Windows/active Directory Administrator Resume
Pleasanton, CA
SUMMARY
- IT Professional with around 5+years of experience in Systems and Network administration with a primary focus on installation and administration of Windows Servers, Active Directory Services (WINS, DNS, DHCP), HP, UCS blades.
- Excellent experience in configuration of Data Domain Storage units in Symantec Net backup.
- Understanding of Microsoft Windows Authentication, Group Memberships and Design, Account settings.
- Ensure system connectivity of all servers, shared software and other applications.
- Strong understanding of Windows system administration, installation, security, user management, networking, disk configuration.
- Familiarity with Microsoft Exchange, Printer, and Shared Folder (on Windows File System Servers) access administration.
- Extensive experience with Active Directory, Domain Name System, Windows Internet Naming Service, and Microsoft Exchange.
- Experience in administering / engineering Microsoft Active Directory.
- Proficient with Microsoft Excel and other tools used to manage large reports and requests.
- Expertise in understanding of NTFS.
- Working knowledge of remote technologies and administrative account controls for VPN, OWA, and Mobile devices.
- Architected, installed and maintained Windows NT server solutions for both production and development environments.
- Experience managing work via Infra or similar ticketing system used for service request and incidents.
- Expertise in Migration Using Quest Migration Manager Tool for Active Directory.
- Expertise in active directory design and support (GPO s, AD Schema, OU s, LDAP, Sites, Replication, etc.).
- Analysis and remediation of windows 2008R2 environment DNS, Sites and services, Kerberos, Trusts, Exchange 2010, Group policy.
- Active Directory migration using Quest Migration Manager QMM and RUM.
- Assisted in designing, implementing and evaluating applications, systems and utilities relevant to Active Directory services
- Experience in Migrating Users, Groups, Workstations and Application window Servers from Source Domain to Target.
- Administration of user Accounts, Groups, Resources, Security, Backup strategies in window Servers 2003/2008R2/2012.
- Implementation and Configuration of Quest Quick Connect and Quest Quick Connect for Virtual Directory VDS.
TECHNICAL SKILLS
Systems: Windows Server 2000/2003/2008 R2/2012R2
Backup: VERITAS Net backup, Replication manager, Recovery point
LDAP Directories: Active Directory
Migration Tools: Quest Migration Manager, RUM, ADMT
Virtualization: Hyper V, VSphere 4.1, ESX/ESXi server 5.0,5.1,5.5/6.0 VSphere Client, VCenter
Workstations: Windows XP, NT, Windows 7,10
Scripting Languages: PowerShell, VBS
Databases: SQL server 2000/2005, DB2 and MS Access
Patching tools: SCCM, Blade Logic
Networking: DNS, WINS, DHCP, TCP/IP, NTFS
Ticketing: CA Service Desk, Lotus notes, Tracer, Service Now
PROFESSIONAL EXPERIENCE
Confidential, Pleasanton, CA
Windows/Active Directory Administrator
Responsibilities:
- Successfully Migrated to Windows 2016 R2 x64 Active Directory Single Forest and Domain Architecture.
- Installed Quest on remote servers, operated QMM and RUM consoles to migrate AD objects, scripting and data manipulation, log review and status reporting.
- Administration on Quest Active Role Server v6.8, Quest Reporter, Quest Recovery and Quest Change Auditor.
- Need to gather data for User and computer migration and prepare for the file to be upload in Quest migration manager.
- Implemented successful migration for 30000s of User, Computer and Group accounts with SID History.
- Migrating Users, Groups, Workstations and Application windows servers from source domain to Target domain using QMM and AD Domain.
- Process employee terminations, employee transfers and employee new hires with IdentityManagement
- Designed process for DNS zone migration from legacy storage to application partition storage
- Security threat detection and countermeasures protect from enumeration and scanning
- Designed and deployed Virtual lab environment based on leading tier 1 hypervisor
- Cross platform authentication (Unix to Windows)
- Developed power - shell scripts to rename and resuming the windows after reboot.
- Provision Infrastructure platformaccessusing Role-Based Access Model (RBAC), Active Directory and Identity&AccessManagement
- Developed power-shell scripts to automate the setting of user credentials and activation of windows.
- Performed Windows servers patching using SCCM console
- Configure constrained delegation in Active Directory for Kerberos enabled applications
- Worked on Public Key Infrastructure (PKI) - certificates
- Troubleshoot Kerberos authentication and constrained delegation
- Incident and Request management through Service Now
- Operating System security hardening of Domain Controllers across the enterprise
- Developed custom Identity Management component to synchronize Active Directory, LDAP, and legacy systems.
- Performed cross platform audits of Active Directory objects and user permissions using Identity Manager.
Environment: Windows 2008, NetApp 8K series, ONTAP, Outlook 2010/2013, O365, Created AD Group policies, Windows Azure AD, IPv4 configurations, IDAM, SCCM Console, Service Now, VMware servers, Identity Management, ADFS, LDAP, Office 365, RBAC, QMM, Quest ARS, DHCP, DNS and WINS.
