Systems Engineer Resume Profile
2.00/5 (Submit Your Rating)
SKILLS:
- Operating Systems: Windows Client and server, Macintosh OSX Client and Server, some Linux
- Help Desk Ticket Generator: SCSM, Remedy
- Network Monitoring: SCOM, SolarWinds
- Administration Software: SCCM, Active Directory, Apple Open Directory
- Good with software, LAN, WAN, TCP/IP, DNS, DHCP, and hardware troubleshooting
- Excellent customer service skills
JOB HISTORY:
Confidential
Senior Systems Engineer
- Cleaned 3 tombstone domain controller accounts from Active Directory, DNS, and SCOM, which were causing multiple issues with replication, DNS backups, Group Policy implementation, and various domain services
- Built and promoted a second domain controller for redundancy, seized FSMO roles from old offline DCs
- Created Event Log Subscriptions from all domain servers on the SCOM server, implemented an auditing policy
- Added an IBM Endpoint Manager Big Fix implementation for compliance monitoring and reporting
- Rebuilt the domain Group Policy infrastructure, and implemented several group policies to comply with DoL security standards
- Raised the default size of the Kerberos/LSA cache, which was preventing access to system resourcesMaintain a production domain utilizing physical servers
- Maintain test, staging, and training domains utilizing virtual servers on Amazon Web Services
- Address and correct multiple domain, software, and network issues
- Create an updated backup and recovery plan
- Assist with documentation Configuration Management Plan, System Safety Plan, System Configuration Plan
- Provide management with a detailed list of options for replacing aging hardware, including virtualization/private cloud, and public cloud
- Monthly testing and deployment of Microsoft patches
- General maintenance, administration, and troubleshooting
Confidential
Senior Operations Engineer
- Performed a complete inventory of all hardware and software assets on the internal training network. Provided detailed reports and Visio drawings of the physical and logical network.
- Information Assurance Trainer - Network Security Engineer III
- Confidential
- Operated as a Local Registration Authority LRA , creating, re-keying, and revoking workstation 802.1x certificates
- Developed a plan to clean up unnecessary and redundant organizational units and group policy objects in the S T domain Active Directory infrastructure
- Provided informal training to fellow engineers on Windows PowerShell, VMware, domain-level security, and Private Cloud Computing
- Created an Active Directory group policy preference which enables and renames the local administrator account, and changes the password every 60 days, on domain workstations and laptops
- Developed a Windows PowerShell script to move and disable stale Active Directory user accounts
- Developed a Windows PowerShell script to move, disable, and ultimately delete stale Active Directory workstation accounts
- Developed a deployment plan to upgrade all S T domain controllers to Windows Server 2012 R2, and to raise the domain functional level
- Tested and developed a deployment plan for Windows 8.1 and Windows Server 2012 R2
- Developed a Windows Server 2012 R2 deployment image that was fully compatible with the S T network
- Developed a Windows 8.1 deployment image that was fully compatible with the S T network
- Worked with a team which upgraded SCSM 2007 to SCSM 2012 R2
- Worked with a team which upgraded SCOM 2007 to SCOM 2012 R2
- Worked with a team which upgraded SCCM 2007 to SCCM 2012 R2
- Led a team which created a VMware vSphere pre-production environment to mirror the S T live domain, as well as providing other virtualized environments for other groups to test software
- Maintained desktop and laptop images, as well as VMware training images, for classroom practical training exercises
- Prepared documentation for official DoS Certification and Accreditation of the internal training network
- Assisted in evaluating new technologies for distance learning and courseware design and production
- Prepared and implemented a backup plan for the internal training network
- Analyzed internal network security, and provided suggestions for improvement, including virtualization
- Maintained an inventory of all training hardware laptops, USB drives, workstations, servers
- Designed, implemented, and maintained a physical security system for hardware and software assets
- Designed, implemented, and maintained a logical security system for digital assets and the internal training network
Confidential
Systems Engineer
- Installed new VMware vSphere and Hyper-V servers in the Enterprise Lab, and converted most servers to virtual machines
