We provide IT Staff Augmentation Services!

Subject Matter Expert/consultant Resume

3.00/5 (Submit Your Rating)

OBJECTIVE

  • Consultant, Project Mgr., S/w Eng. or System Administrator position. Looking to assist in midsize to large shop solutions.
  • Brings 15 years of Enterprise shop experience. Has a broad internal - knowledge of zSeries/z Systems derived from working several years at Confidential . Very proficient in z/VM, zLinux and zSeries shop-solutions.

TECHNICAL SKILLS

Areas of Expertise: z/VM, Red Hat Enterprise Linux (RHEL), SLES, zSeries I/O hardware architecture

Languages/Scripting: Bash, C, C++, HLASM ( Confidential Assembler), REXX, PL/X, Pascal, JCL, Java, SQL, VBJavaScript, HTML5, XML, IP Firewall rules/scripting, IOCDS

Middleware: WebSphere (WAS), DB2, Oracle, Tivoli Access Manager (TAM) and WebSeal, LDAP, IHS (HTTP serv.)

Management Tools: HCD, HMC, VMSES/E, SMP/E, SDSF, RACF/VM, DIRMAINT (z/VM), z/VM Bkup/Tape Mgr., Operations Mgr., z/VPS Velocity S/w, Omegamon, Sys. Automation for Multiplatforms, TCPIP, SSL and routing config.

Platforms/OS: Red Hat Enterprise Linux (RHEL), SLES, z/VM, z/OS (and Unix System Services), UNIX (Sun), Mac OSX, Confidential OS2, MS Windows, MS DOS; also some exposure to AIX (iSeries), VSE and Silicon Graphics

Hardware/Comm.: Confidential zSeries/z Systems (incl. s390/ESA), xSeries/System x (x86), RISC and CISC, Confidential and EMC Enterprise DASD, FBA/SCSI, Confidential ATL/VTS, SNA, VTAM, FCP, FICON/ESCON, HoD, HATS, PCOMM, PuTTy

Industries: Federal Government, Software Development, Engineering, Technology, Education, Medical, Research

Personal qualifications: Assertive individual who thrives in teams. Adapts to new tools quickly and efficiently. Strong inter-personal skills. Takes quality seriously and is comfortable working in high-paced, multi-department environments.

PROFESSIONAL EXPERIENCE

Subject Matter Expert/Consultant

Confidential

Responsibilities:

  • SME for a proof of concept (PoC) at SSA to determine if Linux on the zSeries EC12 platform (running on z/VM) would be a viable complement to their x86 Linux platform, as part of a directive to replace Solaris systems running high availability applications.
  • Analyzed design and platform infrastructure of current Solaris LDOM’s running the applications tested for PoC.
  • Provided strategic rationale for the PoC and scalability for high availability production implementation (including development and testing environments customized for the client).
  • Recommended options for vendor products (COTS) with respect to tools, security and performance measurements.
  • Assisted configuration of networking design for PoC and recommended options for implementation of many isolated application environments running in RHEL virtual machines.
  • Recommended storage infrastructure for PoC and future implementation, providing technical support and expertise in backup and recovery processes (as well as disaster recovery) for z/VM and Linux guest volumes/data.
  • Provided constant technical knowledge transfer, where appropriate, to SSA technicians of different subject expertise.
  • Installed and assisted hardware/software and configuration for the IOCDS, z/VM 6.3 and Linux -using RHEL 6.5.
  • Also assisted with install and configuration of vendor products; e.g. CA’s Top Secret for z/VM and Velocity’s zVPS
  • Provided technical support for defining, implementing, and refining the z/Linux guest cloning process.
  • Supported installation of WebSphere (WAS) and IHS, running on RHEL machines.
  • Assisted in performance tuning of z/VM, RHEL and WAS.
  • Recommended roles and methods for Linux cloning processes, security policies and change management based on clients’ current needs and future implementation.

Senior z/VM and Linux Systems Programmer

Confidential

Responsibilities:

