Global Infrastructure Network Engineer Resume
SUMMARY:
- Life - long passion for technology with over 30 years of professional IT experience and
- Lead Network Engineer at fortune 500 companies providing network and server solution design, implementation, automation, mentoring, and technical support for over 8,000 Employees
- Lead Engineer for Network Operations, Monitoring, Partner tunnels, and Cloud migration projects
- Holds self to high standard of integrity and professionalism
- Versatile and adaptive in skillset
- Networking with 29 years: Global Network Engineer (last 9+ years), ERP, UNIX, DB, Military
- UNIX with 25 years: NXOS, IOS, HP-UX, Solaris, Linux (various)
- Disaster Recovery with 19 years: Network, UNIX, DB, SAN
- SAN with 19 years: EMC Symmetrix, Clariion, Datadomain, IBM XIV
- DBA with 19 years: Oracle, Informix, Microsoft, etc.
- ERP with 10 years: SAP Basis (Network, UNIX, DBA, Programming)
TECHNICAL SKILLS:
Tools: & Collaboration: Microsoft Office Microsoft Visio SecureCRT, ASG - RD, etc. Wireshark GNS3 WebEx Jabber Sametime Landesk Skype
Operating Systems: Cisco: IOS, NXOS UNIX: Solaris, HP - UX Linux: RedHat, Centos, Ubuntu, SuSE, BSD, etc. Microsoft Windows Desktop XP, Vista, 7, 8, 10 Microsoft Windows Server 2003, 2008, 2012
Virtualization: Microsoft Azure VMWare Workstation Pro VMWare vSphere Virtual Machine Provisioning Physical to Virtual Migration VMotion VirtualBox
Monitoring: Solarwinds NPM, NCM, UDT, NTA, IPAM, Atlas, Syslog Solarwinds Engineers toolset Cisco Security Manager (CSM) Panorama Splunk CA Performance Center CA Netflow Analysis CA Performance Manager HP NMMi HP OVPI WhatUpGold
Wireless Management: Solarwinds NPM, NTA, IPAM, Syslog Cisco Prime Infrastructure (PI) Cisco Wireless Control System (WCS) Cisco Wireless Controllers (WLC) Cisco Access Points Power Over Ethernet Control and Provisioning of Access Points (CAPWAP) AP's for Autonomous, Local - Mode, and FlexConnect AirMagnet Surveyor (RF surveys) MetaGeek Chanalyzer (RF analysis) Mobile devices Barcode scanners 802.1X, SSID's (Secure and Guest) Active-Directory Radius, FreeRadius, DaloRadius Cisco Mobile Device Manager (MDM) Cisco Identity Services Engine (ISE) Cisco Secure Access Control System (ACS) Splunk (Mobile Device Registration Analysis) Link Aggregation (LACP) 802.11(a/b/g/n), 802.11ac WAVE 2
LAN Management: Solarwinds (all) and Engineers toolset Cisco Catalyst switches - 3850, 4500X, 6500E, etc. Cisco Nexus switches - 2K, 5K, 7K, 9K Infrastructure (Patch panels, etc) Power Over Ethernet IP-Camera based Campus Surveillance RFID Badge Access and Monitoring Cisco Identity Services Engine (ISE) Cisco Secure Access Control System (ACS) Redundancy, Resiliency Netflow TACACS+ VLAN, EtherChannel, 802.1Q and ISL, STP, etc. VSS, HSRP, etc. DNS, DHCP, SNMP, etc. Traffic Shaping, Priority Queuing, Class of Service (CoS), Quality of Service (QoS)
WAN Management: Solarwinds (all) and Engineers toolset Cisco routers - ISR G2, ISR 4K, and ASR series routers WAN-Optimization (accelerator) Cisco WAAS Central Manager Cisco WAVE SOHO VPN BGP, eBGP multi-hop EIGRP, OSPF, RIPv2 GRE, mGRE HUB/Spoke (DMVPN) IPSec TACACS+ Cisco Identity Services Engine (ISE) Cisco Secure Access Control System (ACS) Netflow Splunk Syslog WAN Circuits, MPLS, VPNS, VRFs, Fiber Optics (DWDM), Frame Relay, Point to Point, OCx, DS3, E/T1s Ethernet, Serial Network Access Control ACL, NAT, etc. Traffic Shaping, Priority Queuing, Class of Service (CoS), Quality of Service (QoS) Redundancy,Resiliency
Change Management: Solarwinds NCM Cisco Security Manager (CSM) Panorama Dell, DataDomain, Avamar Disaster Recovery High - Availability / Redundancy
VOIP / Telephony: Cisco IP Phones Cisco Voice Gateway - 2821, 3925 Cisco Voice Analog Gateway - vg224 Cisco Integrated Management Controller (CIMC)
