Identity Management, Active Directory, Virtualization, Infrastructure Engineer Resume
SUMMARY:
- Sr. Window Systems Engineer with over 20 year’s progressive experience engineering, implementation, system design and development.
- Combine strong analytical, troubleshooting and technical acumen with solid leadership, project management and team - building skills to consistently deliver productive technological solutions.
- Proven history to commitment to the bottom-line objectives and professional achievements.
- I have designed new environments as well as re-design existing environments.
- I have also maintained and supported the environment after setup and implementation.
- I have designed and supported Client/Server architectures that spanned multiple states, countries and continents managing well over 500K endpoint geographically dispersed during my profession career.
- I have been working with Exchange since v 5.5 and have participated and helped to migrate thousands of users from 5.5 to 2003, 2003 to 2008, 2008 to 2010 from 2010 to GMAIL, and 2010 to O365 using tools like quest migration manager or internal migration tools such as the migration wizards in Gmail and O365.
- My primary focus in Exchange is authentication points (Site design) for all end users. Most recent project was setting ADFS and Azure AD Connect to facilitate the migration from On-Prem Mail into 0365 Cloud Services utilizing SSO.
- I have been working with Directory Services since Microsoft’s launch of Windows 3.51nt up to it’s current release, Windows 2012r2.
- I have designed, redesigned, engineered, re-engineered, implemented and migrated multiple domain structures from a flat domain structures with a single domain to flat domain with multiple disjoined domains, to root empty domains and a single child forest, to root empty forest with multiple forest/domain.
- I have managed very complex directory service designs that needed little to no effort, to domains that needed total reorganization of users and its objects within directory services.
- I have consolidated upward 3000 sites, reducing replication sites, site links and adjusting cost utilizing Microsoft best practices and standards.
- My migration, consolidation and engineering efforts have been in private, public and DoD models.
- I have been working with Virtualization technologies since Windows Virtual Server evolved to Windows Hyper-V.
- Utilizing Hyper-V, I have implemented standalone and clustered technologies.
- I started working with VMware ESX v2.5 in 2002 through v6.1, utilizing production and Disaster Recovery environments.
- Latest environment utilized HA and upgrading from 5.5 to 6.1. I am a member of a two-man team responsible for the design and architecture as well as support, maintenance and upgrades.
- I have been working in Microsoft Azure for the last 3 years providing PaaS and IaaS services for 3 years supporting and extending customer compartments that are migrating into HP’s VPC.I have enjoyed my career utilizing HA and business continuity, COOP, disaster recovery, and risk management processes.
- It has allowed me the opportunity to see my design come full cycle, from implementation to availability.
- I have designed HA solutions Provided analysis to government agencies focusing on standardization, internal control systems, and contingency of operation procedures, crisis management, and compliance of federal regulations, risk management, and maintenance of plans.
- As a Directory Service engineer with 20+ years, I really wanted implement and deploy more to IdM projects, full life cycle, as it seems a natural order of progression to my career.
- I have been working within Identity Management field for the 3 +years, learning IdM implementation tools and processes.
- I have established multiple ADFS claims and trust establishing SSO login.
KEY SKILLS AND KNOWLEDGE:
Cisco Networking
NetApp
Microsoft
VMware
Hyper - V
Citrix.
Active Directory Migration
Identity Management
Rights Management
Role Based Access Control
Hyper-V Clustering
Microsoft Active Directory
LDAP
Identity Management
Active Directory Migrations
RBAC, Role Based Access Control
Azure AD Connect
SAML 2.0
Smart Card Access and Design
Certificate Authority Design.
HSPD12 Design Deployment practices
Migrated from NT4.0 to 2000.
Migrated from 2000 to 2003r2.
Migrated from 2003r2 to 2008r2.
Migrated from 2008r2 to 2012r2.
Microsoft Hyper-V 2008r2 and 2012r2
VMware 4.0, 4.1, 5.1, 5.5 and 6.0
Azure Cloud Services
Amazon Web Services
System Center Virtual Machine Manger 2008/2008r2 /2012,2012r2
Exchange 5.5, 2000, 2003, 2007,2010 to O365
Lync 2013, Skype for Business
Communicator
SCOM
SCCM.
WDS
HPSA
Windows Update Server
Shavlik
Desktop - XP, Vista and 7
Server- NT 4.0, 2000, 2003/2003r2, 2008/2008r2, 2012, 2012r2 and Presently 2016
REDHAT
Sun Solaris
Linux.
VMware ESX
CISCO, UCS
SQL, Oracle
Compaq, Dell, Cisco, NetApps, EMC and Confidential brand
WScript, VB, VBS, PowerShell
Office, 95, 98, 2000, 2003, 2007, 2010 SharePoint and Groove.
ITIL V3, Foundations.
