We provide IT Staff Augmentation Services!

Sr. Active Directory Administrator Resume

NJ

SUMMARY:

  • Professional Experience on Windows, Active Domain Services and VMware administration.
  • Experience with Virtualization technologies like Installing, Configuring and administering VMware ESX/ESXi and created, managed VMs (virtual server) and also involved in the maintenance of the virtual server.
  • Windows and VMware with Core Experience with Active Directory Administration and VMware virtualization technologies and Sr Operations Support.
  • Experience with NetIQ Directory Resource Administrator (DRA) product requires regular read and write access into the Active Directory Domains, and any Office 365 tenants managed by each DRA Server. ensure this process occurs in a timely manner each DRA Server will cache a limited number of properties about all AD object types supported by DRA
  • Implementing, Maintaining AD Infrastructure as a service in Microsoft Azure cloud platform
  • Implementing, Maintaining AD Infrastructure.
  • Providing security for servers using iptables, ssh, kerbos
  • Install, configure and maintain VMWARE ESX virtual environment
  • Installed, configured, and maintained multiple production and development servers
  • Designed and maintained both Solaris and Red Hat Linux infrastructures
  • Provided system and log analysis, performance tuning, and monitoring.
  • Maintained and support eTrust Access Control and KERBOS for all UNIX user accounts
  • Troubleshooting weblogic, tibco, and java related problems in production, staging and QA environment
  • Installed, configured and provide support for the LDAP in the development, testing, staging and production environment
  • Design and configuring AD Forests, Domains, Trusts, Group Policy, OU's, promotion & demotion of domain controllers.
  • An Active Directory Engineer Designing, implementing changes, troubleshooting, supporting Enterprise Wide Windows Active Directory environment composed of Multi - Forest environment with different Trusts, Multi-Forest migration and creation, multiple Domain environment, multiple domain consolidations and retirements, Sites and Services, Site replications, domain controllers holding different FSMO roles, DNS troubleshooting,
  • User base accounts of 15,000 and Windows server count of 2,000 running different flavors of Windows Operating Systems such as Windows 2012 R2, Windows 2008 R2 and Windows 2003.
  • Involved in Designing domain Solutions such as Domain consolidation and trust creations both Forest level and Domain level.
  • Supported and implemented Active Directory in relation to PCI DSS (Payment Card Industry Data Security Standard) best practices and guidelines to protect credit card information through the use of audit policies, control access via security groups and network segmentations.
  • Exposures with Azure Active Directory compatibility. Extensive experience in deployment, migration, patching and troubleshooting of windows 2008 and 2012 R2 Domain Controllers in Active Directory.
  • Monitoring the Active Directory Replication status of the Domain Controllers.
  • Active Directory Services, DNS, Lync Administration, Power Shell in a very large network.
  • Expertise in Active Directory design and support (Group Policy Object (GPO), Active Directory (AD) Schema, Organization Unit (OU), LDAP, Sites, Replication, etc.)
  • Creating and Linking Group policies for Windows Server in AD domain.

TECHNICAL SKILLS:

VMware: VMwarevSphere 4.0/4.1/5.0, vCenter Server 4.0/4.1/5.0, ESX 3.5/4.0/4.1/5.0, VMware Update Manager, HA, DRS, FT, vMotion, Storage vMotion, VMware Capacity Planner, VMware WorkstationWindows Administration: Configuration of DHCP and DNS, installation and configuration of VPN client, Windows Server 2003/2008/2012 R/2016 - installation and configuration, installation and configuration of Active Directory creating users and groups, setting user access controls, domains creation and setup.

Networking: OSI Reference Model, IPv4 and IPv6 addressing and subnetting, Ethernet LAN, TCP/IP, UDP, switches, routing concepts, virtual network concepts including vSwitches, VLANs, dvSwitch, TCP/IP stack for virtualization, configuration of printers and, scanners.

Hardware: HP ProLiant DL380 G5/G6 Intel Xeon, HP ProLiant DL385 G6/G7 AMD Opteron, Dell PowerEdge 2850, 2950, R710, HP BL 460c G5/G6 blade servers, C7000 HP Chassis. NetApp V6000 Series.

Operating Systems: Windows servers 2000, 2003, 2008, 2008 R2, 2012, Windows client OS XP/Vista/Windows 7.

