SlideShare ist ein Scribd-Unternehmen logo
1 von 6
PAULA D. ASHFORD
2029 Pinnacle Pointe Dr. ● Norcross, Georgia 30071 ● Mobile (678) 608-8568
p_d_ashford@yahoo.com
KEY QUALIFICATIONS
Strategically resolution focused, forward-thinking, highly accomplished Senior Systems/Applications Engineer with exceptional Engineering,
Datacenter Consolidation, and Operational Support working in various industries Healthcare Shared-Services, Banking, and telecom.
Experienced in planning, managing and supporting large complex environments involving the architecting of an enterprise class shared
services infrastructures. Strong systems management, interpersonal, presentation and organizational skills, critical to develop and maintain
relationships with cross functional organizations, vendors, strategic clients and all members of management. Resolution oriented-thinker with
the ingenuity and creativity to address and solve problems, and adapt to new situations always with an enthusiastic, collaborative, teamwork
and focus to achieve successful results.
CORE COMPETENCIES
Directory Services Architecting
Directory Services Remediation
Configuration Management
Patch Management
GPO Template Management
OS Security Management
Cross-Functional Team Leader
SharePoint
Telecommunications
Banking Technology
Healthcare Technology
Remote Hosting
Training
Client Relations
Process Development
Datacenter Transformation
Stock Exchange
Inter personal Communication
Risk Management
ITIL V3 Foundation Training
Asset Management
SKILL MATRIX
OS/Applications YRS Applications YRS Applications YRS
Windows 2012 1 Microsoft Baseline Analyzer 13 Quest Migration Manager 3
Windows 2008/2008R2 4 SharePoint 2010/2013 3 Quest Resource Manager 3
Windows 2003/2003R2 13 Shavlik Patch Manager 4 Infoblox 3
Windows 8 1 IIS 6.0/7.0 3 DNS/DHCP/WINS/DFS 17
Windows 7 4 Nintex 3
SQL Servers
2000/2005/2008/2012/BI 6
Windows XP 8 Reflection/Rumba/3270 Emulator 16 Exchange 2003/2007/2010 4
VM ESXi 5.0 4 Remedy 7.0 4 Microsoft Cluster Services 5
Directory Services 2008R2/2012 16 HP Service Manager 3 Viso 2003/2007/2013 6
Advanced Group Management 3 EMC EDM 4.4/4.5 3 Office 2003/2007/2013 13
Microsoft Security Compliance
Manager 5 Dcdiag/FRSdiag/Repmon/Repadmin 15 SSRS 2008R2/2012 4
Citrix 4.5 4 PowerShell/ISE 4 KMS Server 4
PROFESSIONAL HISTORY
Intercontinental Exchange, (December-2014 to Present)
IT Engineer
In this role I provided strong leadership, organization skills; coupled with strong technical Microsoft AD, SharePoint, Exchange and
other supporting tools. Strategically planned Enterprise Content Management, site collection, site column, content types and workflow
which resulted in saving NYSE millions of dollars daily. Demonstrated strong Active Directory leadership and operated in a senior-
level capacity in ongoing design, installation, configuration, and administration of a global Windows 2008R2 Active Directory
infrastructure. Primary responsibilities included Active Directory design, configuration, monitoring, process documentation, and
operational support including: provisioning, delegation, Group Policies, DNS, SMTP request, and other related activities, and third
party AD tools for auditing and reporting. In addition, standardize the configuration of interoperability which was necessary to enable
future interoperability with the Active Directory environments.
Key Accomplishments:
o Automatic and customize task via Nintex workflow in SharePoint for NYSE Market Regulation which result in accurate email
reporting saving millions of dollars daily
o Identified several deficiencies with Active Directory, stale domain controllers, Exchange, and Group Policy
Management which compromised the overall health of domain. Improve Active Directory by recommending
and implementing best practices for DNS and DHCP that ensure compliances with the PCI Data Security standards.
o Identify SharePoint sync issues with Active Directory via Central Admin and stsadm resolving User Profile configuration issue.
o Worked closely with the Security Management and Operations Management to standardize deployment of servers,
security policy, anti-virus policy for all servers which resulted in the security Domain.
o Identify inconsistence with SharePoint calendar item and created workarounds to product data which resolve security issue
on the NYSE trade floor
o Mentored, developed and trained IT Support team member to aid in first call resolution
o To meet client SLA requirements implemented SQL 2012/2012 R2 Clusters to provide high availability and
scalability, which met the requirements of the client while being comply with PCI standards.
o Researched mail routing and release mail via Ironport, identified vulnerabilities malicious email content and removed items
from all mailbox
o Implemented Microsoft Security Compliance Manager to standardize baseline GPO, Develop access-controls,
defined duties and roles. Tested, and deployed baseline GPOs to all objects to ensure protection strategies are
properly implemented and working as intended
Brdige2 Solutions Inc., (March-2014 to Present
Senior Windows Engineer
In this role I provided strong leadership, organization skills; coupled with strong technical Microsoft AD and other supporting tools.
Strategically planned the ‘current state’, to support a PCI comply Single Forest/Single domain, Shared-Services model. Demonstrated
strong Active Directory leadership and operated in a senior-level capacity in ongoing design, installation, configuration, and
administration of a global Windows 2008/2008R2 Active Directory infrastructure. Primary responsibilities included Active Directory
design, configuration, monitoring, process documentation, and operational support including: provisioning, delegation, Group Policies,
DNS, KMS, and other AD related activities, and third party AD tools for auditing and reporting. In addition, standardize the
configuration of interoperability which was necessary to enable future interoperability with the Active Directory environments.
Key Accomplishments:
o Identified several deficiencies with Active Directory, stale domain controllers, Exchange, and Group Policy
Management which compromised the overall health of domain. Improve Active Directory by recommending
and implementing best practices for DNS and DHCP that ensure compliances with the PCI Data Security standards.
o Deployed Lync Server 2013, built Lync Topology, created persistent chat rooms and built SQL instance to support
the Lync database structure. Import standard contact groups using Lync Server Management Shell.
o Worked closely with the Security Management and Operations Management to standardize deployment of servers,
security policy, anti-virus policy for all servers which resulted in the security Domain.
