We provide IT Staff Augmentation Services!

Systems Engineer Resume Profile

2.00/5 (Submit Your Rating)

SKILLS:

  • Operating Systems: Windows Client and server, Macintosh OSX Client and Server, some Linux
  • Help Desk Ticket Generator: SCSM, Remedy
  • Network Monitoring: SCOM, SolarWinds
  • Administration Software: SCCM, Active Directory, Apple Open Directory
  • Good with software, LAN, WAN, TCP/IP, DNS, DHCP, and hardware troubleshooting
  • Excellent customer service skills

JOB HISTORY:

Confidential

Senior Systems Engineer

  • Cleaned 3 tombstone domain controller accounts from Active Directory, DNS, and SCOM, which were causing multiple issues with replication, DNS backups, Group Policy implementation, and various domain services
  • Built and promoted a second domain controller for redundancy, seized FSMO roles from old offline DCs
  • Created Event Log Subscriptions from all domain servers on the SCOM server, implemented an auditing policy
  • Added an IBM Endpoint Manager Big Fix implementation for compliance monitoring and reporting
  • Rebuilt the domain Group Policy infrastructure, and implemented several group policies to comply with DoL security standards
  • Raised the default size of the Kerberos/LSA cache, which was preventing access to system resourcesMaintain a production domain utilizing physical servers
  • Maintain test, staging, and training domains utilizing virtual servers on Amazon Web Services
  • Address and correct multiple domain, software, and network issues
  • Create an updated backup and recovery plan
  • Assist with documentation Configuration Management Plan, System Safety Plan, System Configuration Plan
  • Provide management with a detailed list of options for replacing aging hardware, including virtualization/private cloud, and public cloud
  • Monthly testing and deployment of Microsoft patches
  • General maintenance, administration, and troubleshooting

Confidential

Senior Operations Engineer

  • Performed a complete inventory of all hardware and software assets on the internal training network. Provided detailed reports and Visio drawings of the physical and logical network.
  • Information Assurance Trainer - Network Security Engineer III
  • Confidential
  • Operated as a Local Registration Authority LRA , creating, re-keying, and revoking workstation 802.1x certificates
  • Developed a plan to clean up unnecessary and redundant organizational units and group policy objects in the S T domain Active Directory infrastructure
  • Provided informal training to fellow engineers on Windows PowerShell, VMware, domain-level security, and Private Cloud Computing
  • Created an Active Directory group policy preference which enables and renames the local administrator account, and changes the password every 60 days, on domain workstations and laptops
  • Developed a Windows PowerShell script to move and disable stale Active Directory user accounts
  • Developed a Windows PowerShell script to move, disable, and ultimately delete stale Active Directory workstation accounts
  • Developed a deployment plan to upgrade all S T domain controllers to Windows Server 2012 R2, and to raise the domain functional level
  • Tested and developed a deployment plan for Windows 8.1 and Windows Server 2012 R2
  • Developed a Windows Server 2012 R2 deployment image that was fully compatible with the S T network
  • Developed a Windows 8.1 deployment image that was fully compatible with the S T network
  • Worked with a team which upgraded SCSM 2007 to SCSM 2012 R2
  • Worked with a team which upgraded SCOM 2007 to SCOM 2012 R2
  • Worked with a team which upgraded SCCM 2007 to SCCM 2012 R2
  • Led a team which created a VMware vSphere pre-production environment to mirror the S T live domain, as well as providing other virtualized environments for other groups to test software
  • Maintained desktop and laptop images, as well as VMware training images, for classroom practical training exercises
  • Prepared documentation for official DoS Certification and Accreditation of the internal training network
  • Assisted in evaluating new technologies for distance learning and courseware design and production
  • Prepared and implemented a backup plan for the internal training network
  • Analyzed internal network security, and provided suggestions for improvement, including virtualization
  • Maintained an inventory of all training hardware laptops, USB drives, workstations, servers
  • Designed, implemented, and maintained a physical security system for hardware and software assets
  • Designed, implemented, and maintained a logical security system for digital assets and the internal training network

