Sr. Windows Infrastructure Engineer Resume
Franklin Lakes, NJ
SUMMARY:
- Meticulous, tenacious and self - motivated Sr. Windows Infrastructure Server Support Engineer with a solid work ethic.
- U.S. Army veteran experienced handling stress and staying focused while supervising others.
- Corporate wide reputation for immediate problem resolution, result driven attitude and providing expert technical support.
- Additional experience: Mainframe operations, PC/Laptop Executive Support, SCADA/CAMS and PBX/Telecom Support.
TECHNICAL SKILLS:
Operating Systems: Windows NT 4.0/2000/2003/2008/2012/2016 Servers; Windows Client 2K/XP Pro SP3, Windows 7 SP1, 8.1 & 10.
Protocols: TCP/IP, DHCP/STATIC, DNS, WINS, HHTP/HTTPS, SMTP, POP3, FTP, Telnet, SSL, WPA2, WEP and LDAP.
Apps & Utilities: HP Smarts Monitor Alerts, HP System InSight Manager 2.1, 7.3.0 and Intergraded Lights-Out (iLO); HP SysEdge 5.0 and 5.6, PfizerNet (DirectLink), Avocent DSview 3.7, HP System ADU and ACU 8.10, Remedy 7.6 and HP OpenView ServiceCenter 6.2.8, CyberArk EPV 5.30 and CyberArk 9.6 Enterprise Password Vault, CDP 2.8.2; Ghost 11, Ghost Explorer, Acronis; SQL 2005/10/14 and Scanning Tool, QALYS Scanning Tool, Nexpose Scanning Tool, ADDM\BMC Plus NetMRI, PowerSchell v4.0, 4.1, 5.0; VMware/vSphere 5.0, 5.1, 5.5 Local Client and WebBased, Hyper-V, vCOP, InfloBox IPAM Grid Manager, MS-Virtual PC 2007; SMS, MS-SCCM 2007/2012, DRAC, RDP, DameWare v6.9, HyperTerminal, PuTTY, Telnet, Lync 2.0, NetMeeting, WebEx, MS-SharedView, PcAnywhere 11 and 12.5, Real VNC v5.0; Nortel VPN 6.0, CheckPoint R56 and Cisco VPN 4.7 & 4.8, RAS, Citrix Client 13.4, Citrix XenApp 7.5, Citrix Internal/External; SafeGuard Easy 4.4 & Sophos 5.5 Encryption, EnTrust/eGrid, RSA SecurID Token & SoftToken; SharePoint 2010; MalwareBytes 3.0, Symantec Norton AV v10.2 & EndPoint Protection v11 & SEP/MC v12.1.16, McAfee VirusScan Enterprise +AntiSpyWare 8.7/8.8; Symantec BESR 8.5 & Veritas Backup Exec 8.6; Partition Magic 7.0 and Diskeeper; Snag-IT v6; PowerChute v9.0, Remedy, ServiceNow, LANDesk/Shavlik v9.6.
Hardware: HP BL 460C w/C7000 enclosures, PowerEdge R900, 4 CPUs, 6 Cores, 132 Gig Memory, PowerEdge R810, PowerEdge R710, Dell PowerEdge R720, Duel Xeon 3.30 Ghz, 4 Cores and 8 Logical Processors, 8 GB Memory with Mirrored and Raid 5 Configuration, PowerEdge 2500, 2550, 2600, 2850, 2950, 4600, 6600, 6650, HP Proliant DL580 G7/G5/G4, DL380 G7/G5/G4, DL360 G7, DL320 G8, DL380, ML570, ML370, ML360 G6 Server and HP Storage Works 6G DP 15, SAS 300GB Hard drives, Proliant DL380 G3, 32 bit, Quad Core 2791 MHz CPU, 4GB Memory. Cisco UCS Blade Technology, COMPAQ Proliant 6400, 5500, 4500, 3000, 1850, 1600, 1500 Servers, SCSI, Raid 5 & Mirrored; Dell PowerEdge 1750, 2650, 2850, 2950 & R510, R710 Series Servers and Lenovo D20 Industrial Systems.
PROFESSIONAL EXPERIENCE:
Confidential, Franklin Lakes, NJ
Sr. Windows Infrastructure Engineer
Responsibilities:
- Performed Physical and VM W2K8 and W2K12 Server Builds and Decommissions of over 3750 W2K and W2K3 Servers.
- Installs, Decommissions, implementation and support include Primarily HP Servers and some UCS, Lenovo and Dell Servers.
- Server Builds Included: File and Print, Application, IIS Web, DB\SQL\Oracle, SharePoint, DMZ, Development and TS\Citrix.
- Created and Maintained all documentation and Snag-it Training videos related to the Decommission process.
- Technical Approver for all Change Request submitted by Decom Team to the CAB (Change Approval Board).