o Automated Active Directory task using PowerShell 2.0, PowerGUI, redircmp, redirusr, csvde, and ldifde
o Implemented Microsoft Advance Group Management to provide monitored change control and improved Group
Policy management
o Mentored, developed and trained junior engineers and service delivery team to aid in first call resolution
o To meet client SLA requirements implemented SQL 2012/2012 R2 Clusters to provide high availability and
scalability, which met the requirements of the client while being comply with PCI standards.
o Researched current state, identified vulnerabilities and implemented a baseline security group policy for
domain controllers and member servers which resulted in successfully protected the environment from a
previous penetration attackers
o Implemented Microsoft Security Compliance Manager to standardize baseline GPO, Develop access-controls,
defined duties and roles. Tested, and deployed baseline GPOs to all objects to ensure protection strategies are
properly implemented and working as intended
ThyssenKrupp IT Services North America (August-2011 to November-2013)
Senior Application Engineer – Active Directory Architect:
In this role I provided strong leadership, organization skills; coupled with strong technical Microsoft AD and other supporting tools.
Strategically planned the transition of legacy ‘current state’ consolidation, client operations, and support for 31 ThyssenKrupp
Business Area IT, with 31 Forests, multiple domains and a 180,000 users in North America to the newly established Single
Forest/Single domain, Shared-Services model. Demonstrated strong Active Directory leadership and operated in a senior-level
capacity in ongoing design, installation, configuration, and administration of a global Windows 2003/2008R2 Active Directory
infrastructure. Primary responsibilities included Active Directory design, configuration, monitoring, process documentation, and
operational support including: provisioning, delegation, Group Policies, DNS, Infoblox, KMS, and other AD related activities, and third
party AD tools for auditing and reporting. In addition, designed the configuration of interoperability with legacy and distributed
environments which was necessary to enable future interoperability with the Active Directory environments. Serves as a technical
resource to server administrators, programmers, engineers, analysts, and network engineers.
Key Accomplishments:
o Worked closely with the Senior Management to identify insufficient, security policy and anti-virus
policy for all domain controllers, and member servers which resulted in the security deployment of
all domain controllers
o Automated Active Directory task using PowerShell 2.0, PowerGUI, redircmp, redirusr, csvde, and ldifde
o Implement Microsoft Advance Group Management to provide monitored change control and improved Group Policy
management
o Identified issues with ADMX templates on 2003 domain controller and provide remediation which allowed the
LAN Administrations team to deploy Windows 7 successfully across multiple sites
o Mentored, developed and trained junior engineers and service delivery team to aid in first call re solution
o Led the successful migration of ThyssenKrupp North America Regional Headquarters from the legacy to future
state
o Researched current state, identified vulnerabilities and implemented a baseline security group policy for
domain controllers and member servers which resulted in successfully protected the environment from a
previous penetration attackers
o Implemented Microsoft Security Compliance Manager to standardize baseline GPO, Develop access-controls,
defined duties and roles. Tested, and deployed baseline GPOs to all objects to ensure protection strategies are
properly implemented and working as intended
o Successfully recovered CA server from corruption which resulted in the distribution of certificate to users and
objects on the domain
o Developed and implemented 2008 KMS Host to activate both physical and virtual systems. KMS activated Windows
2008R2/2012, Windows 7, Office 2007/2010/2013
o Successfully standardized the deployment SQL 2008R2/2012 which result in a permanent solution for application
Performance related issues. Implement configuration management, release management and maintenance
plan across the North America environment (2005/2008R2/2012)
o Successfully implement best practices and process for account management, Windows/Infobox DNS, DHCP, Security
Group management, and SQL Server/SSRS/SSIS
o Implemented a central event collector as a repository for all security events collected across all servers on the
domain to successfully monitor change across the network
McKesson, Atlanta, GA (April-2008 to August 2011):
Systems Engineer – Remote Hosting
A member of a team of nine supporting over 6,000+ hospitals with 6,000+ domains, 18,000+ domain controllers and multiple trusts.
The final escalation point for all server related issues. This role required management a cross functional team from the Atlanta,
Sacramento and Dubuque consisting of application deployment release, 24 hour infrastructure monitoring/management, security
engineering, Global and Business operations, and to ensure HIPPA compliances in the engineering design/re-design, procurement,
vendor management and disaster recovery efforts.
Key Accomplishments:
o Supported and managed Windows Server 2000/2003/2008 and supported hardware, proposed and
Implemented system enhancements that improved the performance and reliability of the systems
o Partner with clients in planning and executing technical tasks such as conversions, interfaces, integration, issue
resolution, assessment of system environment readiness, and installation
o Monitor and collected data for system status and health utilizing network monitor tools.
o Reconstruct inconsistent development and staging environments to match production for a more precise load
testing and benchmark results for VM server consolidation
o Installed application software, set security policies locally and domain, modify registry to ensure all system followed
HIPPA baseline security setting for compliance, unauthorized access and to ensure functionality of all servers and
applications
o Deployed IBM Director 5.20.3 to automate many processes to allow proactive system management including asset
tracking, preventive maintenance, diagnostic monitoring and troubleshooting
o Served as a member of IBM Director Customer advisory board as a representative of McKesson Corporation.
o Troubleshot Citrix printing, published applications and user access via Citrix Access Management console (4.0/4.5).
o Implement and deployment Shavlik patch management tool to deploy Microsoft patch, hotfixes and application
Updates across multiple domains and VM offline templates
