We provide IT Staff Augmentation Services!

Active Directory Engineer Resume

2.00/5 (Submit Your Rating)

Coppell, TX

SUMMARY:

  • To obtain a career with a company that offers the opportunity for me to use and develop my skills.
  • I was assigned a fortune 1000 customer that had given the company poor marks in feedback for their inability to resolve their numerous technical issues.
  • Within 6 months that same company gave very high feedback to me for fixing most of their issues and the company was able to use them as a reference for new customers.
  • I architected a solution where I consolidated 5 Exchange servers that were located in different parts of the world into a single implementation of 4 servers that were high availability located in 1 central datacenter.
  • I migrated 10 Exchange servers for a single organization from their old hardware to new hardware.
  • This was done as a tech refresh but also to resolve technical issues with the original implementation.
  • I have served as a primary escalation point for my teams in the last 3 companies I have worked for in Active Directory, Exchange, DNS, and connectivity issues.
  • I have personally written over 150 KB or Knowledge Base articles to aid in troubleshooting and provide step by step instructions for other engineers in areas where I either had specialized knowledge or was disseminating custom information.
  • I learned Sequent (an old version of Unix used by 4 customers in the world now) when I was asked to by my company.
  • The Unix team would not do administration for it because it was so old so I was tasked to not only learn it but to administer it and write KB articles so that other engineers would be able to do administration in my absence.

MOST CURRENT TECHNOLOGIES:

  • Windows Operating Systems
  • IIS 4/5/6/7
  • Active Directory 2000/2003/2008/2012
  • Exchange 2000/ 2003/2007/2010
  • Confidential Clustering
  • MS SQL 2000/2005/2008
  • SMS Server 2003/2010
  • DNS Administration
  • DHCP Administration eGurkha Enterprise Monitoring (eG)
  • Sybari Antigen
  • ISA Server 2000/2006
  • Blackberry Enterprise Server
  • Automate
  • Veritas Backup Exec
  • Group Policy
  • Citrix
  • Sitescope/Netiq
  • HP/Compaq/Dell/IBM Hardware
  • NetApp Storage Systems
  • F5 / Netscalar Load Balancing
  • HP EVA Storage Technology
  • SQL Reporting Services
  • MS Office Suite
  • Desktop Support
  • Networking Technologies
  • Server Provisioning and Admin
  • Vmware
  • Unix/Linux
  • HP Operations Manager
  • Symantec Enterprise Security Manager (ESM)
  • Hitachi Privileged Access Manager.

WORK EXPERIENCE:

Confidential, Coppell, TX

Active Directory Engineer

Responsibilities:

  • Collaborated with team in planning, developing and implementing OU restructuring, GPO remediation, service account’s rights remediation, security compliance for organization on Domain Controllers, restructuring permissions into an RBAC (Role Based Access Control) model, and developing the GPO model for restructuring User Rights Assignments
  • Initiated and developed monitoring and alert readiness for all of the 48 Active Directory servers in 12 AD domains which included deciding what was monitored, what the thresholds would be within the business’ capabilities, the criticality of the alerts, and how notifications and action were taken on them, and finally adding documentation into the Sharepoint repository
  • Developed and performed profile migrations for users in the VDI environment when new NetApp filer devices came online or when space was getting full using Robocopy and AD DS Powershell commands
  • Reduced Task and Incident queue from a backlog of 160 outstanding tickets to none and trained new employees on proper ticket handling to keep the number low
  • Trained all new personnel to the team on current systems and process for working within the Confidential environment
  • Initiated and completed adding correct asset information into the Asset Center product and then later the ServiceNOW system for all of the AD Domain Controllers
  • Administered the PAC file used with Internet Explorer to determine which URL’s would get routed to the internal proxy appliances
  • Worked with team to perform sever upgrades to all of the 48 Active Directory servers and 12 AD domains from Windows 2003 to Windows 2008 R2 and migrations from FRS to DFS - R for DC replication
  • Worked with another team member to deploy AGPM to the Dev, QA, and Prod domains to enable change management control over Group Policy Objects
  • Assisted with the administration of the Hitachi Privileged Access Manager system and with user login issues to the system
  • Performed troubleshooting and remediation of security and compliance issues using Symantec Enterprise Security Manager tool for server in the Active Directory.

Confidential, Dallas, TX

Senior Systems Engineer

Responsibilities:

  • Managed and performed patching and maintenance of 10,000 servers via SCCM for Confidential with servers on a Vmware Vblock environment
  • Created patch management documentation showing technical procedures and processes for L1/L2 team
  • Assisted in new customer onboarding for Canadian Pacific Railway by becoming a liaison between Confidential and the customer to better assist in supporting them while they went through a transition of lost staff
  • Provided L3 support of Windows 2000-2012 servers on Confidential Vblock 30,000 servers including builds of SAP, software installation, and troubleshooting of performance issues on a VMware virtualized environemt
  • Performed escalation troubleshooting via an on-call rotation for any security, performance, general Windows Server issues/outages.

