Senior Systems Administrator Resume Profile
WORK HISTORY
Confidential
Senior Solutions Engineer IT Strategic Innovation Services
- Conferences attended: VMWorld 2012, OpenStack Summit, OpenStack Summit
- My primary role is split between two main projects, which consist of maintaining our IT Innovation Zone and architecting/engineering the IT nCloud initiative. While providing resources and leadership within these two projects, tertiary projects surface as well, which don't necessarily fit into a day - to-day management process, but more along the lines of product evaluation.
NetApp nCloud
- My role in nCloud entails architecting and engineering of Cloud Services for NetApp IT. Our goal is to become a Cloud Broker and integrate a Hybrid Cloud Model as the primary means of hosting tiered applications, development operations, shadow IT projects, and eventually, production workloads for NetApp as a whole. When I first started my employment at NetApp, our Cloud environment consisted of a single Cloud Service Provider. Our work has enlightened and enabled NetApp constituents to the world of Cloud Computing. Starting from a simple VMware based CSP, we have strived to not only provide resources for end users, but also to engineer the future of NetApp Cloud Computing through grass roots evangelism and industry encapsulation.
- During our initial External Private Cloud rollout, we soon became aware of IaaS limitations, and started to look up the stack towards PaaS. SaaS has always been another area of expertise for our team, and we have rolled out a few SaaS platforms within IT and NetApp Corporate. Our main goal was to then bring global awareness of new Cloud Technologies, ranging from Cloud Service Providers, to Cloud Management Platforms, and all infrastructure in between.
- Our current Hybrid Cloud Architecture consists of many products from various vendors in the marketplace. The essential tools we have incorporated into our latest nCloud iteration consist of Amazon Web Services, OpenStack, source code repositories, configuration management, API's, development operations, resource monitoring, log collection, automation frameworks, intelligent scaling, security, CMDB, change management, chargeback/showback, ticketing/problem management, team collaboration, as well as other components of a Cloud Management Framework. The end result is expected to provide a completely autonomous, self-service solution, that all employees can leverage in order to streamline activities with results that positively impact the business.
Innovation Zone
- The Innovation Zone is a lab environment within IT that allows for innovation, exploration, evaluation, and proof-of-concept of new and emerging technologies. My role in the Innovation Zone is essentially as the sole proprietor. I maintain all hardware, platforms, software, and management of the entire environment. The IZ consists of primarily a FlexPod deployment, which is configured to virtualize all resources. Within this environment, we not only host our own IT funded projects, but we provide resources for other groups that are resource/space constrained as well. The IZ footprint is pretty substantial, consisting of 1PB of storage, running on latest generation NetApp filers operating in Clustered Mode, and Cisco UCS gear, capable of hosting roughly 700 medium sized virtual machines/instances.
- The IZ also hosts various projects and evaluations that are requirements of our senior leadership executive vice president level . I have worked with all levels of the company reporting structure, from datacenter operations personnel, to resource procurement of new resources, to meetings and presentations to vice presidents, senior directors, and all responsibility layers in between. Working with the IZ has afforded me the opportunity to interact with the company as a whole and has garnered experience that has not been available at my previous residencies in the Information Technology field, and my feedback and performance has been influential to the company in making strategic executive decisions.
- Some of the technologies I maintain and have worked with include:
- Hardware: NetApp Filers FAS6070, FAS 6250, FAS6280, E2600, Fujitsu Servers RX200,RX300, Cisco Switches N5K-C5010, N5K-C5548, Cyclades Terminal Server, Cisco UCS 6248 / B-Series Blades
- Platforms: Amazon Web Services, OpenStack Havana, VMware vSphere 5.x, Data ONTAP 8.x Cluster Mode, RedHat Enterprise Linux 5/6, RedHat Cloud Infrastructure RHEV/OpenStack, Microsoft Windows 2008-R2, 2012, Cloud Foundry, Heroku, Podio, ServiceNow, OpenShift
- Applications: Microsoft SharePoint Server 2010/2012, Microsoft SQL Server 2008/2012, Chef/Puppet, GitHub, Zenoss/ZaaS, SAML, AD,
- Cloud: AWS, OpenStack, New Relic, AppDynamics, Cliqr, ShareFile, Box.com, Office365, CrashPlan, Egnyte, RightScale
Confidential
VMware Specialist / Senior Systems Administrator
- At Cisco, I was responsible for maintaining large VMware clusters that were made up of Cisco UCS Unified Computing System, EMC and NexSan SAN's, and Cisco networking gear both MDS SAN Switches and various Ethernet switches . We maintain approximately 500 virtual machines across 4 clusters for different customer environments in a test / dev atmosphere. I was responsible for rollout, maintenance, upgrades, problem determination, and all other aspects of ensuring maximum uptime. This included setup of hardware, networking, SAN, Ethernet switches and fabric switches on a multi-building campus.