o Lead multiple technical projects simultaneously and was the main point of contact for several clients. Provides
recommendations on the process improvements related to the implementation processes and leads the efforts to
create improvements
o Manages the technical tasks associated with the implementation of the business solutions in complex environments
assuring the timely and quality completion of the deliverables
o Lead contact for all client facing DR testing, preformed dry run. Identify issues with the deployment scripts
documented finding and communicated resolutions to all members of internally and client management
NASCO, Atlanta, GA (October-2005 to November-2007):
Network Server Engineer
Work as Network Server Engineer as part of the Operations Team. Provided Windows Administration, Active Directory
Administration and Exchange Administration. Re-architected client solutions leveraging Exchange Management Console and ADRAP
Tool. Supported over 2000+ users accessing mail, data files and printers internally and remotely.
Key Accomplishments:
o Successful preformed aggressive Exchange 2003 migration to the IBM Blade DS4000 replace defect
Compaq ML750 Exchange 2000, which consist of 600+ user mailboxes
o Managed, supported and maintenance Safeguard Easy client/server, Faxination, Juniper Network Portal and
Alitris Image server
o Reconstructed Active Directory to ensure standard provisioning of users, objects, security groups and group policy
management
o Implement Overland Reo 9000 centralize data management, managing 5 terabytes of data
o Developed and designed the Corporate backup, restore and retention policy Symantec Backup Exec 11D, Overland
VTL and Overland Neo Tape library. This project allow historical data to be backed-up to tape and archiving tapes
offsite which would allow reclaiming terabytes of storage on a more consistent basis, increasing successful backups
by 78%
o Developed and implement a preventive maintenance initiative for all servers, workstations and applicances.
o Served as a member of IBM Director Customer advisory board as a representative of McKesson Corporation
o Troubleshot Citrix printing, published applications and user access via Citrix Access Management console (4.0/4.5).
o Implement and deployment patch management tool to deploy Microsoft patch, hotfixes and application
servers and workstations
DataScan Technologies, Atlanta, Georgia:
Sr. Server Engineer- Contractor (Matrix Resources) (June-2005 to September-2005)
Key Accomplishments:
Analyzed documentation of the current infrastructure in relation to server and workstation configuration. Improved and
documented processes related to the OS and application deployment for servers, workstations and laptops.
o Created and implemented Active Directory Group Policies for desktop computers enterprise wide; Managed over
2000 workstations and servers in multiple domains; Administered Lotus Notes Domino 6 server and clients
o Designed DNS replication topology for multiple domains; Troubleshot and repaired server hardware issues and
ordered parts when needed; Performed network backups
o Developed Enterprise Asset procedures; Applications used: RTI Customer First, Symantec Ghost 8, Symantec
Antivirus 10, Microsoft SMS 2003, Visio, VNC, Remote Desktop, Dell Open Manage, Backup Exec, Citrix, DameWare
o Imaged servers and end user PC’s for use; Worked trouble tickets in resolving end user problems and complaints
SunTrust Bank, Atlanta, Georgia:
Sr. Server Operator—Contractor (Ettain Group) (October-2004 to May-2005)
Successful migrated 1840 NCF/CCB branches. Improving data transfer multi-cast sessions by 60%. Averaging 23 successful branch
deployments nightly.
Key Accomplishments:
o Managed the building of over 3,300 Windows 2003 servers for deployment in newly acquired NCF/CCB branch
locations Designed DNS replication topology for multiple domains
o Facilitated the deployment of 17 to 23 branches per night. Validate teller applications and domain
Configurations while remotely supporting over 92 field technicians per night
o Provide assistance to the desktop migration team to resolve trust relationship problems, Email (Exchange 2003)
account migration, and ensured all users were in the appropriate containers within AD, and all home directories are
pointed to the correct file servers
o Coordinate SNA PU activation with Mainframe group VTAM, and collaborate with Network Operation to re -configure
Cisco 2950 Switch to improve Ghost cast data transfer session
o Remotely deployed McAfee ePolicy Orchestra, SNA, SQL 2000/2003, Service Packs, patches, Veritas NetBackup
Client, ensuring the appropriate services were active and functioning as intended
o Modify Serverinfor.ini and Servername.ini to standardize all Marknet Print Servers Queues with IP A ddresses,
platform and teller printing
Interland Web Solution, Atlanta, Georgia:
Tier III Technical Support Specialist—Contractor (October-2003 to October-2004)
Supported 400,000+ Windows 2000/2003 web domains. Monitored and troubleshot publishing Web content, and provided daily
support to corporate IT professionals with domain expiration, publishing data to site via HTML ASP and ASP.Net. Supported over
400,000 web domains, and worked closely with IT professionals as well as internal and external client engineers
Key Accomplishments:
o Supported DNS, MX/A records, web content, website and webmail, using ASP, HTML, DHTML, Imail, Intermail,
SMTP and POP while ensuring that all pages and webmail were cross-browser and cross-platform compatible
o Investigated client technical requirement for configuring email clients, MySQL, mail servers, Miva shopping carts,
form mail scripting, and MS IIS 5.0/6.0 virtual directory configurations
o Educated customers targeted at familiarizing the client with functionalities of the Web Base mail administration
pages and Web control panel, reducing repetitive calls
o Defused and resolved long standing conflicts and client Web hosting concerns elevated t he quality of service by
providing effective solution and exceptional customer services
All-Proe Contracting, Decatur, Georgia:
Project Manager/Technical Support— Contractor (February-2002 to October-2003)
DeltaThree VoIP Solution, New York, NY:
Senior Application Integration Software Engineer (February 2001 to September-2001)
Barnes and Noble.com, New York, NY:
Senior Systems Administrator (September-1999 to February-2001)
JP Morgan/Chase Bank, New York, NY:
Lead NT Migration Specialist-Contractor (Interim Technologies) (April-1998 to September-1999)
EDUCATION
 VMmare Certified Associate
January 15, 2014
 Fundamental of Network (1997)
Certificate of Completion
Union County College, NJ
 EMC EDM 4.4/4.5 Enterprise Backup (May-2000)
Certificate of Completion
Bell Atlantic Center - Marlboro, MA
 ITIL V3 Foundational Training (July-2013)

