Active Directory /migration Engineer Resume
Easton, Pa
SUMMARY:
- Over 8+ years of experience in IT industry with experience in Server administration in various environments - Windows 2000/2003/2008 R2/2012R2 with Active Directory Services (WINS, DNS, DHCP).
- Provided Tier-3 Support for production environments and trouble shoot critical issues at minimal business impact.
- Expertise in DMZ re-architecture.
- Expertise in Active Directory design and support (GPOs, AD Schema, OUs, LDAP, Sites, Replication, etc.)
- Expertise in managing the users and objects using Identity Manager
- Experience in Integrating Directory to Azure Active Directory using Dirsync and Azure Active Directory Connect.
- Expertise in deployment and troubleshooting of windows 2008 and 2012 R2Domain Controllers in Active Directory.
- Expertise in Migration Using Quest Migration Manager Tool for Active Directory.
- Experience in Migrating Group and Exception Policies from one domain to other domain in AD forest.
- Expertise in creating Exception Group policies for Windows Server 2003/2008/2012 R2 in AD domain.
- Performed and Raise the Domain functional level from windows server 2003 to 2008 R2.
- Experience in creating Service Accounts to have Log on as a Batch and Service Jobs, Create and Link Exception policy to windows Application Servers 2003/2008R2/2012R2.
- Expertise in creating policy domains, realms, policies and rules, configuring access to User directories, setting up response attributes and cookie variables, defining authentication schemes in a SSO Environment
- Build and troubleshooting experience with ESX 3.5/4/5/6 servers and VSphere 4.1/5.0 infrastructure.
- Worked on VCenter server 6.0 5.0 4.0, 4.1 and Virtual center server 3.0 for managing multiple ESX servers.
- Analyze and provide capacity management for Windows based application servers
- Monitoring the servers using NAGIOS tools
- Create and manage group policies in test and production environment
- Automate the AD reports and health check using power shell scripts
- Analyze server slow performance issues like CPU, Memory, Disk, network using sysinternal and Perfmon tool
- Patching the servers using WSUS 3.0 and BMC Foot Prints
- Knowledgeable SharePoint Administration and able to integrate SharePoint with a wide variety of database platforms
- Experience on working with Integration of UNIX and LINUX with Active Directory using Centrify Tool Provided 24x7 on call Support for Production Environments.
- Experience in Automation of tasks using Power Shell
- Assisted in designing, implementing and evaluating applications, systems and utilities relevant to Active Directory services
- Experience in Migrating Users, Groups, Workstations and Application window Servers from Source Domain to Target Administration of user Accounts, Groups, Resources, Security, Backup strategies in window Servers 2003/2008R2/2012
- Experience working with NetIQ product suite like DRA and ADRAP.
- Experience in managing Active Directory Domain Controllers, DNS, DHCP and WINS Servers.
- Handy Experience on troubleshooting Application Authentication issues in Active directory Multi domain Environment.
TECHNICAL SKILLS:
Systems: Windows Server 2000/2003/2008 R2/2012R2
Networking: DNS, WINS, DHCP, TCP/IP
Virtualization: Hyper V, VSphere 4.1, ESX/ESXi server 5.0,5.1,5.5/6.0 VSphere Client, VCenter
Programming Skills: VBScript, Power Shell
Monitoring Tools: Nagios, SCOM, Solar Winds
Operating System: Windows XP, Windows 7, Windows 8, Windows 10
PROFESSIONAL EXPERIENCE:
Confidential, Easton, PAActive Directory /Migration Engineer
- Active Directory Engineer/Enterprise Administrator for large multi-national corporation
- Install and Configure Quest Tools for monitoring changes on Domain Controllers.
- Installed Quest on remote servers, operated QMM and RUM consoles to migrate AD objects, scripting and data manipulation, log review and status reporting
- Implemented successful migration for 1000s of User, Computer and Group accounts with SID History.
- Created AD Group policies to Enforce Domain and OU Level Security of Users and Computer objects.
- Migrating Users, Groups, Workstations and Application windows servers from source domain to Target domain using QMM and AD Domain.
- Incident and Request management through Track It.
- Establish and drive an efficient Group Management strategy including identification, creation and dynamic modifications to user memberships.
