Windows Engineer/vmware Engineer Resume Profile
NJ
Objective:
To apply my 19 years of experience in Information Technology to work projects through to completion, and strategize an IT framework that leads to a well-structured organization.
Technology:
Operating Systems: Windows Server 2000, 2003 R2, 2008 R2, 2012, XP, Windows8 Vmware ESX ESXi, 3.01, 3.5 4.0, 4.1, 5.0, 5.1, 5.5
Familiarity Linux: RHEL 6.5 installations, Open Client 6.5 Workstation, Familiarity with Windows Hyper-V System Center 2012 Experience with Netware 5.0, 6.5
Applications: Active Directory, GPO, InfoBlox, BAB, DFS, Altiris, ArcServe, Avamar, Acronis, EMC OnCourse, Citrix Enterprise Server 4.x, Metaframe XP, Centennial, Double Take, DELL OpenManage, MS Exchange 2003, 2007, EMC OnCourse, , IIS 6.0, 7.5, VERITAS Cluster, IBM SAN Manager, EMC PowerPath, HBAnyware, IBM Director, Lumension, McAfee AV, EPO, Trend Micro, Microsoft SQL Server 2005, 2008, HP SIM, Symantec SAV, SEP, Symantec NetBackup, Tivoli TSM, UCS Manager, WSUS, VMconverter, QUEST, Upstream Backup, Visual Source Safe, CRT 7.0, Interactive SoftWorks, IN-House applications
Hardware: Cisco switches 3500/3550/6500 series, with Cisco entry-level IOS skills, Cisco MDS switches, IBM SAN switches, SAN, FCOE, Ethernet, FastEthernet, Cisco UCS 501B chassis, Cisco UCS B200 M2 M3 blade servers, VCE, DELL R510, R710, PowerEdge 2850, 3850 rack-mount servers, Hewlett-Packard chassis, blade servers, rack-mount servers, IBM chassis, H21, H22 server blades, IBM X-Series rack-mount servers, x3550 M2, 3580 M2, X5, Qlogic HBA's, Emulex HBA's, IBM DS 480 SAN, EMC VNX and VMAX SAN storage units
Networking Protocols and Utilities: TCP/IP, UDP, DHCP, DNS, SMTP, SNMP, ICA, HTTP, HTTPS, FTP, TFTP, SSH, Putty, Hyperterminal, Telnet, VLAN's, Sysinternals, Process Explorer, RichCopy, RoboCopy, Microsoft Tools, familiarity with iSCSI, NAS
Interpersonal: Team-player, positive attitude, self-starter, self-sufficient, responds well to constructive criticism, takes ownership of projects, clear communication skills-both verbal and written, shares IT knowledge, innovative, executes well under pressure, respectful, honest
Professional Experience:
Confidential
Windows Engineer/Vmware Engineer
- Windows Server Engineering, design, basic AD administration, and troubleshooting support
- Physical/virtual provisioning and server builds of Wintel 2008 and 2012 virtual and MDT . This included Windows 2008 two and three node clusters.
- Active Directory security administration and vCenter Single Sign-On
- Utilizing vCenter and vCenter Web Client in creating clones, templates, and Guest Customization Specification
- Implementation and maintenance of new Cisco UCS 510B chassis, UCS B200 M2 and M3 blade servers, UCS 6140XP Fabric Interconnect hardware, and utilization of UCS Manager for administration maintenance purposes
- Firmware upgrades to UCS components, FI's, IOM, IMC, Blade Servers at several sites to update firmware version from 2.0 4b to 2.1 3b
- Maintain HP DL380 and 580 rack-mount servers and BL 465, 460C server blades with C7000 enclosures
- Implementation, configuration, and support of the Cisco UCS vSphere v5.5 environment at the new Piscataway, NJ Data Center.
- Maintenance, administration, configuration, and support of the Cisco UCS vSphere v5.0 environment at both the Fair Lawn and Franklin Lakes, NJ Data Centers.
- Implementation of vSphere 5.5 VC Server, installing the 5.5 Hypervisor from boot LUN. The configuring of the management network and then adding new 5.5 ESXi Hosts to the HA/DRS Cluster.
- Vmware ESXi 5.x host implementation, maintenance, troubleshooting, VUM patching, and administration support.
- Implemented vCenter Site Recovery Manager for Disaster Recovery and configured SRM containers
- Expanded the HP 460C Blade Center for VDI hardware capacity
- Provide specifications for server applications regarding the Windows Server 2003 to 2008, 2012 upgrade project when provided by the vendor during the server build process, specified in the server build intake form
- Responsible for EMC Power Path configuration and upgrades on Wintel servers. Worked with SAN Engineer regarding code upgrades to SAN arrays.