PROFESSIONAL EXPERIENCE:

Confidential

Sr. Active Directory Administrator

Responsibilities:

  • Reviewed Active Directory and exchange structure and made recommendations for changes to follow Microsoft best practices
  • Experience with NetIQ Directory Resource Administrator (DRA) product requires regular read and write access into the Active Directory Domains, and any Office 365 tenants managed by each DRA Server. ensure this process occurs in a timely manner each DRA Server will cache a limited number of properties about all AD object types supported by DRA.
  • Handled operation performed by a DRA Server requires information about a specific AD or cloud object, that DRA server will look to its local off line cached.
  • Support AD object attributes not stored within our cache, the DRA Server will issue a call directly to a specific Windows Domain Controller or Online Office 365 portal to obtain these properties. sync FROM AD or the Office 365 Tenant TO DRA.
  • Used Windows 2000 and later uses Kerberos as its default authentication method.
  • Used Kerberos preferred authentication method: In general, joining a client to a Windows domain means enabling Kerberos as default protocol for authentications from that client to services in the Windows domain and all domains with trust relationships to that domain.
  • Used Intranet web applications can enforce Kerberos as an authentication method for domain joined clients by using APIs provided under SSPI.
  • Handling refresh updates will pick up any changes made to an AD or Cloud object since the last cache refresh.
  • Monitoring the Domino mail servers across the country for mail routing, Database quotas and access, web-mail access, Cluster replication, database replication, server tasks, server health etc.
  • Register, rename, recertify, and delete users, move users to new certifier, move users mail files to Different server, modify person docs, database access issues, out of office agents, modify location Docs, creating mail-in databases, distribution lists, ACL only, Mail only, and Multi- Purpose Notes Groups etc.
  • Determining causes of delivery failures through message tracking, tracert, and examination of server Log file and configuration etc.
  • Providing daily monitoring, analysis, troubleshooting & management of around 13000 Lotus mail users. Troubleshoot mail routing problems (Trace mail)
  • Installing and configuring Lotus notes R-6/6.5. Replication & archiving of mail & other databases
  • Assisting and training help desk technicians.
  • Involved in Virtualization / Decommission of Siteminder policy servers and SunOne Ldap servers across multiple data centers.
  • Involved in detailed setup for troubleshooting and implementation of support procedure.
  • Experience in configuring multiple LDAP instances and defined LDAP Schemas.
  • Defined and maintained Sun and Active Directory (LDAP) security models
  • Administered policy and user stores using the Sun ONE Directory servers while also providing redundancy and availability.
  • Managed Group Polices, Security groups, and file shares for Trinity enterprise
  • Used Operating System Deployment (OSD) module of the Microsoft Deployment Toolkit (MDT) to create automated server builds for both physical and in VMware ESX 5.5 environments
  • Also used Powershell scripts to automated server builds for both physical and in VMware ESX 5.5 environments.
  • Experience in installing, configuring and managing infrastructure using VMware technologies viz. ESX/ESXi 4.x/5.x/6.x, vSphere 5.0, vCenter, VMware View 5.0/5.5, 6.0VMware vCenter Converter etc.
  • Expertise provisioning, building, installing and configuring and support of Windows 2012/R2/2008/R2/2005/2003 Servers, upgrading Windows Server 2003 to Windows 2008 and 2012 on both physical and virtual machines to ensure server compliancy as part of the upgrade/build process.
  • Strong knowledge and experience on VMware and VMware vSphere 5 features including Virtual SMP, Storage DRS, profile driven storage, auto deploy and vSwitches design.
  • Converted many (P2V) physical servers to Virtual Machines using VMware vCenter Converter part of decommission legacy server’s effort.
  • Experience in Network configuration on ESX servers which include NIC teaming / Bonding for Failover and Load Balancing purpose, VLAN's etc.
  • Experience with Microsoft Network Load Balancing and Microsoft Clustering technologies.
  • Troubleshoot System Center Configuration Manager (SCCM) Client issues so that Patch deployment had a higher success rate.
  • Configured Azure Active Directory to be used as Identity Management for Business to Customer Applications (AAD-B2C)
  • Upgraded environment to System Center Configuration Manager (SCCM) from 2012 to 2012 R2.
  • Did design and architecture work for up grading enterprise from Active Directory 2008 to 2012
  • Did Domain Controller promotions on 2012 member servers
  • Did Domain Controller Demotions to eliminate 2003 DCs
  • Did 2008 DC Health checks
  • Did design and architecture work up grading enterprise from Exchange 2007 to Exchange 2013
  • Served as Active Directory Federation Services (ADFS) Subject Matter Expert
  • Implemented Active Directory 2012 into the enterprise
  • Configured Windows 2012 R2 Direct access to Windows 7 Domain resources
  • Configured VMware Templets to be deployed into the enterprise environment
  • Created Windows Management Instrumentation (WMI) queries in System Center Configuration Manager (SCCM) R2
  • Created SCCM server baselines to secure all enterprise servers to remedy finding in a security audit
  • Experience in Rack and Stack HP ProLiant DL servers (DL580s), Cisco UCS blade B200 M3 including power and network cabling, managing multiple hardware configurations & ensuring power, network redundancy of all servers.
  • Experience writing both Power Shell and PowerCLI scripts to automate Virtual Machine builds and DNS entry configurations.
  • Excellent interpersonal, communication and organizational skills with the ability to interact effectively with employees at all levels within the organization