Weitere ähnliche Inhalte

Was ist angesagt?

Linked In Profile Resume
Linked In Profile ResumeLinked In Profile Resume
Linked In Profile Resume
Melissa Gilmore
 
Resume Steve Duncan v4 Feb 2016
Resume Steve Duncan v4 Feb 2016Resume Steve Duncan v4 Feb 2016
Resume Steve Duncan v4 Feb 2016
Steve Duncan
 
Project finance
Project financeProject finance
Project finance
Bob Nash
 
David pitts executive resume-2016
David pitts executive resume-2016David pitts executive resume-2016
David pitts executive resume-2016
David Pitts
 
BusinessIntelligence_SQL_Developer
BusinessIntelligence_SQL_DeveloperBusinessIntelligence_SQL_Developer
BusinessIntelligence_SQL_Developer
Crisdale Pasion
 

Was ist angesagt? (18)

Linked In Profile Resume
Linked In Profile ResumeLinked In Profile Resume
Linked In Profile Resume
 
Resume June 1st 2016
Resume  June 1st 2016Resume  June 1st 2016
Resume June 1st 2016
 
IanShaffer-resume_(2015-9-23)
IanShaffer-resume_(2015-9-23)IanShaffer-resume_(2015-9-23)
IanShaffer-resume_(2015-9-23)
 
Willem VanEssendelft Profile
Willem VanEssendelft ProfileWillem VanEssendelft Profile
Willem VanEssendelft Profile
 
Resume Steve Duncan v4 Feb 2016
Resume Steve Duncan v4 Feb 2016Resume Steve Duncan v4 Feb 2016
Resume Steve Duncan v4 Feb 2016
 
Selvi_resume
Selvi_resumeSelvi_resume
Selvi_resume
 
Brad Stewart
Brad StewartBrad Stewart
Brad Stewart
 
Robert Weissenberg\'s Resume
Robert Weissenberg\'s ResumeRobert Weissenberg\'s Resume
Robert Weissenberg\'s Resume
 
John imor in resume
John imor in resumeJohn imor in resume
John imor in resume
 
Project finance
Project financeProject finance
Project finance
 
John imor resume 3.0
John imor resume 3.0John imor resume 3.0
John imor resume 3.0
 
David pitts executive resume-2016
David pitts executive resume-2016David pitts executive resume-2016
David pitts executive resume-2016
 
Document and Workflow Management Services
Document and Workflow Management ServicesDocument and Workflow Management Services
Document and Workflow Management Services
 
Dowless Corp Cap 12 06 08
Dowless  Corp Cap  12 06 08Dowless  Corp Cap  12 06 08
Dowless Corp Cap 12 06 08
 
