Senior Windows Network Administrator Resume Profile
SUMMARY
Over 17 years defining, acquiring, and providing multi-level network and technical support. Functional areas include: Network administration, virtual administration, Citrix administration, systems administration, network engineering, technical support and customer service. Strength lies in ability to identify and achieve objectives in a networked environment strategically accomplishing organizational goals pertaining to IT topologies organize thoughts and communicate ideas clearly in writing work cooperatively with individuals representing different organizational agendas and solve difficult network problems.
WORK EXPERIENCE
Confidential
Senior Windows Network Administrator
- Citrix administration/engineering duties include testing, delivering and customizing client legacy/Microsoft packaged applications in both Presentation Server 4.5 and XENApp 5.0/6.0/6.5 infrastructures, upgrades and hot fixes, creating new application servers using VMware ESX Server/VMware vSphere Client 4.1/5.1, multiple farms builds and monitoring application usage and administering user profile/permissions management. Firewall coordination with firewall engineers concerning certain applications on Citrix servers accessing forest wide BLS user community via LAN or VPN. Engineered a unique Citrix farm DMZ hosting outside email accessibility for BLS users to meet security demands of client. Created customized Citrix reports for client. Reports consist of application usage, server productivity, server load, CPU Utilization, concurrent users and memory. Create Web Interfaces to fully utilize Citrix online plug-in v12 concerning user community to view/access PS 4.5, XENApp 6.5 and Webmail Citrix infrastructures. Assist with SMS lead administrator for deployment of Citrix plug-ins to BLS community in forest domain, sub domains and regional domains. Administer Terminal Services profiles for all Citrix users in BLS community via NetApps. Administers group policy for all Citrix server infrastructures.
- Senior technical engineer for all Windows server support/LAN support team environment. Primary responsibilities include domain controller/member server/exchange server administration. DNS Secondary Zone administration for entire PSB/BLS domains. Collaborates with Primary DNS Zone administrators UNIX for zone updates. Windows 2003 -2008 SP1 SP2 implementation and testing, administers global group policies in AD/Forest/member server/workstation OUs. Organize technical planning, system integration, verification and validation, cost and risk, supportability and effectiveness analyses for total systems. Develop and administer plans to upgrade domain controllers, member servers, Exchange servers 2003/2007 and IIS 6.0 servers in the PSB, subnets and regional domains from Windows 2000 to Windows 2003, troubleshoot client network issues and Windows servers. Lead DHCP administrator assigning/reserving IPs to subnets, servers/workstations/network appliances. NTFS/Share permissions for entire BLS enterprise. VMware 4.5 administration, WINS/DHCP, Exchange Front End, IIS, IIS Proxy instances, File/home directory, Citrix XenApp 6.5 , networking and fundamental implementation into current infrastructure.
Confidential
Windows Network Administrator
Technical support team lead in Windows server support/LAN support team environment. Primary responsibilities include domain controller/member server/exchange server administration. DNS Secondary Zone administration for entire PSB/BLS domains. Collaborates with Primary DNS Zone administrators UNIX for zone updates. Windows 2003 -2008 SP1 SP2 implementation and testing, administers global group policies in AD/Forest/member server/workstation OUs. Organize technical planning, system integration, verification and validation, cost and risk, supportability and effectiveness analyses for total systems. Develop and administer plans to upgrade domain controllers, member servers, Exchange servers 2003/2007 and IIS 6.0 servers in the PSB, subnets and regional domains from Windows 2000 to Windows 2003, troubleshoot client network issues and Windows servers, assist office/subnet server administrators with server administration duties, administer Exchange, VMware 3.5, 4.1 SMS 2003/SCCM 2007 server related issues concerning PSB domain/subnet domain and regional domains. Windows 2003/2008 Cluster Server technology for both IIS and printer servers. Create and manage Windows user accounts via Active Directory. Lead administrator for global printer issues or implementations on our global printer servers housed for BLS users. Analyze client servers for optimal performance, test and deploy new server image configurations. Administrator for Symantec Net Backup 6.0 MP4 concerning the entire PSB domain and subnet domain offices in ADP server center. Lead DHCP administrator assigning/reserving IPs to subnets, servers/workstations/network appliances. NTFS/Share permissions for entire BLS enterprise. Windows 2003/2008 Server lead. Team lead for upgrades to forest and domain controllers to Windows 2003 Server in PSB/Subnets offices/Regional offices. COOP lead administrator for disaster recovery. Working at all levels of total system production to include: concept, design, fabrication, test, installation, operation, maintenance and disposal. Run monthly security checklists for entire PSB domain controllers/member servers and workstations to comply with FDDC and BLS IT Security Standards using scripting and/or WSUS. Travel has been and can be up to 50 when upgrading regional domain controllers/member servers or consulting for major projects in the entire BLS enterprise. On call 24x7 for support using VPN/Citrix remote client administration. Currently planning, building and administering Windows 2008 domain controllers/member servers/exchange servers/Citrix servers to make complete migration from Windows 2003 to Windows 2008 forest wide. Group policy planning/implementation for Windows 2008. VMware 4.1 administration concerning virtualization/consolidation of current servers P to V for WINS/DHCP, Exchange Front End, IIS, IIS Proxy instances, File/home directory, Citrix XenApp 6.5 , networking and fundamental implementation into current infrastructure. Avocent lead administrator for entire BLS administrator community accessing via KVM technology administering their servers.
