We provide IT Staff Augmentation Services!

Delete This

SUMMARY OF SKILLS

  • DevOps Continuous Integration with Amazon AWS Cloud Computing, VMware, Vagrant, Jenkins, Ansible, Python, Bash, Ubuntu and Windows Servers
  • UNIX Administration: Linux Redhat, CentOS, Suse, Debian, Ubuntu , FreeBSD, OpenBSD, AIX, Solaris, SCO
  • Configuration management via Ansible, Puppet and Salt
  • Device monitoring via CopperEgg, Cacti, IP Sentry, SolarWinds, and custom scripting
  • Scripted creation of Linux images for network booting of clusters of diskless servers that contact puppet server after boot for further application installation, configuration, and fine-tuning
  • Network booting of diskless linux cluster preconfigured to use kickstart services from PXE server via HTTP
  • Redhat/CentOS Linux HA Clustering
  • Windows Administration 2008, 2003, 7, XP
  • Apache, MySQL, PostgreSQL, DB2, Oracle
  • Scripting Python, PERL, KSH, BASH, PHP, Ruby/Rails, JavaScript, jQuery, HTML5 including Canvas , C, C , Cobol, Basic
  • Database Design, Normalization, Migration
  • TCP/IP, SSL, LDAP, NIS, VPN, DNS, HTTP, DHCP, SMTP, SNMP, SSH, iSCSI, NFS, CIFS, NTP, Kerberos
  • NAS Administration NetApp
  • SAN Administration Brocade
  • Virtual Machine Administration VMware ESXi/Server/Workstation, Linux KVM, VirtualBox, AIX LPAR, Windows Terminal Server
  • RPM Packaging and Maintenance
  • Performance and Health Monitoring CopperEgg, Cacti, SolarWinds, IPsentry, SNMP, Bash/SSH scripting, Python
  • Server Imaging and Provisioning Kickstart PXE, TFTP, GPXE , Auto-YAST, Altiris
  • Revision Control bzr, git
  • Service-Now ITIL CMDB Administration, Development, and Support
  • Backups and Data Archiving Netbackup, Tape Libraries, RAID Array, tar
  • User Management UNIX, NIS, NIS , LDAP, Active Directory
  • Incident Ticketing Remedy, Service-Now, Zope/Plone
  • Google SketchUp
  • Understands concepts of Profitability, Internal Customer

EXPERIENCE

Confidential

DevOps Continuous Integration with Ubuntu Server in Amazon AWS Cloud, and matching Ubuntu Server Vagrant instances in VirtualBox on Windows and Macs for developers. Job automation using Ansible Playbooks being called from vagrant up and Jenkins. Scripting in primarily Python, Bash and Dash on Ubuntu Linux Server, with a few Windows Servers requiring remote powershell scripting. Have set up CopperEgg for AWS instance monitoring, including writing a python class that incorporates various CopperEgg API calls to automate the creation of process monitors and alerts, Am employing SumoLogic for AWS instance logging. We are working with both Subversion and Git for source code management. Automate, automate, and automate some more, helping to keep software code development and integration a beautiful-to-behold waterfall of continuous change, and software deployments a fast and stable experience. Document, document, and document some more, helping to keep the team and company abreast of the latest information needed for them to quickly and thoroughly use this work as leverage in achieving success with their own endeavors.

Confidential

Job description:

Member of the Monitoring group. Configured monitoring server and devices to be monitored via ICMP, SNMP, and custom scripts. Devices included Cisco routers and call-center products, Windows servers, Linux servers, ESXi hypervisors, and VMs. Monitoring products used are custom applications, IP Sentry, and SolarWinds. Odd jobs so far have consisted of updating the MSSQL driver used for a legacy PHP/Apache application, migrating the associated PHP scripts written for a previously used version of PHP to the latest version of PHP parlance v5 and to make use of the different methods associated with the new version of Microsoft SQL server DLL. Wrote Python script using SOAP calls via suds module to ServiceNow for the automation of health checks of Cisco voice products. The Python script executed test executables against the hardware being tested, gathered the results, created a new Incident in ServiceNow instance, attached the healthcheck logs to the new Incident, created a comment that the healthchecks were attached, and assigned incident to the ServiceDesk for review.

