Windows-1 Active Directory Administrator

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

Windows/Active Directory Administrator

Windows/Active Directory Administrator - Albertson's Company


• IT Professional with around 5+years of experience in Systems and Network administration with a primary focus
on installation and administration of Windows Servers, Active Directory Services (WINS, DNS, DHCP), HP, UCS
blades.
• Excellent experience in configuration of Data Domain Storage units in Symantec Net backup.
• Understanding of Microsoft Windows Authentication, Group Memberships and Design, Account settings.
• Ensure system connectivity of all servers, shared software and other applications.
• Strong understanding of Windows system administration, installation, security, user management, networking,
disk configuration.
• Familiarity with Microsoft Exchange, Printer, and Shared Folder (on Windows File System Servers) access
administration.
• Extensive experience with Active Directory, Domain Name System, Windows Internet Naming Service, and
Microsoft Exchange.
• Experience in administering / engineering Microsoft Active Directory.
• Proficient with Microsoft Excel and other tools used to manage large reports and requests.
• Expertise in understanding of NTFS.
• Working knowledge of remote technologies and administrative account controls for VPN, OWA, and Mobile
devices.
• Architected, installed and maintained Windows NT, 2000-2003 server solutions for both production and
development environments.
• Experience managing work via Infra or similar ticketing system used for service request and incidents.
• Expertise in Migration Using Quest Migration Manager Tool for Active Directory.
• Expertise in active directory design and support (GPO s, AD Schema, OU s, LDAP, Sites, Replication, etc.).
• Analysis and remediation of windows 2008R2 environment DNS, Sites and services, Kerberos, Trusts, Exchange
2010, Group policy.
• Active Directory migration using Quest Migration Manager QMM and RUM.
• Assisted in designing, implementing and evaluating applications, systems and utilities relevant
to Active Directory services
• Experience in Migrating Users, Groups, Workstations and Application window Servers from Source Domain to
Target.
• Administration of user Accounts, Groups, Resources, Security, Backup strategies in window Servers
2003/2008R2/2012.
• Implementation and Configuration of Quest Quick Connect and Quest Quick Connect for Virtual Directory VDS.
Work Experience
Windows/Active Directory Administrator
Albertson's Company - Pleasanton, CA
March 2018 to Present
Responsibilities:
• Successfully Migrated to Windows 2016 R2 x64 Active Directory Single Forest and Domain Architecture.
• Installed Quest on remote servers, operated QMM and RUM consoles to migrate AD objects, scripting and data
manipulation, log review and status reporting.
• Administration on Quest Active Role Server v6.8, Quest Reporter, Quest Recovery and Quest Change Auditor.
• Need to gather data for User and computer migration and prepare for the file to be upload in Quest migration
manager.
• Implemented successful migration for 30000s of User, Computer and Group accounts with SID History.
• Migrating Users, Groups, Workstations and Application windows servers from source domain to Target domain
using QMM and AD Domain.
• Process employee terminations, employee transfers and employee new hires with Identity Management
• Designed process for DNS zone migration from legacy storage to application partition storage
• Security threat detection and countermeasures protect from enumeration and scanning
• Designed and deployed Virtual lab environment based on leading tier 1 hypervisor
• Cross platform authentication (Unix to Windows)
• Developed power-shell scripts to rename and resuming the windows after reboot.
• Provision Infrastructure platform access using Role-Based Access Model (RBAC), Active Directoryand Identity &
Access Management
• Developed power-shell scripts to automate the setting of user credentials and activation of windows.
• Performed Windows servers patching using SCCM console
• Configure constrained delegation in Active Directory for Kerberos enabled applications
• Worked on Public Key Infrastructure (PKI) - certificates
• Troubleshoot Kerberos authentication and constrained delegation
• Incident and Request management through Service Now
• Operating System security hardening of Domain Controllers across the enterprise
• Developed custom Identity Management component to synchronize Active Directory, LDAP, and legacy
systems.
• Performed cross platform audits of Active Directory objects and user permissions using Identity Manager.
Environment: Windows 2008, NetApp 8K series, ONTAP, Outlook 2010/2013, O365, Created AD Group policies,
Windows Azure AD, IPv4 configurations, IDAM, SCCM Console, Service Now, VMware servers, Identity
Management, ADFS, LDAP, Office 365, RBAC, QMM, Quest ARS, DHCP, DNS and WINS.
System Security Engineer
San Jose, CA
September 2017 to March 2018
Access Control Management
Responsibilities:
• Created AD Group policies to Enforce Domain and OU Level Security of Users and Computer objects.
• Privileged Access Management system deployment, Password vaulting, privileged session recording.
• Working with Access account provisioning and de-provisioning in the windows environment,
Via Active directory and local servers at OS level on Occasion.
• Part of a team that takes care of Exchange Server 2010, Outlook and Messaging (Lync 2010) issues.
• Provision Infrastructure stage get to utilizing Role-Based Access Model (RBAC), Active Directory and Identity
and Access Management
• Handled Access Account Administration work coming from Internal Customers, Business partners and ACM.
• Created and managed user accounts as per client automated and manual requests.
• Handled Access account administration work coming from Access governance team.
• Maintained accurate access account information within specific Identity Access store databases as part of
internal audit controls and provided data in response to Access Governance related audit inquiries from internal
and external auditors within requested timelines.
• Initiated meetings by involving leads with various technology teams for any validation queries or challenges
faced during access management efforts.
• Process employee terminations, employee transfers and employee new hires with Identity Management.
• Successfully created and maintained Mailbox's, Distribution lists in Microsoft exchange.
• Managed work via infra or similar ticketing system used for service request and incidents.
• Worked on remote technologies (RSA) and administering access controls for VPN, OWA and Mobile devices.
• Provisioning new hire accounts (P drive, mailbox) and granted access to various security groups including VDI.