- Configure the new servers into SCOM 2012 to enable the monitoring
Active Directory Engineer
- Automate the new hire process from Workday to Active Directory and Active Directory to Workday using Power Shell.
- Consolidated and streamlined automation of support process in a multi-forest/domain infrastructure while establishing road maps of enterprise Directory environment.
- Assisted and provided guidance in application integration into Directory service including LDAP(S), and service account management.
- Enhanced improvements in user account provisioning/DE-provisioning process workflow.
- Configured scheduled task to automate User Creation and Mailbox creation through Power Shell on regular intervals as per business needs.
- Design and support of Directory integration with Cloud based services including Office365 and Google Suite sync tools.
- Establish and drive an efficient Group Management strategy including identification, creation and dynamic modifications to user memberships.
- Created bulk Security groups using Power Shell.
- Configured Azure AD Connect to integrate on-premises identity infrastructure to connect with Microsoft Azure AD and Office 365.
- Configured Solar Winds to monitor Domain Controllers.
- Create and manage Group Policies across the environment.
- Security hardening of Domain Controllers.
- Install and Configure Quest Tools for monitoring changes on Domain Controllers.
- Administration on Quest Active Role Server, Quest Reporter, Quest Recovery and Quest Change Auditor.
- User and Object Identity Management across multiple Domains using Fore Front Identity Manager 2010.
- Created test environment for scientific and pharmaceutical platforms from the existing production environment.
- Incident and Request management through Service Now.
- Provide daily system analysis to proactively predict and detect systems errors or anomalies to ensure maximum up time and service quality.
- Write and maintain documentation that describes operating procedures and system configuration.
Active Directory Engineer
- Migrating DMZ servers to new DMZ environment:
- Responsible for building ADDS servers and AD related services
- Migrate the ADLDS servers which are in synchronization with different domains in different forests
- Analyze and build virtual servers for applications (120+ servers) using Power Shell scripts
- Deployment of Virtual machines and Troubleshooting on VM Management
- P2V and V2V conversions by using VMware Converter
- Server/OS hardening methods
- Providing support to application during application migration
- Integrating applications with new AD servers
- Test and apply group policies to accomplish the pre-requisites for Application servers
- Reconfigure the AD replication topology
- Configure the new servers into SCOM 2012 to enable the monitoring
- Configure the new servers in Tivoli Storage Manager to schedule backup for the servers
- Co-ordinate with other team members like Network, IT Security & Info Sec to release the servers in production
Active Directory Engineer
Responsibilities:
- Active Directory Engineer/Enterprise Administrator for large multi-national corporation
- Responsible for third level engineering of Windows Active Directory Domain Services based on Server 2012 R2
- Migrated the corporate Active Directory from Server 2008 to Server 2012 R2
- Server 2012 Active Directory development testing
- Server 2012 Active Directory deployment to production
- Manage Active Directory integrated DNS zones
- Designed process for DNS zone migration from legacy storage to application partition storage
- Security threat detection and countermeasures, protect from enumeration and scanning
- Automation of recurring tasks using Power Shell
- Developed Windows Power shell script to automate setting of user credentials and activation of Windows
- Performed cross platform audits of Active Directory (AD) objects and user permissions using Identity Manager
- Security in depth
- Designed and deployed Virtual lab environment based on leading tier 1 hypervisor
- Server administration and monitoring for 30+ physical VMware ESX servers and 200+ virtual machines, including Windows and Linux
- Cross platform authentication (Unix to Windows)
- Server/OS hardening methods
- Privileged Access Management system deployment, Password vaulting, Privileged session recording
- Implemented Office365 and Lync through Active Directory, security per the enterprise identity workforce directory requirements
- Implemented Quest Migration Manager for Active Directory, Quest Migration Manager for Exchange
- Managed performance using Monitoring tools like NetIQ suite and ADRAP
- Configure constrained delegation in Active Directory for Kerberos enabled applications
- Troubleshoot Kerberos authentication and constrained delegation
- Tracking and monitoring of software viruses; enforcing security policies and procedures by administering and monitoring security profiles, reviewing security violation reports and investigating possible security exceptions, updates, and maintaining and documenting security controls.