- My job duties also included various operating system support roles Linux, Windows, and Solaris, as well as rack-and-stack duties. The majority of periphery support tasks were based around VMware and operating systems. I was also required to learn various Cisco operating systems in a basic fashion, such as IOS and NXOS.
- My current primary role is as a remote support admin, supporting multiple UCS chassis with B200-M1/M2 Blades networked with Cisco Ethernet gear for a lab in Richardson, Texas. The storage consists of EMC CX4-240's all connected by Cisco MDS 9120's, Cisco 6120's, and Cisco 5010's. I am the sole admin for this environment that consists of approximately it's being built upon daily 30 hosts connected to 2 separate SAN's. The only thing I don't maintain is the uplink out of our racks, which is maintained by the IT / LAB network team. I perform all maintenance remotely, and have a set of hands available at request. I have also managed all this equipment on-site and have extensive knowledge of equipment connectivity.
- Virtualization: VMware vSphere 4.1 update1, VMware Disaster Recovery VM backup solution, and exploration of other virtualization technologies, such as KVM and XEN.
- Hardware: Cisco Unified Computing Systems UCS, Cisco MDS 91xx SAN Switches, various Cisco Ethernet switches, legacy x86 based systems, SUN boxes, APC Racks, Raritan managed PDU's, KVM switches, ILO / RSA out-of-band management.
- Support: Supported customers on various levels from setting up IP addresses on various operating systems, to deploying redundant vSphere environments. Supported all aspects of the stack from racking equipment, to configuring SAN's, Ethernet Networks, SAN Fabrics, Blade Chassis, vSphere deployment, and ultimately configuration down to the VM level operating system. Most of this support was on a remote basis. Most of my customers were in different labs across the country.
- Storage: Built out SAN fabrics with Cisco MDS SAN switches and primarily NexSan and EMC CX2-240's.
- Operating System Support: All flavors of Windows, RedHat Linux, and some Solaris.
Confidential
Linux / AIX Sr. System Administrator / VMware Virtual Center Administrator
- On my return back to IBM I assumed the role of VMware Virtual Center Administrator as well as general UNIX support. Some of my current responsibilities are to maintain a 4 cluster 30 node Virtual Center environment that has roughly 70 terabytes of shared storage. As a VC Admin I am required to maintain all aspects of VC including but not limited to ESX host upgrades, Virtual Center upgrades, SAN LUN maintenance, and attention to all things support related contacting VMware, working through issues locally, preventative maintenance, etc . Our current virtual machine count hovers around 450 .
- I am also an AIX / pSeries administrator. Our production environment includes a mix of various sized pSeries Power5/6 machines all being maintained by HMC's, with most utilizing Virtual IO Server. I maintain quite a few LPARs that required, and still do require, attention and planning to deploy and maintain. Most of the LPARs are SAN backed, being presented via the VIO Server, and all are being bridged through Shared Ethernet Adapters. The environment also includes some pSeries BladeCenter Blades that are being manage by IVM.
- I also maintain and support an operating system deployment service that is managed by Tivoli Provisioning Manager for OS Deployment. This product allows our lab to deploy just about any version of Windows and most Enterprise class Linux operating systems. We currently deploy approximately 25 different flavors of operating systems in varying bit lengths. This service deploys dozens of operating systems per month saving administrators many ours of installation overhead. The operating systems that are deployed are also completely secured to site specifications and up to date to the latest patch levels for all operating systems.