Confidential, Dallas, TX

Federal Reserve Information Security Transition Engineer

Responsibilities:

  • Assisted in AD migration of all of the satellite districts of the Federal Reserve Bank throughout the United States into a single security model defined as RBAC (Role Based Access Control)
  • Created documentation for migration technical procedures and processes
  • Resolved security issues using the in-house ticketing system. This includes things like production security account creation, resolving permissions issues, creating service accounts and integrating all of them into the Federal Reserve security model, creating change requests, etc.
  • Performed complex security migrations by identifying permissions necessary for the server including inspecting User Rights Assignments, local group memberships and accounts, logon types and evaluating existing Group Policy to provide a seamless transition to the new OU structure and to guarantee compliance with existing security guidelines
  • Performed escalation troubleshooting via an on-call rotation for any security, permissions, or access related issues during the server transitions

Confidential, Dallas, TX

Escalation Support

Responsibilities:

  • Provided staff augmentation while support center was opened and new Confidential engineers were trained
  • Served as third (3rd) level escalation support for Confidential Enterprise customers on Confidential Exchange 2003/2007/2010
  • Supported Availability/Free Busy, Outlook client connectivity, MAPI, OWA, OOF, Autodiscover, and Activesync
  • Documented all cases on a time basis and maintained documentation for tickets for all work performed and billed to customer
  • Resolved complex multi-site issues environment between implementations of Exchange
  • Performed analysis of network issues using Netmon and Fiddler to determine break points and resolve issues with IIS and Exchange.

Confidential, Dallas, TX

Senior Engineer

Responsibilities:

  • Administered and served as an SME for a native Windows 2008 Active Directory environment for the Confidential serving 25,000 staff members, 40,000 desktops, 160,000 students, and over 500 servers.
  • Created login script that uses group memberships to assign drive mappings that was deployed throughout the district.
  • Architected, implemented, and managed Group Policies for AD for servers and for workstations.
  • Implemented and managed auditing for servers and set policies for auditing within the environment.
  • Resolved replication and connectivity issues within Active Directory.
  • Technical lead in site migration project to convert all schools and administration buildings to an Active Directory environment away from Novell.
  • Setup and configured backups for system state on Windows servers and helped to define backup procedures for servers.
  • Provided training and support for existing personnel so they would be able to manage the new environment.
  • Participated as a technical resource on several projects including Identity Management, ChancerySMS (Student Management System) Migration, and in IT policy meetings.
  • Resolved issues with Active Directory involving directory replication, file/folder permissions, home directories, server outages, root cause analysis, script creation, group policy implementations and application interoperability.
  • Created documentation for the network and servers within the district using industry tools such as Visio, Word, and Excel.
  • Discussed and provided guidance for installation and integration of web applications and 3rd party Windows applications to meet project requirements of leveraging Active Directory.
  • Served as escalation path and point of contact for E-mail, DNS, DHCP and other industry standard applications like backup software, anti-virus packages, ticketing systems, etc. that I have had experience with.

Confidential, Irving, TX

Senior Windows/Exchange Engineer

Responsibilities:

  • Built 18 IBM and Dell servers from receipt from vendors to full production. This included patching, monitoring software, backup software and scheduling, and any custom applications on required by the customer.
  • Administered Atos’ North America Active Directory, Exchange 2003, DHCP, WINS, Web, Mail, IIS, and SQL servers.
  • Administered all local/remote Email including systems that interacted with Exchange like Barracuda appliances and UNIX servers.
  • Supported hardware for my 3 customers as well as for Confidential internal support which was well over 150 servers.
  • Was the single point of contact for each of 3 (outside) customer’senvironments
  • Built, installed, and configured Atos internal Exchange servers and customer Exchange servers as part of two migrations from their old hardware to new hardware.
  • Migrated user accounts and Exchange roles to new servers and finally decommissioning the old servers.
  • Setup and configured VMWare virtual environment for testing of Exchange servers, created templates for images, configured Exchange clustering which included creating the virtual network. Responsible for administration of the servers in the virtual environment.
  • Handled on call for break/fix issues for all Confidential customers on a rotating schedule which included both Wintel and then Exchange support/servers.