Firewall and Security Management: Panorama (Web and Content Filtering) - PA M-500 Palo Alto Firewall (cluster) - PA-5050 Disaster Recovery Site-to-Site (B2B) IPSec Microsoft Azure cloud Cisco ASA Firewall Cisco Security Manager (CSM) Checkpoint Firewall Microsoft ICS Firewall SonicWall Firewall Websense Kerberos Qualys Scanner WhiteHat cloud Symantec VIP RSA SecureID Active-Directory TACACS+ Radius, FreeRadius, DaloRadius Cisco Identity Services Engine (ISE) Cisco Secure Access Control System (ACS) Splunk Syslog Cisco Anyconnect VPN client GlobalProtect VPN client PulseSecure RA F5 Load-balancer NetScalar VMware DMZ, vDMZ IDS, IPS Redundancy, Resiliency
SAN storage: SAN Switches EMC Symmetrix, Clariion, Dell EMC Data Domain, Avamar IBM XIV
Database: MS SQL Server MS Access Oracle Informix MySQL
Campus Technical Support: Computer Imaging PC/Laptop Physical Repair Malware removal and prevention Print Management A/V Setup Physical Security
PROFESSIONAL EXPERIENCE:
Global Infrastructure Network Engineer
Confidential
Responsibilities:
- Lead Network Engineer for Global Data Center operations in the US
- Network Lead within an IS/IT team, daily assisting Server teams, Local Site administrators, and the Helpdesk, with supporting 8000+ clients
- Mentored Network Engineers in troubleshooting, monitoring, and configuring of LAN, Wireless, WAN, Firewall devices
- Designed and implemented networking solutions in support of Multiple Business Units within Confidential, encompassing 148 Remote Sites; within North and South America, Europe, Middle-East, and Africa; and with external Partner Businesses in Asia Pacific
- Created and maintained an up-to-date Network Infrastructure inventory listing; conducted yearly inventory to identify inclusion on Cisco SMARTnet contract
- Created and maintained Disaster Recovery documentation and procedures for Network and UNIX; Lead Technical for yearly DR tests at Sungard facilities
- Performed budgeting and purchasing recommendations/processes; responsible for project management and resource scheduling
- Implemented routine network configuration backups, managed configurations for all network devices and configurations
- Developed Advanced Scripts for reporting and automating bulk network configuration changes
- Provided and maintained detailed network architecture diagrams and documentation
- WAN Management:
- Global HUB Build-out, Validation testing, Remote Site migration FY2017; three regional locations: Columbus, Amsterdam, and Hong Kong; new VRF’s, Default-route, Site-Of-Origin, and AS prepending; Verizon (PM contract for design); performed validation and acceptance testing, redundancy and failover testing; with MPLS routers, DMVPN routers, INET routers, Palo Alto FWs, WAAS, WLAN guest anchors, WLC FlexConnect controllers, etc.; site migrations (VRF, DMVPN)
- Lead Project Engineer WOS for new HUBs FY2017; setup, configured, and validated deployment of WOS solution to new Confidential HUBs; WAVE devices associated with two separate Central Managers (two Topologies), and then split off from Confidential ; maintained and upgraded
- Changed MPLS circuit provider of choice from Verizon to AT&T FY2017; this followed the Confidential HUB deployment in Columbus, Amsterdam, and Hong Kong; coincided with the Managed Take Over (MTO); involved Router configuration changes for DMVPN; assisted in Global Team effort; upgraded many of the circuits; router list divvied among network engineers; coordinated with AT&T and Verizon; configured and validated connectivity
- Lead Project Engineer for Disaster Recovery (DR) Business Unit Consolidation FY ; combining Columbus GDC with the Warrenville GDC required a re-design of Network infrastructure to support Recovery at the Philadelphia Sungard-AS facility; COLO equipment housed in Chicago was moved to Philadelphia; WAN capacity increased; configured and deployed Cisco ISR4451; 1GiG MPLS replaced offloading and GRE/IPSec; refreshed network switches; assisted Server admins with re-IP of non-RFC1918 for compliance with standards; expanded contract for 10 GiG interconnect between COLO and Recovery Services; Avamar and Data Domain backup architecture replaced with Dell; in July 2016 the Team successfully performed DR testing without issue