- Lead Engineer on the Wintel Server Decommission and Datacenter migration project
- Data Center network SAN liaison and server hardware support Hands-On
Confidential
Windows Engineer/Vmware Administrator
- Windows Server operations and maintenance support
- Data Center infrastructure support
- Physical/virtual provisioning and Windows 2008 2012 server builds
- Virtual Center administration
- Responsible for server security remediation and baseline Tivoli BigFix
- Troubleshooting .NET Frame versions v2.0 through v4.5
- Active Directory domain and OU administration
Confidential
Windows Engineer/Vmware Administrator
- Operations support of Windows server farms and data centers
- Windows Server OS maintenance on IBM x series servers
- Erected 4.1 ESXi Host and added to vCenter cluster
- P2V and V2V custom virtualizations
- Vmware vCenter host and virtual machine administration
- The decommissioning of Windows and Citrix servers
- Rack-mount and configuration of IBM SAN switches
- Built Windows 2008 Datacenter domain controller and installed at new Newark data center
Confidential
IIS Administrator/Windows Engineer Backfill Position
- New .NET code deployment releases to production, development, and staging environments
- Attribute changes, HTML and web.config changes, FTP web site replications
- IIS WEB administration troubleshooting, log file maintenance, and working with IP Monitoring system
- Requested and installed various CA WEB server certificates
- Utilization of batch scripts and VB scripts
- Windows provisioning and Windows server support
- Virtual builds utilizing Hyper-V System Center Disaster Recovery
- Virtual builds utilizing Vmware vCenter Production
Confidential
Windows Infrastructure Engineer/Vmware Engineer
- Responsible in creating new Active Directory groups with permission assignments to NTFS Share data
- Stabilized the Lumension MS security patching system by upgrading font-end application server and Lumension patch agents
- Fashioned Helpdesk and Alert Center procedures and scheduled all patch related activities for the different computing environments
- Implementation of new Cisco UCS 510B chassis, UCS B200 M2 blade servers, and UCS 6120XP Fabric Interconnects
- Racked chassis and installed server blades
- Cabled all required Ethernet uplinks, FCOE, and SAN connectivity
- Rack-Mounted VNX storage appliance, made SAN connections, and daisy-chained storage shelves
- Configured Cisco MDS multi-layered SAN switches
- Worked with Cisco Engineers and Firewall teams to ensure proper network routing out to the core and required ports to be opened
- Installed vCenter Server, built and added ESXi hosts to Vmware DC clusters
- Created virtual switches, configured port groups, VLAN's, uplinks, etc. UCS
- Fashioned Helpdesk and Alert Center procedures and scheduled all patch related activities for the different computing environments
- Constructed new physical rack-mount DELL R510 and R710 servers
- Provisioned Windows 2008 R2 physical servers and Windows 2003, 2008 virtual servers. Worked on design and specifications with vendors
- Daily 24x7 support of Windows servers, and maintaining stable system within the data center
Confidential
Windows System Administrator
- Netware 6.5 to Windows 2008 data migrations on to new MS cluster server
- Applied and restored share and NTFS Active Directory security permissions
- Daily Citrix end-user support, and maintenance/support of servers/Citrix Farm
- Brand new server builds of physical and virtual Windows servers
- Responsible for the maintenance and support of the Lumension MS security system
- Responsible for the maintenance and support of Vmware ESXi 4.1, vMotion, builds, applications, memory resources, hardware failures
- IT Support at the new Freedom Tower location owned by the Port Authority
- Daily 24x7 support of Windows servers, and maintaining stable system within the data center
Confidential
Windows System Transition Engineer
- Produced system design packs for the Information Enterprise department
- The IES transition team provided reliable, cost effective, and SAN storage services
- Scalable systems included Windows 2003, 2008, virtual servers, Windows Clusters, Print File Servers, application servers
- Provisioned virtual builds and Windows 2003, 2008 physical builds at both DR and Production DC sites
- Built IIS 7.0 and 7.5 WEB servers, Citrix, Windows application and DB servers
- Transition the newly built servers into the production, development, UAT, and QA environments
- Builds consisted of HP Blade and rack-mount servers, 460C, DL380, 580, and DL 585
- The decommissioning of older servers including Citrix
- Stood up new Windows 2003 Cluster Servers with EMC storage and MSA 2000 external array enclosure attached
Confidential
Senior Windows Administrator/Vmware Administrator
- Provided 3rd level 24x7 multi-platform support of Active Directory, Windows OS, WEB, server applications, SAN, and LAN troubleshooting
- Maintenance, administration, upgrades, and support of approximately 600 physical and virtual Windows servers
- Troubleshoot ESX ESXi Host issues and faults with the vCenter environment
- Performed P2V conversions to company specifications, created VM templates, and provisioned new VM builds
- Introduced Citrix host servers into the Citrix farm, and configured with Terminal Services Citrix 4.5 licenses
- Performed Citrix Presentation Server administration at the farm server levels, configured prerequisites, session reliability, policies, bandwidth, ICA protocol, zones, applications, shadowing, client and printing connectivity, etc.
- IIS 7.0, 7.5 installation of server components and the support/troubleshooting of WEB servers, AD security, application pools, .Netframe, web site performance, virtual directories, and code deployments
- Responsible for managing the Lumension server and the support of the patch management process
- Upgraded and introduced two 2003 domain controllers into the Kennedy airport environment, and utilized as the airport badging system
- Lead on the MacAfee EPO v4.5 project, tested in POC, and then then implemented EPO into the production environment
- Lead role, performed proof-of concept testing of 2-node Windows Cluster, documented procedure, and then introduced the cluster into production. Setup all cluster IP, disk, and shared resources
