Principal Systems Engineer Resume
SUMMARY:
- Total of 20+ years of IT experience & Looking for a leadership role in managing and leading a highly professional technical team in deploying cutting edge technologies or processes to deliver mission critical infrastructure services with strong customer service orientation.
- Highly motivated, organized IT Professional with expertise in managing /architecting complex IT infrastructure and cloud projects in the Manufacturing and Financial industries
- Strong team player, with proven abilities to lead, and an effective communicator
PROFESSIONAL EXPERIENCE:
Confidential
Principal Systems Engineer
Responsibilities:
- Architect/Install/configure Oracle PaaS environment in oracle cloud which included setting up the infrastructure setup (vcn/managed compartments/backusp/Lbaas/OTD,DNS,DB, oracle OMC for alerting) Setting up quarterly patching of linux/centos servers using
- Manage engine and setting up Veeam Backup for POC Setting up process flow for provisioning and decommissioning of servers with Service now team Setting up syslog server and installing sumocollector to collect all syslogs from
- Datacenter serves and send it to sumologic server and qradar Work with SOC team for qualys scan for vulnerability Installing/configuring SentnelOne agents on linux servers for malware protection. Responsible for any management escalation of any Infrastructure issues.
Confidential
Systems Architect
Responsibilities:
- Build, Setup, Configure,architect and maintain Virtual Machines, including VM Ware (ESXi), Nutanix. Design,architect, implement and maintain all AWS infrastructure and services Support the business development lifecycle (Business Development,Pricing and Proposal Development and AMI management)
- Strong knowledge of most of the services in AWS as belowEC2: Server configuration and hosting.Amazon S3: Data storage and movement.Elastic Load Balancing: Scalable performance.CloudFront: Deliver a better user experience.Elastic Block Store (EBS): Low - latency instance access.Amazon Route 53:
- The AWS DNS service and ultra DNSCloudwatch: Monitor AWS environmentVPC creation, Autoscaling groups, Placement group,Sumologic for log processing, Security groups and NACLS, Routing tables, creating ec2 instances using Terra form Architect AWS systems Manager for patching of EC2 instances(rhel/centos) Create policy docs as when required for IAM and other services. Working on GlusterFS/GlustedD (redhat) upgrade Working on POC for FSX Lustre on AWS Working on a poc on ELK Stack(Elasticsearch/Logtash/Kibana) Working on POC for Secure@Source from Infromatica Hardware support for on premise servers, including HP and DELL hardware Hardware and system support for storage devices such as Netapp. Support Backup and restore tools (commvault) Support IBM Power systems. Support Active Directory, OKTA, DNS and Network systems. Linux Server Administration including patching across all flavors of linux (Centos, Redhat e.t.c) Troubleshoot performance and scalability issues. Carry out monitoring, tuning, and database performance analysis
Confidential
Systems Engineer
Responsibilities:
- Worked on poc and architecting a 3 tier non prod env to AWS Installing/configuring/Upgrading Linux (Redhat 5.x to 6.x), Upgraded 120 Physical HP DL380 G5, G7 and G8 to Dl380 G9., including Firmware upgrades, Performance testing in Lab env with application team/Networking team, Vendors then find a fix and then deliver the same fix to Tier II through change control for implementation on production servers Writing up documents and RUN books and handing it over to
- Tier II for executions for any changes related to OS, through change management systems Planning/documenting/Testing for any major hardware upgrades, including OS. Helping Tier 2 in testing cluster patches and security patches related to OS in LAB and then handing over the process to Tier II for Patching the UNIX/LINUX servers in prod Leading DR test once in every month Part of data center Migration team migrating on premises servers to AWS cloud and to a different
- Datacenter Hardware used UCS,DELL EMC, OS--VMware (6.5), OS redhat (6.x), with puppet config Performing POC on Redhat 7.3 Upgraded db2 connect accord the environment on Linux/Solaris Currently leading/working on building 120 Physical HP Dl380 Gen10 servers on Redhat 6.x with data encryption and send it to different Hosting Datacenter Designed the process/work flow for decommissioning redhat/solaris servers and leading decommission project for servers in the datacenter. On call support on as per on call rotation
Confidential
System Engineer/Architect
Responsibilities:
- Work with vendor and responsible for maintaining/upgrades of hardware for Servers/ Storage/Software/Firmware as per requirement in two datacenters in NYC and Weehawken, NJResponsibilities:VMWARE:• Using VMware vCenter, created DataCenter Environment by creating VMware clusters, adding ESX hosts in the clusters, and implemented HA and DRS, creating datastores as per requirements• Installed and configured ESX 5.x Servers on UCS and IBM Blade Servers• Upgraded Esxi 5.0 to 5.5 and moving to an another vcenter with the vms.• Performed physical to virtual (P2V) migrations for approximately 100 physical servers utilizing VMware Converter.• Installing, configured VCOPS for performance monitoring• Performed V2V Migration• Created clones and templates of Virtual Machines• Deploying VMs Through Templates, Redhat and windows• Created & Troubleshot Virtual Networks and vSwitches• Install patch updates via update manager• IDM (IPA) management on RHELAWS: Hands - on AWS
- Technical Architect in developing and Architecting enterprise level large scale multi-tier solutions that require complex Architectural decisions. Architected and Performed data migration from on premises environments into AWS via snowball and AWS gateway Created VPN connection for connectivity from On prem to VPC Hands-on experience on implementing Cloud Solutions using various AWS Services including EC2, VPC, S3, Glacier, EFS, Cloud Formation. Hands-on experience on Architecting and securing the
- Infrastructure on AWS using IAM, Cloud Trail, Cloud Watch, Config, Trusted Advisor, Security Groups, NACL etc. work closely with DevOps, Release Engineering, Configuration Management, Cloud Infrastructure, Automation. It includes Amazon Web Services (AWS),, Chef, LINUX etc. plication Migrations and
- Data migrations from On-premise to AWS Cl Experienced in Installing and configuring Chef Enterprise and Chef Workstation hosted as well as On-Premise; Bootstrapped Nodes; Wrote Recipes, Cookbooks and uploaded them to Chef-server. Automated deployments using CloudFormation, terra form
- Configured auto-scaling website platform with peak visitors of 14k per minute Capacity planning, Bottleneck identification Selecting the appropriate AWS service based on data, compute, database, or security requirements. Identifying appropriate use of AWS Architectural best practices. Estimated AWS costs and identifying cost control mechanisms. via AWS pricing tool worked with DevOps team experience with Puppet, Chef, AWSHardware:• IBM blades (HS23,HS22,HS20, JS21), UCS blades(cisco), IBM standalone servers• Responsible for deploying, managing, and maintaining IBM Blade HS20 and HS23,upgrading firmware etc• HP blades running Xen 4.x hypervisor.Storage:• Hands on experience with EMC storage array configuration on Symmetrix VMAX, DMX-4, DMX-3, DMX-2 series,VNX,CX-480/960, CLARiiON CX 300/500/700, CX-3, CX-4 storage arrays
Confidential
System Engineer/Architect
Responsibilities:
- Installed/configured 30 nos of ldoms (including solaris zones running sol10) on CDOM running SOL 11.1(T4 - 1 & T3-1, T2-1) for client test environment Installed/configured 40 nos of ldoms including Solaris zones running sol10) on CDOM running SOL 11.1(T4-1 & T3-1, T2-1) for Production site
- Installed/configured the CDOMS on SOL 11.1 for DR site and setup up the 40 ldoms including Solaris zones) via SRDF (R2), Tested the DR site, Worked with San Storage team in configuring the devices assigned to servers All the DataBase ldoms including the zones were under VCS (cluster) control, CDOMS were under ZFS sol 11.1 and Ldoms boot from SAN, Ldoms FS are vxfs/ufs, installed/configured Veritas Netbackup and Bladelogic and other required packages. The ldoms were created manually and using Oracle Enterprise Manager Ops Center 12c Involved in Data Center Migration, which involved creating ldoms/zones on new data center and migrating OS/App from physical servers to the cloud. Involved in P2V migration in Vmware world Architect/leading and working hands on with the team on the project for converting all the SOL 10 servers from UFS/vxfs(VCS) to ZFS including Solaris zones. This whole effort was tested in lab by me and documented and handed over to Operations for execution Leading / working hands on with team for patching the solaris 10 servers along with Solaris zones with March 2014 patch cluster Supporting Vmware (ESX 5.1) clusters (Creating, Linux Redhat Vms using VM template, patching ESX clusters etc) Supporting Redhat Linux 6.2 for installation and Kernel patch upgrades Remain on call for T3 as on needed & escalations for any infrastructure issues
Confidential
Technical Support UNIX Engineering
Responsibilities:
- Worked in UNIX Engineering for designing/capacity planning/architect the infrastructure. Currently working on migration project from Vmware ESX4.x to ESX 5.1 Installed/configuring ESX 5.0 cluster on HP Proliant G6 and G7, Vsphere 5 and RHEL 5.7 /RHEL6.2 guests as per the requirement of the business/stakeholders. Installing/configuring/Supporting the Solaris (Sun4u, SUN4v, Intel) and Linux (Redhat), using Jumpstart and Kickstart servers. Installing/configuring Veritas volume manager, VCS Maintaining cluster patches quarterly for Solaris, RHEL, ESX, SYMCLI, POWERPATH and update build accordingly.
