KEITH A. HILL
Fairfax Station, VA *****
Phone: 703-***-**** Email: ****************@*****.***
Summary
Highly motivated and extremely dedicated Network Engineer. Constantly seeking better ways to increase efficiency and performance in my network environment. US Army Veteran. Certifications and Training
Windows Server 2016 (10/2017)
Windows 7, Configuring (12/2015)
Citrix Certified Professional – Virtualization CCP -V (10/2015)
Microsoft Certified Solution Expert Server Infrastructure (9/2013)
Microsoft Certified Solution Associate Windows Server 2012 (07/2013)
Enterprise Message Administrator Exchange 2010 (02/2012)
Windows Server 2008 (04/2012)
Virtualization Administrator Windows 2008 R2 (Hyper V) (01/2012)
MCITP Lync Server Administrator 2010 (01/2012)
MCITP Enterprise Administrator Windows Server 2008 (11/2012)
Cisco Certified Network Professional Voice Engineer 08/2011)
Cisco Certified Network Associate (Voice) (05/2011)
Cisco Certified Network Associate (Switching and Routing) (02/2010)
Microsoft Certified Systems Engineer (Windows 2000) (06/2002)
Microsoft Certified Systems Engineer (Windows NT) (06/2000)
A+ Certified Computer Technician (12/2000)
Professional Experience
US Securities and Exchange Commission (SEC) Washington, DC System Engineer January 2013 – October 2019
Contracted as a system engineer
Worked on AWS Certified SysOps Administrator
Troubleshoot the Citrix Environment
Working with https//go.sec.gov
Working with VPN on a daily basis
Updated Several HP & Canon Printers
Worked with BlackBerry 12 Servers with Windows 2012 R2
Working with Citrix Applications on a daily basis
Work with Big Fix to patch all Citrix Servers
Worked with Citrix Universal Printers.
Configure Windows 2008 R2 & Windows 2012 R2 for Post patch Procedures
Installing and Configuring Windows 2008 Servers
Install component for various servers Windows 2008 R2 Servers
Update Active Directory Servers for DNS, Replication, Wins, DHCP or other various server issues
Push out Windows Patching utilizing the Big Fix/Tivoli End Point Manager for all Windows Update or Hot Fixes
Monitor and Work on the Vcenter as needed to better manage the Virtual Machines as part of the windows team
Do daily status reports on the SEC environment to insure the health of the SEC
Also Updated Cert Request that were being handling while on the Windows Team
Create Print Queue’s on the various Print Servers with the SEC
Create SCR’s for all servers or Active Directory devices that may need to modified during the maintenance windows
Support all Disaster Recovery Project every 6 months.
Updated PowerShell to Version 5 within the Active Directory Infrastructure
Work with Exchange 2010 on a daily basis
Department of Justice (DOJ) Washington, DC
System Engineer January 2012 – January 2013
Contracted as a system engineer with the DOJ
Installing and Configuring Lync Server 2010 for Department of Justice (DOJ)
Lead Design Engineer for our Video Teleconference Project which will include a VCS-C controller, VCS-E Expressway and an ISDN Gateway
Create and Install/Deliver packages-Updates from SCCM
Created OS deployment package to update Windows xp to Windows 7 utilizing the USMT
Updated SCCM server from Windows 2003 to Windows 2008 R2 then installed SCCM 2007 SP1 and SP2 then updated to SCCM 2007 R3
Created a backup from SCCM server 2003 then ran site repair wizard in SCCM 2007
Installed SQL Server 2008 for SCCM backend
SAIC Washington, DC
System Engineer October 2011 – June 2012
Worked with Vsphere 4.1 Enterprise essentials creating VMware guest machines within the Vsphere environment utilizing VMware Win2K8 64Bits Templates plus using the cloning feature inside the Vcenter
Monitored the WSUS environments to insure that all patches were being applied to the servers
Scanned network environment on all servers to insure all machines risk and vulnerabilities were up to the necessary security levels
Verizon
System Engineer March 2011 – August 2011
• Installed and Administered Cisco Unified Call Manager 7.0 in Verizon Test Lab Environment
• Installed and configured Cisco 2950 switch in the lab along with the Windows 2003 Virtual Servers for further testing with CUCM and the Cisco IP Phones.