- Upgraded Enterprise Lab domain controllers to Windows Server 2008 R2
- Built and deployed Windows 7 and Windows XP images using MDT 2007 and SCCM 2007. Trained lab users on imaging procedures
- Repaired faulty Active Directory replication between domain controllers
- Created and implemented a backup plan for Enterprise Lab domain controllers and file servers
- Installed and configured a Symantec SEP11 management server, and SEP11 clients on workstation images and servers
- Created an SOP for product evaluation submission to the new online ITCCB submission process
- Planned and built a SharePoint site for internal users
- Provided testing results and recommendations for Windows Server 2008 R2, IIS, 7.0, IIS 7.5, and Adobe Acrobat X Professional
- Started Windows 7 testing project
- Assisted SCCM team with product package deployment issues
- Produced and implemented a plan to eliminate unnecessary subnets and streamline the Enterprise Lab internal network
- Implemented a PKI infrastructure in the lab environment
Confidential
Senior Systems Analyst Deployment Manager
- Worked for one month at Denver Passport Agency, assisting with the 2007 passport surge
- Trained an Advanced Systems class for travelers and CA Support Desk staffers
- Volunteer work at Foreign Service Institute, assisting with Non-Immigrant Visa interview training for new consular officers
- Consistently attained above average scores on customer and peer reviews
- Received Team Leader travel award in August 2008, peer travel award in May 2009
- Responsible for all trip planning and reporting, and supervising a team of 2 to 5 fellow travelers, depending on post size and length of visit
- Helped to create a new, streamlined deployment system for proprietary Consular applications, utilizing batch files, VB Scripts, and Symantec Ghost
- Tested Consular workstation images and proprietary Consular applications on proposed workstation configurations. Provided test results documentation to CA for future purchase considerations
- Performed troubleshooting procedures on consular systems and workstations to prevent future issues
Confidential
Network Engineer / Systems Administrator
- Performed a preliminary survey of the main COOP DR site and other COOP sites, and supplied the Air National Guard with equipment requirements, including cost options and associated performance benefits and liabilities
- Helped to produce Phase 1 and 2 Envisioning and Planning documentation for the COOP project
- Developed a test lab for the COOP project, including: Domain Controllers, Active Directory Infrastructure, DNS, DHCP, Firewalls, SQL Servers, Blue Coat WAN Accelerators, NetApp Storage solution, and Citrix Servers
- Installation and configuration of hardware routers, switches, servers, data storage, copper and fiber cabling, etc at multiple COOP sites
- Imaging and maintenance of laptop computers for COOP project. Installation, configuration, and testing of mission-specific proprietary and COTS software applications
- Testing of the LAN/WAN configuration and resolving connectivity problems/issues
- Supported and monitored multiple live exercises at the DR site, involving 15 100 users
- Developed a Site Operations Handbook and provided hands on training for end user self sufficiency
- Helped establish a baseline for WAN performance and replication
- Maintained network and port security at both the COOP site and the ANGRC in compliance with Air Force and DOD guidelines and standards
- Worked to establish connectivity and collaboration between the Air National Guard and Army National Guard networks at DR site
- Trained new members of the COOP support team. Performed hands-on training on Windows 2003 Server, including Network Administration, Active Directory, DNS, and DHCP development. Created documentation for new team members, including: Visio drawings of current and future network configurations, COOP exercise SOPs, and security documents
- Performed 24-hour support at main COOP site during COOP exercises, managing a team of four technicians
- Worked with ANGRC CAT Crisis Action Team researching the deployment of a new ClearCube Hardware deployment scheme
- Helped plan migration of approximately 700 ANG users at secondary site from Army network to Air Force Network. Trained and supervised temporary IT staff to perform the migration
- Assisted in the migration from Microsoft Exchange 5.5 to Microsoft Exchange 2003
- Assisted in the installation and configuration of CAC PKI on the ANG network
- Assisted with the implementation of port security at ANGRC
- Operated as a local registration authority LRA for the ANGRC network PKI infrastructure
- Hardware/Software maintenance and installation
- Resolution of network connectivity and VPN issues.