  • Installed, configured and maintained secure RHEL (Red Hat Enterprise Linux) server environments for enterprise middleware and applications (e.g. WebSphere, TAM, DB2, Oracle, firewall security, etc.) that complied with US Federal Gov’t/DHS/GAO directives and NIST standards.
  • Provided technical expertise in the design and implementation of all z/VM and zLinux systems for OPM.
  • Led migration planning, installation, configuration and testing for z/VM operating system and its components.
  • Evaluated and recommended z/VM and Linux-related technologies to OPM management and staff. This includes new technologies and feature exploitation of virtualization, as well as keeping a focus on the consolidation of hardware and software costs in order to lower TCO.
  • Installed, configured and maintained middleware such as WebSphere (WAS), DB2, TAM, WebSeal, LDAP, IHS (HTTP servers) and Oracle. Participated in independent security audits to certify z/VM and Linux environments.
  • Worked on 24x7 continuous availability and high availability (application continuity) projects in z/VM, such as SSI (single system interface) and clustering z/VM + zLinux systems within a GDPS.
  • Provided technical leadership in the implementation of large scale, technically complex systems software/integration of z/VM and Linux technologies at OPM.
  • Migrated and upgraded Linux OS’s from SLES9/10 to RHEL5 and, later to RHEL6.
  • Performed z/VM and Linux conversions and release level upgrades using both completely new distributions of systems, as well as z/VM SES/E to upgrade specific components or related products. Experience installing PTFs, Linux RPMs and coding local fixes/circumventions.
  • Provided daily problem determination and resolution associated with client’s technologies by developing and working with new debugging tools and utilizing existing tools, sometimes on second/third-level z/VM systems.
  • Performed I/O configuration changes using HCD (on z/OS), dynamic I/O and LPAR configuration changes to HMC.
  • Installed and configured external security tool, RACF/VM, during z/VM migrations and upgrades; providing assistance to client’s Security Administrators in the implementation of external security policies, RACF/VM rule/resource creation and SMF logging for z/VM and vendor products.
  • Implemented and maintained Linux firewall environments and rules, as well as various RHEL security implementations required for proper certification of US Federal security policies (such as FIPS) and industry consortiums (such as NIST).
  • Wrote and implemented required z/VM software exits in Confidential Assembler (HLASM) in accordance with client’s system requirements.
  • Installed, customized, and configured z/VM TCP/IP with SSL to support the zLinux/VM LPARs within isolated Guest LANs using a layered DMZ firewall topography.
  • Performed migration of zLinux RHEL environments from IPv4 to IPv6.
  • Provided technical support to client’s Operations Staff and related-project application developers at OPM.
  • Utilized z/OS to perform some z/VM and Linux tasks in order to balance workload resources within the Sysplex and z/VM. Familiar with z/OS utilities, such as SDSF, WLM, SMP/E and use of JCL. Implemented HiperSockets, internal cross-system communications and CTCs between the z/OS and z/VM LPARs. Some MQ experience, albeit limited in scope.
  • Implemented and automated zVPS -performance reporting suite- in order to monitor VM guest resource usage related to zLinux VM guests and their application middleware. Use real-time monitoring tools to analyze performance issues and history report tools to document and process to z/OS analyzing tools, such as SAS.
  • Implemented z/VM tools for automated backups of specific or grouped minidisks allowing for greater flexibility and quick recovery. Also, implemented regularly scheduled backup automation using z/OS JCL and SNAP processing for DASD mirroring and regular tape backups.
  • Participated and led in the design, implementation and successful restoration of the client’s LPARs at an offsite location during OPM annual Disaster Recovery tests, recovering from mirrored data.
  • Provided technical documentation, planning and execution for z/VM, Linux and related-middleware for the annual Disaster Recovery test and any future declared disaster to OPM.

Software Engineer

Confidential

Responsibilities:

  • Worked in z/VM I/O development, programming mainly in Confidential Assembler (HLASM); however, sometimes exploited C/C++, Java, REXX, JCL, PL/X and Pascal. Experienced in z/VM environment- developing, implementing, and maintaining operating systems and subsystem exits in Confidential assembler language.
  • Exploited z/VM code and virtualization concepts to zLinux and new zSeries H/w in a volatile, mainframe vs. server farm climate.
  • Great knowledge of zSeries internals, specializing in I/O and networks. Assisted with several zLinux/VM Redbooks, regarding z/VM’s TCP/IP (IPv6), Virtual/Guest LAN.
  • Last projects included; iSCSI, HCD (for VM), FICON Coupling Facility support. Developed and designed a few z/VM Performance/Monitor/RMF projects and assisted in the testing of FCON/X, of which became z/VM PerfKit.
  • Co-developed and supported some of z/VM’s later I/O capabilities (Multi-Channel Subsystems -MCSS, parts of QDIO and iQDIO/HiperSockets, FlashCopy, SnapShot, FastTransCCW, etc.) in virtualization. This requires extensive knowledge working with zSeries H/w. Also, had minor line items in virtual storage and scheduling.
  • Assisted (with developers from Confidential Böblingen, Germany) in designing z/VM I/O driver capabilities to zLinux guests
  • Designed consolidation solutions for potential and existing Confidential customers with mid-size and complex shops
  • Designed and wrote many permanent fixes (APARs/PTFs), tests and circumventions.
  • Worked in I/O Service, performing Level 2 and L3 customer support: Analyzed, debugged issues and used VM dump tools to review core dumps. Sometimes, from other zSeries operating systems such as z/OS or VSE and components like VTAM. Performed GTF traces and other diagnostics on customer z/OS systems (native and as VM guest) in conjunction with simultaneous, z/VM or H/w traces. Component test, System Test exp.
  • Led and participated in critical-situation solutions, performing diagnosis (sniffer traces, dump review, trace traps, performance analysis and tuning, etc.); working directly with customers, vendors, and business partners.
  • Presenter and participant of several SHARE conferences. Presented Linux/VM-related automated data processing (ADP)/telecommunication subjects for executives, managers and customers of novice to expert-level knowledge.
  • Attended college fairs and performed professional recruiting for Confidential ’s Systems division.
  • Took initiative in meeting with Confidential Executives in order to address and help provide solutions and technical knowledge for a new generation of Systems Programmers and CIO’s. Suggestions from these small group discussions eventually advanced into a Global Services System Programmers ‘school’ for recent university graduates.
  • Helped promote internal developer meetings on resource management and future architecture planning related to z/VM, zLinux and zSeries H/w, in order to advance product development and marketing.

We'd love your feedback!