- Disseminated Decommission Work Load to the Systems Engineers and Review their Progress thru to Completion.
- Team Leader of Systems Engineers performing Windows Server Inventory & Created reports for Data Center Decommissioning.
- Attended Leadership Meetings to Discuss Future Strategies, Engineer Performance and Decom Process Updates and Tweaking.
- Participated in all Staff Meetings to discuss scheduled builds and decommissions, current issues, fixes and work arounds.
- Participated in Meetings with Business Owners & App Owners to determine system requirements and best provisioning Process.
- Attended Security Best Practices Meetings to Brain Storm Policy and Procedures for PCI, HIPPA Audit Requirements.
- Created and Maintained Progress reports and actual Metrics to the Leadership Team.
- Performed SCCM 2012\VCenter 5.5 Cleanup Plus Reclaiming Software Licenses and Canceling Service Contracts.
- Performed Active Directory Container and Organization Unit Administration and Cleanup.
- Performed Problem Management and Root Cause Analysis including implementation of approved corrective actions.
- Performed Disk Space Management via Regularly scheduled DiskCleanup Utility and/or Archiving Log Files as needed.
- Performed Manual Installations as needed of Symantec EndPoint Protection 12.1.16 and Malwarebytes CE 3.0.
- Performed updates of the Configuration Management DB (CMDB - Enterprise Server Technology Database).
- Used HP Systems Insight Manager 7.3.0 (SIM) to monitor server health, hardware failure & addressing generated Remedy tickets.
- Used HPE OneView to Configure new W2K8 and W2K12 R2 Servers for remote access via Insight Remote Support (IRS).
- Used SCCM Software Update Groups and Deploy Update Wizard to Download and Push Packaged Software.
- Used WSUS to Package and Push Updates for Deployment after Testing and Validation is Completed.
- Used PDQ to Install 3rd Party Software and some Critical Updates on W2K8 R2 and W2K12 R2 Enterprise Servers.
- Used Power Shell 4.1 Scripts and Batch Files to perform Shutdowns\Restarts, Server Configurations and Creating Back Doors.
- Used CyberArk EPV 5.30 and 9.6 for Administrator Passwords when accessing Servers.
- Used Citrix and XenApp 7.5 for Microsoft and 3rd Party Application distribution used by Primarily Remote Users.
- Used KeePass v2.3 Password Safe for Temporary credentials to Servers during long Periods when CyberArk is being upgraded.
- Used SEPM v12.1.6 Symantec Endpoint Protection Manager for User Software & Hardware Access including USB, CD\DVD.
- Used SolarWinds v10.7 for Server online Availability, Health and Wireless Access Point Monitoring.
- Used Ivanti formally Shavlik v9.x for Windows Patch Management and 3rd party Security Updates on W2K8 & W2K12 Servers.
- Used LanSweeper 6.0 for network inventory, software deployment and asset management.
- Used Neverfail v4.1 HeartBeat Management Console v6 for DR Site, Cluster Failover continuity & Server Heartbeat Monitoring.
- Used ForcePoint ( formerly Websense Web Filter & Security) to Black/WhiteList Email addresses and Attachment by type.
- Used Exchange 2010 Management Console to Move or Delete Old Mailboxes and Create PST files for Migrations and needed.
- Used SMSME v7.5 (Symantec Mail Security & MS Exchange). Checks Internal Attachments for Viruses & Key Words and links.
- Used PowerShell v4.1 to run scripts that Create Admin Accounts on Servers, Perform Therapeutic Reboots and Shutdowns.
- Used Remedy 7.6 for Server Decommissions, Builds and Change Management including Implementations.
- Used VMware ESX\ VSphere 5.0, 5.1, 5.5 Local Client and WebBased to Build VM’s.
- Used InfloBox - Grid Manager - to Assign IP address to new server Builds, Production DNS System - Used for IPAM.
- Used Nexpose report scans to determine necessary patches for new Server Builds.
- Used ADDM (BMC Atrium Dependency and Discovery Mapping Tool) Plus NetMRI.
- Followed ITIL Framework for IT service management practices.
Confidential, Newark, NJ
Windows Server Support Engineer
Responsibilities:
- Performed Physical Build of Dell PE2850, PE6650, R720, R710, R810, R900 and M1000e Blade Servers.
- Performed Windows 2K3, 2K8 and 2012 SP1 Server Build Quality Assurance and Final Quality Assurance (Validation).
- Performed PERC (Power Edge Remote Controller) Configurations.
- Server Builds Include: File and Print, Application, SharePoint, DB\SQL\Oracle, ISS Web, DMZ, Development, TS\Citrix.
- Additional Builds include Physical and Virtual Machines Servers for HLS (Home Land Security) and Salem Nuclear Power Plant.
