We provide IT Staff Augmentation Services!

Active Directory /migration Engineer Resume

3.00/5 (Submit Your Rating)

Easton, Pa

SUMMARY:

  • Over 8+ years of experience in IT industry with experience in Server administration in various environments - Windows 2000/2003/2008 R2/2012R2 with Active Directory Services (WINS, DNS, DHCP).
  • Provided Tier-3 Support for production environments and trouble shoot critical issues at minimal business impact.
  • Expertise in DMZ re-architecture.
  • Expertise in Active Directory design and support (GPOs, AD Schema, OUs, LDAP, Sites, Replication, etc.)
  • Expertise in managing the users and objects using Identity Manager
  • Experience in Integrating Directory to Azure Active Directory using Dirsync and Azure Active Directory Connect.
  • Expertise in deployment and troubleshooting of windows 2008 and 2012 R2Domain Controllers in Active Directory.
  • Expertise in Migration Using Quest Migration Manager Tool for Active Directory.
  • Experience in Migrating Group and Exception Policies from one domain to other domain in AD forest.
  • Expertise in creating Exception Group policies for Windows Server 2003/2008/2012 R2 in AD domain.
  • Performed and Raise the Domain functional level from windows server 2003 to 2008 R2.
  • Experience in creating Service Accounts to have Log on as a Batch and Service Jobs, Create and Link Exception policy to windows Application Servers 2003/2008R2/2012R2.
  • Expertise in   creating policy domains, realms, policies and rules, configuring access to User directories, setting up response attributes and cookie variables, defining authentication schemes in a   SSO   Environment
  • Build and troubleshooting experience with ESX 3.5/4/5/6 servers and VSphere 4.1/5.0 infrastructure.
  • Worked on VCenter server 6.0 5.0 4.0, 4.1 and Virtual center server 3.0 for managing multiple ESX servers.
  • Analyze and provide capacity management for Windows based application servers
  • Monitoring the servers using NAGIOS tools
  • Create and manage group policies in test and production environment
  • Automate the AD reports and health check using power shell scripts
  • Analyze server slow performance issues like CPU, Memory, Disk, network using sysinternal and Perfmon tool
  • Patching the servers using WSUS 3.0 and BMC Foot Prints
  • Knowledgeable SharePoint Administration and able to integrate SharePoint with a wide variety of database platforms
  • Experience on working with Integration of UNIX and LINUX with Active Directory using Centrify Tool Provided 24x7 on call Support for Production Environments.
  • Experience in Automation of tasks using Power Shell
  • Assisted in designing, implementing and evaluating applications, systems and utilities relevant to Active Directory services
  • Experience in Migrating Users, Groups, Workstations and Application window Servers from Source Domain to Target Administration of user Accounts, Groups, Resources, Security, Backup strategies in window Servers 2003/2008R2/2012
  • Experience working with NetIQ product suite like DRA and ADRAP.
  • Experience in managing Active Directory Domain Controllers, DNS, DHCP and WINS Servers.
  • Handy Experience on troubleshooting Application Authentication issues in Active directory Multi domain Environment.

TECHNICAL SKILLS:

Systems: Windows Server 2000/2003/2008 R2/2012R2

Networking: DNS, WINS, DHCP, TCP/IP

Virtualization: Hyper V, VSphere 4.1, ESX/ESXi server 5.0,5.1,5.5/6.0 VSphere Client, VCenter

Programming Skills: VBScript, Power Shell

Monitoring Tools: Nagios, SCOM, Solar Winds

Operating System: Windows XP, Windows 7, Windows 8, Windows 10

PROFESSIONAL EXPERIENCE:

Confidential, Easton, PA 

Active Directory /Migration Engineer

  • Active Directory Engineer/Enterprise Administrator for large multi-national corporation
  • Install and Configure Quest Tools for monitoring changes on Domain Controllers.
  • Installed Quest on remote servers, operated QMM and RUM consoles to migrate AD objects, scripting and data manipulation, log review and status reporting
  • Implemented successful migration for 1000s of User, Computer and Group accounts with SID History.
  • Created AD Group policies to Enforce Domain and OU Level Security of Users and Computer objects.
  • Migrating Users, Groups, Workstations and Application windows servers from source domain to Target domain using QMM and AD Domain.
  • Incident and Request management through Track It.
  • Establish and drive an efficient Group Management strategy including identification, creation and dynamic modifications to user memberships.
  • Configure the new servers into SCOM 2012 to enable the monitoring
Confidential, Boston, MA 

