We provide IT Staff Augmentation Services!

Systems / Security Admin Resume

5.00/5 (Submit Your Rating)

TECHNICAL SKILLS

Operating Systems: Windows Server 2016/2012/2008 , 2012/2008 R2, Windows 7/8/10, Sun Solaris 8.0/UNIX/Linux/RHEL/Ubuntu, MacOS 7.5.x/X, Hyper - V, VMware 5.5 ESXi

Server Technologies: Active Directory 2012, DNS, DHCP, DFS, ADUC, GPO

Cloud Computing Services: AWS, Azure

Networking: Cisco routers, switches, firewalls, load balancers, VPN, QoS, PABX, wireless, VoIP, Email, HTTP, HTTPS, SSL, OSI Model, TCP/IP

Security Tools: Splunk, Nexpose, Fusion, Archer GRC, SIEM, DLP

Hardware: Servers, HP DL380 Gen 8 & 9, workstations, Cisco UCS, HP C700 Blade, SAN arrays, EMC, VNX, NetApp, NAS volumes, switches

Programming Languages and IDE: PowerShell, XML, VBScript, Jscript, Bash, Python, Perl, Ruby, Shell Scripts, Go, Agile, DevOps, Scrum, PL/SQL, TSQL

Source Control Management Software: Perforce, PVCS, Confidential Rational ClearCase, Visual SourceSafe, Source Depot

Bug Tracking Software: ClearQuest, Bugzilla, ProblemTracker, Product Studio

Drilling and Well Data Software: RIGWATCH, RIGREPORT, WellView, Eclipse, Petrel RE

Software Distribution Tools: Microsoft Windows Installer, SCCM 2012, Confidential Big Fix, Microsoft SMS 1.2/2.0/2003 , Automated Software Installer, Altiris Deployment Console, Altiris NS Console, ISSI

Ticketing Software: ITSM Remedy Help Desk, Heat, Peregrine, Track IT, Phoenix, Product Studio, MSE, Service Center, Maximo

Remote Access Tools: Dial Up Networking (Analog/ISDN), Cisco Secure Administration, Ace Database, VPN client, SMS, Citrix 6.0, Citrix Metaframe, Citrix Suite, Management Console, Real VNC

Other Communication Tools and Software: Microsoft Office 365, Word, Excel, Power Point, Access, SharePoint, OneNote, Project, Visio, Project Server, Confidential Sterling Gateway, Adobe, Citrix Receiver, MS Exchange Server, Lotus Notes Client 6.0, Microsoft RADIUS, Eudora Pro 4.x, Citrix WinFrame, Hummingbird NFS Maestro, WRQ Reflection X, Hummingbird Host Explorer, Corel WordPerfect Suite, ClearQuest, Quest, Lotus Live, Same Time, Lotus Connections, Veeam, HP ALM, MobileIron, Airwatch, XenMobile, HP ArcSight, RSA Envision, McAfee Nitro, Alien Vault, Q1 Labs, Net, Gmail, Drive, Docs, Google+

PROFESSIONAL EXPERIENCE

Confidential

Systems / Security Admin

Responsibilities:

  • Build or migrate Windows 10, Server 2003, 2008, 2012, 2016, VM, Web, Application, FTP, Domain controllers, Linux and physical ESX hosts from the Confidential and HPI domains for the 25,000 plus server build and deployment project
  • Install, manage, configure, troubleshoot imaging, MS, MacOS, Office, industry apps, VMware vSphere environment, vCenter, vROPs, ESXi hypervisor on various hosts, VMs, datastores, maintain inventory of deployed hardware, software and equipment
  • Coordinate projects, seek business requirements, track time, action, deliver messages to all levels of business, patch releases, critical updates, service packs, work on various projects, provide triage, escalation, backup support for the team, facilitate creation of processes and policies
  • Address any application, system issues, failures, problems by reviewing the logs, analyzing error messages and configuration to resolve the respective issues
  • Optimize, standardize, server, desktop platforms, manage SCCM infrastructure, provide guidance, execute patch management plan, install, configure, maintain SCCM, review policies, changes proposed and create app deployment objects
  • Administer SCCM to deploy apps, patches, OS images, machines, monitor SCCM platform health, desktop queue, support applications, packaging, testing, QA apps, ESX clusters, document, release control and maintain communication with support teams to address issues
  • Bestow technical assistance to users, manage app lifecycle, software remediation, rationalization, AD user accounts, folder permissions, certificates, security groups, OUs, group policies, logon scripts, phone extentions, mailboxes, VoIP accounts, distros, public folders for Exchange
  • Work with hardware, software, platform vendors, gather stakeholder buy-in to ensure timely deployment of resources, delivery of products and provision access to team members
  • Analyze threats, vulnerability scans on devices, system logs, audit logging, test penetration, apply OS patches, upgrade administrative tools, utilities, system software, make recommendations based on costs, risk, effort, benefit for hardware, software standardization
  • Configure new services, system, network components, harden servers, devices by disabling nonessential services, maintain security, redundancy standards, adhere to security requirements, monitor systems, infrastructure and report malicious activity
  • Research solutions to contain, remediate vulnerabilities on systems or applications, gather, evaluate cyber threat business intelligence, monitor information sources to identify, investigate cybersecurity threat vectors and assess against various products
  • Suggest solutions to improve the reliability, quality of apps, organization, processes, reduce operating costs, increase productivity, maintain expertise while ensuring security, support coverage, BCP/DRP activities and ITIL processes, incident, change and release management
  • Collaborate with various teams on all security, compliance related business matters, report, track, manage, close tickets, resolve security vulnerabilities, meet with the respective teams to acquire feedback, requirements and find solutions to issues
  • Troubleshoot incidents, resolve virtualization infrastructure problems on various systems, application issues, support enterprise hardware, software, develop solutions and migrate or VMotion VMs from one host, DC, cluster or farm to another
  • Monitor health, performance, optimization of the virtualized architecture, provide after hour/on call support, implement best practices for VMware environment, maintain vulnerability solutions, remediation standpoint, update, system config, support, test plans and app documentation

