Senior Citrix Engineer Resume
SUMMARY
- Over 17 years defining, acquiring, and providing multi - level network and technical support. Functional areas include: Network administration, virtual administration, Citrix administration, systems administration, network engineering, technical support and customer service.
- Demonstrated experience with Windows 2003 -2008 SP1 &SP2 implementation and testing, administered global group policies in AD/Forest/member server/workstation OUs.
- Implemented new XenApp/Published Desktop/VDI methodologies, applications and documentation.
- Created new application servers using VMware ESX Server/VMware vSphere Client 4.1/5.1, multiple farms builds and monitoring application usage and administering user profile/permissions management.
- Firewall coordination with firewall engineers concerning certain applications on Citrix servers accessing forest wide BLS user community via LAN or VPN.
- Strength lies in ability to identify and achieve objectives in a networked environment; strategically accomplishing organizational goals pertaining to IT topologies; organize thoughts and communicate ideas clearly in writing; work cooperatively with individuals representing different organizational agendas and solve difficult network problems.
PROFESSIONAL EXPERIENCE
Confidential
Senior Citrix Engineer
Responsibilities:
- Citrix Administrator/Engineering for XenApps/Published Desktop 6.5/VDI (pilot) environment using Citrix Provisioning Services 7.6.0, StoreFront 2.6 and NetScaler.
- Coordinated with Citrix Architect concerning documentation, migration, site re - engineering and consultation.
- Completed site migration from two different demographic areas to two new demographic areas.
- Implemented new XenApp/Published Desktop/VDI methodologies, applications and documentation.
- Coordinated and acted with Tier 1, Tier 2 and Tier 3 Helpdesk and Engineers to transition users from site to site migration.
- Worked closely with Firewall/Network engineers concerning migration to new sites.
- Provided support for published offices within Bloomberg BNA concerning legacy and current applications such as Arbortext, PDM, Exceed, Lotus Notes, Website Watcher and other publishing applications.
Technologies: Group Policy, Remote Desktop Services, VMWare 5.5, Symantec VIP and Management Consoles, Symantec VIP Access, Splunk network performance reporting, Okta, PowerShell, DHCP, Oracle, SQL 2012, Windows 2008R2/2012, Office 365, Skype for Business 2015.
Confidential
Senior Windows Network Administrator/Citrix XenApp Engineer
Responsibilities:
- Citrix Administration/Engineering duties include testing, delivering and customizing client legacy/Microsoft packaged applications in both Presentation Server 4.5 and XENApp 5.0/6.0/6.5 infrastructures, upgrades and hot fixes.
- Created new application servers using VMware ESX Server/VMware vSphere Client 4.1/5.1, multiple farms builds and monitoring application usage and administering user profile/permissions management.
- Firewall coordination with firewall engineers concerning certain applications on Citrix servers accessing forest wide BLS user community via LAN or VPN.
- Engineered a unique Citrix farm (DMZ) hosting outside email accessibility for BLS users to meet security demands of client.
- Created customized Citrix reports for client.
- Reports consist of application usage, server productivity, server load, CPU Utilization, concurrent users and memory.
- Created Web Interfaces to fully utilize Citrix online plug - in (v12) concerning user community to view/access PS 4.5, XENApp 6.5 and Webmail Citrix infrastructures.
- Assisted with SMS lead administrator for deployment of Citrix plug-ins to BLS community in forest domain, sub domains and regional domains.
- Administered Terminal Services profiles for all Citrix users in BLS community via NetApps.
- Administered Group Policy for all Citrix server infrastructures.
- Senior technical engineer for all Windows server support/LAN support team environment.
- Primary responsibilities include domain controller/member server/Exchange server administration.
- DNS Secondary Zone administration for entire PSB/BLS domains.
- Collaborated with Primary DNS Zone administrators (UNIX) for zone updates.
- Windows 2003 -2008 SP1 &SP2 implementation and testing, administers global group policies in AD/Forest/member server/workstation OUs.
- Organized technical planning, system integration, verification and validation, cost and risk, supportability and effectiveness analyses for total systems.
- Developed and administered plans to upgrade domain controllers, member servers, Exchange servers (2003/2007) and IIS 6.0 servers in the PSB, subnets and regional domains from Windows 2000 to Windows 2003.
- Troubleshoot client network issues and Windows servers.
- Lead DHCP Administrator assigning/reserving IPs to subnets, servers/workstations/network appliances.
- NTFS/Share permissions for entire BLS enterprise.
- VMware 4.5 administration, WINS/DHCP, Exchange Front End, IIS, IIS Proxy instances, File/home directory, Citrix XenApp 6.5), networking and fundamental implementation into current infrastructure.
Confidential
Windows Network Administrator
Responsibilities:
- Technical support team lead in Windows server support/LAN support team environment.
- Primary responsibilities include domain controller/member server/Exchange server administration.
- DNS Secondary Zone administration for entire PSB/BLS domains.
- Collaborated with Primary DNS Zone administrators (UNIX) for zone updates.
- Windows 2003 - 2008 SP1 &SP2 implementation and testing, administered global group policies in AD/Forest/member server/workstation OUs.