- Divestiture separation from Confidential FY ; assisted in Global Team effort to isolate and perform VRF migration of the Confidential networks; deployed Firewalls as next-hop into Confidential network; remote Site router configuration for VRF; Global detailed inventory of Network devices and software; name change from Confidential to Confidential Co required rebranding/removing all s to Confidential ; identification of Confidential HUB and Datacenter resources to be migrated; phased-in firewall ACL restrictions
- Worked with Confidential to establish Standards, guidelines, and Router templates for WAN-offloading deployment in Europe and Africa for non-Business-Critical Web traffic; where MPLS costs are premium and low-cost internet is prevalent; beta sites used for proof-of-concept
- Implemented and Managed WAN-Optimization (WOS) on Routers and WAVE devices; standalone and redundant layer-2 peering; upgraded (HW and SW), troubleshot, and isolated issues using Cisco WAAS Central Manager; where appropriate, bypassed highly compressed TCP traffic (WCCP redirect for Double-Take); isolated common issues with CIFS/445 by working with engineers and developers at Cisco TAC to resolve Open-FD limitation in Linux
- Configured Netflow on WAN Routers and Distribution switches, used during periodic review and troubleshooting
- Deployed traffic shaping and QoS markings for Landesk patch management and Symantec Endpoint Security
- Global Router refresh project FY2014; coordinated HW refresh for 2800 series and SOHO routers
- Managed: Routers (total 200), Central Manager, WOS (total 40), and over 2000 subnets
- Yearly budgeting for WAN refresh and/or enhancements
- Firewall and Security Management:
- Lead Project Engineer for migrating tunnels FY2017; Site-to-Site 3rd party (B2B) Tunnels, consisting of Warehouses (APAC had 7), Vendors, and Partners; migrated to Palo Alto’s from Cisco ASA’s due to an acquisition requirement to be completely separated (removed) from Confidential Electric; coordinated and conducted meetings; provided the re-design, configuration, and rollout; liaison with the partner’s Network support and the local Business contacts to validate connectivity (NAT rules, Security rules, Regional-HUBs, Remote-Access, etc.); when possible at the partner side, deployed parallel tunnels followed by legacy decommission
- Lead Project Engineer for Verizon IoT (Internet of Things) FY2017; coordinated with Verizon-Wireless; configured and validated Land Mobile Radio (LMR) connectivity with the Far-end devices (Military base); configured using MPLS with private BGP ASN, GRE/IPSec to Primary and Secondary locations (AS prepended for path selection), and separated VRF (for security)
- Lead Project Engineer for Microsoft Azure for developers FY2017
- Implemented and Maintained Checkpoint FW’s; migrated DMZ’s to Cisco ASA’s; increased security posture by terminating B2B’s, and placing “outside services”, to vDMZ infrastructure
- Implemented and Maintained Cisco ASA’s; adjusting rule-sets per Business needs; Splunk logging for Firewall devices, used during periodic review and troubleshooting
- Maintained Microsoft ICS reverse-proxy to Sharepoint internal Web server (not exposing it to the outside); Business migrated to newest Sharepoint and utilized F5
- Implemented Cisco ACS for authentication, authorization, and accounting (AAA): Radius (Wireless) and TACACS+ (network devices); maintained, upgraded, and later virtualized
- Migrated network devices (Radius, TACACS+) from Cisco ACS to Cisco ISE; Two-factor authentication for WAN and Firewall devices (via Active-Directory and RSA SecureID)
- Periodic Qualys Scanning and review for all network connected devices (with few exceptions for UNIX servers)