Environment: Windows 2008, 2008 R2 and Windows 2012, RBAC, ACM, Net IQ DRA, RSA, MS Exchange
management console, PAM, VDI, Office 365, Group Policy, IDAM.
Active Directory Engineer
Macy's - San Francisco, CA
October 2016 to September 2017
Responsibilities:
• Support multiple AD forests, including multiple domains forest with over 16 domains, 80 domain controllers and
40 AD sites, running on Windows 2003, Windows 2008, 2008 R2 and Windows 2012
• Planning intra forest migration to consolidate multiple child domains. Provide procedures, documents,
customize accounts migration with pre/post task to minimize user's impact after migration.
• Managed systems configuration and maintenance, problem troubleshooting, system and program security,
applications and program management, planning and directing upgrades, and testing operations to ensure
optimum system functionality.
• Provided design, implementation, administration and support of Windows 2000 Active Directory and Windows
NT legacy domain.
• Managed the Help desk & Desktop Support team which supported Windows 9.X, 2000, XP, Vista and Windows 7
along with the MS-Office including mail services.
• Investigated new technologies, software, patches, and security packages, which will improve system
performance and systems administration procedures.
• Managed, led and supported Windows NT, 2000 and 2003 Active Directory domain network in multi-locations.
• Planning and implement data synchronization between external data to AD.
• Customize update certain data fields from HR data to multiple attributes in AD user object.
• Deploy, Manage and troubleshooting of windows 2008R2 Domain Controllers in Active Directory
• Implemented Power-shell scripts to generating automated reports.
• Implemented Power-shell scripts to automate creation of contacts from Active directory users.
• Creation of Identity Management process, strategy, best practice and architecture documentation including
Access Management, Password Management, DAP Management, Provisioning, Delegated Administration.
• Worked with developer to troubleshoot LDAP connection to query multiple AD domains
• Experience in installation and configuration of Microsoft SQL Server 2000 and 2005.
• Automated user accounts to force password change for every 30 days with Group policy.
Hyper-V installation and configuration in Windows.
• Provide expert technical knowledge and support for Microsoft Active Directory 2003/2008R2.
• Active Directory administration, infrastructure, process, procedures, monitoring, and projects
- Active Directory Win2008R2.
Third level support for DNS, DHCP, DFS, group policy
Windows Admin
Valuelabs - IN
June 2012 to July 2015
Responsibilities:
• Design, Deploy and migrate Windows 2000 domains to join new Windows 2003 forest.
• Migrating users and groups from windows 2000 domains to windows 2003 domains using Aelitas tool
• Windows 2003 Servers deployment and Configuration
• Managing Active directory, DNS, WINS and DHCP Servers
• Active Directory Services -- Managing Users & Other AD objects
• Developed custom web-based self-service identity management website
• Planning and configuring new internal & external websites
• Developed power-shell scripts for backup and restore for windows.
• Creating, deploying, renewing and Import & export of the SSL certificates
• Coordination with application development teams for issue troubleshooting
• Work on Accounts Delegation, Drive Mappings and Widows Servers Decommission Process
• Create and Link AD policies to windows Servers 2003 in PROD & QA Environments.
• Monitoring/Analyzing/Troubleshooting Active Directory Replication in Multi Domain Environment.
• Tracking and documenting Active Directory production support issues

Environment: Active Directory, DNS, WINS, DHCP, Identity Management, Windows Servers, Drive Mappings
Education
Master's
Skills
ACTIVE DIRECTORY (5 years), DHCP (4 years), WINS (3 years), DNS (4 years), REPLICATION (3 years)
Additional Information
Technical expertise:

Systems Windows Server 2000/2003/2008R2/2012R2


Backup VERITAS Net backup, Replication manager, Recovery point
LDAP Directories Active Directory
Migration Tools Quest Migration Manager, RUM, ADMT
Virtualization Hyper V, VSphere 4.1, ESX/ESXi server 5.0,5.1,5.5/6.0 VSphere Client, VCenter
Workstations Windows XP, NT, Windows 7,10
Scripting Languages PowerShell, VBS
Databases SQL server 2000/2005, DB2 and MS Access
Patching tools SCCM, Blade Logic
Networking DNS, WINS, DHCP, TCP/IP, NTFS
Ticketing CA Service Desk, Lotus notes, Tracer, Service Now

You might also like