- Organized technical planning, system integration, verification and validation, cost and risk, supportability and effectiveness analyses for total systems.
- Developed and administered plans to upgrade domain controllers, member servers, Exchange servers (2003/2007) and IIS 6.0 servers in the PSB, subnets and regional domains from Windows 2000 to Windows 2003.
- Troubleshoot client network issues and Windows servers, assist office/subnet server administrators with server administration duties.
- Administered Exchange, VMware 3.5, 4.1 SMS 2003/SCCM 2007 server related issues concerning PSB domain/subnet domain and regional domains.
- Windows 2003/2008 Cluster Server technology for both IIS and printer servers.
- Created and managed Windows user accounts via Active Directory.
- Lead Administrator for global printer issues or implementations on our global printer servers housed for BLS users.
- Analyzed client servers for optimal performance, test and deploy new server image configurations.
- Administrator for Symantec Net Backup 6.0 MP4 concerning the entire PSB domain and subnet domain offices in ADP server center.
- Lead DHCP Administrator assigning/reserving IPs to subnets, servers/workstations/network appliances.
- NTFS/Share permissions for entire BLS enterprise.
- Windows 2003/2008 Server Lead. Team lead for upgrades to forest and domain controllers to Windows 2003 Server in PSB/Subnets offices/Regional offices.
- COOP Lead Administrator for disaster recovery. Working at all levels of total system production to include: concept, design, fabrication, test, installation, operation, maintenance and disposal.
- Ran monthly security checklists for entire PSB domain controllers/member servers and workstations to comply with FDDC and BLS IT Security Standards using scripting and/or WSUS.
- Travel has been and can be up to 50% when upgrading regional domain controllers/member servers or consulting for major projects in the entire BLS enterprise.
- On call 24x7 for support using VPN/Citrix remote client administration.
- Currently planning, building and administering Windows 2008 domain controllers/member servers/exchange servers/Citrix servers to make complete migration from Windows 2003 to Windows 2008 forest wide.
- Group policy planning/implementation for Windows 2008.
- VMware 4.1 Administration concerning virtualization/consolidation of current servers (P to V for WINS/DHCP, Exchange Front End, IIS, IIS Proxy instances, File/home directory, Citrix XenApp 6.5), networking and fundamental implementation into current infrastructure.
- Avocent lead administrator for entire BLS administrator community accessing via KVM technology administering their servers.
- Citrix administration/engineering duties include testing, delivering and customizing client legacy/Microsoft packaged applications in both Presentation Server 4.5 and XENApp 5.0/6.0/6.5 infrastructures, upgrades and hot fixes. Created new application servers using VMware ESX Server/VMware vSphere Client 4.1/5.1, multiple farms builds and monitored application usage and administering user profile/permissions management.
- Firewall coordination with firewall engineers concerning certain applications on Citrix servers accessing forest wide BLS user community via LAN or VPN.
- Engineered a unique Citrix farm (DMZ) hosting outside email accessibility for BLS users to meet security demands of client.
- Created customized Citrix reports for client. Reports consist of application usage, server productivity, server load, CPU Utilization, concurrent users and memory.
- Created Web Interfaces to fully utilize Citrix online plug-in (v12) concerning user community to view/access PS 4.5, XENApp 6.5 and Webmail Citrix infrastructures.
- Assisted with SMS Lead Administrator for deployment of Citrix plug-ins to BLS community in forest domain, sub domains and regional domains.
- Administered Terminal Services profiles for all Citrix users in BLS community via NetApps. Administers group policy for all Citrix server infrastructures.
Technologies: Citrix Presentation Server 4.5, Citrix XenApp 5.0/6.0/6.5, XenApp UPM, Citrix Management Console/XENApp Advanced Configuration, EdgeSight 5.4, XconnectCitrix XENApp Web Interface, Citrix Access Gateway (CAG), ICA File Creator, PN Agent v11Online Plugin v12, SQL Server 2005-2008, Hotfix Management, Citrix Licensing Console, VDI
Confidential
Wintel Systems Administrator
Responsibilities:
- Responsible for maintaining Confidential s DC Test Lab environment which is a replica of Confidential s production environment in the District of Columbia, Urbana, Maryland and Reston, Virginia.
- Duties included Active Directory maintenance, domain controller migrations, promotion/demotion of domain controllers, DNS updates/maintenance using Vital QIP, server tests with clients concerning Confidential software/hardware rollouts into production, reimaging test lab servers using Ghost2003 or WinPE to mock production server standards, building servers (e. Confidential . HP Proliant DL380 s, DL385 s & DL580 s) with new image for either
- Windows 2003 Standard or Enterprise software, research web for updates on drivers, patches, hardware for current systems Confidential governs.
- Provided outside Confidential software/hardware testers access to DC test lab via specific routers, updating and patching Active Directory and test environment using Shavlik software every third Tuesday, Group Policy implementation.
- Assisted with Exchange 2003 mailbox store migrations as well as newly built Exchange 2003 servers.
- Consistent contact with POC s concerning Confidential software testing.