- Periodic scanning with WhiteHat cloud and review of all Public facing
- Symantec report review, and isolation of devices (by MAC and/or Port) for Virus threats, etc.; Domain accounts locked when appropriate
- Landesk and WebEx used for troubleshooting remote end-point devices (Windows applications)
- Transitioned Confidential NOC to Verizon NOC for WAN circuit and Security monitoring (Verizon PM for HUB install)
- Managed: Firewalls (total 20), Tunnels (100), and Appliances
- Yearly budgeting for Firewall refresh and/or enhancements
- Monitoring:
- Lead Project Engineer for Global Solarwinds deployment FY2016; Setup and configured new Solarwinds instance in Columbus GDC, with regional polling engines in Amsterdam and Hong Kong; migrated and merged two Solarwinds instances; Solarwinds consisted of NPM, NCM, UDT, NTA, IPAM, Atlas, Syslog; imported 1200+ nodes; conducted sessions for administrator; performed periodic upgrades of the software; added custom pollers as needed (for VoIP Cisco CUCM); previously installed (et al) old Solarwinds instance in Warrenville GDC during FY2008
- Developed and maintained Solarwinds (SWQL) scripts to auto-extract Key Performance Indicator (KPI) metrics
- Configured Solarwinds to monitor Wireless-LAN controllers (and AP’s); developed customized reporting for spotting over-utilization for troubleshooting
- Created customized reports in Solarwinds and Cisco Prime to identify issues and for capacity planning; setup alerts to trigger when thresholds are exceeded
- Extracted Solarwinds nodes from Confidential NOC instance, imported into new Confidential HQ instance; NOC migrated to Solarwinds FY2015, from HP NMMi, HP OVPI, CA tools
- Periodic monitoring and capacity planning for Quality of Service, and varying types of traffic, especially VoIP, Video, and Business Critical applications
- Periodic monitoring and capacity planning for bandwidth utilization, etc. from all perspectives (WAN, LAN, WLAN)
- Periodic monitoring of HW and SW updates; planned for continuing maintenance and future growth
- Monthly capacity review of WAN circuits; identifying trends and investigating
- Daily monitoring of Syslog for Hardware and Security related incidents
- Daily Wireless monitoring and evaluating RF interference, coverage holes, user density issues, and seamless mobility issues (roaming between areas)
- Daily Wireless monitoring and capacity planning for average number Users joining each AP, overall capacity throughput and WLC uplink to the Switch infrastructure, number of new AP’s that can join a WLC, IP Planning for DHCP pool exhaustion; monitoring of Shared accounts
- Yearly budgeting for Monitoring refresh and/or enhancements
- Wireless Management:
- Daily support of a large staff, including VIP; utilizing monitoring software (Cisco Prime or Cisco WCS) and specialized software to troubleshoot and resolve user connectivity issues
- Chanalyzer software to monitor the dual-band spectrum, identify and eliminate RF interference, dead spots, and channel saturation
- Deployed Wireless Standard Secure SSID’s (Active-Directory authentication), Custom SSID’s, and Guest Anchors with Radius
- Coordinated and upgraded software on Wireless Controllers and Access Points during off-hours to limit downtime
- Assisted Confidential in establishing Standards for Wireless and LAN; consolidated and transitioned WCS to Corporate
- Windows Active-Directory group policy (GPO) associated with Workstation/Laptop users to eliminate common Wireless connectivity problems
- Documented procedures for barcode scanners, and other specialized network devices
- Sharepoint portal location for Wireless documentation of each “location” (small, medium, large), to include Quotes, Purchase Orders, AirMagnet Projects files (Predictive, Passive, and Active surveys), Facility Drawings and/or Pics with dimensions, Visio Diagrams for Supporting Infrastructure, Local Points-of-Contact, &etc.
