We provide IT Staff Augmentation Services!

Windows/active Directory Administrator/system Admin Resume

2.00/5 (Submit Your Rating)

Brooklyn Park, MN

SUMMARY:

  • IT Professional with around 6+years of experience in Systems and Network administration with a primary focus on installation and administration of Windows Servers, Active Directory Services (WINS, DNS, DHCP), HP, UCS blades.
  • Excellent experience in configuration of Data Domain Storage units in Symantec Net backup.
  • Understanding of Microsoft Windows Authentication, Group Memberships and Design, Account settings.
  • Ensure system connectivity of all servers, shared software and other applications.
  • Strong understanding of Windows system administration, installation, security, user management, networking, disk configuration.
  • Familiarity with Microsoft Exchange, Printer, and Shared Folder (on Windows File System Servers) access administration.
  • Extensive experience with Active Directory, Domain Name System, Windows Internet Naming Service, and Microsoft Exchange.
  • Experience in administering / engineering Microsoft Active Directory.
  • Installed CITRIX XenServer Environment to build Virtual cloud for development and testing. Installed Xen hypervisor on the hosts and connected into cluster in Xencentre
  • Proficient with Microsoft Excel and other tools used to manage large reports and requests.
  • Expertise in understanding of NTFS.
  • Working knowledge of remote technologies and administrative account controls for VPN, OWA, and Mobile devices.
  • Knowledgeable of penetration testing, vulnerability assessment, threat hunting, and security program development.
  • Architected, installed and maintained Windows NT, 2000 - 2003 server solutions for both production and development environments.
  • Expertise skills to create and manage VMs, Templates, Cloning, and managing Snapshots. Perform VMware vMotion migrations.
  • Good Knowledge and experience of Risk assessment process and control frameworks including ISO/IEC 27001/2, NIST, SOC II, GDPR, PCI DSS, HIPAA etc
  • Experience managing work via Infra or similar ticketing system used for service request and incidents.
  • Expertise in Migration Using Quest Migration Manager Tool for Active Directory.
  • Expertise in active directory design and support (GPO s, AD Schema, OU s, LDAP, Sites, Replication, etc.).
  • Analysis and remediation of windows 2008R2 environment DNS, Sites and services, Kerberos, Trusts, Exchange 2010, Group policy.
  • Active Directory migration using Quest Migration Manager QMM and RUM.
  • Assisted in designing, implementing and evaluating applications, systems and utilities relevant to Active Directory services
  • Experience in Migrating Users, Groups, Workstations and Application window Servers from Source Domain to Confidential .
  • Experience and knowledge with designing, installing and implementing VMwareVSphere ESX/ ESXi 4.0/5.X, VMware VCenter, setting up V-Motion, HA, DRS, and related VMware products such as VM Workstation, VMware converter VM Backup products and other products for virtualization.
  • Administration of user Accounts, Groups, Resources, Security, Backup strategies in window Servers 2003/2008R2/2012.
  • Implementation and Configuration of Quest Quick Connect and Quest Quick Connect for Virtual Directory VDS.

TECHNICAL EXPERTISE:

Systems: Windows Server 2000/2003/2008R2/2012R2

Backup: VERITAS Net backup, Replication manager, Recovery point

LDAP Directories: Active Directory

Migration Tools: Quest Migration Manager, RUM, ADMT

Virtualization: Hyper V, VMware, VSphere 4.1, ESX/ESXi server 5.0,5.1,5.5/6.0 VSphere Client, VCenter

Workstations: Windows XP, NT, Windows 7,10

Scripting Languages: PowerShell, VBS

Databases: SQL server 2000/2005, DB2 and MS Access

Patching tools: SCCM, Blade Logic

Networking: DNS, WINS, DHCP, TCP/IP, NTFS

Ticketing: CA Service Desk, Lotus notes, Tracer, Service Now

PROFESSIONAL EXPERIENCE:

Confidential, Brooklyn park, MN

Windows/Active Directory Administrator/System Admin

Responsibilities:

  • Successfully Migrated to Windows 2016 R2 x64 Active Directory Single Forest and Domain Architecture.
  • Installed Quest on remote servers, operated QMM and RUM consoles to migrate AD objects, scripting and data manipulation, log review and status reporting.
  • Administration on Quest Active Role Server v6.8, Quest Reporter, Quest Recovery and Quest Change Auditor.
  • Need to gather data for User and computer migration and prepare for the file to be upload in Quest migration manager.
  • Provided guidance to modify IT operational processes and infrastructure in order to bring them to PCI compliance
  • Implemented successful migration for 30000s of User, Computer and Group accounts with SID History.
  • Migrating Users, Groups, Workstations and Application windows servers from source domain to Confidential domain using QMM and AD Domain.
  • Develop and implement an ongoing risk assessment program targeting information security and privacy matters; recommend methods for vulnerability detection and remediation, and oversee vulnerability testing
  • Tested and Configured SNMP Traps for Production ESXi Servers using VMware vSphere CLI
  • Conducting NIST assessments, supporting compliance and documenting findings for COBIT, HIPAA, PCI, SOX, and ITIL frameworks
  • Process employee terminations, employee transfers and employee new hires with IdentityManagement
  • Designed process for DNS zone migration from legacy storage to application partition storage
  • Security threat detection and countermeasures protect from enumeration and scanning
  • Designed and deployed Virtual lab environment based on leading tier 1 hypervisor
  • Cross platform authentication (Unix to Windows)
  • Extensive knowledge in advance features of ESXi VMOTION, HA and DRS including VMware Lab Manager and VMware vCloud Director
  • Developed power-shell scripts to rename and resuming the windows after reboot.
  • Strong knowledge of PCI DSS, understanding of SOX, HIPAA, PII and data privacy legislation
  • Provision Infrastructure platformaccessusing Role-Based Access Model (RBAC), Active Directory and Identity&AccessManagement
  • Gained hands on experience with Risk assessment process and control frameworks including ISO/IEC 27001/2, NIST, SOC II, GDPR, PCI DSS, HIPAA etc.
  • PerformVulnerabilityscanningon our network and make sure that vulnerabilities areaddressed.
  • Creating Protection Groups and Recovery Plans using SRM 5.0 andVMwarebest practices.
  • Linux administration on Ubuntu 12.04 LTS and Red Hat Enterprise Linux
  • Developed power-shell scripts to automate the setting of user credentials and activation of windows.
  • Performed Windows servers patching using SCCM console
  • Configure constrained delegation in Active Directory for Kerberos enabled applications
  • Worked on Public Key Infrastructure (PKI) - certificates
  • Installed and configured VMware vCloud Director to deploy and manage Virtual Machines for end users
  • Troubleshoot Kerberos authentication and constrained delegation
  • Backup and restore systems, user data as a part of the Campus disaster recovery plan.
  • UpgradedVMwareESX 3.5 servers to ESX 4.0
  • Experience in Cloud Infrastructure Technologies like installing, configuring, management, administration and maintenance of servers and clients in VMware, CITRIX and Microsoft Hyper-V environments
  • Incident and Request management through Service Now
  • Operating System security hardening of Domain Controllers across the enterprise
  • Developed custom Identity Management component to synchronize Active Directory, LDAP, and legacy systems.
  • Develop and supply training material to SOX/MAR Program participants, including Business/IT management and Internal Audit teams
  • Performed cross platform audits of Active Directory objects and user permissions using Identity Manager.

Environment: Windows 2008, NetApp 8K series, ONTAP, Outlook 2010/2013, O365, Created AD Group policies, Windows Azure AD, IPv4 configurations, IDAM, PCI, SOX, HIPAA, SCCM Console, Service Now, VMware servers, Identity Management, ADFS, LDAP, Office 365, RBAC, QMM, Quest ARS, DHCP, DNS and WINS.

Confidential, San Jose, CA

Windows / VMware

Responsibilities:

  • Documented and designed procedures to implement new app functionality to hardened domain controllers
  • Planning and implementing an Active Directory domain consolidation and reorganization for HDS.
  • Developing Windows PowerShell scripts to automate Active Directory Moves/Adds/Changes and attribute updates;
  • Remediating Service Principal Names for Kerberos Constrained Delegation.
  • Two factor authentication, code signing, server SSL.
  • Experience in NTFS and file share permissions.
  • Managing Security tools DLP, SIEM,Vulnerabilityscanner and Penetrations test.
  • Perform automated and manual security assessments to identify configuration and patch relatedvulnerabilities using commercial and open source tools.
  • Installed/updated patches on VMware ESXi hosts using VMware Update Manager tool.
  • As part of migrating from traditional application delivery to users we are using VMware App Volumes along with VMware ThinApp 5.0 for legacy applications to, virtualize applications and deliver to users on demand with isolation from OS and better user rich Experience and for better manageability
  • Provide expertise to assist in LDAP Authentication for Application Auth.
  • Automation certificate revocation for account management.
  • Provide custom certificate template for VPN to allow access to different network segment.
  • Customize update certain data fields from HR data to multiple attributes in AD user object.
  • Deploy, Manage and troubleshooting of windows 2008R2 Domain Controllers in Active Directory
  • Creation of Identity Management process, strategy, best practice and architecture documentation including Access Management, Password Management, DAP Management, Provisioning, Delegated Administration.
  • Provided technical support for over 200 users in a Windows XP/ Windows 7 and 10 environments.
  • Managed laptop and MacBook inventory and assisted in procuring new hardware, software and related supplies.
  • Monitoring and reporting the health status of VMware Horizon View VDI environments and VSphere environments using vCOPS/vROPS
  • Assisted a PCI assessment by collecting documents for assessment, participating in client interviews and evaluating compliance with PCI requirements
  • Identified problem and forwarded it to appropriate area of responsibility.
  • Configured Azure AD Connect to integrate on-premises identity infrastructure to connect with Microsoft Azure AD and Office 365
  • Provided support in setting up audio and visual technology for conferences and meetings.
  • Directly supported the in-house service ticket software for non-emergency user related issues. This support involved resolving the issue and/or re-directing the ticket to the appropriate team who would then resolve.
  • Worked with third party vendors to resolve issues with hardware or software covered by annual maintenance agreements.
  • Identifying and remediating any threats and vulnerabilities.
  • Provide technical expertise and troubleshooting of NetApp and VMware systems
  • Worked with developer to troubleshoot LDAP connection to query multiple AD domains
  • Experience in installation and configuration of Microsoft SQL Server 2000 and 2005.
  • Conveyed instructions remotely through phone communications and web chat when necessary.
  • Automated user accounts to force password change for every 30 days with Group policy.
  • Hyper-V installation and configuration in Windows.
  • Provide solution for wireless access by custom certificate template base user account.
  • Complete Active Directory AD health check with MS Engineer to fix more than 100 issues in companywide forest, modify Active Directory topology to enhance replication and authentication operations.
  • Provide solution for various applications connect direct/indirect to AD database for user authentication.
  • Work with developer to troubleshoot LDAP connection to query multiple AD domains.
  • Provided guidance to modify IT operational processes and infrastructure in order to bring them to PCI compliance
  • Application virtualization using VMware ThinApp 4.6 & 4.7 versions.
  • Third level support for DNS, DHCP, DFS, group policy.
  • Implement ADFS and Dir-sync for deployment of Office 365.