Citrix Administrator Bureau of Labor Statistics
Citrix administration/engineering duties include testing, delivering and customizing client legacy/Microsoft packaged applications in both Presentation Server 4.5 and XENApp 5.0/6.0/6.5 infrastructures, upgrades and hot fixes, creating new application servers using VMware ESX Server/VMware vSphere Client 4.1/5.1, multiple farms builds and monitoring application usage and administering user profile/permissions management. Firewall coordination with firewall engineers concerning certain applications on Citrix servers accessing forest wide BLS user community via LAN or VPN. Engineered a unique Citrix farm DMZ hosting outside email accessibility for BLS users to meet security demands of client. Created customized Citrix reports for client. Reports consist of application usage, server productivity, server load, CPU Utilization, concurrent users and memory. Create Web Interfaces to fully utilize Citrix online plug-in v12 concerning user community to view/access PS 4.5, XENApp 6.5 and Webmail Citrix infrastructures. Assist with SMS lead administrator for deployment of Citrix plug-ins to BLS community in forest domain, sub domains and regional domains. Administer Terminal Services profiles for all Citrix users in BLS community via NetApps. Administers group policy for all Citrix server infrastructures.
Citrix Technologies:
- Citrix Presentation Server 4.5
- Citrix XenApp 5.0/6.0/6.5
- XenApp UPM
- Citrix Management Console/XENApp Advanced Configuration
- EdgeSight 5.4
- Xconnect
- Citrix XENApp Web Interface
- Citrix Access Gateway CAG
- ICA File Creator
- PN Agent v11
- Online Plugin v12
- SQL Server 2005-2008
- Hotfix Management
- Citrix Licensing Console
- VDI
Confidential
Wintel Systems Administrator
Responsible for maintaining Fannie Mae's DC Test Lab environment which is a replica of Fannie Mae's production environment in the District of Columbia, Urbana, Maryland and Reston, Virginia. Duties included Active Directory maintenance, domain controller migrations, promotion/demotion of domain controllers, DNS updates/maintenance using Vital QIP, server tests w/clients concerning Fannie Mae software/hardware rollouts into production, re-imaging test lab servers using Ghost2003 or WinPE to mock production server standards, building servers e.g. HP Proliant DL380's, DL385's DL580's with new image for either Windows 2003 Standard or Enterprise software, research web for updates on drivers, patches, hardware for current systems Fannie Mae governs, providing outside Fannie Mae software/hardware testers access to DC test lab via specific routers, updating and patching Active Directory and test environment using Shavlik software every third Tuesday, Group Policy implementation, assisted with Exchange 2003 mailbox store migrations as well as newly built Exchange 2003 servers. Consistent contact with POC's concerning Fannie Mae software testing. Responsible for long term projects concerning implementation and licensing of VMWARE ESX Server 2.5.2, 3.0.1 and VMWARE Workstation 5.5 into the Fannie Mae production and test lab environment. Assisted with installation, configuration, and setup VMWARE ESX Server 3.0.1 Virtual Center 2.0.1 to provide virtual machines as servers/workstations for test environment to continue effecting testing before rollout to Fannie Mae's production side. Continued research for strategies and cost effectiveness concerning a virtual environment in both test lab and production. Software and hardware testing on virtual machines VMs concerning operating systems, legacy applications, Fannie Mae applications, patches and anti-virus Assisted with the building and configuration of HP Blades for domain migration concerning Fannie Mae's test domain fanniemae.lab . Continued work and assistance with DFS Distributed File Systems migration from Windows 2000 Advanced Server to Windows 2003 Enterprise.
