We provide IT Staff Augmentation Services!

Solutions Engineer Resume

3.00/5 (Submit Your Rating)

PROFESSIONAL EXPERIENCE

Confidential

Solutions Engineer

Responsibilities:

  • Analyzed, Evaluated, Migrated & Restored Mission Critical Exchange 2013 mailboxes for senior executives.
  • Authored PowerShell Scripts to remediate quarantined mailboxes & repair databases.
  • Wrote Automated Scripts to restart services for production applications on Windows Servers to reduce incidents.
  • Worked & lived in Office 365 for 100 different tenants troubleshooting Exchange Online & MS Teams.
  • Diagnosed failures, outages, unexpected shutdowns, input/output errors and failures in services in 3rd level support.

Confidential

Sr. Windows Engineer

Responsibilities:

  • Designed, Engineered & Implemented VMware Horizon 7.7.0 for over 250 users.
  • Upgraded Horizon Standard to 7.10.0 on Server and 250 agents.
  • Authored Documentation for Desktop Engineers on how to upgrade Horizon Agents.
  • Created a Break/Fix plan for Horizon Agents which face Incompatibility Issues in VMware Tools.
  • Wrote Documentation on how to conduct Horizon Updates.
  • Planned, Set Up & Implemented Microsoft Teams to the entire organization for over 2212 users.
  • Architected & Implemented Microsoft Office 365 Phone System for a Teams Direct Routing SBC - PBX.
  • Utilized VMware vRealize Automation for deploying virtual server builds & vROPs for overall infrastructure health.
  • Planned, Engineered & Implemented Microsoft OneDrive to the entire organization for over 2212 users.
  • Executed Lockdown of user content during OneDrive Migration with a Mitigation Plan for OneNote and PSTs.
  • Built, Developed a Plan & Implemented Microsoft BitLocker Administration for IT Security Compliance.
  • Hosted Microsoft Leadership in-person onsite for Security Optimization Assessment & BitLocker Engagement.
  • Deployed SCCM Monthly Patches to Windows Servers in Development, QA and Production.
  • Performed Required Updates on VMware Horizon Environment for IT Security Compliance.
  • Wrote SCCM Automation Scripts & Queries for Desktop Engineers on the Windows Team.
  • Authored PowerShell Scripts for VMware, Teams, OneDrive, and Office 365 Administration.
  • Provided Solutions for Senior Directors and Technology Management at various property hotels.
  • Implemented a BeyondTrust Linux Appliance for IT Security in vCenter 6.7
  • 24/7 on call Rotation for SEV 1 and 2 incidents.
  • Opened Change Requests for all production, development, QA, security & for various project action items.
  • Chaired meetings on Weekly Incident Management, prioritizing & assigning out incidents for the Windows Team.
  • Attended Daily Project Stand-Ups & Collaborative Meetings providing my work progress on all active tasks.
  • Wrote custom policies in Azure, Cloud App, SharePoint & Exchange Online for MS Security Optimizations.

Confidential

Systems Engineer

Responsibilities:

  • Designed & Deployed VMs for Critical High Availability Applications in vCenter 6.5 & 5.5.
  • Architected, Engineered & Deployed Failover Cluster Builds for Microsoft 365 Dynamics.
  • Planned, Designed & Built Tumbleweed Servers with DFS for Secure Transport 5.4
  • Renovated ESX Hosts in failure by conducting a case study of VMware Inventory utilizing SSH & PowerCLI.
  • Retired 150 legacy servers, completing 15 Requests for Change Management in order to free up available storage.
  • Drafted PowerShell scripts to Solve Issues with Microsoft Components: BitLocker, Acl and Cipher/TLS/SSL config.
  • Wrote PowerCLI Scripts for VMware Infrastructure changes to VMTools, Hardware, Power & Monitor Control.
  • Monthly Security Patching for Windows Server 2016, 2012, 2008 collaborating with Database Team for Failover.
  • Worked & lived in Cisco Integrated Management Controller & HP iLo Enterprise environment.
  • Performed 3 disaster recovery tests with Teams in Canada & United States by on-call rotation every 12 hours.
  • Managed Kaspersky Administration Server 10 for compliance, remediation, policies & protection status.
  • Executed Root Cause Analysis for Incident Management SEV1 & SEV2 cases.
  • 24/7 on call rotation every 14 days for Infrastructure on any high risk or critical incident.
  • Re-Engineered System Center Configuration Manager: 2,000 devices, 10 Distribution Points & 5 Management Points.
  • Opened RFCs for Decommissioning, Emergency Incidents, Critical Application Changes and Routine Maintenance.
  • Utilized Solarwinds Orion for Monitoring of complete Infrastructure.
  • Composed Daily Reports of VMware Infrastructure & Kaspersky for Senior-level Management.