Confidential, NJ

Active Directory Enterprise Engineer

Responsibilities:

  • Install, configure and maintain VMWARE ESX virtual environment
  • Installed, configured, and maintained multiple production and development servers
  • Designed and maintained both Solaris and Red Hat Linux infrastructures
  • Provided system and log analysis, performance tuning, and monitoring.
  • Maintained and support eTrust Access Control and KERBOS for all UNIX user accounts Implemented Proof of Concept for Oracle Identity Manager.
  • Implemented Pilot for IBM Tivoli Identity Manager.
  • Implemented Proof of Concept for Active Directory Lightweight Directory Service. (AD LDS)
  • Design and Deploy AD LDS as authentication store.
  • Design new solution to integrate all applications through one authentication store using AD LDS.
  • Design Single Sign On (SSO) through Claims-Bases authentication using Active Directory Federated
  • Service (ADFS)
  • Design and Deploy AD LDS as authentication store.
  • Installation and configuration of ADFS 2.0 and ADFS 1.1 as Federated Secure Token Server (STS)
  • Migrated users from multiple Active Domains and open LDAP to AD LDS.
  • Design and Implementation of FIM Service and Portal.
  • Integration of SAP with FIM.
  • Implemented Forefront Identity Manager (FIM) Sync Server Manager.
  • Designed solution to implement multi-authentication for web facing and cloud applications.
  • Implemented self service component for account management by users.
  • Implemented Certificate Authority and created Certificates for SSO implementation.
  • Managing and maintaining DHCP, DNS and AD Services.
  • Managing and maintaining Active Directory, DNS, DHCP servers and Event Logs.
  • Managing and marinating ADRMS server.
  • Managing and maintaining CA (Certificate Authority Server).
  • Managing and maintaining group policy (Citrix, terminal server, adrms, CA enrollment.
  • Installation/Configuration/Troubleshooting of Windows Server 2003/2008 and Active Directory.
  • Windows 2003 and 2008 troubleshooting.
  • Involved in AD migration., Aware Quest and AD Migration tool.
  • Helping to team to rectify the issue.
  • Used Windows 2000 and later uses Kerberos as its default authentication method.
  • Used Kerberos preferred authentication method: In general, joining a client to a Windows domain means enabling Kerberos as default protocol for authentications from that client to services in the Windows domain and all domains with trust relationships to that domain.
  • Used Intranet web applications can enforce Kerberos as an authentication method for domain joined clients by using APIs provided under SSPI.
  • From physical server racking, SAN fiber connections to installation and Setup of ESXi 5.1 hosts as well as the corresponding Virtual Machines guests for production and test environments.
  • Setup for new production servers involving RAID configuration, VMware Tools installation, Service Packs, Security Updates, Domain join, WSUS, NBU installation, ePO management, iLO setup and other.
  • Monthly Windows Updates deployment using WSUS in a two days schedule to serve East and West divisions.
  • Regular Administration of an environment comprising of 90 ESXi Servers 5.1 in vSphere 5.1 with 1490VM's across 2 Datacenters.
  • Experience in Configuration and Installation of ESXi Servers 5.1 using normal GUI Installation with ILO.
  • Knowledge of VMware Update Manager and manual Upgrade to ESX servers, creating baselines and pushing the patches for the ESX servers. Updated 24 ESXi servers from 5.0 to 5.1 manually.
  • Used Power CLI on ESXi server administration to fix descriptor file for Confidential disks, relocating VMDKs and restoring VMs to vSphere.
  • Experience on ESXi, vSphere Troubleshooting, Host Profiles, vDistributed Switches, HA, DRS, vMotion, Storage vMotion, FT, Resource pools, vCenter Permissions, Snapshots, Disk expansions, Templates.
  • Mentored three coworkers to reduce deployment times by creating templates with Quickprep and cloning, P2V, migrating between ESXi servers in the cluster, fixing ESXi issues, CPU, BSODs.
  • Knowledge in using SQL Server 2008 Cluster for vCenter server.
  • Experience in P2V and V2V process for Windows Environments using VMware vCenter Converter.
  • Configuring vSwitches for Port groups, NIC Teaming, Traffic shaping, Load Balancing VLAN tagging, Failover and Security Policies on the vNetworks and Basic Knowledge of Network I/O Control.
  • Experience in storage provisioning process with NetApp, zoning, and volume and LUN creation.
  • Knowledge in provisioning in Windows 2003/2008/2012 .
  • High observance of specific time resolutions for Critical, High and Standard incidents using Remedy for Tickets, Incidents, Change Call management and Work Requests. Provided root cause analysis for any single production stop issue.
  • Migrated from Windows Server 2003 to Windows Server 2008 R2 by either an in-place upgrade or creating a brand-new server to replace the old one.
  • Administration, management, troubleshooting on the Microsoft Activation Status, clustering, and consolidated control by deploying SCCM 2007 solution for Update Management and OS Deployment for Windows Server 2008.