Confidential
Network Administrator
Responsible for maintaining, upgrading, troubleshooting, programming, and administering a diverse and geographically dispersed network for The Department of Army. Evaluates the effectiveness of systems, devices, procedures, and methods to safeguard classified, private, and other sensitive data in computer accessible media performs security inspections and prepares reports that include findings and recommendations for correction of deficiencies and reviews or designs system software routines to provide an audit trail of activity against sensitive data files or insure that access to data through remote terminals is properly controlled. Responsible for the setup and maintenance of all the servers for the Army JAG Corps. Ensures complete backup of all data systems throughout the entire WAN for a 30 day period with redundant site fail over ensure user data is always available. Manage user accounts and lifecycle replacement of servers. Managed, improved, and maintained the Administrative Law Case System ALCS , a web-based application essential to the everyday operations of the Administrative Law Division of OTJAG and Detainee Operations Case Tracking System DOCTS to Microsoft Internet Servers that are using Microsoft SQL, Server 2003 and IIS server vr6 , also keeping all servers updated and patched, and troubleshooting any problems at the server. In charge of virtual servers W2K3 on Linux operating systems containing production/staging system information and data using VMWARE v2.5.2 Virtual Services. Implemented a network wide monitoring system GFI TempR for temperature/humidity and continuity stabilization. Network security duties consisting of network scans STAT 6.0 for major/minor vulnerabilities, compliancy objectives pertaining to Department of Army standards and continuing projects concerning Big IPv9.0, COOP Continuity of Operations Sites for Mirrored networks in Ballston and Rosslyn. Other system administrator small projects pertain to Army JAG Corps integrity such as server migration, application installs, antivirus server set up for LAAWS workgroup servers, Active Directory admin duties and user account setups, Disaster Recovery implementation and documentation, full and differential backups of all servers using the software Commvault and the ADIC tape drives. Administering SANS Storage Area Network CX500-600-700 series for two LAAWS sites Ballston and Rosslyn .
Confidential
Network Administrator
Member of a team tasked with building a new Enterprise / Corporate .EDU domain network in the Gray Research Center, to include an offsite location. Established a Windows 2003 Enterprise network, incorporating Dell PowerEdge 7 servers for three concurrent networks running in the Research Center. Updated the infrastructure within the Research Center by connecting the client PC's via CISCO 2950 switches 7 and a fiber optic backbone. Configured and implemented a Cyberguard FireStar 500 firewall. Team member tasked with implementing and managing a new Exchange 2003 mail server. Created and managed accounts for a staff of 40 plus users. Tasked with the update of software, patches, etc. for the Patron server. Team member tasked with the day-to-day management of a 50 -user base for a Patron network located within the Research Center. Tasked with implementing policies and settings for Patron user accounts. Installed and configured Norton Web Security and Norton Antivirus Server for the server / domain controller of the Patron network. Assisted with administering the TRIM Captura version sever, Veritas 9.0 Backup server and Horizon 7.02 Web server. Maintain inventory control and documentation on all h/w s/w purchased and received update equipment database as required . Installed, configured and administer a wireless environment using the Netgear Cable/DSL Prosafe Firewall w/Print Server model FR114P router.
Confidential
PC Technician
Staging and Deployment of Dell 600 series B57.Dos laptop and Del GX260 series E1000.Dos Desktop workstations. Conducted the staging of desktop and laptop workstations using the NMCI Navy Marine Corps Intranet Staging Instructions Version 1.5. Set up secondary profiles for USMC United States Marine Corps public folder access, join workstation domains, migration procedures with help of staging lead and configurations of undocked profiles and defrag registry and final cleanup. Installing, configuring, imaging and troubleshooting desktop and laptop computers in a WinNT/2000/XP environment. TCP/IP and VLAN allocation switches for military Walter Reed Army Hospital and civilian pc s Installing late model pc s with newer models compatible with the new military software programs, IP switches on most network and shared printers, military software installs Troubleshooting customer related computer problems.
Confidential
Database Administrator
Ensured database performance and resolves network related problems in a WinNT/98/2000 environment. Completed design changes to foster database usage. Identified and removed duplicated records while entering new and terminated client information. Researched and compiled database related resources to strengthen knowledge base. Provided synchronization updates for remote databases in regional areas of the company. Beta testing updates for training manuals and groups training for the ACT database. Attended high-profile meetings concerning RFP s for active prospects obtaining MHSA and EAP assistance.
Confidential
Help Desk Agent/ Applix Administrator
Primarily assisting travel agents with reporting procedures through IAR Interactive Agent Reporting . Duties included receiving incoming calls from numerous travel agents dealing with questions, comments and concerns for reporting procedures detailed logging of each call incident into a service application system known as Confidential.Continued beta testing, coding, query design, forms design, call reports account creation