- Spreadsheet for Wireless considerations, to include: Concurrent users, Voice, Coverage Density and Throughput needs, FlexConnect, WLC Redundancy, SmartNet, Access Point models (internal or external with antenna models), Area definitions with sq. ft. for Open areas and areas
- Configured and Deployed WLC’s and AP’s for small, medium, and large sites, according to Best Practices per Cisco Validated Design; AP’s with low latency to a nearby WLC may be configured for Central FlexConnect (usually for smaller sites, but also common with shared sites)
- South Africa for a month to combine two businesses into one; configured and deployed Wireless LAN controllers and AP’s; multi-floor Office area and Warehouse for 250+ employees; performed Wireless Site Surveys (Predictive, Passive, Active) for optimal deployment; configured and deployed network infrastructure, to include WAN Routers, WAN-Optimization, LAN Distribution and Access switches
- FY’2015, performed Global Wireless refresh across the entire Business, upgrading Wireless Controllers to model 5508 and upgrading older AP’s (1242’s, etc.) to the latest models; performed LAN refresh alongside the Wireless refresh in-order to support PoE requirements
- Sampling of Wireless projects for prior two years: Reynosa Mexico (Office and Warehouse) - Jan-Feb 2016 (refresh); Lorain Ohio (Office) - Mar 2016 (refresh); Zagreb Croatia (Office) - Mar 2016 (refresh); London Ontario Canada (Office) - Apr 2016 (refresh); CamoniReal Peru (Office) - May 2016 (refresh); Reynosa Mexico + McAllen Texas (Office and Warehouse) - May 2016 (new) +WCS; Costa Rica (Office) - Jun 2016 (new); Bogota Columbia (Office) - Sep 2016 (refresh); Zagreb Croatia (Office and Warehouse with LAN/WLAN for Mokrice) - Mar-Sep 2016 (expansion); Mississauga Canada (Office and Warehouse) - Oct 2016 (new); Columbus Ohio (Global Datacenter) - Jan-Jun 2017 + HUB build-out (Logicalis contractor); Delaware Ohio (Office and Warehouse) - Jan 2017 (refresh); South Africa (Office and Warehouse) - Feb 2017 (refresh); Reynosa Mexico (Office) - Mar 2017 (expansion); Lorain Ohio (Office) - Apr 2017 (expansion); Global Wireless infrastructure for new Global Datacenter HUB - Feb-Oct 2017 (integration)
- Decommissioned older Cisco Wireless Service Modules (WiSM); deployed Managed Wireless and removed Autonomous AP’s from the environment
- Management platform for Wireless was migrated to Cisco Prime Infrastructure with Cisco ISE for Radius authentication during HUB turn-up in FY’2017 (Logicalis PM for install)
- Managed: Wireless controllers (total 60), and Lightweight Access Points (total 600 with 50% FlexConnect)
- Yearly budgeting for Wireless refresh and/or enhancements
- LAN Management:
- Lead Project Engineer for new COLO Datacenter FY2016; Dual 10G dark fiber LAN-extension between Columbus Datacenter and new COLO Datacenter; equipment purchased; worked with internet providers for fiber run, and 1G Ethernet MPLS for data replication; configured WAN router as standard site DMVPN spoke; Dual 4500-X configured for VSS with redundant uplinks to new HUB’s MPLS routers and Palo Alto’s for DMZ; Default route and MSEG networks learned via OSPF, redistributed into EIGRP, and injected routes (to local MPLS) for Sungard data replication; HSRP between Cores, and BGP advert more specific networks at Columbus for Wireless Controllers (and Guest anchors), Cisco ISE, and Cisco Prime, for temp staging until the new ESX environment could be stood up at the COLO (HUB Datacenter); decommissioned Cisco ASA firewalls and B2B tunnel no longer required for replication
- Lead Project Engineer for Reynosa Mexico Business Unit divestiture FY2016 (Leroy Somer); topology was 4 Plants with layer-2 partial mesh, with two collapsed-core layer-3 inter-distribution; Plant-2 configured new router advert slash-21 network; first logically separated; uplink to new router EIGRP advert in default route; secondary-IP’s on VLANs with DHCP scopes for re-IP; new VLAN-ID’s spanning-tree root; configured new WCS+WLC+AP’s for Wireless; TACACS+ and security opened to the network devices; security server became active; then physical separation with fiber pull, and interconnect plant-1 to plant4 for full mesh; removal from monitoring and inventory