- Network trace analysis, Fiddler, Netmon and Wireshark for packet analysis
- Operating System security hardening of Domain Controllers across the enterprise
- GPO development and implementation
- OU structure design and implementation
- Cross forest/domain migration of users for acquisition and removal from the enterprise
- Designed and deployed VM host environment for pre-production and development testing
- Linux administration on Ubuntu 12.04 LTS and Red Hat Enterprise Linux
- Designed process Sysvol migration from FRS to DFSR completed in production environments
- Implemented Microsoft System Center Virtual Machine Manager to manage and provision Virtual Machines in both production and integration
Environment: Active Directory, Ubuntu 12.04 LTS and Red Hat Enterprise Linux, FRS to DFSR, Netmon and Wireshark for packet analysis, EC Council, DNS zones.
Confidential, San Jose, CAActive Directory Engineer
Responsibilities:
- Support multiple AD forests, including multiple domains forest with over 10 domains, 60 domain controllers and 40 AD sites, running on Windows 2003, Windows 2008, 2008 R2 and Windows 2012
- Planning intra forest migration to consolidate multiple child domains. Provide procedures, documents, customize accounts migration with pre/post task to minimize user’s impact after migration.
- Planning and implement data synchronization between external data to AD. Customize update certain data fields from HR data to multiple attributes in AD user object.
- Creation of Identity Management process, strategy, best practices and architecture documentation including Access Management, Password Management, LDAP Management, Provisioning, Delegated Administration
- Implemented Power Shell and VB Scripts that automated creation of contacts from Active Directory users and updating of address books
- Automation stale user and computer accounts clean up to compliance with company policy.
- Research and deploy companywide private enterprise Public Key Infrastructure using MS CA servers for encryption file system, two factor authentications, code signing, server SSL.
- Automation certificate revocation for account management.
- Provide custom certificate template for VPN to allow access to different network segment.
- Provide solution for wireless access by custom certificate template base user account.
- Complete Active Directory AD health check with MS Engineer to fix more than 100 issues in companywide forest, modify Active Directory topology to enhance replication and authentication operations.
- Provide solution for various applications connect direct/indirect to AD database for user authentication.
- Work with developer to troubleshoot LDAP connection to query multiple AD domains.
- Third level support for DNS, DHCP, DFS, group policy.
- Implement ADFS and Dir-sync for deployment of Office 365.
Environment: Windows 2008, 2008 R2 and Windows 2012, DNS, DHCP, DFS, LDAP, Office 365.
Confidential, Pennington, NJActive Directory Services Engineer
Responsibilities:
- Global Upgrade of 700 windows 2003 Domain Controllers to Windows Server 2008 Enterprise x64 R2
- Managed 2008 R2 Enterprise Server installation and configuration’s
- Managing w2k8 R2 Domain Controller promotions using over the wire and IFM media.
- Managed 700 w2k8R2 Domain Controller Diagnostics and Health checks in America, Europe and Asia.
- Managed User s, Groups, Computers, OU objects and Kerberos Permission delegation in Active Directory
- Effectively use AD support tools, DCDiag, Netdiag, Replmon, Repadmin, FRSdiag, Sonar, RSOP
- Managed Troubleshooting Networking related problems (TCP/IP, DNS, WINS)
- Troubleshooting problems related to Active Directory Database (NTDS.DIT replication, Capacity and Logging)
- Monitoring Active Directory (CPU overload, AD Response time, GC response time, Trust Relationships)
- Managed and Supported Microsoft’s Security Patching of Domain Controllers.
Environment: Windows Server 2008 Enterprise x64 R2, DCDiag, Netdiag, Replmon, Repadmin, FRSdiag, Sonar, RSOP, TCP/IP, DNS.WINS, Active Directory.Confidential
System Administration Technical Specialist
Responsibilities:
- Manage 25 Servers and 350 desktop clients for Indya.com and ITSpace.com
- Installation, Configuration, and Administration of Windows NT, 2000, MS Exchange 5.5 Servers, McAfee AV Server, and ARC ServeIT.
- Installation, configuration and administration of Proxy Servers, IIS Servers and SQL Servers
- Manage Check Point VPN-1 & Firewall-1 security policy
- Administration of LAN and WAN. Manage Cisco Switches and 2500 series Routers
- Manage WAN link connecting to ISP
- Attend to end user issues related to Windows 95, and Windows 98
Environment: MS Exchange 5.5 Servers, Proxy Servers, IIS Servers and SQL Servers, LAN and WAN