- Updating /writing korn shell scripts as when required. Doing performance testing in Lab env with application team/Networking Team. Working with vendors then find a fix and then deliver the same fix to Tier II through change control for implementation on production servers Writing up documents and RUN books and handing it over to Tier II for executions for any changes related to OS, through change management systems Planning/documenting/Testing for any major hardware upgrades, including OS Perform the same in Lab (Engineering Team) and then port in to production Currently working on Migration of
- Websphere MQ server V6.0 running on SOLARIS to Version 7.1 in LINUX Participate in DR test as when required. Centrify - Migrated user ids form NIS to centrify On call support on when required
Confidential
System Administrator
Responsibilities:
- Installing/configuring/Supporting the Solaris(Sun4u, SUN4v, Intel) and Linux (Redhat), Veritas volume manager, Veritas cluster server, Sun storage array, Netapp Filer for Production, LAB and Field test (QA) environment Installed/Configured couple of wanboot server on Solaris 10 for remotely booting/imaging production SUN servers across the globe Doing performance testing in Labs(Engineering Team) on OS level (NFS, NIS) and working with DBAs and application team, Vendors then find a fix and then deliver the same fix to Operations through change control for implementation on production servers Involved in setting up a Disaster recovery site which includes
- SOLARIS and LINUX, NFS, DNS, VXVM, VCS, Storage arrays, Network equipment (Layer 4 and layer 2 switches) Installed/configured/tested a Field Test Environment similar to production environment, comprising of Solaris 9 and 10 (NFS, NIS, DNS), Linux, veritas volume manager & veritas cluster server, Netapp filer, SUN Storage Array along with applications. Writing up documents and M&Ps(methods & procedures) and handing it over to Operations for executions for any changes related to OS, network and also work with them in case any help is needed
- Planning/documenting/Testing for any major hardware upgrades, including OS. Perform the same in Lab (Engineering Team) and then port in to production Testing cluster patches and security patches related to OS in LAB and then handing over the process to Operations for Patching the SUN servers in production 1st level support on network devices like Foundry and cisco layer 2 switches. Did the migration of SUN production servers from one datacenter to another data center. On call support on as per on call rotation
Confidential
System Administrator
Responsibilities:
- Responsible for scheduling & executing maintenance/upgrades of hardware and co-ordinating with business.• Attending root cause analysis meetings for any production outage.
- Attending meetings with vendor like SUN, BMC, Egenera, HP for any kind of hardware requirements for future projects and upgrades.
Confidential
System Administrator
Responsibilities:
- Working & managing large number of projects In UNIX Provisioning/capacity planning team The projects includes configuring/building of mission critical Server in NY & LN, like racking it, jumpstarting the server, attaching SAN, configuring network, installing packages, create FS as per requirement of the project and then doing a server check out and hand over to the production team. All these works are done remotely. All of these servers are in NIS and NFS env and the OS including Solaris 10, Suse and Redhat. Attending weekly Service delivery meetings with NY and LN team for the upcoming projects and delivery of projects.
- Currently also leading the Decommissioning of servers project, as large number of applications and servers are getting migrated to Solaris Zones.Hardware: IBM HS20, LS20 blades, DL585 and Egenera Blade Farms on SuSE, and Sun Enterprise 10K/ 6500/ 6000/ 5500/ 5000/ 4500/ 4000/ 3500/ 3000/ 450/ 250/ 420 R/ 220R/ Sunfire 6800/ 4800/ 4810/ 0/ 280 / V880 / V480EMC Symmetrix 8730, 8430, EMC switch, Clariion FC4500,DMX
Confidential
Technical Lead
Responsibilities:
- Leading a team of 30 in offshore (India) and 10 in onsite (USA) of high technical skills. Quarterly technical and monthly soft skill plan for team Involvement in workshops and pre - sales activities on new prospective projects Managing 3 shifts for 24*7*365 support with proper roaster design & leave management etc.
- Highest technical escalation point for the team as well as for the organization for guidance in UNIX / Solaris /operations related issues. Attending monthly SDR (Service Delivery Report) meeting with Onsite team. Involved in day to day daily operation issues in operations. Attending daily / weekly customer meeting. Planning for strengthening the UNIX/Application skill of the organization by conceptualizing and executing in house test lab with proper P&L calculations vs. external . Explanation to higher management for the requirement of any technical with proper justification.