Confidential

Job description:

Member of the Data Center Solutions Validation Engineering group. Primary project has been creating a web application that gives Service Account Managers the ability to visualize the results of the validation of millions of servers from results stored in a database. The PHP/jQuery/SQL application includes the following abilities: Create accounts, modify accounts, create and customize reports, save reports, edit reports, view reports to screen, download reports for import into Excel. First experience developing with Ruby on Rails writing the document-attachment module for tracking purchase orders. Scripted new application that performs the merging of all worldwide validation databases This application integrates with the before-mentioned web-application, allowing SAMs to initialize a sync of any particular database around the world, on demand, for more immediate access to the latest server-validation intelligence. Wrote script that creates new customized Enterprise Linux boot images for simultaneously booting several thousand machines at once for hardware validation before and sometimes after placement in a customer's data center. The script is capable of configuring the OS, pre-installing packages, and outputting the following network-bootable gPXE/HTTP formats: NFS root-disk , iSCSI root-disk, 'monolithic' initramfs. Output of ISO image also available for stand-alone, one-off server validation. Validation images are now up-to-date with latest drivers, quick to create, easy to customize, and dependably consistent.

Technologies and tools used:

  • Linux Centos, RHEL
  • MySQL
  • Apache
  • AJAX
  • PHP, Ruby on Rails, JavaScript, jQuery, HTML, CSS, JSON
  • SQL
  • gPXE, TFTP, HTTP

Confidential

Job description: Member of the Kickstart/RPM Development IT Infrastructure Services team.

Technologies and tools used:

  • Redhat Linux, CentOS Linux, Debian Linux
  • Puppet and Salt configuration management systems
  • LDAP for integration with Active Directory
  • SNMP, SSH, BASH, kickstart, TFTP, PXE, GPXE, BZR, git, Virtual Machines
  • Single-sign-on, RPM package creation, Cacti monitoring software
  • Mock RPM development , rpmbuild

Responsibilities and accomplishments:

  • Assembling RPM packages for Enterprise Linux that are made available to Rackspace internal and customers, and to the world via the IUS Community project Confidential
  • Built two configuration management systems: Puppet on behalf of the Kickstart team, and Salt on behalf of the RPMDev team
  • Configured salt scripts to automatically install single sign-on over LDAP on Enterprise Linux systems
  • Set up and maintain Cacti, which monitors and graphs performance of client systems via SNMP and SSH/scripting
  • Revision control: Working with git for Kickstart team and bzr for RPMDev team
  • Set up PXE/kickstarting environment on VMs to test scenarios such as using GPXE to support protocols other than the relatively limited TFTP protocol for data transport

Confidential

  • Technologies and tools used:
  • Job description: Developer and administrator of AMD's enterprise-wide Service-Now ITSM implementation. Especially active with Service-Now discovery solution.
  • Service-Now, PERL, Service-Now PERL API, SOAP, BASH, JavaScript
  • Redhat Linux, Windows Servers, SNMP, SSH, WINS, Apache

Responsibilities and accomplishments:

  • Created several automated software supplements of the Service-Now discovery module using PERL, Service-Now's PERL API, and SOAP calls.
  • Provided continuous, back-to-back discovery scanning across several thousand subnets.
  • Created an on-demand discovery scanning system via a simple telnet to an odd port of a discovery MID server, then the MID server would contact the Service-Now instance and set up an immediate discovery schedule of the client computer. This telnet instruction is being added to all installation images of all operating systems so they may be immediately entered into the configuration item CMDB of our Service-Now instance for asset management
  • Wrote javascript to customize and enhance functionality of the Service-Now instance
  • Administered users and groups within Service-Now
  • Staged and tested code from development instance to QA and Production instances Tested new ideas in sandbox instance

Confidential

Job description: Worked with High Performance Storage Systems Group, a division of Global Services Federal. Developer for High Performance Storage Systems HA on Linux, systems administrator for High Performance Storage Systems test lab/data-center.