Confidential, Irving, TX

Assigned Systems Engineer

Responsibilities:

  • Ensured 99.9% availability for their Exchange 2003 front-end, back-end clustered mail environment while migrating them from 5 servers worldwide to just 1.
  • Reconfigured and repaired the Active Directory implementation for several customers 3 of my 7 customers while serving as an ASE (Assigned Systems Engineer) for my company.
  • Reduced alerts (issues reported by monitoring tools) from an average of 50 per day to 10 per day within a 3 month time frame.
  • Learned Sequent (an old version of UNIX) in order to support a customer with this implementation.
  • This was necessary because the UNIX engineers at our company did not know this version and did not have the time to learn it.
  • Created SMS pushes, continued O/S patching and generally maintained the SMS server for a client when their on-site SMS person resigned. This persisted for 3 months until another person was hired to do this full time.
  • Perform basic Citrix administration for a customer’s custom application.
  • This included moving applications between servers when a server went down and basic profile administration.
  • Designed and Maintained the Application Flow Visio diagrams. They document how the applications worked and identified break points.
  • Designed and Maintained the Logical Diagram, which showed information about all of the devices and how they were out and how the network was configured.
  • Configured and maintained all monitors. Using the break points identified in the Application Flow diagram, set-up monitors to make sure that our NOC was notified when a failure occured.
  • Designed and maintained the “Return to Service” documentation. These were KB articles that explained to a frontline engineer how to get the application or device back online in the event of a failure.
  • Was escalation point for failures the frontline engineers could not resolve?
  • Identified and eliminated problems in the customer’s environment using best practices for Confidential and related vendors.
  • Ensured 99.9% availability for their Exchange 2003 front-end, back-end clustered mail environment while migrating them from 5 servers worldwide to just 1.
  • Managed complex Active Directory environments, one utilizing split-horizon DNS (this is when the AD domain uses the same name as a publicly addressable DNS name).
  • Administrated VMWare workstations and servers.
  • Created virtual workstations and instances. Virtual servers were primarily for monitoring tools with VMWare ESX for some troubleshooting and performance monitoring.
  • Migrated to a new Active Directory domain controller from the old VMWare domain controller in their development environment.
  • This involved moving all of the FSMO roles, pointing the clients to the new DC, moving user accounts and migrating DNS and DHCP.
  • Prior to my position as an ASE, I was an Incident Management Engineer. During that time, with a team of 3, I managed over 1000 servers for over 300 customers.
  • This included servers in NT4, Windows 2000, and Windows 2003. I was responsible for the hardware, software and O/S as well as Datareturn supported applications like I-Mail and ASPMail.

Confidential, Denver, CO

Systems Analyst

Responsibilities:

  • Tier 1, 2, and 3 support for server and for customers for a worldwide company.
  • Managed Windows 2000 domain in a Solaris NIS domain.
  • Administered DHCP, WINS, DNS, and Printer network
  • Provided hardware/software support for Dell and Toshiba desktops and laptops.
  • Ran backups and facilitated restores that backed up home directories and critical files.
  • Responsible for security on the internal network and ran several security audits on a weekly basis to ensure a maximum of protection.
  • Setup monitoring of 4 separate networks to determine cause of bandwidth problems between them.
  • Responsible for a Ghost Server that included duties such as creating new bootable floppies, making images for new hardware that included a checklist of specifications set forth by BEA. I also had to create images on CD/DVD when a client was offsite so that they were able to do the install.
  • Supported clients on virtually any issue in several countries both over the phone and in person.
  • Supported Windows95/98/ME/NT/2000/XP, Redhat Linux, and Solaris.
  • Supported several applications such as iPass, Netscape, Eudora, McAfee Virus Scan, Second Copy, MS-Office, Visio, Veritas, Jabber, and VNC.

Confidential, Littleton, CO

Senior Network Administrator

Responsibilities:

  • Designed and Supported Windows NT Domain. User Accounts, Roaming Profiles, Policies.
  • Configured and administered DHCP, WINS, Web, Mail, IIS, and SQL servers.
  • Installed, configured, and administered Unix DNS server (FreeBSD Unix)
  • Administered local/remote Email.
  • Provided every type of hardware/software support.
  • Setup backups and created backup sets to back up the entire company on a daily basis.
  • Rolled entire company out on Windows2000 and roaming profiles.
  • Setup a RAID-5 file server using Windows2000 and setup the permissions for all of our end-users.
  • Managed over 600 domains and the DNS server (Solaris) itself while hosting with a variety of registrars.
  • Sole management responsibility of primary and co-location, which housed nearly all of our 30 servers (DNS, Web, Mail, SQL, IIS).
  • Installed configured and supported both 3662 and 2626 routers, 2900 catalyst switches, fast irons, and load balancer used in day-to-day operation.
  • Supported all the Cisco catalyst 2900 switches at office and all the foundry fast irons at our co-location.

We'd love your feedback!