- Lead Project Engineer for Global Datacenter relocation FY2015 (Warrenville IL to Columbus OH); local consolidation from full mesh topology with Dual Core, Dual Router, Dual WOS, to a reduced single Core; connections to 6509E port-ASIC re-balanced per module to reduce multi-pathing to fiber switches supporting a complex ESX environment; un-routed layer-2 to non-DMZ ESX, and VM’s were migrated, then the DMZ ESX’s and DMZ switches were removed; the activities were fully documented and well-coordinated during the preparation prior to the move; all cabling was labelled (including HBA’s to Fiber Channel SAN switches); the moving company packed and delivered; Supernet was advertised out of Columbus; multi-Core redundancy established via Layer-3 ether-channel and EIGRP, with injected routes (from Backup router to tertiary circuit) for Sungard Disaster Recovery offloading; the move occurred Friday night, and validation testing concluded Sunday morning; everything went according to plan with no major issues
- Lead Project Engineer for Office and Warehouse consolidations during FY (Stockholm Sweden, Johannesburg South Africa, NoveMesto Slovakia, Mississauga Canada)
- Lead Project Engineer for Global Network LAN Refresh FY ; identified switches that were at or approaching EOL, reviewed existing architecture and discussed current and future projects to gage growth expectations; presented final recommendations; obtain WWT quotes to capitalize on increased port density with stacking technology for resiliency and redundancy; submitted for budget approval; ordered equipment; pre-configured templates according to standards; coordinated efforts and conducted meetings with Local Site contacts; presented detailed cut-over plans, to include action items, diagrams and switch-port mapping spreadsheets; provided time for labelling and proper cable-management; scheduled each refresh during off-hour maintenance windows; at completion of each, updated Portal documentation (Inventory Spreadsheets, Diagrams, etc.) and monitoring software (Solarwinds NPM, NCM, etc.); provided periodic status updates throughout the project, and a final review at completion
- Standardized and deployed configuration for AAA - TACACS+ (security), SSH (encryption), SNMP ACL (monitoring), VTY mgmt. ACL’s (block-for attempts), Port-security (MAC flooding), VTP, Spanning-tree, NTP, logging, QoS, VLANs for Management, etc., Control of unused ports (man-in-the-middle via gratuitous-ARP), Native-VLAN (VLAN hopping), DHCP snooping (DHCP spoofing), Ether-channel and Port-fast (guard), VLAN-filtering for Security, 802.1x on an as needed basis for EAP on port, …
- Setup and configured IP-Based Surveillance systems (Security CCTV)
- Managed and updated VOIP Gateway Routers
- Decommissioned and Upgraded (where possible) all Catalyst switches from CatOS to IOS
- Global Datacenter relocation FY2007 (Mayfield Heights Ohio to Warrenville Illinois); assisted with network activities; lead for UNIX, DB, SAN components; 14 UNIX Servers, 2 EMC Symmetrix arrays, tape libraries, SAN switches, etc.
- Managed: Switches (total 400), VOIP Routers (15), Security devices (total 100)
- Yearly budgeting for LAN refresh and/or enhancements
Senior SAP Basis Administrator
Confidential
Responsibilities:
- Job Role included: Network Administrator, UNIX Administrator, DBA Team Lead, SAP R/3 Security Administrator, SAP ABAP/4 Performance Tuner
- Provided technical support for 2200+ named users (1000+ concurrent user sessions)
- Upgraded to new Servers and EMC Clariion disk array (SAN)
- Technical Lead for relocation of the Global Data Center from Mayfield Heights to Warrenville Illinois
- Technical Lead for relocation of the Sweden and Brazil SAP instances to the U.S.