Confidential

VMware Engineer

Responsibilities:

  • Managed 14 vCenters with 50,000 virtual machines and over 2,000 ESX hosts.
  • Troubleshooted ESX hosts by looking for failures, alerts, warnings, missing licenses, cluster deficiencies, vMotion issues, disconnected Hosts, greyed out vm’s, locked vmdk’s via SSH and PowerCLI.
  • Vigorous PowerCLI Utilization for events, compliance, clean up, hardware summary & critical info for RFC execution.
  • Deployed ESX patches during Request for Change Management Window 11PM EST to 6AM EST Monday to Saturday.
  • Executed thorough review/analysis of each ESX host prior to RFC patching via PowerCLI reports, review & testing.
  • Lived in ESX logs vmkernel, vobd, storagerm and hostd for discovery of failures/incidents.
  • Adhered to strict standards concerning RFCs for patching, vCenter clean up and tasks from senior management.
  • Worked & Lived in HP Enterprise Chassis/iLo environment to control Direct Console User Interface.
  • Deep Investigation of the Compatibility Matrix between VMware, HP Enterprise and 3rd party hardware vendors.
  • Conducted Root Cause Analysis for Senior level management to determine why business critical outages occurred.
  • Joined live Severity 1 and 2 calls for Incident Management to restore critical failures or determine RCA.
  • Provided ESX host grabs for VMware and Dell EMC for production and business critical outages.
  • Supported VDI environments for Work from Home employees during production outages or business critical failure.
  • Worked & Lived in vCenter 5.0, 5.5 6.5; vCloud Director 8.0, 9.0; ESX 4.0, 5.0, 5.5, 6.0, 6.5.
  • Performed 3 disaster recovery tests with Windows & Linux teams on an on-call rotation for 12 hour tests.
  • Fulfilled on-call production & business critical support for 7 days out of the month during scheduled rotation.
  • Rebooted 65 ESX Hosts which had 800+ days of uptime on a 5-day Request for Change Management Window.

Confidential

Systems Engineer

Responsibilities:

  • Worked & Lived in PowerShell, Shell Scripting and Command-line execution.
  • Built custom Crystal Reports querying data from Active Directory and SQL Server 2008 R2 DB.
  • Deployed Azure IaaS virtual machines (VMs) into secure virtual networks and subnets.
  • Designed Network Security Groups to control inbound and outbound access to virtual machines and policies.
  • Built and Configured cloud/on premise web server environments in Apache Tomcat and IIS 8.
  • Deployed firmware updates for Redhat Enterprise Linux 6.7/6.8 and Radia 9.2.
  • Deployed emergency shell scripts/batch files to fix critical severity 1 and 2 incidents.
  • Supported 65,000 devices in the Enterprise environment for Patch Management using HPCA and Radia.
  • Maintained a 98% compliance rate of all PCI devices within the 30-day patch mandatory compliance window.
  • Created and provided custom patch reports to management for any critical or non-critical PCs using PowerShell.
  • Created custom reports for ALL FSS and VAPP servers on the status of services, disk space and availability using PowerShell.
  • Supported and Balanced ALL FSS and VAPP servers in Enterprise, which distributes/deploys patches to the entire infrastructure for 50,000 devices using VMware.
  • Identified, evaluated, and resolved problematic PCs who fall behind the 30-day patch compliance window.
  • Evaluated and fixed the Problematic Devices by fixing ZTimeQ files, clearing Patch Logs, Fixing WUA services, Checking Event Logs and other applicable methods of break/fix remedies.
  • Queried/Captured/Fixed the Problematic Devices via PowerShell and Command line which do not require Remote Desktop Access.
  • Evaluated and Fixed individual or group PCI Devices with error codes related to the Windows Update service, Radia failed policy, Failed Network Connection, and any other applicable Radia error code.
  • Created Tickets for Devices not patching, pending reboot, offline and past 30 days of compliance.
  • Built Custom PowerShell Scripts and Batch files for any applicable patch, bulletin, application, and/or imperative data for execution purposes.
  • Utilized WUSA and PKMGR for any patches/bulletins that appear to be failing on clients.
  • Built/Tested/Evaluated New Patches/Bulletins for Windows, Office, Java, Chrome, Adobe Reader/Flash to be deployed in HPCA/Radia.

Confidential

Systems Engineer

Responsibilities:

  • Installed, Configured and Designed VMware ESX ESXi within VI3, vSphere 4 and vSphere 5 environments.
  • Utilized vCloud Director, vMotion, VMware Data Recovery/Site Recovery Manager for DRS responsibilities.
  • Built, Configured and Deployed VMs and templates.
  • Completed Physical to Virtual, Virtual to Virtual, & Virtual to Physical migration of Windows 2000, 2003, 2008, 2012.
  • Assembled, Mounted, and Configured Cisco Nexus Switches for Disaster Recovery Site Datacenter.
  • Identified and Secured Sensitive Data (SSNs, PII, PCI, HIPAA) using Varonis DatAdvantage.
  • Delegated Permissions Cleanup from previous moves, rectifying immoderate global access to critical data.
  • Provided more visibility into individuals who accessed data for Forensics such as inappropriate file activity and access denied activity.
  • Performed Power maintenance for Cisco Catalyst Switches at Disaster Recovery Site Datacenter.
  • Planned & Executed Power maintenance for Enterprise Production/Development/Database Servers.
  • Deployed Critical Updates for 100 servers using SolarWinds Patch Manager.
  • Decommissioned APC UPS Backup Units & replaced with PDUs on new Power Circuit/Generator.
  • Deployed Microsoft Exchange 2010 to Exchange 2013 migration.
  • EMC XtremeIO assembly/installation/configuration.
  • Executed EMC Avamar daily backups.
  • APC UPS Struxtureware management and administration.
  • Globalscape EFT and DMZ Support for enterprise applications/customers.
  • Performed VMware ESXI Disaster Recovery Administration.
  • Created and Terminated Cat 5 Cabling for critical projects and installations.
  • Cleanup/Daily Maintenance for 3 Server Rooms, maintaining over 100 physical devices consisting of switches, servers, and patch panels in the datacenter.
  • Traveled to Houston Headquarters for in-person collaborative meetings.

We'd love your feedback!