We provide IT Staff Augmentation Services!

Systems Engineer Resume

5.00/5 (Submit Your Rating)

Media, PA

SUMMARY:

Professionally and personally trained IT engineer with over 11 years of experience in the industry searching for new chances to grow and evolve into the engineer that I want to be. Armed with a logical mind and a penchant for finding creative solutions to non - conventional issues, as well as an affinity for automating repetitive as well as complex tasks. I have hands on experience with a wide array of technologies and business-class software, and actively seek the opportunity to learn new ones. My strongest attribute is being able to fanatically learn new technologies and offerings, then piece together their usefulness with an array of other technologies.

TECHNICAL SKILLS:

Programming/Scripting language:

Very strong experience with BASH.

Strong experience with Python.

Fairly comfortable with Perl and Powershell.

Operating Systems

Linux (RHEL4 - 7, Debian, Ubuntu, Gentoo) and systemd friendly

AIX

FreeBSD

Windows 2000 - 2016 Server

Virtualization:

VMware ESX/ESXi

XEN

QEMU

Database Engines:

MSSQL 2000-16, MySQL/MariaDB, Oracle, Postgres, Ariel

SoftwareSIEM

IBM Confidential

HIDS/FIM

Tripwire Enterprise

OSSEC

PAM

CA PAM/ControlMinder

Hosting

Apache HTTP

Nginx

Microsoft IIS6-10

Managed Endpoint Protetion

Symantec Endpoint Protection

Misc

Wireshark/tcpdump

Ansible with Jinja2 templating

Limited Jenkins/Hudson support experience (plugin config).

Syslog/SyslogNG/Journald

Directory Services (Active Directory, LDAP)

Iptables, firewalld

Sharepoint

PROFESSIONAL EXPERIENCE:

Confidential, Media, PA

Systems Engineer

Responsibilities:

  • Configuration and administration of various linux based systems.
  • System hardening (iptables/firewalld, user management, selinux hardening, Nessus policy and scan) to meet compliance regulations, such as PCI.
  • Deployment and configuration management with Ansible, as well as distilling templates with Jinja2.
  • Patch and vulnerability awareness/management.
  • Log/SIEM management ( Confidential, log aggregation/correlation, enterprise syslog/eventlog collection.
  • Hardening of services such as Apache/Nginx/Tomcat.
  • Monitoring setup and configuration with ELK, NAGIOS, or Zabbix.

Confidential - Newark, DE

Sr. Information Security Engineer

Responsibilities:

  • Assisted with managing syslog(all variants of) for the majority of Confidential servers.
  • Developed automation for above products to suit the needs of our security team as well as the customer, primarily in Python as well as BASH.
  • Acted as SME for Confidential as well as Controlminder.
  • Kept a close eye on upcoming and new vulnerabilities, and provided plans and solutions for addressing them.
  • Attended and later ran weekly meetings with Confidential to address concerns and provide status updates for ongoing projects.
  • Worked with vendors to correct bugs and address issues that arose from the sheer scale of deployments for Confidential and Controlminder.
  • Investigate and mitigate security compromises.
  • Created, updated, and maintained knowledge base articles to assist coworkers and to standardize workflow.
  • Worked as the only on-call contact for Confidential from 2014-2015, then later shared the responsibility after that.
  • Created and maintained the knowledge base in Sharepoint for Confidential .
  • Patch, run, and maintain all SIEM/IDS/IPS software and ensure no vulnerabilities are present.

Confidential, Wilmington, DE

Virtualization/Administration/Infrastructure Consultant

Responsibilities:

  • Set up, configured, and administrated a VMWare ESX cluster in two separate locations.
  • Set up and configured/administered Active Directory, trust management, and successfully migrated an entire NT 4.0 domain into it.
  • Designed and implemented a backup solution using a combination of Backup Exec, Veeam, tape rotations, and offsite storage.
  • Set up and configured multiple Netapp filers to provide aggregates/luns to provide VM storage as well as mirror both company locations.
  • Assisted team with ground-up construction and setup of infrastructure in two datacenters.
  • Assisted in planning and setup of Avaya phones and network.
  • Set up and configured Puppet for monitoring and automation of *nix systems.
  • Set up and administered MySQL clusters as well as Squid proxies.
  • Acted as team leader for multiple projects.
  • Worked constant on-call for support and disaster recovery.
  • Assisted network admin with light networking such as vlan management and dhcp scopes.

Confidential - Newark, DE

Server Engineer/Systems Administrator

Responsibilities:

  • Hired as a Technical Support Representative in 2006
  • Provided phone support for customers in the shared server group.
  • Performed root cause analysis frequently to diagnose performance and compromise issues for shared RHEL4-5 apache and mysql servers.
  • Promoted to Server Engineer in 2007.
  • Produced countless bash scripts for customer needs as well as internal use for technicians.
  • Developed php applications with mysql backend for internal technician use.
  • Promoted to Systems Administrator in 2009
  • Maintain corporate and customer firewall policies and vpns.
  • Investigate and mitigate security compromises.
  • Created, updated, and maintained knowledge base articles to assist lower tier technicians and to standardize workflow.
  • Conceive, test and implement server solutions based on client needs.
  • Troubleshoot and/or implement alternative solutions for top tier clients with business crippling issues.
  • Administration of multiple database engines such as MySQL, MSSQL, and PGSql.
  • Assisted in automation of server deployments, as well as automation of common/uncommon administrative functions across multiple platforms
  • Assisted in design and development of a standardized high-availability MySQL failover clustering offering.
  • Assisted training department on development of a Linux training curriculum.
  • Personally designed and developed a security monitoring solution using OSSEC for use with our problematic (frequently compromised) RHEL/CentOS customer base.

We'd love your feedback!