CMMI
Agile SCRUM
PROJECT EXPERIENCE:
Confidential
Identity Management, Active Directory, Virtualization, Infrastructure Engineer
Responsibilities:
- Team Lead and Primary Active Directory Services Engineer.
- My Team managed Enterprise solution that scaled 17 Datacenters and 20 countries.
- I have designed, lead and supported HP’s ADDS initiative. (VPC). Thru 8 versions.
- Directly responsible for managing over 300K users and endpoints daily.
- My AD Designs were used and implemented across the VPC design.
- Written rapid deployment scripts to assist with customer automation process.
- Installed and configure System Center Suite for multiple customers.
- Duties included providing technical assistance to support multiple on-Prem offerings.
- Redesigned multiple replication topologies using Microsoft best practices for site design.
- Performed multiple migrations from FRS to DFRS for VPC customers.
- Redesigned Multiple DNS Namespaces, joined and conjoined for VPC customers.
- Served on a 3-man ranger team to resolve tier 5 resolutions for all HP customers.
- Supported VPC and Hellion team of 2,000 employees for 500+ customer contracts.
- Migrated multiple domain structures from Windows 2008r2 to Windows 2012r2.
- Provided training and support for HP IT staff and customers after process changes.
- Established multiple Windows trust to VPC customers.
- Managed Patch levels using HPSA for customer VPC offering’s across, Dev, test and Prod.
- Installed and configured ADDI DNS on customer deployed compartments via PowerShell.
- Installed and deployed DHCP reservations via PowerShell using. csv’s files.
- Designed and Implemented Windows 2012r2 AD Flat domains.
- Wrote and tested all Migration practices used by customers to move into VPC.
- Designed and implemented multiple Windows 2008r2 to 2012r2 Hyper-V clusters.
- Designed and Implemented the automation of security groups via PowerShell.
- Designed and Implemented the automation of users via PowerShell scripts and .csv files.
- Designed libraries to support and store images and templated used by VMM
- Instituted monthly maintenance policy, involving the performance host servers.
- Designed a rapid deployment process using P2V methodology and SCVMM2012/R2.
- Managed multiple virtualization platforms to include, VMware, Hyper-V and Citrix
- Installed and configured AGPM 4.02 and 4.03 to manage and monitor production changes
- Designed and implemented HP’s Policy on Establishing Customers boundaries in the VPC.
- Installed and Configured MTA. Design touched 100’s of DC.
- Upgraded Multiple Certificate Authorities from Win2K3 to Win2K8 and Win2012r2.
- Reduced GPO deployment by 65%, utilizing baseline and incremental best practices
- Configured Webfocus and IBM Kenexa ADFS trust to support HP related projects.
Confidential, Herndon, VA
Virtualization SME/ Sr Systems Engineer/ Manager
Responsibilities:
- Defined and Outlined All Best Practices to deploy VMM
- Implemented (4)3 Node Windows 2012 failover cluster used in multiple Environments.
- Implemented /configured System Center Virtual Machine Manager 2012 for Inf. Fabric for Private Cloud management.
- Implemented VMM Self Service Portal to service developers and reduce admin points
- Created RBAC model for VMM Self Service Portal.
- Designed Libraries to support and store objects used by VMM.
- Pushed All VMM Agents to All Host servers
- Set up and Configured cluster host to perform Live Migration.
- Assisted in the Installation and Configuration of SCOM 2012 Sp1 installation.
- Configured and Tuned monitors in Scom 2012 for SCVMM 2012 alerts and reporting.
- Created the VMM Lifecycle and retention Policy, Governing the Virtual Solution cleanup.
- Implemented VMST 3.0 to manage Geico Offline Vm’s.
- Promoted to Manager, responsible for all Corporate resources.
- Upgrade Windward’s Internal domain from 2k8r2 to 2012r2.
Confidential
Active Directory Architect/Virtualization SME/Project Engineer
Responsibilities:
- AD Team Lead/Architect for Usvisit domain redesign.
- Responsible for Active directory 2008 r2 redesign and domain restructures
- SME for VMware 5.1 Administration of SFE project, labs; Dev, Non Prod and Test.
- Implemented QAS for Active Directory. Adding 150 UNIX Servers to production.
- Implemented role based control model to administrate Multi domain/forest solution.
- Redesigned security groups and access control model for UsVisit project.
- Implemented Best practice for the deployment and management of Directory Services.
- Centralized the management of 700+ 2003/2008 and Unix Servers.
- Extended the Single Sign-On functionality to all Red Hat Clients/Servers using QAS
- Designed and implemented conjoined 08 forest/multi-domain models.
- Designed and implemented new OU and rights model using Delegated rights wizard.
- Solutions Design Document Lifecycle Process. (SDLC)
- Responsible for deploying 2 * 2 Node Windows 2008 failover cluster services.