Confidential
Senior Specialist UNIX System Administrator
Responsibilities:
- Technical lead, Leading & managing technical projects, 24/7 - production support, Internal & external strategic account handling. Technical evaluation, implementation, Trouble shooting, SLA management, Problem & Change management, Process development and implementation for mission critical environments. System and network administration in Solaris on all enterprise class platforms including E10K and high end SunFires. Expert level skills in system design, installation, configuration, implementation, up-gradation and administration in Solaris 9/8/7/2.6/2.5.1/2.5, Veritas Cluster Server, Veritas Volume Manager, VxFS, Veritas Netbackup Datacenter, DR (Dynamic Reconfiguration), Veritas Cluster In depth experience in TCP/IP network configuration, performance tuning, NFS, NIS, NIS+, DNS, Automounter, LDAP, Sendmail, Netscape / IPlanet, Apache, Apache SSL web server, Xntp and Sudo etc.
- Veritas Volume Manager Configuration with EMC Symmetrix, Sun Storage Array and Clariion Storage Array. System and network administration on Red hat Linux 8, HP UX 11i, DRS/NX (SVR 4.2 UNIX) running on Fujitsu / ICL SPARC Was responsible for transitioning
Confidential
Project Manager/System Administration
Responsibilities:
- Provide to the Event managers for any new application/hardware installed as when reqd.• Responsible for RCA (root cause analysis after an outage) & SLA Impacting events.• Worked as a Project manager
Confidential
Enterprise UNIX System Administrator
Responsibilities:
- Solaris System Administration Installing /configuring /building /upgrading(Solaris 2.7 to 2.8) SUN Enterprise servers from scratch level, through JUMPSTART Installation, by running the add client command. Configured a boot server for Jumpstart installations. Installed and configured NIS with one master NIS server and four slave servers along with required NIS clients. Some of the NIS clients have been configured in passwd Compatibility mode.
- Administering 80 Enterprise SUN and HP servers. Creating NIS accounts, creating files systems, installing optional softwares like JRE etc per user requirement along with day - to-day system admin activities. Installed and configured Veritas Volume manager ver X7 hrs support for the production and development SUN and HP servers. Carried the pager and cell phone. Trouble shooting any type of problems whether hardware /network/ software related on the SUN and
- HP servers. Changing/adding new hardware. Setting up NFS servers/clients and troubleshooting NFS related issues. Configuring and setting up automounter. NFS mounting FS from Net Appliance server F220 & F330 on SUN boxes, by using quota, exports command on the NetApps. Kernel Parameter tuning in /etc/system. Configured DNS server in Solaris 8 with bind 8.1.2 Solving user related problems through Ticketing Systems. Installing/configuring oracle 8i on Sun/HP serversHardware: SUN E450, E6000,Ultra 80,Netra 1125/1405,E3500, HP series
Confidential
Enterprise Solaris System Administrator
Responsibilities:
- Solaris System Administration I was part of the Enterprise UNIX System Group. The group was responsible for administering all the Enterprise UNIX Servers for the organization and I was working as an on - site System Administrator at the Worldwide Command Center
I worked on remedy ticket (i.e. any problems related to customer, creation of accounts, resetting of passwords addition of groups etc) for internal issues and opening production issues for any activity that affects production, and Patch Installations in Solaris through Change Window. Also I was responsible for starting up the daemons and processes and cron jobs when required and building/installing up a new server from scratch level i.e. assigning IP, default router etc. Had to work with SUN for server panics, erunning explorer etc The whole environment was set in NIS master, NIS client and NFS. Sometimes it was needed to add veritas Licenses for the Veritas FS. For the E10Ks I used login into separate domains thru the ssps and see for any
Record Stop errors occasionally. For shutting down a domain for maintenance I used logging into the particular SSp and start NETCON utility.etc.Patrol V3.2.09 was installed in all the UNIX boxes. I administered the patrol part also. Details: Changing of thresholds of the Knowledge modules. Starting up the patrol agent locally and for RSM Adding and deleting hosts from the console Blacking/snoozing alerts in patrol. Adding/deleting processes to be monitored by using Agent configuration Setting up Alarms and warnings and paging services to the related groups Configuring KMs for auto paging etc. and day to administration jobsVeritas Volume Manager 3.0.2 was installed in all the UNIX boxes. Installation of Veritas Vol manager and configuring it.
Creation of Volumes and adding File systems in it. Creation of Plexes of different layouts like Concatenated,RAID-5, Installations of Licenses Adding /removing DISKS Mirroring of ROOT DISK Encapsulation/VXUNROOT of ROOT DISK. Above all I had to do the normal System administration job on daily basis.