Confidential

Sr, Active Directory Engineer

Responsibilities:

  • Provide L1/L2/L3 level Support for Exchange, Office365 and LYNC related issue.
  • Experience administering and Planning, Deploying and Configuring Exchange 2010 and 2013.
  • Migration Experience from Lotus to Exchange 2010/13 servers and Migration from Exchange2010/2013 to Office365.
  • Pre- Migration Activity, Bulk mailbox migration, migrated from lotus notes and Exchange to Office365 and Post Migration Management Experience.
  • Office 365 Deployment, Implementation and administration support experience.
  • Migration Experience from Google apps to Office365.
  • Migration of SharePoint sites to office365 sites using Share Gate.
  • Setup New servers for production environments for SharePoint Server 2013 and 2010
  • Google drive to One Drive migration experience.
  • Binary Tree and Quest Migration Manager Tool experience in office 365 migrations.
  • Migration Experience from POP/SMTP to Exchange 2010 servers.
  • Managed Active Directory site; replication schedules, site links and boundaries, used ADUC to create and manage computer, user and group accounts in an Active Directory environment.
  • Managing entire AD replication, trust relationship, and lingering object related issue. Cross Forest Migration Experience.
  • Managing mailbox server’s and databases by clearing white space, restricting users with mailbox limit, mail recipient limit.
  • Mailbox Creation and Shared Mailbox Creation and rename & delete Mailbox. Configuring and managing mail routing and connectors.
  • Configure Outlook Client, OCS, LiveMeeting and LYNC.
  • Resolving Outlook free busy, calendar and LM issue.
  • Used Shell Scripting for windows and server patching. Administration tools using PowerCLI.
  • Installing, configuring, administration of Windows 2003/2008/2012 Servers, Active Directory Services, DNS DHCP, FTP, LADP, WSUS, IIS Web Server and SQL Database Server, System Management Servers (SMS) Servers.
  • Installation, configuration, and deployment of SCCM 2007 and SCCM 2012 for imaging and deployment of applications and Operating Systems.
  • Configured automatic updates for network clients by using Group Policy.
  • AD user creation & group creation, hardening the server with appropriate credentials. File and Folder share permissions
  • Group Policy update and configuration needed for WSUS patching & User level permissions
  • Managed multiple Domain Active Directory forest with 4,000+ users.
  • Creating and updated network shares, adding permissions software and groups for users through Active Directory

Confidential

IT Analyst

Responsibilities:

  • The responsibility includes Implementation of Active Directory of the Tea Processor Ltd.
  • Responsible for the design and support of Active Directory infrastructure technology providing configuration assistance, performing needs assessments, recommendation and implementation.
  • Responsible for all aspects of System monitoring, System administration, System
  • Backups, System controls and documentation
  • Administering Windows Server Update Services (WSUS), Setting Up and Running Synchronizations, Synchronizing Updates by Product and Classification, Managing SUS clients etc.
  • Installation & Configuration of Windows 2008/2003 Domain Controller Servers
  • Implementations and administration of DNS, DHCP, Active Directory Server (ADS).
  • Install and configure ESX servers and Virtual Center.
  • Troubleshooting ESX server and Virtual Center using VIC and command line (SSH or console)
  • Work with engineers located locally and overseas
  • Perform change tasks (ITIL process) on Virtual Center and ESX servers.
  • Upgrading/Patching Virtual infrastructure.
  • Uses of Vmotion, DRS and HA.
  • Knowledge of LUN masking, zoning, Replication, cloning, multipathing.
  • Two main sites and one Disaster Recovery site.
  • Datacenter with physical servers and virtual servers on VMWare.
  • Network includes EMC SAN, VMWare, MOM, SMS and Exchange 2003 system.
  • Responsibilities:
  • Main role is to implement the Active Directory upgrade project along with regular Server and Network administration to manage servers and multiple sites.
  • Designing and planning of Active Directory upgrade Project.
  • Documentation of high level design and project implementation plan.
  • Tested the complete application compatibility in the test region.
  • Support AD and Exchange migration team.
  • Upgraded the Windows 2000 network to Windows 2003 network.
  • Upgraded Active Directory.
  • Design of Exchange 2003 environment.
  • Implemented Migration from exchange 2000 to exchange 2003 environment.
  • Managed Exchange 2003 servers and exchange system.
  • Troubleshooting and Performance tuning for Exchange messaging system.
  • Managed Server and system changes using SMS 2003
  • Configured security, distribution and group policies from Active Directory.

Hire Now