• Worked in a Windows Seven computer environment to implement Cisco management products for compatibility issues
• Work with Verizon Design Engineers on the various integrations procedures with ICM and CVP telephony solutions
• Worked with the Sonus Engineer on the proper test procedures for the Sonus Devices within the infrastructure
• Monitored the ICM-CVP Logs to determine if ICM-CVP were experiencing any latency issues or dropping of calls
Unisys
Test Lab Engineer May 2010 – November 2010
• Testing various Cots applications
• Worked with Windows 2008 R2 plus VMware Vsphere 4.1 Enterprise essentials
• Working with various hardware platforms to see if there is any compatibility issues with the Microsoft Operating Systems (Windows 2003 & XP)
• Installed and Administered WSUS (Windows Software Update Service) Server for Unisys Lab infrastructure
• Installed Network Load balancing on 2 Client Access Servers within the Exchange Site.
• Installed and administered all Application Service Packs and Updates on all Servers and Workstations Via Altiris within the Lab test environment. The Ventura Group
Network Engineer July 2008 – January 2010
• Worked on a contract supporting DOI (Department of Interior)
• Installed a Cisco Test Lab environment for testing various TFTP images on Cisco 2950 switches.
• Installed Windows 2008 with SCVMM to test Microsoft virtualization P2V
• Testing Upgrade Procedures from Windows Vista to Windows Seven
• Installed Windows Seven and Windows Vista for Testing Functionality with Bit locker and PIV Card Implementation
• Installed SQL Server as part of the component of SharePoint, SCCM,SCOM and SCVMM
• Working in a Lab environment testing applications that integrate with Active Directory
• Set up AD forest to test application servers such as SharePoint & SCCM
• Worked on several projects involving testing hardware encryption and PIV II compliant cards for two factor authentication
• Installed an IBM San Enclosure with over 1TB of storage while utilizing a QLogic Fiber switch for zone Implementation plus IBM San Controller Management software to create the LUNS for the SAN
• Installed HP Blade Center to boot to IBM San Controller
• Updated the Labs AD infrastructure by running WSUS on all test servers, then notified production of the results.
• Upgraded Domain Controllers to Windows 2008 R2
• Installed and tested Exchange 2007
• Was responsible for troubleshooting all Exchange 2007 and 2003 Exchange Issues within the test lab.
• Exchange Administrator of a VMware exchange 2003
• Managed & Monitored Replications and or DNS issues that arose within the Forest
• Tested ESX VMware utility on a several servers to see if they were compatible with an IPcontrol management software
• Worked with Microsoft Hyper-V converting over 15 to 20 machines from Physical Boxes to Virtual Machines (P to V) and also converted several VMware machines to Hyper V machines (V to V)
• Installed a total of 7 Domain Controller in one AD forest with 4 Child Domains in that forest
• The 4 Domains within the forest were setup on 4 different subnets within the forest
• 3 Child Domains DC’s were setup as Virtual Machine that ran DHCP, DNS L-3 Communications Dulles, Virginia
System Administrator January 2007 – July 2008
• Worked at the Corporate office supporting several offsite locations that work directly with Government clients
• Implemented a Windows 2003 Active Directory Forest with 2 child domains
• Worked on 2 man team to configure our EMC San Controller which was 1.5TB
• Set up zones on a brocade fiber switch
• Created Luns on EMC utilizing the EMC management software at that time
• Migrated a Windows 2000 Active Directory Forest to the new Windows 2003 Active Directory Forest by using the Quest migration tools
• Installed & Configured two SQL Servers as part of our clustered environment
• Installed SQL Server as part of the component of the BlackBerry Enterprise Server
• Installed the Bridgehead Server along with the OWA component within the L-3 AD Forest
• Performed Daily Administration of the Exchange 2003 Servers
• Was Responsible for Installing Exchange 2003 Servers to various off site Locations within the Forest.