- Extended HSPD-12 Two Factor Initiative for Usvisit Design, Using Smart Cards and certificate based authentication.
Confidential
Active Directory Architect/Virtualization SME/Project Engineer
Responsibilities:
- ADDS Team Lead Architect.
- SME for implementation of 50+ Hyper V Host and 4, 4 Node Hyper V Clusters
- SME for VMware Datacenter Upgrade.
- SME for System Center Suite Installation 2008 SCVMM, OP Man and Con Man, TO
- Manage Hyper V Parent Host and domain environment.
- Restructured and elevated multiple Domain
- Decommissioning 2003 domain services.
- Collapsed Wins and implemented GNZ (Global Named Zones)
- Designed and implemented the Quest Active Roles V 6.7.0 and 7.0
- Using Quest, implemented a Role based access control model (RBAC) for 20K users.
- Centralized the management of 2500+ 2003 /2008 hyper-v server with SCVMM R2.
- Designed and Implemented Quest Active Recovery manager for Active Directory.
- Implemented Quest Access Manager for permission management across the Platform.
- Leveraged high availability for hyper-v technology to support critical servers and apps.
- Implemented Best practice for the deployment and management of Hyper-V servers.
- Solutions Design Document Lifecycle Process. (SDLC)
- Tech Lead, providing growth and direction for application and infrastructure teams
- Designed and developed HSPD-12 Two Factor Initiative for agency wide installation
- One of 3 Lead Engineer for Exchange Mail Migration to Google (Cloud)
Confidential
Active Directory Architect/Virtualization /Team Lead/Tech Lead
Responsibilities:
- SME for Hyper V design of the HIM Solution.
- SME for SCVMM 08 R2 Installation and Data center consolidation
- Responsible for deploying 6 * 10 Node Cluster environment and Migration datacenters
- SME for Active directory windows 2003/2008 domain restructure.
- Manage tickets assignment, work request and problem escalation.
- Provide Technical support and on call duties for a 24*7 Operation shop.
- Redesigned several disjoined namespaces, Windows 03/08 forest (s)/domain(s).
- Designed Conjoined 08 forest/multi-domain model using multiple migration techniques.
- Designed and Implemented new ADI DNS Topology for the new domain model.
- Collapsed Wins and implemented GNZ (Global Named Zones)
- Migrated newly acquired companies into our new MMS domain model.
- Designed and implemented the role based access control model (RBAC) for 20K users.
- Centralized the management of 2500+ 2003 /2008 hyper-v server with SCVMM R2.
- Implemented a Raritan KVM / ILO Lights out infrastructure spanning two datacenters.
- Leveraged KMS and MDT to accelerate server deployment and activation.
- Leveraged WSUS v2, v3, Ops Man07 for HA and management of the virtual environment.
- Leveraged high availability for hyper-v technology to support critical servers and apps.
- Implemented Best practice for the deployment and management of Hyper-V servers.
- Solutions Design Document Lifecycle Process. (SDLC)
- Tech Lead, providing growth and direction for application and infrastructure teams
- Team was responsible for infrastructure support for 20k users and 80k IIS service users.
- Worked effectively with all levels of management ensuring on time delivery of services.
Confidential
Team Lead
Responsibilities:
- Responsible for the Solutions Design Document Lifecycle Process. (SDLC)
- Redesigned the Windows 2003 R2 Active Directory Infrastructure Proof of Concept.
- Designed Windows 2003 R2 64 Bit Single forest/Single domain structure.
- Implemented RBAC model that spanned 17 windows 2003 R2 sites for 50K + users
- Installed and configured 3rd party Authentication Tools (LDAP) by Quest.
- Extended the Single Sign-On functionality to all Red Hat Clients/Servers using Vintela.
- Responsible for the design and implementation of storage, backup solution.
- Implemented VMware ESX 3.5 to support design.
- Co-Designed and implemented an Enterprise Monitoring Solution using NetIQ.
- Responsible for the design of the support lab to test all deployment scenarios.
Confidential
Team lead
Responsibilities:
- Responsible for the Solutions Design Document Lifecycle Process. (SDLC) for upgrade.
- Active Directory team lead for the Windows 2003 R2 upgrade and Operations group
- Provide Tier IV support for the engineering and operations groups.
- Designed, tested and deployed the Windows 203 R2 DC upgrade for the Confidential Domain.
- Deployed 288 geographically located Airport DC’s Sites for a Government Client.
- Designed and Implemented, DNS and Wins Topology.
- Designed and implemented AD new replication model.
- Standardize infrastructure using Microsoft best practices across environments.
- Helped reduce TCO, by reducing DC deployment Schedule, saving 58K.
- Developed Green Process to reduce, power consumption, and discard of old equipment.