Environment: Windows 2008, 2008 R2 and Windows 2012, DNS, DHCP, DFS, PCI, ADFS, LDAP, Office 365, Group Policy

Confidential

Active Directory Engineer

Responsibilities:

  • Support multiple AD forests, including multiple domains forest with over 16 domains, 80 domain controllers and 40 AD sites, running on Windows 2003, Windows 2008, 2008 R2 and Windows 2012
  • Planning intra forest migration to consolidate multiple child domains. Provide procedures, documents, customize accounts migration with pre/post task to minimize user’s impact after migration.
  • Managed systems configuration and maintenance, problem troubleshooting, system and program security, applications and program management, planning and directing upgrades, and testing operations to ensure optimum system functionality.
  • Provided design, implementation, administration and support of Windows 2000 Active Directory and Windows NT legacy domain.
  • File and Print Server migration from physical to VMware virtual environment.
  • Managed the Help desk & Desktop Support team which supported Windows 9.X, 2000, XP, Vista and Windows 7 along with the MS-Office including mail services.
  • Investigated new technologies, software, patches, and security packages, which will improve system performance and systems administration procedures.
  • Managed, led and supported Windows NT, 2000 and 2003 Active Directory domain network in multi-locations.
  • Planning and implement data synchronization between external data to AD.
  • Customize update certain data fields from HR data to multiple attributes in AD user object.
  • Deploy, Manage and troubleshooting of windows 2008R2 Domain Controllers in Active Directory
  • Implemented Power-shell scripts to generating automated reports.
  • Implemented Power-shell scripts to automate creation of contacts from Active directory users.
  • Creation of Identity Management process, strategy, best practice and architecture documentation including Access Management, Password Management, DAP Management, Provisioning, Delegated Administration.
  • Worked with developer to troubleshoot LDAP connection to query multiple AD domains
  • Experience in installation and configuration of Microsoft SQL Server 2000 and 2005.
  • Automated user accounts to force password change for every 30 days with Group policy.
  • Hyper-V installation and configuration in Windows.
  • Provide expert technical knowledge and support for Microsoft Active Directory 2003/2008R2.
  • Active Directory administration, infrastructure, process, procedures, monitoring, and projects - Active Directory Win2008R2.

Confidential

Windows Admin

Responsibilities:

  • Design, Deploy and migrate Windows 2000 domains to join new Windows 2003 forest.
  • Migrating users and groups from windows 2000 domains to windows 2003 domains using Aelitas tool
  • Windows 2003 Servers deployment and Configuration
  • Managing Active directory, DNS, WINS and DHCP Servers
  • Active Directory Services -- Managing Users & Other AD objects
  • Developed custom web-based self-service identity management website
  • Planning and configuring new internal & external websites
  • Developed power-shell scripts for backup and restore for windows.
  • Creating, deploying, renewing and Import & export of the SSL certificates
  • Coordination with application development teams for issue troubleshooting
  • Work on Accounts Delegation, Drive Mappings and Widows Servers Decommission Process
  • Create and Link AD policies to windows Servers 2003 in PROD & QA Environments.
  • Monitoring/Analyzing/Troubleshooting Active Directory Replication in Multi Domain Environment.
  • Tracking and documenting Active Directory production support issues

Environment: Active Directory, DNS, WINS, DHCP, Identity Management, Windows Servers, Drive Mappings

We'd love your feedback!