Ad/security Engineer Resume
OBJECTIVE:
To obtain a position in an environment using Active Directory/PowerShell and our any of the Virtual Directory / Identity or Access management products such as Oracle Identity Manager, Radiant Logic, Optimal IdM as well as SCCM, or SCOM. I enjoy automation repetitive tasks as well using PowerShell. Also enjoy creating small programs using C# and modifying/fixing/testing code of various languages such as MVC C#, ASP.NET, PowerShell to help solve issues.
SUMMARY:
- An effective communicator with clients as well as with peers. I am a dedicated MCSE professional. Major abilities communicating with technical and non - technical personnel. Willing to take on any task. Well-respected by peers, clients, and management. Enjoy working on projects using access management software where I can continue to learn new technology and continue to leverage skills that I have obtained over the years such as Active Directory; OIM and OAM; Radiant Logic; Radiant One Identity Correlation and Synchronization Server(ICS);Optimal IdM; SailPoint; PowerShell; WMI/ADSI; Vbscript to name a few.
- In my current role, I am the IAM administrator where I am involved with testing RBAC where the application is (claims-aware SharePoint 2013). The goal here is to allow outside contracting companies RBAC access to SharePoint resources. Delegated access will be given to representatives of these companies so they can manage access to their own employees as they do business with us. We are mapping business roles to access permissions in SharePoint so these outside companies employees will have the access they need and required to have.
TECHNICAL SKILLS:
- Windows 2008 and 2012 versions; JAVA; JavaScript; Html; CSS; JQuery; Bootstrap; ASPX; Python; PowerShell; MVC; C#; ASP.NET; SOAP; Web Services; XML; LDAP; Shell scripting; Python; DHCP; LDS; TFS.
- RadiantOne FID, Optimal IdM; OpenIDM; Oracle Identity Manager; AD Federation Services (ADFS);Active Directory 2003/2008/2012 ; DFSR; Microsoft HPC PowerShell, Grid Server, Kerberos, Exchange 2000/2003/2007 , Exmerge, Microsoft Exchange IMF, IronMail, MOM, SMS, WSUS, SMTP, SQL Server, Live Communications Server, Perfmon, GPMC, LDP, CSVDE, ADSIedit, Adsvw, LDAP, IIS, MailFrontier, Antigen for Exchange; MS Outlook, OMA, OWA, Microsoft Network Monitor, Tcp/Ip, SSL, VPN, RPC, VMWare, MS Virtual PC, MS Virtual Server, Windows 2000 debugging tools, Terminal Services, Citrix, Group Policies, Perfmon, DNS, WINS, DHCP, MS Office, Windbg, NTSD, KD, NTSD, Single Mailbox Recovery Tool, Enterprise Vault.
PROFESSIONAL EXPERIENCE:
Confidential
AD/Security Engineer
Responsibilities:
- Remediated explicit user permissions on AD objects.
- Worked with permission owners to certify user’s membership in Roles.
- Creating and managing SPNs for Web applications.
- Troubleshooting Kerberos issues and using utilities setspn, klist, and ktpass.
- Validating and verifying new SailPoint for new groups and new group memberships for appropriate permissions for users.
- Created documentation to record process of remediating user permissions.
- Created PowerShell script that created a custom object that held various attributes of user, groups and computers objects to identify security configurations against Microsoft Best Practices.
- Wrote PowerShell script that read from Confidential file to email permission owners to inform them of the upcoming remediation against users and AD resource.
Confidential
Optimal IAM Engr, Raleigh, NC
Responsibilities:
- Using the AD Tools to modify the directory schema.
- Implemented token-based authentication and claims-based authorization schemes.
- Helped designing and modifying and configuring ASP.net development experience using C#, JavaScript, SQL, XML, SOAP, web services.
- Working with Active Directory IAM SME.
- Worked with RadiantOne FID in test environment.
- Testing using ADFS and Optimal IdM to provide STS.
- Used TFS for encrypted file exchange.
- Using Ldap Manager to view directory objects.
- Create and modifying .NET applications to modify group memberships of users as well as manipulate attributes in C# and PowerShell.
- Knowledge of building RESTful web services
- Using MVC C# and PowerShell access the Active Directory to automate processes.
- Modifying code to a tool used that monitors contracting company’s certification expiration date which reads/modifies groups and group types and attributes in Active Directory.
