Sccm/sms Patch Engineer Resume
2.00/5 (Submit Your Rating)
SUMMARY:
- A self - motivated detail-oriented and well organized hands-on professional with progressive experience in
- SCCM Patch Engineer seeks a position where formal personal ability commitment to learn advance and succeed would be of value.
TECHNICAL SKILLS:
- Windows 2008/2003/2000 ; Exchange/Active Directory (AD)
- System Center Configuration Manager (SCCM); System Management Server (SMS)
- Windows Software Update Services (WSUS); Software patches
- Security patches, Wise Package Software; Software deployment; MSI
- Packaging Tools; System Center Updates Publisher (SCUP)
- Application Packaging; VMware Sphere v4; What’s Up Gold; Zenprise
- Symantec Anti-Virus Server; VB Scripting; McAfee EPO Server
- Windows NT; Windows XP; Windows v9.x, Novell NetWare
- Lotus Notes v3.x, v4.x; Microsoft Outlook 98 & 2000; cc:Mail for DOS & Windows
- NetWorker; Netscape; McAfee; Ontime; Bindview; Reachout; FaxWorks
- MS Office Suite; Support Magic, REMEDY& HEAT;
- IBM compatibles, DELL; Network Servers; Mail Servers; Legato Backup Servers
- SMTP Gateways; DHCP; FTP; DNS; Emerald tape drives; Exabyte
- HP LaserJet Printers; Modems; Routers; Scanners; Dell Docking Stations;Willing to travel.
PROFESSIONAL EXPERIENCE:
SCCM/SMS Patch Engineer
Confidential
Responsibilities:
- Provide installation and maintenance of the Microsoft SCCM application in complex environments
- Recommend SCCM updates and configuration modification.
- Apply application updates as required.
- Utilize tools for remote management and support of SCCM client computers.
- Establish and maintain system configurations for the SCCM environment including site servers and clients.
- Develop and maintain operational support procedures for the environment.
- Troubleshoot possible causes of patch package installation failures. This will include all clients and infrastructure systems that support the Centralized Patch Management project.
- Conduct reboots on workstations where it is applicable.
- Install and/or remove patches with the coordination of CPM sites.
- Aid in removing all previous Office Professional products and install the latest approved Office Professional product (i.e. Office Professional 2007).
- Aid in monitoring the Standard Operating Environment (SOE) levels current and at any future SOE productversion level as newer product upgrades are approved and released for use enterprise - wide.
- CPM will correspond with sites via email and/or through submitted Remedy tickets from CPM sites.
- Utilize iPOST to review Patch Score for each site, Risk Advisory Score for each site, and inventory of site systems.
- Gather and review inventory of systems located at each site.
- Connect to site systems and alter/set/delete system settings and components.
- Connect to site systems and perform reboot on workstations where it is applicable.
- Connect to site systems and troubleshoot where patch and/or software package installation failed.
Systems Engineer
Confidential
Responsibilities:
- Manage SMS 2003 environment for 10,000+ desktops and 300+ Windows 2003 Server with Active Directory. Monitor SMS package distribution and execution status and report when required or as requested.
- WSUS Patch Management; Create CR’s, and coordinated with 508, OAST & ICCB.
- Package and distribution of software and Windows Security Patches/Hotfixes using SMS 2003 & Windows Software Update Services (WSUS). SQL Server 200x, including complex SQL queries and run reports against SMS 2003 database.
- Experience in implementing and supporting SMS based desktop management infrastructures for large complex organization
- Software packaging experience (Wise installer)
- Analyze, build, test, and deploy software installation packages for the Microsoft Windows XP operating systems using Wise Installer (MSI) technology.
- Deploying and testing highly complex installation packages for functionality, compliance, quality assurance, integration, and user acceptance, verifying that the MSI is operating correctly to install, uninstall, and repair an application and ensuring there are no DLL/registry conflicts or ICE errors in the EXE/MSI packages.
- Analyses are performed at all levels of total system product to include: concept, design, fabrication, test, installation, operation, maintenance and disposal.
- Ensures the logical and systematic conversion of customer or product requirements into total systems solutions that acknowledge technical, schedule, and cost constraints.
- Work on Information Security Vulnerability Management (ISVMs) to keep DHS Network secure of vulnerabilities.
- Performs routine AD clean-up: create and run customs queries to remove stale workstations, user accounts, contacts, and group accounts.
- Monitor Symantec & McAfee EPO Anti-Virus Servers.
- Performs functional analysis, timeline analysis, detail trade studies, requirements allocation and interface definition studies to translate customer requirements into hardware and software specifications.
- Support 1 BES 5.0 and 4 BES 4.1x Servers with 8000+ blackberry handhelds duties includes: adding users, service books, it policies, reloading users, purging high data packets, monitoring storage groups on Exchange 2003 Servers, 2/3 tier support, ensure that service is not interrupted and if it is, that downtime is kept to a minimum, add/remove/move customers to the servers, troubleshoot any synchronization, reconciliation, e-mail issues via blackberry handheld.
- 24/7 support (phone & emails)
- On-Call for two weeks every other Month (Primary 1st week and Secondary the 2nd week)
- Provides backup infrastructure/after hours support as needed
- Works on special projects as needed.
- Monthly Server Patching of DHS Servers
- Complete daily tasks which includes: update HQs Daily Operations slides for Program Manager of all s and major issues that arises on DHS Network by emails/HOC/Management/O&M Engineering; Disconnect inactive sessions on all DHS Servers; Move Computer Objects in AD and move them to its proper OU according to Site set policies; Purge High Pending Data Packets on all BES Servers;
DBIDS/RAPIDS Senior Network Installation Engineer
Confidential
Responsibilities:
- DBIDS is a force protection system currently deployed at DoD installations worldwide and that DBIDS presently supports an installed base of over 2M people.