- Technical lead for Re-IP Address and Domain name change for Marconi divestiture integration into Confidential
- Updated Disaster Recovery procedures to include the Sweden and Brazil instances; validated during Sungard DR testing
- Technical lead to train and transition (SME - subject matter expert) outsourced SAP Basis positions to offshore hires
- Transitioned to Network Engineer position; primary focus was on deploying vendor tunnels using Checkpoint FW
Senior Database Administrator / SAP Security Administrator
Confidential
Responsibilities:
- Job Role included: Network Administrator, UNIX Administrator, SAP R/3 Security Administrator
- Aug’2002, spent a month in Dublin Ireland to provide technical expertise and issue resolution for a recently released Network Software Package; Isolated, resolved, and presented finding with mitigating strategy to the group
- Upgraded UNIX Servers, and migrated to newer EMC Symmetrix disk array (SAN)
- Technical lead for 10 Business Unit Go-lives in SAP, and upgrading SAP R/3 to 3.1G, 3.1I, 3.1I com, 4.6C, and 4.6D
- Provided technical support for 2200+ named users (1000+ concurrent users sessions)
- Created automated Disaster Recovery scripting to self-generate scripts to mirror production at a Sungard DR facility
- Managed Checkpoint Firewall for DMZ, Datacenter network connectivity of Routers, Switches, and SAN
- Provided cross- in areas of Network, UNIX, and Database administration for 5 individuals
- Aug’2000, spent three weeks as “Lead Analyst” in Cupertino California (HP facility) to perform Stress testing and Performance tuning to support a large (critical) Business Unit Go-live; Presented recommendations; Upgraded the Informix Database and patched the SAP R/3 instance; Go-live was a tremendous success; my end-to-end skills (Network, UNIX, DBA, SAP) were labelled as Platinum by “Arthur Anderson”, which is the highest level of competency for AA consultants
- Created Disaster Recovery procedures; designed and validated UNIX scripts for recovery at a Sungard DR facility
- Reltec was the 1st SAP site to “successfully” upgrade to Informix 64bit architecture; isolated memory management and optimizer bugs; worked with SAP and Informix to correct issues
- Mentored 2 recent hire DBA’s (1 direct, 1 contract)
Datacenter Operations - System Manager and Trainer
Confidential
Responsibilities:
- Provided daily technical support for the Logistics Group (over 500 customers) and other outside agencies, for 10 years; Supervised 8 Operators
- Infrastructure Manager for Mainframes, High-end Servers, and Network resources
- Trainer and task certifier for the entire Datacenter Operations (2 System Managers and 8 Operators)
- Act of Congress, Data Center Operations was outsourced to the Private sector
- Transitioned the Job roles and trained the new Hires - (SME - subject matter expert)
- Secretary of the Air Force authorized staff to accept reassignment or be Honorably discharged
Datacenter Operations - System Operator and Trainer
Confidential
Responsibilities:
- Designed and implemented analytical software and local databases (data warehouse) for Logistic Maintenance Summaries for decision making by Senior Level Management
- Supervisor and Trainer for the System Operators; Trainer for the System Users; responsible for overall systems security and integrity; database developer (Designing and Modeling); database programmer (C with SQL); database administrator (INFORMIX, ORACLE, and IMAGE-includes performance optimizing and referential relationships); network/email administrator (NOVELL and GROUPWISE), system administrator (HP-9000's, HP-1000's, HP Net Servers); tech support and troubleshooting.
- Hardware: HP-9000 model 715 Pa-Risc servers, HP-1000 Series F mainframes, HP Network servers, Bar-coding Equipment, Personal Computers, Network Interface Cards, Cabling, Hubs, Routers, 6250 BPI Tape drives, High Speed Printers, Multiplexers, Modems, Terminals
- Systems: DOS; Microsoft Windows versions 3.1, 95, NT; NOVELL versions 3.12, 4.11; HP-UX versions 9.05, 10.20; HP-VM (RTE-6) versions 4, 5, 6
- Software: INFORMIX Online versions 5.03, 5.04, 6.00, 7.10, 7.22; INFORMIX SQL versions 4.11, 6.05; INFORMIX 4GL versions 4.10, 4.11, 6.05; INFORMIX ESQL-C versions 5.01, 7.20; IMAGE 1000 RDBMS; Query 1000; Dbase III, IV; PowerBuilder (InfoMaker); MS Access; SQL & 4GL scripts; Assembler, Fortran, C, C++, Multi-thread, Winsock, HTML, JAVA; Shell scripting, Command-Interpreter, File-Manager
- Supervised 2 Operators