Confidential

Systems / Security Analyst

Responsibilities:

  • Facilitate, implement the patching, security compliance and remediation of over 60,000 Windows and Unix servers worldwide to secure the JPMC infrastructure
  • Utilize SCCM, DVMT, manual process to patch Wintel servers, workstations, desktops, collect hardware or software inventory, build, distribute software packages, employ Putty to patch Unix servers to the latest patch levels to secure the JPMC environment, reboot ESX and Linux hosts
  • Employ SCCM to drive the maintenance, creation, testing, deployment of server, desktop, workstation, laptop images and automated software deployments to ensure high levels of systems, infrastructure availability, efficiency and security
  • Administer SCCM to prepare, test, release software application and security updates to production, manage Windows, Linux servers and investigate their respective issues
  • Set up Vision App, Putty, blackout in scope servers, email LOBs, shutdown databases, stop various services, failover resources such as SQL DB instances from the active node on the cluster to the passive node, pause cluster services prior to patching the host thence start the respective databases, services and move resources back to the original nodes thereafter
  • Lead, plan, execute, delegate, SAN, NAS, Robocopy, Veritas, LVM, ASM online or offline migrations, decommissions, LUN scans to meet or exceed run rates, oversee server, application deployments, ITSM creation and approval chasing
  • Provision, install, maintain, configure, test app performance, system management tools, administer, operate, performance tune, troubleshoot and manage Windows Server 2000, 2003, 2008, 2012, 2016 for multi-user systems and utilize Powershell to automate tasks
  • Install Service Packs, VMware tools, administer Symantec Endpoint Protection, Net Backup client, Dell OMSA, OC Manager and execute HBA upgrades
  • Investigate, troubleshoot issues with patches not installing, SCCM issues, SSRS reporting issues, DVMT reporting, .Net issues, WMI issues, run Configuration Manager scan cycles, open tickets and escalate as defined by process to mitigate, remediate and facilitate resolution
  • Perform Hygiene ITRC break remediation on diverse servers to check login issues, ssh, console connectivity, disk space, uptime, troubleshoot Snare, update the security policy and fix issues
  • Address, mitigate, and resolve core infrastructure issues on various Wintel, Unix, VMware platforms in the JPMC environment
  • Validate various server monitoring alerts such as CPU utilization/idle, memory, disk space, process, service, hardware, logfile, hardware mon, ITM heartbeat, network, backup, restore and resolve them according to our department’s scope, process and runbook stipulations
  • Analyze host down events by ping, rdp, ssh via pstools, FSecure or jump host, check TAMS to determine if the box is in production or has been decommissioned, check for a ITSM or PRIME and Netview record, check the ILO console or iDRAC to validate the current state of the server and bounce the machine if hung or take the next best course of action
  • Engage vendors ( Confidential, HP, Fujitsu or Oracle) if a hardware issue is identified for a given server by opening an eBond and create a vendor ticket containing ten steps after validating the event against the HP System Management Homepage, Dell OpenManage Server Administrator or a Sys Ad from the OS resolver team
  • Utilize HP System Management Homepage, HP SIM, HP iLO, Dell OpenManage Server Administrator and the iDRAC to validate server issues, blacked out and logged in to hosts via RDP, FSecure or Putty to bring them down during the approved downtime