- Traveled (95%) to CONUS Air Force bases to setup, install and configure DBIDS. Installed DBIDS, to include computers, scanners, biometric equipment, printers, and wireless layer two security devices (Fortress Technologies ES520), to secure base LANs. Perform RF surveys of sites where required.
- Performed additional configuration to provide a Virtual Private Network (VPN) to a regional database necessary for the DBIDS operation, the database work in configuring Oracle, and configurated/installated custom apps on PDAs for wireless verification of personnel. Performed continuous troubleshooting of hardware and network problems until issues were resolved. Coordinate with communication engineers to obtain required connectivity.
- Trained and familiarized end-users on the operation and capabilities of the DBIDS application.
- RAPIDS is a United States Department of Defense (DoD) system used to issue the definitive credential within DoD.
- RAPIDS use information stored in the DoD Defense Enrollment and Eligibility Reporting System (DEERS) when providing these credentials. Used together, these two systems are commonly referred to as a DEERS/RAPIDS system or DEERS/RAPIDS infrastructure.
- Maintaining working knowledge of IP, hubs, routers, modems, WLANS, and other telecommunications protocols, hardware and software. Configured, install, test and maintain Real Time Automated Personnel Identification System (RAPIDS) hardware and network.
- The Real-Time Automated Personnel Identification System (RAPIDS) is a United States Department of Defense (DoD) system used to issue the definitive credential within DoD. RAPIDS uses information stored in the DoD Defense Enrollment and Eligibility Reporting System (DEERS) when providing these credentials. Used together, these two systems are commonly referred to as a DEERS/RAPIDS system or DEERS/RAPIDS infrastructure.
Systems Administrator
Confidential
Responsibilities:
- Participate in managing user accounts and shared accounts for Department of Homeland Security LAN.
- Provide end-user support for over 500 users with 200 Active Directory Servers.
- Install and maintain workstation and office automation configurations and software.
- Troubleshoot workstation problems and participate in software and hardware migrations.
- Assist in managing network resources, including printers, servers, PCs switches, etc.
- Perform backups, system shutdowns, and other routine maintenance tasks.
Network Administrator
Confidential
Responsibilities:
- Duties include creating new users, delete, add and group policies.
- Server OS and SW installation on multiple HW platforms; Proven ability to resolve problems in a timely and proactive manner;
- Demonstrated ability develop, improve and adhere to processes including hands on experience in supporting Windows XP, MS Office 2000, MS Exchange, MS Internet Explorer, Norton Utilities, Ghost and HEAT & Remedy. Coordinating Office moves by ensuring PC & peripherals are connected properly to the network with Vendors.
- Adding and deleting users; maintain security privileges, change user’s passwords; daily backups and monthly maintenance to email by running batch files.
- Backup and Restore operations; LAN, WAN and Security concepts for approximately 1000 users.
Systems Administrator
Confidential
Responsibilities:
- Performed administration for DHCP for end user support. Installed, updated users right, troubleshoot and performed problem resolution with MS Exchange.
- Used TCP/IP to ensure that the user has connectivity to the LAN.
- Used DNS with Windows NT to configure lists of host names and IP Addresses, allowing users of workstations configured to query the DNS to specify remote systems by host names rather than IP addresses.
- Familiar with SMTP in an Exchange with Outlook 2000 environment.
Network Engineer
Confidential
Responsibilities:
- Install GSACO and non-GSACO operating systems and applications. Such as migrating from Windows NT v3.51 to v4.0 desktop installations.
- Perform daily routine checks to ensure connectivity by checking the cc:Mail routers, Network Servers, and sweeping the customer areas for specific requests and needs.
- Additionally responsible for ensuring network optimization by performing maintenance on LAN resources.
- Maintain system security, including user Ids, and passwords-system, directory, volume and file protection. Analyze and evaluate new technology related to LAN software/hardware.
- Provide end-user support. Used DHCP to provide effective configuration of IP addresses. Used TCP/IP to ensure connectivity to the Windows NT server.
Network System Analyst
Confidential
Responsibilities:
- Additionally, assigned as the Backup Administrator (Legato NetWorker) for a multi-post office cc:Mail system for DOS and Windows with over 4,000 mail users.
- Responsible for providing administration for a Local Area Network (LAN) transitioning to a Wide Area Network (WAN) that successfully integrates client/server models in a multi-server environment for DOD & Navy.
- Daily management of a 400 node, 650 user Novell 3.1x network in a Token Ring environment. This is accomplished by the manipulation of user environment by utilizing NetWare utilities such as NWTOOLS, SYSCON, FILER, RCONSOLE and FCONSOLE.
- Additionally assigned as the backup technician for a multi-post office cc:Mail system for DOS and Windows with over 4,000 mail users.
- Extensive usage of ADMIN, CHKSTAT and ANALYZE automated utilities to ensure the integrity of the databases that comprise the e-mail system. Additionally responsible for ensuring network optimization by performing maintenance on LAN resources.
- Installed, configured and troubleshooted SMTP gateway using cc:Mail. Used TCP/IP to ensure connectivity to the LAN. Used DHCP to provide effective configuration of IP addresses.
- Used DNS with Novell to configure lists of host names and IP Addresses, allowing users of workstations configured to query the DNS to specify remote systems by host names rather than IP addresses.