Active Directory Engineer

  • Automate the new hire process from Workday to Active Directory and Active Directory to Workday using Power Shell.
  • Consolidated and streamlined automation of support process in a multi-forest/domain infrastructure while establishing road maps of enterprise Directory environment.
  • Assisted and provided guidance in application integration into Directory service including LDAP(S), and service account management.
  • Enhanced improvements in user account provisioning/DE-provisioning process workflow.
  • Configured scheduled task to automate User Creation and Mailbox creation through Power Shell on regular intervals as per business needs.
  • Design and support of Directory integration with Cloud based services including Office365 and Google Suite sync tools.
  • Establish and drive an efficient Group Management strategy including identification, creation and dynamic modifications to user memberships.
  • Created bulk Security groups using Power Shell.
  • Configured Azure AD Connect to integrate on-premises identity infrastructure to connect with Microsoft Azure AD and Office 365.
  • Configured Solar Winds to monitor Domain Controllers.
  • Create and manage Group Policies across the environment.
  • Security hardening of Domain Controllers.
  • Install and Configure Quest Tools for monitoring changes on Domain Controllers.
  • Administration on Quest Active Role Server, Quest Reporter, Quest Recovery and Quest Change Auditor.
  • User and Object Identity Management across multiple Domains using Fore Front Identity Manager 2010.
  • Created test environment for scientific and pharmaceutical platforms from the existing production environment.
  • Incident and Request management through Service Now.
  • Provide daily system analysis to proactively predict and detect systems errors or anomalies to ensure maximum up time and service quality.
  • Write and maintain documentation that describes operating procedures and system configuration.
Confidential,Lansing, MI

Active Directory Engineer

  • Migrating DMZ servers to new DMZ environment:
  • Responsible for building ADDS servers and AD related services
  • Migrate the ADLDS servers which are in synchronization with different domains in different forests
  • Analyze and build virtual servers for applications (120+ servers) using Power Shell scripts
  • Deployment of Virtual machines and Troubleshooting on VM Management
  • P2V and V2V conversions by using VMware Converter
  • Server/OS hardening methods
  • Providing support to application during application migration
  • Integrating applications with new AD servers
  • Test and apply group policies to accomplish the pre-requisites for Application servers
  • Reconfigure the AD replication topology
  • Configure the new servers into SCOM 2012 to enable the monitoring
  • Configure the new servers in Tivoli Storage Manager to schedule backup for the servers
  • Co-ordinate with other team members like Network, IT Security & Info Sec to release the servers in production
Confidential,Denver, CO 

Active Directory Engineer

Responsibilities:

  • Active Directory Engineer/Enterprise Administrator for large multi-national corporation
  • Responsible for third level engineering of Windows Active Directory Domain Services based on Server 2012 R2
  • Migrated the corporate Active Directory from Server 2008 to Server 2012 R2
  • Server 2012 Active Directory development testing
  • Server 2012 Active Directory deployment to production
  • Manage Active Directory integrated DNS zones
  • Designed process for DNS zone migration from legacy storage to application partition storage
  • Security threat detection and countermeasures, protect from enumeration and scanning
  • Automation of recurring tasks using Power Shell
  • Developed Windows Power shell script to automate setting of user credentials and activation of   Windows
  • Performed cross platform audits of Active Directory (AD) objects and user permissions using Identity Manager
  • Security in depth
  • Designed and deployed Virtual lab environment based on leading tier 1 hypervisor
  • Server administration and monitoring for 30+ physical VMware ESX servers and 200+ virtual machines, including Windows and Linux
  • Cross platform authentication (Unix to Windows)
  • Server/OS hardening methods
  • Privileged Access Management system deployment, Password vaulting, Privileged session recording
  • Implemented Office365 and Lync through Active Directory, security per the enterprise identity workforce directory requirements
  • Implemented Quest Migration Manager for Active Directory, Quest Migration Manager for Exchange
  • Managed performance using Monitoring tools like NetIQ suite and ADRAP
  • Configure constrained delegation in Active Directory for Kerberos enabled applications
  • Troubleshoot Kerberos authentication and constrained delegation
  • Tracking and monitoring of software viruses; enforcing security policies and procedures by administering and monitoring security profiles, reviewing security violation reports and investigating possible security exceptions, updates, and maintaining and documenting security controls.
  • Network trace analysis, Fiddler, Netmon and Wireshark for packet analysis
  • Operating System security hardening of Domain Controllers across the enterprise
  • GPO development and implementation
  • OU structure design and implementation
  • Cross forest/domain migration of users for acquisition and removal from the enterprise
  • Designed and deployed VM host environment for pre-production and development testing
  • Linux administration on Ubuntu 12.04 LTS and Red Hat Enterprise Linux
  • Designed process Sysvol migration from FRS to DFSR completed in production environments
  • Implemented Microsoft System Center Virtual Machine Manager to manage and provision Virtual Machines in both production and integration

Environment: Active Directory, Ubuntu 12.04 LTS and Red Hat Enterprise Linux, FRS to DFSR, Netmon and Wireshark for packet analysis, EC Council, DNS zones.