- Responsible for long term projects concerning implementation and licensing of VMWARE ESX
- Server 2.5.2, 3.0.1 and VMWARE Workstation 5.5 into the Confidential production and test lab environment.
- Assisted with installation, configuration, and setup VMWARE ESX Server 3.0.1 (Virtual Center 2.0.1) to provide virtual machines as servers/workstations for test environment to continue effecting testing before rollout to Confidential s production side.
- Continued research for strategies and cost effectiveness concerning a virtual environment in both test lab and production.
- Software and hardware testing on virtual machines (VMs) concerning operating systems, legacy applications, Confidential applications, patches and anti - virus.
- Assisted with the building and configuration of HP Blades for domain migration concerning Confidential s test domain (fanniemae.lab).
- Continued work and assistance with DFS (Distributed File Systems) migration from Windows 2000 Advanced Server to Windows 2003 Enterprise.
Confidential
Network Administrator
Responsibilities:
- Responsible for maintaining, upgrading, troubleshooting, programming, and administering a diverse and geographically dispersed network for The Department of Army.
- Evaluated the effectiveness of systems, devices, procedures, and methods to safeguard classified, private, and other sensitive data in computer accessible media.
- Performed security inspections and prepares reports that include findings and recommendations for correction of deficiencies.
- Reviewed or designed system software routines to provide an audit trail of activity against sensitive data files or insure that access to data through remote terminals is properly controlled.
- Responsible for the setup and maintenance of all the servers for the Army JAG Corps.
- Ensured complete backup of all data systems throughout the entire WAN for a 30 - day period with redundant site fail over ensure user data is always available.
- Managed user accounts and lifecycle replacement of servers.
- Managed, improved, and maintained the Administrative Law Case System (ALCS), a web-based application essential to the everyday operations of the Administrative Law Division of OTJAG and Detainee Operations Case Tracking System (DOCTS) to Microsoft Internet Servers that are using Microsoft SQL, Server 2003 and IIS server (vr6), also kept all servers updated and patched, and troubleshooting any problems at the server.
- In charge of virtual servers (W2K3) on Linux operating systems containing production/staging system information and data using VMWARE v2.5.2 Virtual Services.
- Implemented a network wide monitoring system (GFI & TempR) for temperature/humidity and continuity stabilization.
- Network security duties consisting of network scans (STAT 6.0) for major/minor vulnerabilities, compliancy objectives pertaining to Department of Army standards and continuing projects concerning Big IPv9.0, COOP (Continuity of Operations) Sites for Mirrored networks in Ballston and Rosslyn.
- Other system administrator small projects pertain to Army JAG Corps integrity such as server migration, application installs, antivirus server set up for LAAWS workgroup servers, Active Directory admin duties and user account setups, Disaster Recovery implementation and documentation, full and differential backups of all servers using the software Commvault and the ADIC tape drives.
- Administered SANS (Storage Area Network) CX500-600-700 series for two LAAWS sites (Ballston and Rosslyn).
Confidential
Network Administrator
Responsibilities:
- Member of a team tasked with building a new Enterprise / Corporate (.EDU domain) network in the Gray Research Center, to include an offsite location.
- Established a Windows 2003 Enterprise network, incorporated Dell PowerEdge (7) servers for three concurrent networks running in the Research Center.
- Updated the infrastructure within the Research Center by connecting the client PC s via CISCO 2950 switches (7) and a fiber optic backbone.
- Configured and implemented a Cyberguard FireStar 500 firewall.
- Team member tasked with implementing and managing a new Exchange 2003 mail server.
- Created and managed accounts for a staff of 40 plus users.
- Tasked with the update of software, patches, etc. for the Patron server.
- Team member tasked with the day - to-day management of a 50+-user base for a Patron network located within the Research Center.
- Tasked with implementing policies and settings for Patron user accounts.
- Installed and configured Norton Web Security and Norton Antivirus Server for the server / domain controller of the Patron network.
- Assisted with administering the TRIM (Captura version) sever, Veritas 9.0 Backup server and Horizon 7.02 Web server.
- Maintained inventory control and documented all h/w s/w purchased and received (update equipment database as required).
- Installed, configured and administered a wireless environment using the Netgear Cable/DSL Prosafe Firewall w/Print Server model FR114P router.
Confidential
PC Technician
Responsibilities:
- Staging and Deployment of Dell 600 series (B57.Dos) laptop and Del GX260 series (E1000.Dos) Desktop workstations.
- Conducted the staging of desktop and laptop workstations using the NMCI (Navy Marine Corps Intranet) Staging Instructions Version 1.5.
- Set up secondary profiles for USMC (United States Marine Corps) public folder access, join workstation domains, migration procedures with help of staging lead and configurations of undocked profiles and defrag registry and final clean - up.
- Installing, configuring, imaging and troubleshooting desktop and laptop computers in a WinNT/2000/XP environment.
- TCP/IP and VLAN allocation switches for military (Walter Reed Army Hospital) and civilian PC(s) Installing late model PC(s) with newer models compatible with the new military software programs, IP switches on most network and shared printers, military software installs.
- Troubleshooting customer related computer problems.