Resume 2.0
Resume 2.0Resume 2.0
Resume 2.0
 
My CV
My CVMy CV
My CV
 
BusinessIntelligence_SQL_Developer
BusinessIntelligence_SQL_DeveloperBusinessIntelligence_SQL_Developer
BusinessIntelligence_SQL_Developer
 
Office Intranet Managed Services
Office Intranet Managed ServicesOffice Intranet Managed Services
Office Intranet Managed Services
 

Ähnlich wie Ashford_Paula_063014(1) (20)

sdonellan2016
sdonellan2016sdonellan2016
sdonellan2016
 
Rodger+Berlins+Resume+1.15
Rodger+Berlins+Resume+1.15Rodger+Berlins+Resume+1.15
Rodger+Berlins+Resume+1.15
 
J_Cargill_Professional_Resume
J_Cargill_Professional_ResumeJ_Cargill_Professional_Resume
J_Cargill_Professional_Resume
 
IT Manager Ed Maiani_v6Imprivata
IT Manager Ed Maiani_v6ImprivataIT Manager Ed Maiani_v6Imprivata
IT Manager Ed Maiani_v6Imprivata
 
libbycm_resume
libbycm_resumelibbycm_resume
libbycm_resume
 
Sr_MicroStrategy_Consultant
Sr_MicroStrategy_ConsultantSr_MicroStrategy_Consultant
Sr_MicroStrategy_Consultant
 
Resume_Padmashree _Business Systems Analyst
Resume_Padmashree _Business Systems AnalystResume_Padmashree _Business Systems Analyst
Resume_Padmashree _Business Systems Analyst
 
JD Taylor - Resume w dates
JD Taylor - Resume w datesJD Taylor - Resume w dates
JD Taylor - Resume w dates
 
Bilal ITM
Bilal ITMBilal ITM
Bilal ITM
 
Christian baki resume
Christian baki resumeChristian baki resume
Christian baki resume
 
Vishal Guleria (ITIL Certified) IT Service Management Lead Updated Resume
Vishal Guleria (ITIL Certified) IT Service Management Lead Updated ResumeVishal Guleria (ITIL Certified) IT Service Management Lead Updated Resume
Vishal Guleria (ITIL Certified) IT Service Management Lead Updated Resume
 
Resume - DWBI - 5years - Akshay Shaha
Resume - DWBI - 5years - Akshay ShahaResume - DWBI - 5years - Akshay Shaha
Resume - DWBI - 5years - Akshay Shaha
 
Resume latest
Resume latestResume latest
Resume latest
 
SWAPNIL Resume
SWAPNIL ResumeSWAPNIL Resume
SWAPNIL Resume
 
Joel Spiegel resume
Joel Spiegel resumeJoel Spiegel resume
Joel Spiegel resume
 
Lerman, gerald 1
Lerman, gerald 1Lerman, gerald 1
Lerman, gerald 1
 
Robert Elder - Resume - Jan 2016
Robert Elder - Resume - Jan 2016Robert Elder - Resume - Jan 2016
Robert Elder - Resume - Jan 2016
 
AnnetteCarperResume
AnnetteCarperResumeAnnetteCarperResume
AnnetteCarperResume
 
tp chakravty
tp chakravtytp chakravty
tp chakravty
 
Kent.shaffer
Kent.shafferKent.shaffer
Kent.shaffer
 

Ashford_Paula_063014(1)