Technologies and tools used:

  • Redhat Linux 5.3 5.5, AIX 6.1 , DB2
  • Redhat Cluster Suite, NIS, LDAP, Redhat Directory Server, iSCSI, SAN, fibre, KVM virtual
  • High Performance Storage Systems software
  • AIX LPARs, Linux KVM, VMware

Responsibilities and accomplishments:

  • Architected and Developed an HA clustering solution for IBM's High Performance Storage Systems software on the Linux platform
  • Special note: IBM had employees attempting to make HPSS highly available on Redhat Linux for over a year, but could not get it to work. They assigned me the project and I demonstrated a working solution to the Board of Directors within three months. The solution began selling to clients within six months. Development of the Highly Available HPSS on Linux then became primary task.
  • Installed Redhat Directory Server 8.1 to move authentication away from NIS in lab using multiple master replication agreements
  • Install, update RHEL 5.3-5.5 and AIX 6.1.
  • Used Redhat Cluster Suite to architect HA highly available HPSS Server clusters.
  • Installed iSCSI targets and initiators on Redhat Linux
  • SAN zoning on Brocade Fibre Switch
  • DB2 installation
  • HPSS compilation, installation, configuration
  • Created KVM virtual machines on RHEL for cluster prototyping
  • Technical consult for Redhat Cluster in making Earth orbit satellite processor simulator systems highly available for satellite operating system development

Confidential

Job description: Re-engage client for install.

Technologies and tools used:

Redhat, VNC server, LDAP

Responsibilities and accomplishments:

  • Install Redhat servers
  • Create VNC server to provide development workstations for remote developers
  • Link the VNC provided VMs to previously deployed LDAP server for authentication

Confidential

Job description: Systems administration, engineering

Technologies and tools used:

  • Solaris, Redhat Linux, Windows Server
  • Veritas Netbackup, Sun C4 Tape Library, AD, DNS, DHCP, NIS, PAM, LDAP, NAS CIFS NFS
  • Windows Terminal Servers

Responsibilities and accomplishments:

  • Administrate Solaris, Linux, Windows servers
  • Installed and administrated Netbackup 6.5 with Sun C4 tape library on Solaris with mixed clients
  • Altered Sun Solaris servers to authenticate via Windows Active Directory via client-side Kerberos/PAM/LDAP
  • Administrated AD, DNS, DHCP, NIS, sudoers, print servers, Exchange, Sun 5320 NAS providing CIFS and NFS shares, and Windows Terminal Services
  • Installed hardware, racked and provisioned servers

Confidential

Job description: Image servers for server refresh project.

Technologies and tools used:

  • Altiris to image Windows servers
  • Kickstart to image Redhat Linux servers
  • auto-YAST to image Suse Linux servers
  • Remedy

Responsibilities and accomplishments:

  • Imaged hundreds upon hundreds of Redhat, SUSE, and Windows servers
  • Configure RAID, install memory, HBA cards, NICs
  • Provisioned and decommissioned servers
  • Used remedy ticketing system

Confidential

Job description: Systems Engineer consultant

Technologies and tools used:

  • Redhat, CentOS, Ubuntu Linux, Windows Server 2003, XP
  • OpenLDAP, VMware, Borland StarTeam Server, Samba, NFS, VNC, Java JDK
  • Cisco ASA 5500 VPN router, NAS

Responsibilities and accomplishments:

  • Install Redhat, CentOS, Ubuntu, Windows servers
  • Create VNC server to provide development workstations for remote developers
  • Setup VPN, wifi, Borland StarTeam server, DNS, DHCP, NFS, VNC
  • Create developer environments in VMs

Confidential

Job description: Four month project to assist in discovering and securing their services after their chief systems administrator left without providing documentation and with no notice.