• Performed a Migration of an Exchange 5.5 mail system to a Clustered Exchange 2003 architecture utilizing the Aletia Quest Exchange Migration utilities
• Worked with Rim with their Blackberry Migration Kit. Migrated the Blackberry Server from 3.6 SP4 to Blackberry Server 4.1 SP3, also stood up Good Message Server for Mobile 5 Phones via email
• Working with Net backup and backup Exec utilities. Worked with Symantec Anti-Virus software in W2k3 infrastructure
• Worked on a team setting up a virtual environment within our 2003 AD infrastructure
• Tested the differences between VMware & Microsoft Virtual Server software
• Created overs 15 Virtual Machines utilizing VMware Server
• Worked with WSUS to update our WinXP desktops and W2K3 Servers
• Performed Migration from a Windows 2000 Print Server to a W2k3 Print server utilizing the print mig utility and the chg print server utility via the web. Pentagon
System Administrator October 2006 - December 2006
• Contracted with IMCEN at the Pentagon which supported all branches of the military.
• Worked with Net App Filers as primary San Solution for email and storage
• Worked with SMS & WSUS in a Win2k3 AD Forest
Pentagon
System Administrator June 2006 – September 2006
• Contracted with the Pentagon working and maintaining the server infrastructure.
• Worked as a senior system admin with Desktop Support/Server support various clients on day- to-day operational requirements including maintaining Active Directory/Email Accounts.
• I worked at the National Archives building on 701 Pennsylvania Avenue supporting the Navy’s Small Business Servers (2000/2003 environment).
• An Exchange Administrator of 5 Small Business Exchange Servers for 2000/2003 located in the northern Virginia area.
• Troubleshooting all issues related from desktop support/Server support
• Worked with Symantec back-up Exec for various clients backing up emails. Also worked with SMS engineers to assist in rolling out patches for the Desktop clients NORTEL Government Solutions
Network Administrator November 2001 – June 2006
• Email Administrator supporting day-to-day operational requirements of the Office of The Surgeon General (OTSG) U.S. Army enterprise email resources, including the primary mail server, Bridgehead and Outlook Web Access server. Responsibilities include ensuring that NT and Email accounts are managed in accordance with prescribed architectural guidelines for over 400 accounts including day-to-day tape backup requirements. Provide troubleshooting support for all elevated issues that are not resolved at Tiers 1 or 2. Created essential documentation of client email applications to ensure consistency in use as well as for internal troubleshooting approaches.
• Coordinated Exchange 5.5 migration to Exchange 2003 within the OTSG OU within the AMEDD Active Directory Forest
• Updated the Exchange Server Database to reflect AKO Accounts. Worked with clients to insure that AKO email was forwarded to Amedd.army.mil accounts
• Worked with Net App Filer to preform mailbox recovery on offline Mailbox Server also utilized snap mirror and snap manager as exchange utilities.
• Installed and supported OTSG’s implementation of RIM Blackberry Enterprise Server
(BES) in support of OTSG’s mobile computing environment. Evaluated and documented new features for deployment to the community at large, when appropriate
• Installed and Configured SQL Server as part of the Blackberry Enterprise Server component
• Updated Blackberry Enterprise Server (BES) from 3.6 to 4.0
• Installed and Configured Blackberry Enterprise Server (BES) 4.0 for use with the Common Access Card (CAC) sled. Updated over 15 BlackBerry devices to point to Certificate Authority for the DOD
• Assisted with Device Manager on Updating firmware on 300 Blackberries Devices from 3.6 to 4.0. Also performed software upgrades on all BlackBerry Desktop software.
• Managed the Exchange PKI Public Folder containing General Officer (GO) contact information and their associated Public Key. This provides the OTSG GO community with visibility to other Army GO PKI information.