- Some of the newer technologies that I have experienced in this new role include:
- Virtualization: VMware ESX 3.5, VMware Virtual Center 2.5, Shared storage technologies with live migration and capacity planning as imperative considerations
- Hardware: Extensive exploration of various BladeCenter, xSeries, pSeries, and some iSeries
- Application Deployment: Rolled out and rebuilt a TPM environment that is backed up by failover nodes and replication hubs. IE: One location hosts all the images, while other replicate and deploy the same unified images across sites
- Support: Continued customer support of virtually all operating systems that are available in the enterprise workspace, including AIX, RedHat, SuSE, MS Windows, and Solaris
- Storage: Overall well rounded discovery of general SAN technology including zoning, port mapping, array creation, LUN creation, capacity sizing, data resilience, cabling techniques and limitations, deployment strategy, and cost analysis
Confidential
Linux / AIX Sr. System Administrator
- Currently I work as a Sr. UNIX Administrator for confidential. Work accomplishments include upgrading of all on-site HMC's, AIX / Linux system maintenance and upgrades, operations disaster recovery, system build recommendations, application failover implementations, and attending a multitude of meetings in both an information gathering role as well as delegated representative for a seniority role. This list is not to exclude the slew of other tasks to fulfill the requirements of the server environments.
- I support roughly 130 AIX and RedHat / SuSE Linux boxes. With the majority of time spent on the AIX / pSeries side. The main emphasis on this position is AIX Level III support for a 24x7 hospital environment. Being able to respond quickly and perform duties at an elevated level of criticality is required and exercised regularly. The environment provided, relies on Level III support for most of the sites disaster recovery activities.
- A datacenter move is also being planned while working at DHTS. Most of the attention given during these exchanges are focused on database relocation and redundant Virtual I/O rollout. This datacenter move is also a consolidation effort. The goal being to move as many applications to a physically different location with as little downtime as possible, utilizing seeded hardware and storage to swing these applications into new locations.
- VMware ESX is used for most of the Linux server environment. I am tasked with building some of the virtual Linux servers including all the steps involved from the start of the allocation of disk space, to the installation of the OS after successful virtual machine creation. I have also been responsible for activating machines quickly in an emergency situation. I had the opportunity to attend a VMware seminar that was local to the RTP area as well.
- New and continued experiences and technologies:
- Virtualization: VMware ESX 2.x, VMware Server, VMware Fusion, continued pSeries 550 and 570 architecture exploration
- Storage: Hewlett Packard EVA 5000 and 8100, IBM DS8300
- Software: Oracle 10g Database AIX and Linux, McKesson Suite of Healthcare Application Servers, Cerner Healthcare Application Servers, Citrix published application usage
- Operating Systems: AIX 5.3 various technology levels, RedHat Enterprise Linux 3 / 4, SuSE Enterprise Linux 9 / 10, VMware ESX 2.x, Fedora Linux
- Operations: 24x7 Level III Escalation Support Role, 24x7 Level I/II Rotational Operations Support Role, Lights-Out Datacenter interaction
Confidential
Linux / AIX Sr. System Administrator
- Worked as a contractor through Sykes as a member of the SWG AIX / Linux / Provisioning support teams
- IBM Software Group develops and tests the majority of applications that IBM as a whole sells, supports, and develops. Software Group provides services for the entire life-cycle of IBM and some Tivoli applications. SWG also provides services to many internal employees to enable development, file storage, open source operating system / application access, and other related services, utilizing a multitude of IBM branded products as well as third party and open source solutions.
- My primary role in SWG is as a Linux / UNIX admin supporting multiple projects as well as backfilling work requirements needed by fellow co-workers on whatever projects they might be working on.
- The main devotion of my time, involves automating the installation of operating systems for testers and developers dispersed amongst various labs / locations, called WPLC Provisioning. Our project goals were to leverage every available piece of hardware that could potentially be under utilized in order to reduce expenditures into new hardware acquisition and to allow the testers to spend more time testing, instead of building machines and installing software. Many groups were requesting new hardware while available resources were being ignored. We successfully put a service into production to do just that. Our service reduces the time it takes to install a base operating system to hundreds of machines from days to mere hours, allowing development / test teams to focus more of their time on enhancing and debugging code. This service is under constant development, adding more operating systems to the available install catalogue as well as including other architectures into the offering.