- Installing and configuring Optimal IdM's Virtual Server and OFIS products in Confidential 's development, Integration, Quality Control and will install in production as well.
- Configuring a single joined view of data from various backend data silos.
- Creating test entitlements and user accounts as well as other test data to test our Access solution.
- Configuring Optimal's Secure Token Service - OFIS product and relying parties. with their claims.
- Writing test C# programs to perform claims augmentation.
- Setting up and configuring certificates on application servers for SSL communications.
- Using Optimal tools, directory tools and writing PowerShell scripts manage the environment.
- Troubleshooting issues using Netmon and Fiddler as well as others.
- Installing and updating certificates on Optimal IdM servers for secure communications with directories as well as other systems.
- Using PowerShell to view auditing data and identity data in SQL tables.
- Troubleshooting IIS virtual directory issues and ASP.NET application issues with the custom vendor code.
- Implemented new relying parties in Optimal OFIS so new sites users to be authenticated by the OFIS federation by way of the configured data sources such as Active Directory in order to access claims aware resources.
Confidential
Active Directory Engr, Raritan, NJ
Responsibilities:
- Managing JnJ’s AD operations including group policies, promoting and demoting, sites and services, and many more.
- Worked with DHCP.
- Architecting upgrade of Active Directory.
- Use ADSIedit and LDP to review AD objects and Create PowerShell scripts to test against attributes and their values.
- Used ADSIedit and LDP to compare attribute values of objects when troubleshooting issues.
- Participated in AD LDAP schema changes to have pertinent company data/attributes in user objects to be access/queried by Group policy and scripts as well as to provide access to various resources.
- Troubleshooting issues where group policies do not get applied to objects in an OU.
- Using Netmon to troubleshoot the LDAP protocol to determine if applications are configured to put to a DNS name for authentication or a specific hardcoded DC.
- Use PowerShell to script against AD objects in order to search for objects that meet various criteria.
- Designing and writing PowerShell scripts to identify specific issues in DFS configuration/setup.
- Designing strategy for promoting and demoting domain controllers with consideration for ample DC resources for users of a site; and legacy client applications that may have hard coded DCs configured.
- Assisting client application owners to configure application for redundancy DC authentication.
- Using AD tools such as repadmin, gpupdate, dcdiag, and gpresult to report, update, and troubleshoot issues.
- Writing PowerShell scripts to automate pre and post procedures after isolating, promoting, and demoting DCs.
- Creating MVC C# and PowerShell scripts to modify lots of remote registries, configuration services and reporting on services that fit criteria and querying the AD as well.
- Modifying various registry entries such as those that affect the speed of intra-site AD replication.
Confidential
Active Directory Engr, Providence, RI
Responsibilities:
- Managing Confidential Bank multi-domain and multiple forest Active Directories.
- Participated in architecture AD design meetings.
- Using Quest Recovery Agent for AD.
- Worked with DHCP.
- Used Ldap and ADSIedit to view permissions and troubleshoot various objects in AD.
- Use LDP to view the various partitions in AD to troubleshoot possible replication issues.
- Creating subnets, sites, and site links.
- Checking health of AD 2008.
- Resource to other parts of the company as AD resource.
- Searching objects in using LDAP.
- Managing AD attribute values using LDP and ADSIedit.
- Using PowerShell to manage AD.
- Handling replication issues
- Creating and managing DFS replication.
- Using secedit for security Windows servers.
Confidential
Programmer Analyst, Newark, DE
Responsibilities:
- Troubleshooting code to correct issues.
- Running PowerShell code on Grid Server.
- Converting code to PowerShell.
- Using Microsoft HPC snap-in to create HPC tasks and jobs.
- Adding features to code.
Confidential
Virtual Directory Engineer, Newark, DE
Responsibilities:
- Working on Virtual Directory Server (VDS) Proof of Concept (POC for the Bank using five VDS products.
- Used ADFS to test Federation/Relying party access to Claims aware application.
- Tested provisioning user policies with Oracle Identity Manager.
- Testing/Validating SailPoint Provisioning rules.
- Configured multiple backend directories using Oracle Identity Manager to correlated identities across the multiple backends while presenting a single virtual source.
- Created internal ASP website using C# as code behind language to guide myself through the various use cases for the demos. The ASP site displayed the various virtual attributes taken from the attributes of the data sources for each of the users.
- Attended Radiant Logic class in Washington DC.
