We provide IT Staff Augmentation Services!

Infrastructure Engineer Resume

3.00/5 (Submit Your Rating)

SUMMARY

  • Seasoned IT professional with more than six years of hands - on experience in Red Hat Linux system administration, AWS cloud computing, VMware, version control, ansible automation, docker containerization, infrastructure monitoring, user administration, system security, server builds, data center operations and application support.
  • Linux system administration. PLATFORM: (Redhat 6/7, Centos 6/7, Ubuntu)
  • AWS Cloud Computing
  • User administration using NIS and Red Hat IPA
  • Package management using YUM/RPM
  • Server builds using PXE and Red Hat satellite with customized kickstart profiles
  • Vulnerability management using McAFee foundstone
  • Servers security using Iptables, firewalld and SELinux
  • Storage management using LVM, parted and fdisk tools
  • Troubleshooting issues using netstat, traceroute, tcpdump, fsck, dig, ping, top, iostat and vmstat tools set
  • Understanding of network protocols like TCP/IP, UDP, DNS, DHCP, SSH, POP, SMTP, FTP, SFTP, HTTP and HTTPs
  • Monitoring using Nagios, SolarWinds and CloudWatch
  • Bash Shell Scripting
  • Configuration management using ansible
  • Virtualization using VMware ESXi 5.x/6.x
  • Continuous integration with Jenkins
  • Working with databases such as; MySQL, Maria Db, PostgreSQL, DynamoDB and Amazon RDS
  • Version control using Git
  • Working with AWS service such as; IAM, EC2, EBS, EFS, S3, ELB, Lambda, VPC, Transit Hub, SNS, CloudWatch, CloudFront and etc…
  • Installation and configuration of Apache/Tomcat webservers, LAMP Stack, Postfix, NFS, LDAP and Openssl certificate authority
  • System backups using Symantec NetBackup 7.7
  • SAN/NAS storage
  • Supported Cisco UCS, Dell and HP servers
  • Servers patching using opensource repos and red hat satellite repositories

PROFESSIONAL EXPERIENCE

Confidential

Infrastructure Engineer

Responsibilities:

  • Migrated Confidential on-prem virtual machines to cloud using AWS v-center connector.
  • Migrated application data from network storage to block storage.
  • Decommissioned UNIX servers and migrated applications to Linux servers.
  • Migrated applications from RHEL 6 to RHEL 7 servers.
  • Migrated data from on-premises to AWS S3.
  • Remediated vulnerabilities by applying patches and implementing no patch solutions.
  • Scheduled cronjobs and eliminated repetitive tasks.
  • Wrote ansible playbooks to deploy applications and push changes to thousands of servers.
  • Applied security patches to thousands of RHEL 6 and RHEL 7 servers for security compliance.
  • Configured PXE server with customized kickstart profiles for server builds.
  • Installed and configured Nagios master and registered clients.
  • Deployed apache and tomcat web application behind a load balancer on premises and as well as in cloud.
  • Upgraded physical servers enic/fnic drivers.
  • Racked, stacked, cabled servers and configured network switches in datacenter.
  • Deployed and configured docker containers for microservices.
  • Deployed applications with AWS services such as EC2, IAM, S3, EBS, SNS, SQS, RDS, CloudWatch, Amazon VPC and Elastic load balancer.
  • Defined pre/post patching procedures.
  • Created technical runbooks for applications and day-to-day operations.
  • Worked with automation team to create Jenkins jobs.
  • Installed and configured DNS caching servers.
  • Installed and configured postfix mail servers.
  • Created security groups in IAM for user management.
  • Implemented server hardening to meet firm’s security policies.
  • Defined SLAs for incidents and change requests.

Confidential

Linux Engineer

Responsibilities:

  • Supporting day-to-day IT infrastructure operations at Confidential .
  • Building DNS servers using bind on RHEL and Ubuntu servers.
  • Working on service now tickets (Incidents, changes and requested items).
  • Patching and upgrading Red Hat 6/7 Linux systems, providing user support, application support and system support.
  • Deploying servers such as DNS, DHCP, NTP, PXE, NFS, and FTP servers.
  • Creating LVM partitions and resizing volume groups.
  • Fixing filesystem errors with fsck and xfs repair utilities.
  • Monitoring the health of infrastructure using SolarWinds.
  • Installing packages using YUM and RPM.
  • Knowledge of Red hat Identity management (IPA) and Red Hat Satellite.
  • Automating tasks with Bash scripting and Ansible.
  • Writing ansible playbooks, running ad-hoc commands, creating roles and deploying applications.
  • Installing and configuring VMware ESXi hosts on bare-metal servers on premises. Enabling HA, DRS, creating clusters and datastores. Deploying virtual machines on ESXi host through PXE boot server using the customized kickstart profile.
  • Maintaining servers by working closely with the VMware team. Continuously monitoring the vCenter with vROPs. Using tools such as vMotion to migrate virtual machines between clusters.
  • Deploying EC2 instances on AWS using customized AMI images. Experience with S3 storage, Cloud watch, configured VPC and subnets in different regions on AWS. Taking snapshot of EC2 instances.

We'd love your feedback!