- We utilize a couple of different applications to accomplish this. We use Remote Deployment Manager to provide PXE booting and hardware inventorying. Our front end web based GUI is powered by a STAF/Stax based internal product called Lotus Automator. We work one-on-one with the developer of this product in order to enhance, debug, and roll out to other groups at IBM. We are also slated to incorporate Tivoli Provisioning Manager, which is a datacenter management tool designed on a WebSphere, Portal Server, DB2, and ITDS stack, by the end of the year.
- My secondary role is as a backup admin for two projects in particular, the Linux Technology Center and Community Source. Both of these projects provide open source technologies and services to thousands of internal development teams and support personnel.
- The Linux Technology Center is considered to be everything Linux IBM, Worldwide. All operating system deployments, kernel development, open source projects, etc, are contained, managed, and developed within the LTC. We provide a variety of services including licensing / FTP access to operating system code, IMAP mail services for developers, source code versioning, bug tracking systems, and more. One of the major projects I completed for the LTC was a migration from Legato to Tivoli Storage Manager for the backup solution. I migrated all machines and 2.2 terabytes of backups over to TSM in early 2007.
- Community Source is a service that SWG provides to developers of code for internal use. Currently is has over 20K users and 950 projects. This service provides developers with code versioning management, bug tracking facilities, wiki based documentation services, and many other functions. The backbone of Community Source is the utilization of Linux on pSeries and the GForge application. Community Source is designed to be dynamically adjusted based on load requirements. Utilizing the virtual resource design of the Power5 architecture, CPU and memory resources can be dialed-in as needed in cases of extreme resource over utilization or over allocation of valuable CPU and RAM resources. This allows for precise logical resource control and distribution to other projects that are sharing the same physical assets. CS also utilizes SAN storage which can be leveraged for exponential growth in storage needs. This dynamicity allows for a smooth running service no matter the workload of the users, in addition to virtually unlimited future growth potential as the user base increases.
- Some of the newer technology skills and experience gained with SWG include:
- Virtualization: Working with Power5 hardware providing virtual resources and dynamic allocation of resources. Including virtual storage, virtual networks, and CPU / RAM allocation
- Open Source: Learned an immense amount of information about licensing, development, and the global development community
- Automation: Incorporation of x86 and pSeries architectures into our current Provisioning project. Windows, Linux, and AIX operating system automated deployment. Working with network boot methods including PXE booting, bootp, and ARP/RARP
- Linux: Working with the LTC has strengthened my Linux core abilities as well as problem determination abilities. Linux is huge at IBM, and I have acquired much knowledge from some of the top Linux administrators in the World
- Software: Tivoli Provisioning Manager, STAF / Stax, WebSphere, DB2, Tivoli Directory Server, Remote Deployment Manager, IBM Director, VMware Server, VMware Workstation
- Operating Systems: RedHat, SuSE, AIX, VIOS, Windows, and Solaris
Confidential
Level III AIX Systems Administrator / Linux Support / Customer Relations
- Promoted up to Level III AIX System Administrator after one year of 24x7 Level I support
- Worked as a contractor through VTG for IGS as a member of the Level III AIX support / build team
- Provided specialized support for 50 servers mainly in a centralized location in Essex Junction, Vermont
- Primary customer was IBM Microelectronics Division. IBM MD is the division that designs, creates, and deploys CPU's and other chips to customers around the world. Some of the customers IBM MD provide chips to include Microsoft, Nvidia, SONY, Apple Computer, NOKIA, Nintendo, and many others. IBM Microelectronics Division designs chips from high end IBM pSeries chips to the smallest ASICs chips utilized in cell phones.
- The IBM MD environment consisted mainly of high end pSeries AIX boxes that supported connections to DB2 databases stored in fiber channel connected high availability storage arrays called Sharks. These servers also housed development environments, both production and test. My responsibility for IBM MD was to keep these servers up-to-date, secure, and available as much as possible. I built, repaired, upgraded, re-built, designed, and took care of these servers on a daily basis as the main objective to my roll at IGS.