- Setting up 5 different Virtual Directory products in POC including Oracle IdM, OpenIDM and Radiant Logic’s RadiantOne VDS Identity Management products. Obtained some knowledge of SiteMinder.
- Installed and configured MS LDS to be one of the data sources for VDS.
- Created customized attributes which combined at least two attribute values.
- Created VDS views that contains attributes from a variety of data sources.
- Discussed use cases and determining if Virtual Directories would solve each issue.
- Uses Radiant Logic’s ICS to correlate and synchronize the data across the datasources.
- Participated in project management meetings and offsites to manage the project.
- Performed in VDS demonstrations to Confidential management.
Confidential
Active Directory & Exchange Engineer, New Castle, DE
Responsibilities:
- Managing more than 12 Confidential AD domains
- Managing AD and Exchange components such as objects/attributes, sites, and other basic administration.
- Worked with DHCP.
- Worked in a rotated on-call schedule.
- Resolving AD and Exchange issues.
- Updating and applying patches to Exchange clustered servers.
- Using QMM to migration objects between AD domains.
- Exchange 2003 managing more than 300k user mailboxes
- Participating in design for Exchange 2003 migration to Exchange 2010.
- Troubleshooting and maintaining IronPort mailflow issues.
- Using PowerShell with Quest snapin module to administer AD domain.
- Supporting MS Exchange in Clustered environment
- Supporting multiple 7 node Exchange clusters. 5 active; 2 passive.
- Managing logon script written in VBScript.
- Mentoring level 1 and 2 engineers.
Confidential
Active Directory Engineer, Philadelphia, PA
Responsibilities:
- Managing group policies and security.
- Using NetIQ to manage and deploy GPOs.
- Assisting with migration of Confidential ’s systems; software and data to IBM.
- Building domain controllers via automated build process.
- Managing Exchange 2007.
- Managed AV for Exchange.
- Keeping DAT files up-to-date.
- Managing logon script written in VBScript.
- Writing C# and Powershell scripts to manage and report on AD and Windows systems.
- Supporting Citrix team with logon script issues.
- Upgrading servers and restoring/migrating applications.
- Searching objects in using LDAP.
- Managing AD attribute values using LDP and ADSIedit.
- Designing the layout of new Active Directory sites in the domain.
Confidential
Sr. System Engineer, Sterling, VA
Responsibilities:
- Designing & supporting Exchange/SCCM-SMS/SCOM-MOM/Active Directory/ADFS.
- Using MOM to proactively and reactively attend to server and network issues.
- Using MOM to monitor systems on the network.
- Inventorying computers on the network using SMS.
- Creating Reports using SMS Reporting; Modifying SQL SELECT statements to provide customized Web reports to clients.
- Using SMS to push out applications and for inventorying computers on network.
- Configured SMS to push MSI packages.
- Using AdminStudio to create MSI packages.
- Used ADFS to configure a Federation between organizations to have IM between them.
- Designing/Installing/supporting Live Communications Server.
- Migrating users acquired companies into our AD environment using Quest.
- Testing and evaluating new technologies.
- Testing MS patches using Virtualization.
- Creating and executing LDAP queries in ADSI scripts; constructing Exchange RUS policies for the enterprise; and creating management reports for auditing activities.
- Administer IronMails creating white lists and policies for environment.
- Using the LDAP protocol in IronMail to route mail to appropriate mail server.
- Searching objects in using LDAP.
- Editing AD values using LDP and ADSIedit.
- Evaluating Clustering for Exchange technologies.
- Determining best Active Directory site link configuration settings.
- Designing the layout of new Active Directory sites in the domain.
- Responsible to Active Directory and Exchange recovery.
- Designing FSMO role placement on Domain Controllers.
- Designing and creating WSUS configuration to support the delivery of security updates for test bed of machines as well as production computers.
- Designing Exchange routing to better control the flow of email.
- Troubleshooted Kerberos ticket issues using setspn and klist utilities.
- Developing migration plans pertaining to company acquisitions.
- Investigating anti-spam products.
- Using PerfMon to view performance of systems and processes.
- Will be involved in evaluating offline email storage systems as our customers are beginning to require larger mailboxes.
- Preparing project plan to introduce additional routing groups into the Exchange organization.
- Investigating the virtual server technologies for lab testing as well as decommissioning old servers.
- Meeting with various vendors to compare products.