Confidential

Systems Engineer

  • Installed new VMware vSphere and Hyper-V servers in the Enterprise Lab, and converted most servers to virtual machines
  • Upgraded Enterprise Lab domain controllers to Windows Server 2008 R2
  • Built and deployed Windows 7 and Windows XP images using MDT 2007 and SCCM 2007. Trained lab users on imaging procedures
  • Repaired faulty Active Directory replication between domain controllers
  • Created and implemented a backup plan for Enterprise Lab domain controllers and file servers
  • Installed and configured a Symantec SEP11 management server, and SEP11 clients on workstation images and servers
  • Created an SOP for product evaluation submission to the new online ITCCB submission process
  • Planned and built a SharePoint site for internal users
  • Provided testing results and recommendations for Windows Server 2008 R2, IIS, 7.0, IIS 7.5, and Adobe Acrobat X Professional
  • Started Windows 7 testing project
  • Assisted SCCM team with product package deployment issues
  • Produced and implemented a plan to eliminate unnecessary subnets and streamline the Enterprise Lab internal network
  • Implemented a PKI infrastructure in the lab environment

Confidential

Senior Systems Analyst Deployment Manager

  • Worked for one month at Denver Passport Agency, assisting with the 2007 passport surge
  • Trained an Advanced Systems class for travelers and CA Support Desk staffers
  • Volunteer work at Foreign Service Institute, assisting with Non-Immigrant Visa interview training for new consular officers
  • Consistently attained above average scores on customer and peer reviews
  • Received Team Leader travel award in August 2008, peer travel award in May 2009
  • Responsible for all trip planning and reporting, and supervising a team of 2 to 5 fellow travelers, depending on post size and length of visit
  • Helped to create a new, streamlined deployment system for proprietary Consular applications, utilizing batch files, VB Scripts, and Symantec Ghost
  • Tested Consular workstation images and proprietary Consular applications on proposed workstation configurations. Provided test results documentation to CA for future purchase considerations
  • Performed troubleshooting procedures on consular systems and workstations to prevent future issues

Confidential

Network Engineer / Systems Administrator

  • Performed a preliminary survey of the main COOP DR site and other COOP sites, and supplied the Air National Guard with equipment requirements, including cost options and associated performance benefits and liabilities
  • Helped to produce Phase 1 and 2 Envisioning and Planning documentation for the COOP project
  • Developed a test lab for the COOP project, including: Domain Controllers, Active Directory Infrastructure, DNS, DHCP, Firewalls, SQL Servers, Blue Coat WAN Accelerators, NetApp Storage solution, and Citrix Servers
  • Installation and configuration of hardware routers, switches, servers, data storage, copper and fiber cabling, etc at multiple COOP sites
  • Imaging and maintenance of laptop computers for COOP project. Installation, configuration, and testing of mission-specific proprietary and COTS software applications
  • Testing of the LAN/WAN configuration and resolving connectivity problems/issues
  • Supported and monitored multiple live exercises at the DR site, involving 15 100 users
  • Developed a Site Operations Handbook and provided hands on training for end user self sufficiency
  • Helped establish a baseline for WAN performance and replication
  • Maintained network and port security at both the COOP site and the ANGRC in compliance with Air Force and DOD guidelines and standards
  • Worked to establish connectivity and collaboration between the Air National Guard and Army National Guard networks at DR site
  • Trained new members of the COOP support team. Performed hands-on training on Windows 2003 Server, including Network Administration, Active Directory, DNS, and DHCP development. Created documentation for new team members, including: Visio drawings of current and future network configurations, COOP exercise SOPs, and security documents
  • Performed 24-hour support at main COOP site during COOP exercises, managing a team of four technicians
  • Worked with ANGRC CAT Crisis Action Team researching the deployment of a new ClearCube Hardware deployment scheme
  • Helped plan migration of approximately 700 ANG users at secondary site from Army network to Air Force Network. Trained and supervised temporary IT staff to perform the migration
  • Assisted in the migration from Microsoft Exchange 5.5 to Microsoft Exchange 2003
  • Assisted in the installation and configuration of CAC PKI on the ANG network
  • Assisted with the implementation of port security at ANGRC
  • Operated as a local registration authority LRA for the ANGRC network PKI infrastructure
  • Hardware/Software maintenance and installation
  • Resolution of network connectivity and VPN issues.

We'd love your feedback!