maintain assessment reports focused on assets with encryption dependencies.
Confidential, Dallas, TX
Cloud Services Engineer
Responsibilities:
- Securely deployed high-profile commercial and government customers to dedicated and shared certificate authority (CA) servers during key generation ceremonies.
- Lead vulnerability remediation efforts to ensure compliance with the security standards of our commercial and federal customers on VMWare, Linux and Windows server infrastructure.
- Worked to implement custom audit log feeds to the Arcsight SIEM.
- Implemented and assessed LDAP and LDAPS configurations for customers.
- Provided feedback on proposed and existing security posture, to ensure continual compliance with security policy.
- Learned and implemented Ansible, Docker, Python, and Atlassian tools to support the then new company automation initiatives.
- Automated several, labor-intensive processes, using Ansible, Python, and shell scripting. Through this effort, a minimum of a day’s work was condensed into minutes.
- Utilize Bash and Python to write and implement custom monitoring scripts for Nagios XI.
- Automated the build out of a new Entrust IdentityGuard (IDG)-based solution, using Ansible, that automatically creates, and configures virtual machines, and then installs and configures the Linux OS, and software for the application.
- Configured and maintained database replication solutions for high-availability of trusted applications.
Confidential, Irving, TX
Systems Administration Expert
Responsibilities:
- Architected and participated in proof of concept, and implementation of HP-UX P2V datacenter migration process, that resulted in a cost-savings of over one million dollars, using a combination of HP Ignite-UX, HPVM, Rsync, and IBM’s Softek TDMF product.
- Scripted basic monitoring website that can create itself from the input of a *.csv file of specified fields, which provided system statistics to several external application teams, that resulted in reduced time on outage calls for the sys admin team.
- Developed script that finds, remediates, and sends daily reports on rogue processes across managed servers.
- Participates in security audit task force that aggressively finds and remediates possible findings.
- Completed multiple build projects that involved end-to-end configuration of the HP enclosures and blade servers.
Confidential
Senior Systems Administrator
Responsibilities:
- Built out several environments for customers that facilitated secure mobile to mobile (M2M), NFC payment transactions for TSM customers, and OTA activations for LTE customers. These environments employed secure identity management, and the use of a proprietary reverse proxy setup.
- Participated as key custodian in customer encryption key ceremony exercises (PKI). This process served to securely transfer, or update customer keys for use in secure communications with third-party entities.
- Installed and configured LogRhythm SIEM platform for use in intelligent log analysis.
- Installed and configured Thales and Safenet HSM hardware.
- Periodically reviewed logging for system and network devices to detect any problems with configurations, infrastructure hardware, or to detect possible security-related incidents.
- Performed security hardening of server OS across the enterprise to ensure security posture is in-line with security standards, and to avoid audit findings.
- Assisted in the troubleshooting of customer VPN connectivity issues within the firewall.
- Identified several legacy “word of mouth” procedures and “tribal knowledge” and formally documented them to knowledge repository Wiki.
- Created system preventative maintenance guidelines for company use.
- Performed Spanning-Tree analysis for production environment to determine areas for network configuration improvements.
- Improved customer response time by scripting solutions common maintenance tasks to save time with server upgrades.
- Performed server hardware replacements in accordance with change management guidelines.
- Developed custom Netbackup reporting script to give a detailed view of backup status for each customer supported.
- Periodically validated failover configuration of hardware, VERITAS VCS cluster servers, and VMware VM’s using VMotion.
- Used P2V to virtualize old physical servers to reclaim hardware and improve data center efficiency.
Confidential
Sr . Systems Analyst, UNIX Systems Administrator
Responsibilities:
- P rovi ded on-call tier II and III sup port for multiple application groups, involving application upgrades, and 3rd-party software installation.
- D epl oy ed and sup ported Veritas (VCS) and MC Service Guard server clusters as part of large-scale.
- S etup and confi gured HP-UX syst ems for va rio us application groups using p hy si cal and virtua l (NPAR) ma chin es.
- Configured EMC, Hitachi, and HP EVA SAN attached storage using EMC Powerpath, LVM, and Veritas Volume Manager.
- Instituted secure methods of remotely patching servers using VNC and SSH tunneling.
- Managed user access, and provided vendor management and coordination for hardware and software issues.
- Scripted solutions that allowed PeopleSoft administrators restricted, privileged access to maintain web server functions without administrator intervention.
- Im pl ement ed and managed disaster recovery procedures, exercises, and documentation.
- Improved efficiency, availability, scalability and resource utilization by developing automation tools to replace manual, repeatable processes, which helped meet customer needs ahead of expected deadlines.