- Using MOM to proactively and reactively attend to server and network issues.
- Using MOM to monitor systems on the network.
- Inventorying computers on the network using SMS.
- Creating Reports using SMS Reporting; Modifying SQL SELECT statements to provide customized Web reports to clients.
- Using SMS to push out applications and for inventorying computers on network.
- Using WSUS to push MS security updates to systems. Decided on specified WSUS and GPO settings based on business requirements of the organization.
- Writing/Modifying VB scripts (ADSI/WMI) based on helpdesk requirements.
- Writing programs and web-based automation tools in Visual Web Developer 2005 and Visual C# 2005.
- Using PERFMON to monitor Exchange performance.
- Handling (change management) off-hours modifications to the company network.
- Creating/modifying/designing Active Directory group policies/object security/OU structure/domain account policies.
- Installing Confidential Servers to Standard Build Specifications.
- Disabling user accounts; modifying permissions on AD objects; moving user mailboxes.
- Using LDP to query AD to obtain requested data in the directory.
- Using CSVDE to export Active Directory data of our organization for auditors.
- Monitoring Exchange message queues; Recovering mailboxes using the Recovery Storage Group in Exchange 2003; managing Offline Address Book; Joining and removing Email servers in/out of the Exchange Organization; moving server roles of Exchange to other servers.
- Recovering user mailboxes using Recovery Storage Group (RSG) and Exmerge.
- Modifying the mailbox GUID on user account to match Exmerge log file so user mailbox can be recovered.
- Handling SPAM issues; installing/configuring MS Exchange IMF; Reviewing other technologies to combat SPAM in organization.
- Addressing any issues with Antigen for Exchange AV engines that may occur.
- Keeping AV up-to-date.
- Customizing MOM’s scripts and management packs for specifically for Confidential ’s environment.
- Analyzing computer memory dumps using debugging tools from Microsoft.
- Participating in interviewing candidates.
- Escalation point for the HelpDesk engineers.
- Mentoring Helpdesk frontline engineers.
Confidential
Treasury Systems Engineer, Washington, DC
Responsibilities:
- Maintained and evaluated Windows 2003 Active Directory.
- Analyzed a variety of solutions and selected best product based on customer requirements.
- Searching objects in using LDAP.
- Editing AD values using LDP and ADSIedit.
- Supporting Microsoft Exchange.
- Troubleshooted Kerberos ticket issues using setspn and klist utilities.
- Evaluated technologies and decided whether to implement at Treasury.
- Investigated the virtual server technologies for lab testing as well as decommissioning old servers.
- Met with various vendors to compare products.
- Troubleshooting major network issues.
- Using LDP to query AD to obtain requested data in the directory.
- Participating in interviewing candidates.
- Continuation of contract position mentioned below. Hired fulltime by BAE.
Confidential
Contractor, Washington, DC
Responsibilities:
- Technical Lead on the Confidential NT4 to Windows 2003 Active Directory Migration project.
- Supporting Microsoft Exchange.
- Designed Migration plans and procedures for the Confidential based on their requirements.
- Created Build Documentation for New Production Domain Controllers as well as DNS, WINS, and DHCP Servers.
- Upgraded remote domain controllers at various locations.
- Migrated/Upgraded Confidential Disaster Recovery Site to Active Directory as well.
- Migrated DHCP and DNS data from NT4 to Windows 2003 (DNS zones AD Integrated).
- Created ADSI VBScript to move Disabled Users from Users containing to an alternate container.
- Closely worked with Project Lead during AD project to insure accurate and timely progression.
- Worked with Security Team defining Base-Line Server Security Template and Group Polices for DCs, member servers, and workstations.
- Used GPMC to link designed GPOs to various containers in the Active Directory structure.
- Used Virtual PC and Virtual Server to examine various configurations, group polices, and other testing efforts.
- Used Microsoft Project to assign man-hours to tasks created.
- Invited Vendors On-Site to deliver information about how their products can help in current environment.
- Supported engineers with various MS Outlook, connectivity, performance, licensing, Active Directory, as well as other issues.
- Mentored help desk and other support engineers on a variety of technical Areas.
- Created crash cart design procedures to be used if server blue screens.
- Created and Revising processes and procedures relating to network design.
- Attended vendor demos to evaluate and research products for the Confidential ’s Network.
- Installed and configuring new technologies in test environment to help determine interest level.