- Performed HP Physical and VMs Builds with VMware vSphere 5.0/5.1 for Server 2003, 2K8 R2, 2K12 R2 STD and ENT.
- Built Virtual Machines for DMZ Servers and Creating All Change Request needed for Port Access of Applications.
- Created and Submitting Change Request for SEP, TSM and SCCM for Technical Review and Approval.
- Created TSM 6.2.3 Backup report of Servers that Failed Backups for Morning Staff Meeting.
- Investigate and Troubleshoot any server that did not Complete TSM Backups Successfully.
- Performed File Restores per user request Used TSM 6.2.3 Restore Option.
- Investigate any Server loss of connectivity, Hung Servers and or Failed System Alert from Ionix
- Migrate Virtual Machines to different Data Stores and Physical Servers.
- Used Dell IDRAC to Access Servers via IE, Firefox or Chrome.
- Performed Remediation of Personal Drives on Servers and applying permissions as needed if missed by Security Dept.
- Deciphered (Decrypting) User Data as needed.
- Performed Bios Upgrade as needed from 3.0 to 6.3 on Dell System Boards or DRACs.
Confidential
Promoted to Windows Server Support Engineer
Responsibilities:
- Supported, Configured and Administering 11,000 International EDC Wintel 2000/2003/2008 Servers.
- Used HP OpenView ServiceCenter 6.2.8 for Configuration Management, Incident Management, Problem Management, Change Management, Availability Management and Capacity Management of Pfizer’s production and manufacturing EDC Servers.
- Creating, Planning, Submitting and Implementing approved RFC’s (Request for Change) for Technical and Business Approvers.
- RFC’s included requests for Downtime to Address Server Alerts for SW\HW configurations, maintenance or updates.
- Performed Manual Software Migration from Norton AV to McAfee ISP 7.0.
- Addressed HP SMARTS Monitor Alerts for Accelerator Boards, Batteries, Hard Drives, PSU & NIC/SAN Connection Failures.
- Used HP Server Insight Manager (SIM) 6.0, 7.0 & Integrated Lights-Out (ILO) for Monitoring, Remote control & System Status.
- Addressed Server HP SysEdge 5.0 Alerts for Disk Capacity Management and Threshold Configurations.
- Used ADU/ACU (Array Diagnostic/Configuration Utility 8.2.8) for Raid Array Diagnostics and Configurations.
- Responsible for Monitoring Server & Network Parameters like disk space, CPU utilization, Network bandwidth & memory usage.
- Ensure servers are compliant to various corporate standards including SP, AV, Firmware and Admin Accounts Passwords.
- Performed Problem Management which includes Root Cause Analysis and implementing approved corrective actions.
- Addressed Performance issues on Server CPU, Memory, NIC and Raid configurations.
- Performing Scheduled Server Shutdowns for equipment moves and performing regularly Scheduled Manual Reboots.
- Used CyberArk EPV 5.30 Enterprise Password Vault for Access to Servers with Temporary Administrative Credentials.
- Used Global DSView 3 and Terminal-RDP to remotely access Enterprise Servers.
- Updated the Configuration Management DB after a CI is affected by a change.
- Coordinated Access to International EDC Servers with System, Business Owners & Site Services for HP Computer Engineers.
Confidential
Pharma, Non-Standard Manufacturing, Laboratory, BMS and Surveillance Computer Systems
Responsibilities:
- Supported Pfizer Non-Standard GMP, Qualified & Validated Vaccine\Vitamin Manufacturing, Laboratory, Security Surveillance, BMS (Building Monitoring Systems), SCADA ( supervisory control & data acquisition ) & CAMS Raid 1 & 5 Industrial systems.
- Supported Industrial control systems (ICS) that monitor and control the industrial, infrastructure and facility-based processes for manufacturing, production of Centrum Vitamins and Prevnar-13 Vaccine.
- Migrated/Upgraded Legacy Wyeth Non-Standard Industrial Computers to FDA compliance regulations & Pfizer’s Specifications.
- Performed Manual Software Migration from Norton AV to McAfee VirusScan Enterprise +AntiSpyWare 8.8 & Def file updates.
- Prepped SCADA & CAMS Computers for Siemen’s Genisus-Iconics, Cams, Honeywell & Advantech App, Installs and Configs.
- Supported and upgraded 32 American Intellex Data Surveillance systems hosting 631 cameras with new software and hardware.
- Migrated Wyeth Legacy Non-Standard Manufacturing & Non-Standard Computer to FDA & Pfizer Specifications (Domain).
- Prepped SCADA & CAMS Computers for Siemen’s Genisus-Iconics, Cams, Honeywell & Advantech Apps Installs and Configs.
- Interfaced with third party technical support vendors including Siemens, Honeywell and Advantech.