Solutions Engineer Resume
3.00/5 (Submit Your Rating)
PROFESSIONAL EXPERIENCE
Confidential
Solutions Engineer
Responsibilities:
- Analyzed, Evaluated, Migrated & Restored Mission Critical Exchange 2013 mailboxes for senior executives.
- Authored PowerShell Scripts to remediate quarantined mailboxes & repair databases.
- Wrote Automated Scripts to restart services for production applications on Windows Servers to reduce incidents.
- Worked & lived in Office 365 for 100 different tenants troubleshooting Exchange Online & MS Teams.
- Diagnosed failures, outages, unexpected shutdowns, input/output errors and failures in services in 3rd level support.
Confidential
Sr. Windows Engineer
Responsibilities:
- Designed, Engineered & Implemented VMware Horizon 7.7.0 for over 250 users.
- Upgraded Horizon Standard to 7.10.0 on Server and 250 agents.
- Authored Documentation for Desktop Engineers on how to upgrade Horizon Agents.
- Created a Break/Fix plan for Horizon Agents which face Incompatibility Issues in VMware Tools.
- Wrote Documentation on how to conduct Horizon Updates.
- Planned, Set Up & Implemented Microsoft Teams to the entire organization for over 2212 users.
- Architected & Implemented Microsoft Office 365 Phone System for a Teams Direct Routing SBC - PBX.
- Utilized VMware vRealize Automation for deploying virtual server builds & vROPs for overall infrastructure health.
- Planned, Engineered & Implemented Microsoft OneDrive to the entire organization for over 2212 users.
- Executed Lockdown of user content during OneDrive Migration with a Mitigation Plan for OneNote and PSTs.
- Built, Developed a Plan & Implemented Microsoft BitLocker Administration for IT Security Compliance.
- Hosted Microsoft Leadership in-person onsite for Security Optimization Assessment & BitLocker Engagement.
- Deployed SCCM Monthly Patches to Windows Servers in Development, QA and Production.
- Performed Required Updates on VMware Horizon Environment for IT Security Compliance.
- Wrote SCCM Automation Scripts & Queries for Desktop Engineers on the Windows Team.
- Authored PowerShell Scripts for VMware, Teams, OneDrive, and Office 365 Administration.
- Provided Solutions for Senior Directors and Technology Management at various property hotels.
- Implemented a BeyondTrust Linux Appliance for IT Security in vCenter 6.7
- 24/7 on call Rotation for SEV 1 and 2 incidents.
- Opened Change Requests for all production, development, QA, security & for various project action items.
- Chaired meetings on Weekly Incident Management, prioritizing & assigning out incidents for the Windows Team.
- Attended Daily Project Stand-Ups & Collaborative Meetings providing my work progress on all active tasks.
- Wrote custom policies in Azure, Cloud App, SharePoint & Exchange Online for MS Security Optimizations.
Confidential
Systems Engineer
Responsibilities:
- Designed & Deployed VMs for Critical High Availability Applications in vCenter 6.5 & 5.5.
- Architected, Engineered & Deployed Failover Cluster Builds for Microsoft 365 Dynamics.
- Planned, Designed & Built Tumbleweed Servers with DFS for Secure Transport 5.4
- Renovated ESX Hosts in failure by conducting a case study of VMware Inventory utilizing SSH & PowerCLI.
- Retired 150 legacy servers, completing 15 Requests for Change Management in order to free up available storage.
- Drafted PowerShell scripts to Solve Issues with Microsoft Components: BitLocker, Acl and Cipher/TLS/SSL config.
- Wrote PowerCLI Scripts for VMware Infrastructure changes to VMTools, Hardware, Power & Monitor Control.
- Monthly Security Patching for Windows Server 2016, 2012, 2008 collaborating with Database Team for Failover.
- Worked & lived in Cisco Integrated Management Controller & HP iLo Enterprise environment.
- Performed 3 disaster recovery tests with Teams in Canada & United States by on-call rotation every 12 hours.
- Managed Kaspersky Administration Server 10 for compliance, remediation, policies & protection status.
- Executed Root Cause Analysis for Incident Management SEV1 & SEV2 cases.
- 24/7 on call rotation every 14 days for Infrastructure on any high risk or critical incident.
- Re-Engineered System Center Configuration Manager: 2,000 devices, 10 Distribution Points & 5 Management Points.
- Opened RFCs for Decommissioning, Emergency Incidents, Critical Application Changes and Routine Maintenance.
- Utilized Solarwinds Orion for Monitoring of complete Infrastructure.
- Composed Daily Reports of VMware Infrastructure & Kaspersky for Senior-level Management.
Confidential
VMware Engineer
Responsibilities:
- Managed 14 vCenters with 50,000 virtual machines and over 2,000 ESX hosts.
- Troubleshooted ESX hosts by looking for failures, alerts, warnings, missing licenses, cluster deficiencies, vMotion issues, disconnected Hosts, greyed out vm’s, locked vmdk’s via SSH and PowerCLI.
- Vigorous PowerCLI Utilization for events, compliance, clean up, hardware summary & critical info for RFC execution.
- Deployed ESX patches during Request for Change Management Window 11PM EST to 6AM EST Monday to Saturday.
- Executed thorough review/analysis of each ESX host prior to RFC patching via PowerCLI reports, review & testing.