  • 1. PAULA D. ASHFORD 2029 Pinnacle Pointe Dr. ● Norcross, Georgia 30071 ● Mobile (678) 608-8568 p_d_ashford@yahoo.com KEY QUALIFICATIONS Strategically resolution focused, forward-thinking, highly accomplished Senior Systems/Applications Engineer with exceptional Engineering, Datacenter Consolidation, and Operational Support working in various industries Healthcare Shared-Services, Banking, and telecom. Experienced in planning, managing and supporting large complex environments involving the architecting of an enterprise class shared services infrastructures. Strong systems management, interpersonal, presentation and organizational skills, critical to develop and maintain relationships with cross functional organizations, vendors, strategic clients and all members of management. Resolution oriented-thinker with the ingenuity and creativity to address and solve problems, and adapt to new situations always with an enthusiastic, collaborative, teamwork and focus to achieve successful results. CORE COMPETENCIES Directory Services Architecting Directory Services Remediation Configuration Management Patch Management GPO Template Management OS Security Management Cross-Functional Team Leader SharePoint Telecommunications Banking Technology Healthcare Technology Remote Hosting Training Client Relations Process Development Datacenter Transformation Stock Exchange Inter personal Communication Risk Management ITIL V3 Foundation Training Asset Management SKILL MATRIX OS/Applications YRS Applications YRS Applications YRS Windows 2012 1 Microsoft Baseline Analyzer 13 Quest Migration Manager 3 Windows 2008/2008R2 4 SharePoint 2010/2013 3 Quest Resource Manager 3 Windows 2003/2003R2 13 Shavlik Patch Manager 4 Infoblox 3 Windows 8 1 IIS 6.0/7.0 3 DNS/DHCP/WINS/DFS 17 Windows 7 4 Nintex 3 SQL Servers 2000/2005/2008/2012/BI 6 Windows XP 8 Reflection/Rumba/3270 Emulator 16 Exchange 2003/2007/2010 4 VM ESXi 5.0 4 Remedy 7.0 4 Microsoft Cluster Services 5 Directory Services 2008R2/2012 16 HP Service Manager 3 Viso 2003/2007/2013 6 Advanced Group Management 3 EMC EDM 4.4/4.5 3 Office 2003/2007/2013 13 Microsoft Security Compliance Manager 5 Dcdiag/FRSdiag/Repmon/Repadmin 15 SSRS 2008R2/2012 4 Citrix 4.5 4 PowerShell/ISE 4 KMS Server 4 PROFESSIONAL HISTORY Intercontinental Exchange, (December-2014 to Present) IT Engineer In this role I provided strong leadership, organization skills; coupled with strong technical Microsoft AD, SharePoint, Exchange and other supporting tools. Strategically planned Enterprise Content Management, site collection, site column, content types and workflow which resulted in saving NYSE millions of dollars daily. Demonstrated strong Active Directory leadership and operated in a senior- level capacity in ongoing design, installation, configuration, and administration of a global Windows 2008R2 Active Directory infrastructure. Primary responsibilities included Active Directory design, configuration, monitoring, process documentation, and operational support including: provisioning, delegation, Group Policies, DNS, SMTP request, and other related activities, and third party AD tools for auditing and reporting. In addition, standardize the configuration of interoperability which was necessary to enable future interoperability with the Active Directory environments.
  • 2. Key Accomplishments: o Automatic and customize task via Nintex workflow in SharePoint for NYSE Market Regulation which result in accurate email reporting saving millions of dollars daily o Identified several deficiencies with Active Directory, stale domain controllers, Exchange, and Group Policy Management which compromised the overall health of domain. Improve Active Directory by recommending and implementing best practices for DNS and DHCP that ensure compliances with the PCI Data Security standards. o Identify SharePoint sync issues with Active Directory via Central Admin and stsadm resolving User Profile configuration issue. o Worked closely with the Security Management and Operations Management to standardize deployment of servers, security policy, anti-virus policy for all servers which resulted in the security Domain. o Identify inconsistence with SharePoint calendar item and created workarounds to product data which resolve security issue on the NYSE trade floor o Mentored, developed and trained IT Support team member to aid in first call resolution o To meet client SLA requirements implemented SQL 2012/2012 R2 Clusters to provide high availability and scalability, which met the requirements of the client while being comply with PCI standards. o Researched mail routing and release mail via Ironport, identified vulnerabilities malicious email content and removed items from all mailbox o Implemented Microsoft Security Compliance Manager to standardize baseline GPO, Develop access-controls, defined duties and roles. Tested, and deployed baseline GPOs to all objects to ensure protection strategies are properly implemented and working as intended Brdige2 Solutions Inc., (March-2014 to Present Senior Windows Engineer In this role I provided strong leadership, organization skills; coupled with strong technical Microsoft AD and other supporting tools. Strategically planned the ‘current state’, to support a PCI comply Single Forest/Single domain, Shared-Services model. Demonstrated strong Active Directory leadership and operated in a senior-level capacity in ongoing design, installation, configuration, and administration of a global Windows 2008/2008R2 Active Directory infrastructure. Primary responsibilities included Active Directory design, configuration, monitoring, process documentation, and operational support including: provisioning, delegation, Group Policies, DNS, KMS, and other AD related activities, and third party AD tools for auditing and reporting. In addition, standardize the configuration of interoperability which was necessary to enable future interoperability with the Active Directory environments. Key Accomplishments: o Identified several deficiencies with Active Directory, stale domain controllers, Exchange, and Group Policy Management which compromised the overall health of domain. Improve Active Directory by recommending and implementing best practices for DNS and DHCP that ensure compliances with the PCI Data Security standards. o Deployed Lync Server 2013, built Lync Topology, created persistent chat rooms and built SQL instance to support the Lync database structure. Import standard contact groups using Lync Server Management Shell. o Worked closely with the Security Management and Operations Management to standardize deployment of servers, security policy, anti-virus policy for all servers which resulted in the security Domain. o Automated Active Directory task using PowerShell 2.0, PowerGUI, redircmp, redirusr, csvde, and ldifde o Implemented Microsoft Advance Group Management to provide monitored change control and improved Group Policy management o Mentored, developed and trained junior engineers and service delivery team to aid in first call resolution o To meet client SLA requirements implemented SQL 2012/2012 R2 Clusters to provide high availability and scalability, which met the requirements of the client while being comply with PCI standards. o Researched current state, identified vulnerabilities and implemented a baseline security group policy for domain controllers and member servers which resulted in successfully protected the environment from a previous penetration attackers o Implemented Microsoft Security Compliance Manager to standardize baseline GPO, Develop access-controls, defined duties and roles. Tested, and deployed baseline GPOs to all objects to ensure protection strategies are