- AIX Operating System: All versions ranging from 4.2.0 to 5.3.0 Installations, upgrades, and maintenance
- RISC / Intel Servers: Single and Multi processor, clustered and stand-alone, rack mounted and free standing
- Raised Floor Operations: Performed necessary server maintenance in high security, climate controlled, raised floor environments
- Application Support : Installed various IBM products including: DB2, WebSphere products, and Tivoli products
- Storage Server Support: Supported the connectivity from the MD servers to the Sharks. This included configuration of hardware as well as implementing software installations / customizations
- Linux Server Support: Worked with primary Linux support personnel to help solve issues and provide insight as was needed / possible
- Linux Desktop Support: Worked with the IBM Linux initiative to help deploy Linux as the default desktop environment corporate wide
- Peer Support: Supported peers in helping with various AIX, Linux, and Windows situations. Provided backup to peers as required and filled shifts as needed
- Team Support: Worked with other teams such as web team, networking team, deskside team, and 24x7 team to accomplish a common goal, customer satisfaction and solution deployment
Confidential
Level I AIX Systems Administrator / AIX and Tivoli Storage Manager Systems Support
- Worked as a contractor through CTG for IGS as a member of the 24x7 Level I AIX support team
- Provided support for over 300 servers at various locations around the world, in various roles ranging from simple username maintenance to high availability production environments
- Support TSM clients in performing and maintaining backup solutions
- Responsible for keeping production servers online which impact the IBM Microelectronic production line
- AIX Operating System: All versions ranging from 4.2.0 to 5.2.0 Installations, upgrades, and maintenance
- RISC/Intel Servers: Single and Multi processor, clustered and stand-alone, rack mounted and free standing
- Raised Floor Operations: Performed necessary server maintenance in high security, climate controlled, raised floor environments
- TSM Backup Infrastructure: Supported top priority backup and recovery solutions for high impact customers such as Sony, JP Morgan Chase, and AstraZeneca
- Co-Worker Tech Support: Supported co-workers windows environment as well as AIX and Linux environments
- Telephone Support: Supported customers via telephone and SameTime instant messenger mediums
- Procedures Documentation: Created and maintained team procedures and documentation for daily tasks and various special projects
Confidential
Network Administrator / Ghost Specialist / Senior Technician / Lead Assistant
- Managed backup/restore sessions for a 700 machine roll-out. Using Symantec Ghost, we backed up ALL data, replaced machines, and redeployed the backed up data
- Responsible for all user related data on machines that were replaced
- Managed fellow workers in designating jobs and sessions
- Assisted Project Lead in the processes necessary to keep the group moving along and the roll-out progressing
- Supported fellow co-workers to work out network / hardware / software related issues
- Deployment Software: Symantec Ghost 7.5 Corporate Edition GhostCast
- Operating Systems: Windows 2000 Server / Professional Windows XP Professional Windows 98
- Hardware: 700 Gateway Desktops and Laptops LCD Screens Servers
Cobnfidential
Assistant Manager of Information Systems / Network Administrator / PC Technician / Help Desk Support
- Configured and maintained Cisco Aeronet 802.11b wireless network over 3 mile radius. Troubleshot various issues, and solved packet flooding, radio interference, and bridging problems
- Implemented a complete network overhaul from ground up. Replaced all servers with rack mount Compaq Proliant DL380 Servers. All servers were rolled over to Windows2000 and all database/accounting applications were upgraded and moved onto Windows2000 servers. Replaced all Windows98 clients with Windows2000 clients, and the network is now a full Windows2000 Active Directory driven entity
- Our site has integrated a card swipe security system for guests and employees, and locked down all essential components
- Integrated a web service, and created an online reservation system for New Seabury Resort