Technologies and tools used:

  • Redhat, CentOS, FreeBSD, Solaris
  • Apache, Oracle, DNS, DHCP, Qmail, Postfix
  • Tripwire, Coyote Load Balancer

Responsibilities and accomplishments:

  • Discovered existing systems, provided documentation, installed new systems
  • Implemented tripwire across all Linux servers for intrusion monitoring
  • Administrated Linux, Solaris, FreeBSD
  • Inserted Coyote Load Balancer into production environments

Confidential

Job description: Sole administrator serving US operations of StarCore business.

Technologies and tools used:

  • NetApp NAS with CIFS, NFS, iSCSI shares, Exchange 2003
  • Windows 2003, Solaris, Linux, FreeBSD
  • EDA tools Synopsys, Cadence , BIND DNS, DHCP, wifi, SMTP, Zope, PHP, JavaScipt, BASH
  • Veritas Netbackup Solaris server and mixed clients
  • PostgreSQL database, RIM Blackberry server and handhelds
  • Server and workstation break-fix, provisioning, racking
  • Active Directory, FTP, firewall

Responsibilities and accomplishments:

  • Wrote PHP web pages served from Linux that queried AD for authentication, interacted with PostgreSQL database
  • Provision and administrate Windows servers and workstations, Linux servers and workstations, Solaris servers, FreeBSD servers
  • Configure and administrate NetApp NAS
  • Install, configure, administrate Veritas Netbackup with Solaris server and mixed clients
  • Administrated NIS, AD, Exchange, DHCP, DNS, Firewall, Routing, Blackberry server
  • Wrote custom tools in PHP, SQL Automated tasks and provided outage recovery solutions in BASH
  • Administrate world facing webservers and FTP servers

Confidential

Job description: Support onsite at PepsiCo Business Solutions Group on behalf of Dell to create, execute, and support mass firmware upgrade of Dell RAID arrays. This was done to recover from faulty firmware on RAID arrays that was marking multiple good disks as bad, and had been knocking out otherwise perfectly functioning Exchange servers resulting in data loss.

Technologies and tools used:

  • Dell Servers and Dell Powervault 220 external RAID Arrays
  • Windows 2000 and 2003, Dell SNAP, Dell DSET
  • Javascript via Windows Scripting Host, MS Access, MS SQL Server-side

Responsibilities and accomplishments:

  • Staged, tested, executed method for upgrading firmware of Powervault 220 external RAID arrays using Dell SNAP utility. This was done to several hundred Microsoft Exchange servers with zero data loss
  • Wrote Javascript utility via Windows Scripting Host that turned 20 man hours into 20 man minutes by automating deployment, data collection of DSET scans performed across hundreds of servers, and uploaded results to database needless to say, Dell management was ecstatic, and this tool saw worldwide distribution to Dell engineers Dell's client PepsiCo was very pleased as well

Confidential

Job description: Member of Authentication Team, Third-tier NOC/SOC Support Team, Change Management Team. Performed NIS , LDAP, and Radius administration of 107 servers. Services provided for the authentication of millions of customers of SBC IS, Southwestern Bell IS, Pacific Bell IS, Nevada Bell IS, Ameritech IS, and SBC/Yahoo .

Technologies and tools used:

  • Sun Solaris, iPlanet and SunDS LDAP, NIS , Cisco and Navis RADIUS
  • OpenSSH, KSH, Expect, Apache, PHP, MySQL

Responsibilities and accomplishments:

  • Perform Solaris, LDAP, NIS and Radius administration
  • Routine and emergency patch management
  • Install and update service packages
  • Employee account management
  • My servers were responsible for the authentication of millions of internet service customers and over 700 employee and server accounts

Hire Now