Confidential, San Jose, CA

Active Directory Engineer

Responsibilities:

  • Support multiple AD forests, including multiple domains forest with over 10 domains, 60 domain controllers and 40 AD sites, running on Windows 2003, Windows 2008, 2008 R2 and Windows 2012
  • Planning intra forest migration to consolidate multiple child domains. Provide procedures, documents, customize accounts migration with pre/post task to minimize user’s impact after migration.
  • Planning and implement data synchronization between external data to AD. Customize update certain data fields from HR data to multiple attributes in AD user object.
  • Creation of Identity Management process, strategy, best practices and architecture documentation including Access Management, Password Management, LDAP Management, Provisioning, Delegated Administration
  • Implemented Power Shell and VB Scripts that automated creation of contacts from Active Directory users   and updating of address books
  • Automation stale user and computer accounts clean up to compliance with company policy.
  • Research and deploy companywide private enterprise Public Key Infrastructure using MS CA servers for encryption file system, two factor authentications, code signing, server SSL.
  • Automation certificate revocation for account management.
  • Provide custom certificate template for VPN to allow access to different network segment.
  • Provide solution for wireless access by custom certificate template base user account.
  • Complete Active Directory AD health check with MS Engineer to fix more than 100 issues in companywide forest, modify Active Directory topology to enhance replication and authentication operations.
  • Provide solution for various applications connect direct/indirect to AD database for user authentication.
  • Work with developer to troubleshoot LDAP connection to query multiple AD domains.
  • Third level support for DNS, DHCP, DFS, group policy.
  • Implement ADFS and Dir-sync for deployment of Office 365.

Environment: Windows 2008, 2008 R2 and Windows 2012, DNS, DHCP, DFS, LDAP, Office 365.

Confidential, Pennington, NJ

Active Directory Services Engineer

Responsibilities:

  • Global Upgrade of 700 windows 2003 Domain Controllers to Windows Server 2008 Enterprise x64 R2
  • Managed 2008 R2 Enterprise Server installation and configuration’s
  • Managing w2k8 R2 Domain Controller promotions using over the wire and IFM media.
  • Managed 700 w2k8R2 Domain Controller Diagnostics and Health checks in America, Europe and Asia.
  • Managed User s, Groups, Computers, OU objects and Kerberos Permission delegation in Active Directory
  • Effectively use AD support tools, DCDiag, Netdiag, Replmon, Repadmin, FRSdiag, Sonar, RSOP
  • Managed Troubleshooting Networking related problems (TCP/IP, DNS, WINS)
  • Troubleshooting problems related to Active Directory Database (NTDS.DIT replication, Capacity and Logging)
  • Monitoring Active Directory (CPU overload, AD Response time, GC response time, Trust Relationships)
  • Managed and Supported Microsoft’s Security Patching of Domain Controllers.

Environment: Windows Server 2008 Enterprise x64 R2, DCDiag, Netdiag, Replmon, Repadmin, FRSdiag, Sonar, RSOP, TCP/IP, DNS.WINS, Active Directory.Confidential

System Administration Technical Specialist

Responsibilities:

  • Manage 25 Servers and 350 desktop clients for Indya.com and ITSpace.com
  • Installation, Configuration, and Administration of Windows NT, 2000, MS Exchange 5.5 Servers, McAfee AV Server, and ARC ServeIT.
  • Installation, configuration and administration of Proxy Servers, IIS Servers and SQL Servers
  • Manage Check Point VPN-1 & Firewall-1 security policy
  • Administration of LAN and WAN. Manage Cisco Switches and 2500 series Routers
  • Manage WAN link connecting to ISP
  • Attend to end user issues related to Windows 95, and Windows 98

Environment: MS Exchange 5.5 Servers, Proxy Servers, IIS Servers and SQL Servers, LAN and WAN

We'd love your feedback!