  • 3. properly implemented and working as intended ThyssenKrupp IT Services North America (August-2011 to November-2013) Senior Application Engineer – Active Directory Architect: In this role I provided strong leadership, organization skills; coupled with strong technical Microsoft AD and other supporting tools. Strategically planned the transition of legacy ‘current state’ consolidation, client operations, and support for 31 ThyssenKrupp Business Area IT, with 31 Forests, multiple domains and a 180,000 users in North America to the newly established Single Forest/Single domain, Shared-Services model. Demonstrated strong Active Directory leadership and operated in a senior-level capacity in ongoing design, installation, configuration, and administration of a global Windows 2003/2008R2 Active Directory infrastructure. Primary responsibilities included Active Directory design, configuration, monitoring, process documentation, and operational support including: provisioning, delegation, Group Policies, DNS, Infoblox, KMS, and other AD related activities, and third party AD tools for auditing and reporting. In addition, designed the configuration of interoperability with legacy and distributed environments which was necessary to enable future interoperability with the Active Directory environments. Serves as a technical resource to server administrators, programmers, engineers, analysts, and network engineers. Key Accomplishments: o Worked closely with the Senior Management to identify insufficient, security policy and anti-virus policy for all domain controllers, and member servers which resulted in the security deployment of all domain controllers o Automated Active Directory task using PowerShell 2.0, PowerGUI, redircmp, redirusr, csvde, and ldifde o Implement Microsoft Advance Group Management to provide monitored change control and improved Group Policy management o Identified issues with ADMX templates on 2003 domain controller and provide remediation which allowed the LAN Administrations team to deploy Windows 7 successfully across multiple sites o Mentored, developed and trained junior engineers and service delivery team to aid in first call re solution o Led the successful migration of ThyssenKrupp North America Regional Headquarters from the legacy to future state o Researched current state, identified vulnerabilities and implemented a baseline security group policy for domain controllers and member servers which resulted in successfully protected the environment from a previous penetration attackers o Implemented Microsoft Security Compliance Manager to standardize baseline GPO, Develop access-controls, defined duties and roles. Tested, and deployed baseline GPOs to all objects to ensure protection strategies are properly implemented and working as intended o Successfully recovered CA server from corruption which resulted in the distribution of certificate to users and objects on the domain o Developed and implemented 2008 KMS Host to activate both physical and virtual systems. KMS activated Windows 2008R2/2012, Windows 7, Office 2007/2010/2013 o Successfully standardized the deployment SQL 2008R2/2012 which result in a permanent solution for application Performance related issues. Implement configuration management, release management and maintenance plan across the North America environment (2005/2008R2/2012) o Successfully implement best practices and process for account management, Windows/Infobox DNS, DHCP, Security Group management, and SQL Server/SSRS/SSIS o Implemented a central event collector as a repository for all security events collected across all servers on the domain to successfully monitor change across the network McKesson, Atlanta, GA (April-2008 to August 2011): Systems Engineer – Remote Hosting A member of a team of nine supporting over 6,000+ hospitals with 6,000+ domains, 18,000+ domain controllers and multiple trusts. The final escalation point for all server related issues. This role required management a cross functional team from the Atlanta, Sacramento and Dubuque consisting of application deployment release, 24 hour infrastructure monitoring/management, security engineering, Global and Business operations, and to ensure HIPPA compliances in the engineering design/re-design, procurement, vendor management and disaster recovery efforts. Key Accomplishments:
  • 4. o Supported and managed Windows Server 2000/2003/2008 and supported hardware, proposed and Implemented system enhancements that improved the performance and reliability of the systems o Partner with clients in planning and executing technical tasks such as conversions, interfaces, integration, issue resolution, assessment of system environment readiness, and installation o Monitor and collected data for system status and health utilizing network monitor tools. o Reconstruct inconsistent development and staging environments to match production for a more precise load testing and benchmark results for VM server consolidation o Installed application software, set security policies locally and domain, modify registry to ensure all system followed HIPPA baseline security setting for compliance, unauthorized access and to ensure functionality of all servers and applications o Deployed IBM Director 5.20.3 to automate many processes to allow proactive system management including asset tracking, preventive maintenance, diagnostic monitoring and troubleshooting o Served as a member of IBM Director Customer advisory board as a representative of McKesson Corporation. o Troubleshot Citrix printing, published applications and user access via Citrix Access Management console (4.0/4.5). o Implement and deployment Shavlik patch management tool to deploy Microsoft patch, hotfixes and application Updates across multiple domains and VM offline templates o Lead multiple technical projects simultaneously