- Maintained 3 Nortel PBX's at separate locations, including DN setup, analog station module setup, support for remote configuration, voice mail configuration, and employee support. Installed and changed all local copper phone lines on site. Toned out, punched down, and tested lines. Responsible for UNIX based Mitel NuPoint voice mail maintenance
- Configured Cisco 1700 series router for static IP designation and cleaned up previous NAT settings
- Brought in new anti-virus software. Upgraded old CA Innoculan to newest Norton Antivirus Corporate Edition. Scheduled updates to virus definitions, scheduled client updates, scanned entire network. Installed and implemented Exchange e-mail plug-in
- Successfully retired prior POS software Positouch with new POS software Aloha TableService . Configured terminals, printers, mappings, bridges, and assured consistent connection over wireless network
- Supported employees in usage and maintenance of terminals/printers
- Maintained all printers, scanners, computers, copiers, and faxes while providing tech support to all employees in a 100 seat network
- Worked with vendors and support venues to complete a common goal. Successfully troubleshot hundreds of issues with and without support from technicians, by phone, e-mail, and fax
- Accounting Software: Great Plains Accounting - FRX Reporting - Crystal Reports - Wennsoft Service Management
- Backup Solutions: Backup Exec WinNT/2000 HP SureStore Tape Drives
- Anti-Virus: Norton Anti-Virus Corporate Edition v7.6 - Rollout - Virus Definition Schedule - Scanning Schedule - Virus Management
- Network Monitoring: Scripting / Set-up of a complete network monitoring solution - 24/7/365 E-mail/Page Support Implementation
- Microsoft Exchange Server: Installation - Configuration - Mailbox Creation/Maintenance - MTA Configuration - Datastore Backup
- Cisco Router Configuration: Installation - NAT Config - Static IP - Maintenance - TCP/IP Config
- Nortel Norstar Modular ICS 4.0: Installation - Configuration - System Programming Support - ACD
- Mitel Nu Point Messenger: System Configuration - Mailbox Maintenance - Greeting Setup
- Centrex / PBX Phone Systems: Punch Down - Tone / Locate - Cable Drop - Troubleshooting - Support
- Microsoft Windows NT 4.0: SP6 / Windows 2000: Server - Pro / Windows 95/98 / Windows XP: Pro Home
- Microsoft Terminal Services: Client Setup Application Installation Printer Support
- Cisco Aeronet Wireless LAN Network Architecture: 802.11 Ethernet - 2.4 GHz Band - Configuration - Troubleshooting
- Microsoft Office: 2000 Premium - XP Developers Edition
- Network Appliances: Switch / HUB - Firewall - Network Attach Storage - Cisco Routers
- Database Environments: Microsoft SQL Server - Pervasive SQL Server
- Computer Construction And Support: CPU - HD - RAM - SCSI - IDE - Serial - USB - Ethernet - Keyboard - Mouse
- Printers: Laser - InkJet - Dot Matrix / FAX: Hardware - Software / Image Scanners: HP
- Point-Of-Sale: Aloha Software - Positouch Software - Touch Screen Displays - Credit Card Hardware
- Network Topology: Patch Panel - CAT 5 Cable Drop - Office Wiring - Wireless Access Point - Fiber Optics - T1
- User Support: Network Access - Application Assistance - Storage Planning - PC Maintenance
- Resort Applications: Resort Data Processing - Fairways Systems Internet Reservation System
- UNIX: Simple UNIX commands and configuration Maintenance Backup
- Server Racks: Configuration Design- Implementation Construction
Confidential
Manager / PC Technician / Tech Support / Customer Service
- Managed a small computer store. Performed various tasks including tech support for walk-in and telephone customers, sales, shipping / receiving, and computer maintenance. Tasks included, but not limited to the following:
- Customer Support: Walk-in - Telephone - On-Site
- Order Processing: Shipping - Receiving - Ordering - RMA -Purchase Order
- Computer Construction: CPU - HD - RAM - SCSI - IDE - Serial - USB - Ethernet - Keyboard - Mouse
- Computer Technician: Upgrade - Repair - Installation - Support
- Operating Systems: Microsoft Windows NT 4 / 3.11 WFW / 95 / 98 - Novell Netware 3.12 - Linux
- Network Support: Print Server - File Sharing - Database - Small Law / Medical / Retail Office Support
- Printers: Laser - InkJet - Dot Matrix / FAX: Hardware - Software / Image Scanners : HP
Confidential
Product Delivery / Customer Support
Delivered company product and provided customer support via telephone as well as personal one on one support and assistance