- Lived in ESX logs vmkernel, vobd, storagerm and hostd for discovery of failures/incidents.
- Adhered to strict standards concerning RFCs for patching, vCenter clean up and tasks from senior management.
- Worked & Lived in HP Enterprise Chassis/iLo environment to control Direct Console User Interface.
- Deep Investigation of the Compatibility Matrix between VMware, HP Enterprise and 3rd party hardware vendors.
- Conducted Root Cause Analysis for Senior level management to determine why business critical outages occurred.
- Joined live Severity 1 and 2 calls for Incident Management to restore critical failures or determine RCA.
- Provided ESX host grabs for VMware and Dell EMC for production and business critical outages.
- Supported VDI environments for Work from Home employees during production outages or business critical failure.
- Worked & Lived in vCenter 5.0, 5.5 6.5; vCloud Director 8.0, 9.0; ESX 4.0, 5.0, 5.5, 6.0, 6.5.
- Performed 3 disaster recovery tests with Windows & Linux teams on an on-call rotation for 12 hour tests.
- Fulfilled on-call production & business critical support for 7 days out of the month during scheduled rotation.
- Rebooted 65 ESX Hosts which had 800+ days of uptime on a 5-day Request for Change Management Window.
Confidential
Systems Engineer
Responsibilities:
- Worked & Lived in PowerShell, Shell Scripting and Command-line execution.
- Built custom Crystal Reports querying data from Active Directory and SQL Server 2008 R2 DB.
- Deployed Azure IaaS virtual machines (VMs) into secure virtual networks and subnets.
- Designed Network Security Groups to control inbound and outbound access to virtual machines and policies.
- Built and Configured cloud/on premise web server environments in Apache Tomcat and IIS 8.
- Deployed firmware updates for Redhat Enterprise Linux 6.7/6.8 and Radia 9.2.
- Deployed emergency shell scripts/batch files to fix critical severity 1 and 2 incidents.
- Supported 65,000 devices in the Enterprise environment for Patch Management using HPCA and Radia.
- Maintained a 98% compliance rate of all PCI devices within the 30-day patch mandatory compliance window.
- Created and provided custom patch reports to management for any critical or non-critical PCs using PowerShell.
- Created custom reports for ALL FSS and VAPP servers on the status of services, disk space and availability using PowerShell.
- Supported and Balanced ALL FSS and VAPP servers in Enterprise, which distributes/deploys patches to the entire infrastructure for 50,000 devices using VMware.
- Identified, evaluated, and resolved problematic PCs who fall behind the 30-day patch compliance window.
- Evaluated and fixed the Problematic Devices by fixing ZTimeQ files, clearing Patch Logs, Fixing WUA services, Checking Event Logs and other applicable methods of break/fix remedies.
- Queried/Captured/Fixed the Problematic Devices via PowerShell and Command line which do not require Remote Desktop Access.
- Evaluated and Fixed individual or group PCI Devices with error codes related to the Windows Update service, Radia failed policy, Failed Network Connection, and any other applicable Radia error code.
- Created Tickets for Devices not patching, pending reboot, offline and past 30 days of compliance.
- Built Custom PowerShell Scripts and Batch files for any applicable patch, bulletin, application, and/or imperative data for execution purposes.
- Utilized WUSA and PKMGR for any patches/bulletins that appear to be failing on clients.
- Built/Tested/Evaluated New Patches/Bulletins for Windows, Office, Java, Chrome, Adobe Reader/Flash to be deployed in HPCA/Radia.
Confidential
Systems Engineer
Responsibilities:
- Installed, Configured and Designed VMware ESX ESXi within VI3, vSphere 4 and vSphere 5 environments.
- Utilized vCloud Director, vMotion, VMware Data Recovery/Site Recovery Manager for DRS responsibilities.
- Built, Configured and Deployed VMs and templates.
- Completed Physical to Virtual, Virtual to Virtual, & Virtual to Physical migration of Windows 2000, 2003, 2008, 2012.
- Assembled, Mounted, and Configured Cisco Nexus Switches for Disaster Recovery Site Datacenter.
- Identified and Secured Sensitive Data (SSNs, PII, PCI, HIPAA) using Varonis DatAdvantage.
- Delegated Permissions Cleanup from previous moves, rectifying immoderate global access to critical data.
- Provided more visibility into individuals who accessed data for Forensics such as inappropriate file activity and access denied activity.
- Performed Power maintenance for Cisco Catalyst Switches at Disaster Recovery Site Datacenter.
- Planned & Executed Power maintenance for Enterprise Production/Development/Database Servers.
- Deployed Critical Updates for 100 servers using SolarWinds Patch Manager.
- Decommissioned APC UPS Backup Units & replaced with PDUs on new Power Circuit/Generator.
- Deployed Microsoft Exchange 2010 to Exchange 2013 migration.
- EMC XtremeIO assembly/installation/configuration.
- Executed EMC Avamar daily backups.
- APC UPS Struxtureware management and administration.
- Globalscape EFT and DMZ Support for enterprise applications/customers.
- Performed VMware ESXI Disaster Recovery Administration.
- Created and Terminated Cat 5 Cabling for critical projects and installations.
- Cleanup/Daily Maintenance for 3 Server Rooms, maintaining over 100 physical devices consisting of switches, servers, and patch panels in the datacenter.
- Traveled to Houston Headquarters for in-person collaborative meetings.