Confidential

Desktop Engineer

Responsibilities:

  • Identify, document and troubleshoot user computing issues to resolution and maintain customer satisfaction
  • Analyze user issues and work within a structured problem management and resolution process to remediate them within established SLAs
  • Deliver onsite user support services and update service request information and collaborate to work with other staff and vendor support resources to resolve issues
  • Address issues with users’ Blackberry, Cisco IP, cell phones and connectivity to the corporate network
  • Migrate desktops, laptops, workstations and servers from Windows XP or Windows Vista to Windows 7

Confidential

Security Delivery Specialist

Responsibilities:

  • Execute Server Activation and Deactivation checklists, run initial compliance check and patch scans utilizing scanning tools, analyze scans to determine security violations thence facilitate server patching, OS security hardening accordingly to mitigate the risks to the environment and remediate the issues
  • Perform and assist in SCS ID health checks on the Intel, Unix, Mainframe, AS400, and VMware platforms on the specific accounts that are in scope for the team
  • Gather and determine business requirements to facilitate application development, automate complex tasks and improve processes
  • Migrate and image machines, desktops and laptops from Windows XP to Windows 7 utilizing SCCM
  • Engage SCCM to deploy operating systems, OS updates, applications and software to desktops, laptops, servers and workstations
  • Utilize VMware to test operating systems, software, service packs, create a network environment for testing, run virtual servers, and mount ISO images
  • Design and recommend customized technology-based solutions for the end users
  • Back up user data, transfer files and settings in user accounts from the old machines to the new ones
  • Triage all network tickets including LAN, WAN, Firewall, Load Balancing, Voice, IPT and DNS in a timely manner
  • Grant access to file shares on servers or NAS, creating service accounts on servers that don’t expire, creating Exchange functional mailboxes, creating/updating file share owners, updating exchange functional mailbox owners, placing end users in AD groups/OUs that grant them specific access to applications

Confidential

Project Coordinator / Asset Refresh Lead

Responsibilities:

  • Set up, document, and implement scheduling and approval process, inventory process, deployment process, quality assurance process and reporting process
  • Gather business requirements to facilitate application development, automate complex tasks and improve processes accordingly
  • Provide application level support for Eclipse and Petrel RE and other proprietary technical apps
  • Migrate Tier 2 machines from Windows 2000 to Windows Vista
  • Implement SCCM to deploy operating systems, OS updates, applications and software to desktops, laptops, servers and workstations
  • Devise refresh and migration process
  • Estimate time required per refresh and migration
  • Identify appropriate skills and resources required for the refresh and migration
  • Work with Project Manager to establish project timeline
  • Direct day to day deployment activities of the Desktop Support team
  • Serve as the Subject Matter Expert on the EPW Tier 2 Asset Refresh Project

Confidential

Support Analyst

Responsibilities:

  • Support users inside the Windows Organization involving proprietary internal tools as a member of the Windows Internal Tools Support team
  • Investigate issues involving the Automated Software Installer (ASI) by analyzing the log files of the build installation and determine if the error was setup or network related
  • Gather business requirements to enable application development, automate repetitive tasks and improve processes where possible
  • Administer SCCM to deploy operating systems, OS updates, applications and software to desktops, laptops, servers and workstations
  • Monitor MSE to manage diverse communications and track various technical incidents through to resolution
  • Provide weekly reports on aging Service Requests and other assignments in progress
  • Utilize Product Studio to file bugs and to track and document code related errors
  • Grant or deny access requests in SharePoint to the Win 7 Portal, WEX, WEX sub-sites and the Win 7 document library according to the group the user belongs to
  • Create Product Signoff sites utilizing the Product Signoff Tool when users requested
  • Analyze the TFS Difference Resolution within CompCentral to determine if the nodes and components are synching properly with Product Studio
  • Investigate and resolve issues related to Team Foundation Server, Timebuild Verification Service, Product Health Indicator, Build Notification Service and BVT
  • Document and streamline internal processes, taxonomy and methodologies regarding handling of diverse issues within FaqEase
  • Scrutinize Code Coverage related issues to conclude if the error was caused by Magellan, Vulcan, or the Win Cover tools

Confidential

Senior Desktop Analyst

Responsibilities:

  • Supported users with technical issues in Russia, China, Azerbaijan, Brazil, Canada, France, and England within the International Division including locales nationwide
  • Utilized the Altiris Deployment Console to image desktops, laptops, and workstations with the standard image in addition to required and approved applications
  • Invoked the Carbon Copy client integrated in to the Altiris NS Console and Remote Desktop to assist users remotely

We'd love your feedback!