Confidential, San Jose, CA
System Security Engineer/Access Control Management
Responsibilities:
- Created AD Group policies to Enforce Domain and OU Level Security of Users and Computer objects.
- Privileged Access Management system deployment, Password vaulting, privileged session recording.
- Working with Access account provisioning and de-provisioning in the windows environment, Via Active directory and local servers at OS level on Occasion.
- Part of a team that takes care of Exchange Server 2010,Outlookand Messaging (Lync 2010) issues.
- Provision Infrastructure stage get to utilizing Role-Based Access Model (RBAC), Active Directory and Identity and Access Management
- Handled Access Account Administration work coming from Internal Customers, Business partners and ACM.
- Created and managed user accounts as per client automated and manual requests.
- Handled Access account administration work coming from Access governance team.
- Maintained accurate access account information within specific Identity Access store databases as part of internal audit controls and provided data in response to Access Governance related audit inquiries from internal and external auditors within requested timelines.
- Initiated meetings by involving leads with various technology teams for any validation queries or challenges faced during access management efforts.
- Process employee terminations, employee transfers and employee new hires with IdentityManagement.
- Successfully created and maintained Mailbox’s, Distribution lists in Microsoft exchange.
- Managed work via infra or similar ticketing system used for service request and incidents.
- Worked on remote technologies (RSA) and administering access controls for VPN, OWA and Mobile devices.
- Provisioning new hire accounts (P drive, mailbox) and granted access to various security groups including VDI.
Environment: Windows 2008, 2008 R2 and Windows 2012, RBAC, ACM, Net IQ DRA, RSA, MS Exchange management console, PAM, VDI, Office 365, Group Policy, IDAM.
Confidential, San Francisco, CA
Active Directory Engineer
Responsibilities:
- Support multiple AD forests, including multiple domains forest with over 16 domains, 80 domain controllers and 40 AD sites, running on Windows 2003, Windows 2008, 2008 R2 and Windows 2012
- Planning intra forest migration to consolidate multiple child domains. Provide procedures, documents, customize accounts migration with pre/post task to minimize user’s impact after migration.
- Managed systems configuration and maintenance, problem troubleshooting, system and program security, applications and program management, planning and directing upgrades, and testing operations to ensure optimum system functionality.
- Provided design, implementation, administration and support of Windows 2000 Active Directory and Windows NT legacy domain.
- Managed the Help desk & Desktop Support team which supported Windows 9.X, 2000, XP, Vista and Windows 7 along with the MS-Office including mail services.
- Investigated new technologies, software, patches, and security packages, which will improve system performance and systems administration procedures.
- Managed, led and supported Windows NT, 2000 and 2003 Active Directory domain network in multi-locations.
- Planning and implement data synchronization between external data to AD.
- Customize update certain data fields from HR data to multiple attributes in AD user object.
- Deploy, Manage and troubleshooting of windows 2008R2 Domain Controllers in Active Directory
- Implemented Power-shell scripts to generating automated reports.
- Implemented Power-shell scripts to automate creation of contacts from Active directory users.
- Creation of Identity Management process, strategy, best practice and architecture documentation including Access Management, Password Management, DAP Management, Provisioning, Delegated Administration.
- Worked with developer to troubleshoot LDAP connection to query multiple AD domains
- Experience in installation and configuration of Microsoft SQL Server 2000 and 2005.
- Automated user accounts to force password change for every 30 days with Group policy.
- Hyper-V installation and configuration in Windows.
- Provide expert technical knowledge and support for Microsoft Active Directory 2003/2008R2.
- Active Directory administration, infrastructure, process, procedures, monitoring, and projects - Active Directory Win2008R2
Confidential
Windows Admin
Responsibilities:
- Design, Deploy and migrate Windows 2000 domains to join new Windows 2003 forest.
- Migrating users and groups from windows 2000 domains to windows 2003 domains using Aelitas tool
- Windows 2003 Servers deployment and Configuration
- Managing Active directory, DNS, WINS and DHCP Servers
- Active Directory Services -- Managing Users & Other AD objects
- Developed custom web-based self-service identity management website
- Planning and configuring new internal & external websites
- Developed power-shell scripts for backup and restore for windows.
- Creating, deploying, renewing and Import & export of the SSL certificates
- Coordination with application development teams for issue troubleshooting
- Work on Accounts Delegation, Drive Mappings and Widows Servers Decommission Process
- Create and Link AD policies to windows Servers 2003 in PROD & QA Environments.
- Monitoring/Analyzing/Troubleshooting Active Directory Replication in Multi Domain Environment.
- Tracking and documenting Active Directory production support issues
Environment: Active Directory, DNS, WINS, DHCP, Identity Management, Windows Servers, Drive Mappings