and was the main point of contact for several clients. Provides recommendations on the process improvements related to the implementation processes and leads the efforts to create improvements o Manages the technical tasks associated with the implementation of the business solutions in complex environments assuring the timely and quality completion of the deliverables o Lead contact for all client facing DR testing, preformed dry run. Identify issues with the deployment scripts documented finding and communicated resolutions to all members of internally and client management NASCO, Atlanta, GA (October-2005 to November-2007): Network Server Engineer Work as Network Server Engineer as part of the Operations Team. Provided Windows Administration, Active Directory Administration and Exchange Administration. Re-architected client solutions leveraging Exchange Management Console and ADRAP Tool. Supported over 2000+ users accessing mail, data files and printers internally and remotely. Key Accomplishments: o Successful preformed aggressive Exchange 2003 migration to the IBM Blade DS4000 replace defect Compaq ML750 Exchange 2000, which consist of 600+ user mailboxes o Managed, supported and maintenance Safeguard Easy client/server, Faxination, Juniper Network Portal and Alitris Image server o Reconstructed Active Directory to ensure standard provisioning of users, objects, security groups and group policy management o Implement Overland Reo 9000 centralize data management, managing 5 terabytes of data o Developed and designed the Corporate backup, restore and retention policy Symantec Backup Exec 11D, Overland VTL and Overland Neo Tape library. This project allow historical data to be backed-up to tape and archiving tapes offsite which would allow reclaiming terabytes of storage on a more consistent basis, increasing successful backups by 78% o Developed and implement a preventive maintenance initiative for all servers, workstations and applicances. o Served as a member of IBM Director Customer advisory board as a representative of McKesson Corporation o Troubleshot Citrix printing, published applications and user access via Citrix Access Management console (4.0/4.5). o Implement and deployment patch management tool to deploy Microsoft patch, hotfixes and application servers and workstations DataScan Technologies, Atlanta, Georgia: Sr. Server Engineer- Contractor (Matrix Resources) (June-2005 to September-2005) Key Accomplishments:
  • 5. Analyzed documentation of the current infrastructure in relation to server and workstation configuration. Improved and documented processes related to the OS and application deployment for servers, workstations and laptops. o Created and implemented Active Directory Group Policies for desktop computers enterprise wide; Managed over 2000 workstations and servers in multiple domains; Administered Lotus Notes Domino 6 server and clients o Designed DNS replication topology for multiple domains; Troubleshot and repaired server hardware issues and ordered parts when needed; Performed network backups o Developed Enterprise Asset procedures; Applications used: RTI Customer First, Symantec Ghost 8, Symantec Antivirus 10, Microsoft SMS 2003, Visio, VNC, Remote Desktop, Dell Open Manage, Backup Exec, Citrix, DameWare o Imaged servers and end user PC’s for use; Worked trouble tickets in resolving end user problems and complaints SunTrust Bank, Atlanta, Georgia: Sr. Server Operator—Contractor (Ettain Group) (October-2004 to May-2005) Successful migrated 1840 NCF/CCB branches. Improving data transfer multi-cast sessions by 60%. Averaging 23 successful branch deployments nightly. Key Accomplishments: o Managed the building of over 3,300 Windows 2003 servers for deployment in newly acquired NCF/CCB branch locations Designed DNS replication topology for multiple domains o Facilitated the deployment of 17 to 23 branches per night. Validate teller applications and domain Configurations while remotely supporting over 92 field technicians per night o Provide assistance to the desktop migration team to resolve trust relationship problems, Email (Exchange 2003) account migration, and ensured all users were in the appropriate containers within AD, and all home directories are pointed to the correct file servers o Coordinate SNA PU activation with Mainframe group VTAM, and collaborate with Network Operation to re -configure Cisco 2950 Switch to improve Ghost cast data transfer session o Remotely deployed McAfee ePolicy Orchestra, SNA, SQL 2000/2003, Service Packs, patches, Veritas NetBackup Client, ensuring the appropriate services were active and functioning as intended o Modify Serverinfor.ini and Servername.ini to standardize all Marknet Print Servers Queues with IP A ddresses, platform and teller printing Interland Web Solution, Atlanta, Georgia: Tier III Technical Support Specialist—Contractor (October-2003 to October-2004) Supported 400,000+ Windows 2000/2003 web domains. Monitored and troubleshot publishing Web content, and provided daily support to corporate IT professionals with domain expiration, publishing data to site via HTML ASP and ASP.Net. Supported over 400,000 web domains, and worked closely with IT professionals as well as internal and external client engineers Key Accomplishments: o Supported DNS, MX/A records, web content, website and webmail, using ASP, HTML, DHTML, Imail, Intermail, SMTP and POP while ensuring that all pages and webmail were cross-browser and cross-platform compatible o Investigated client technical requirement for configuring email clients, MySQL, mail servers, Miva shopping carts, form mail scripting, and MS IIS 5.0/6.0 virtual directory configurations o Educated customers targeted at familiarizing the client with functionalities of the Web Base mail administration pages and Web control panel, reducing repetitive calls o Defused and resolved long standing conflicts and client Web hosting concerns elevated t he quality of service by providing effective solution and exceptional customer services All-Proe Contracting, Decatur, Georgia: Project Manager/Technical Support— Contractor (February-2002 to October-2003) DeltaThree VoIP Solution, New York, NY: Senior Application Integration Software Engineer (February 2001 to September-2001) Barnes and Noble.com, New York, NY: Senior Systems Administrator (September-1999 to February-2001)
  • 6. JP Morgan/Chase Bank, New York, NY: Lead NT Migration Specialist-Contractor (Interim Technologies) (April-1998 to September-1999) EDUCATION  VMmare Certified Associate January 15, 2014  Fundamental of Network (1997) Certificate of Completion Union County College, NJ  EMC EDM 4.4/4.5 Enterprise Backup (May-2000) Certificate of Completion Bell Atlantic Center - Marlboro, MA  ITIL V3 Foundational Training (July-2013)