• Provide support for OTSG’s Defense Messaging System (DMS) client requirements. Supported testing and implementing the new release of DMS 3.0 prior to deployment to the community
• Currently involved in the evaluation of the DMS Decision Agent; a web-based implementation of DMS. This agent facilitates interaction with DMS via the Common Access Card (CAC) eliminating the administrative burden associated with the handling of the Fortezza card
• Assumed the Organizational Release Authority (ORA) role for OTSG, which entailed ensuring that Fortezza cards were handled within the prescribed process
• Provided lifecycle oversight for all networked printing resources within the OTSG network infrastructure. Elements of this project have included the development of an overall plan for the effective management of key configuration variables such as printer settings, consolidation of resources on an isolated VLAN, identification of automated management resources and an assessment of individual device security settings to mitigate associated risks.
• Developed and executed a Printer Migration Plan for the migration of printing resources from an NT4.0 platform to one based on Windows 2000. Efforts in this area produced an automated script to seamlessly and transparently migrate client systems to the new print server with no lapse in system performance. Additionally, implemented an automated routine to back up the print server configuration to an offline location, in such a fashion that it can be used for emergency Disaster Recovery (DR) purposes. Migration plan has lowered the overall risk associated with a server failure and ensures that print services can be effectively restored within 1 hour of an incident.
• Maintained key configuration elements within prescribed tracking requirements developed within Printer Management Plan. The documentation of these elements ensures that all team members have the necessary procedures available to implement changes to the networked printer environment. Configured network switch ports to correspond to the appropriate VLAN settings for printing resources.
• Implemented SNMP-based HP WebJetAdmin as a management tool to develop proactive capacities for identifying major hardware issues. Ensured that SNMP community strings were changed appropriately and that only essential services were enabled to mitigate potential security risks. Performed routine security scans on printer resources to validate compliance with baseline settings.
• Created DHCP reservations for all print devices to establish an environment where modifications can be imposed centrally.
• Served as a primary point of contact for troubleshooting all cabled infrastructure requirements. In this capacity, research problems beginning with Layer 1 (Physical) issues as the first step in resolving performance issues. Monitored switch interfaces for trends in performance-based issues such as alignment errors, CRC errors, collisions, and runts. Isolated issues using Fluke DSP-4000 Cable Test Equipment and imposed a structured process of elimination to pinpoint issues.
• Facilitated the installation of new cabling for client systems as appropriate. Ensured that new installations were documented within the appropriate floor plan diagrams.
• Ensured all new installations were tested and validated prior to being used.
• Tracked down all unmanaged, legacy mini-hubs on the OTSG network and re-allocated all associated connections to OTSG switched infrastructure. This project improved several client-side performance issues and ensured greater visibility into OTSG’s wired infrastructure.
• Served as a team member supporting a major infrastructure upgrade involving the replacement of all legacy switches and the implementation of a redundant network core. Project included redundant routers, switches and firewalls with the purpose of limiting single points of failure and the migration to a new IP topology. Nortel Government Solutions
Level 1/2 Technician September 1999 – November 2001
• Provided Level 1/2 Technical Support to fast-paced environment of approximately 400 community members. Responsibilities included extensive problem solving and direct interaction with clients, test and evaluation of all aspects of hardware and software configurations, development of identified documentation requirements, and deployment of new systems using Ghost 5.x/6.x, installation of new hardware and peripherals, and tracking of all support requests using Bendata Heat Call Logging software.
U.S. Army Fort Lewis WA
Unit Armorer January 1981 – January 1985
• Maintained security of over $300,000 worth of weapons and ammunition
• Performed daily, weekly, and monthly maintenance on equipment
• Obtained secret security clearance
U.S. Army Fort Belvoir, VA
U.S. Army Reserves June 1994 – January 2001
• Performed maintenance on Trucks, Boats and Floating Bridges Education
• Associates Degree in Computer Information Systems, Strayer University (04/1999)
• Bachelor’s Degree in Computer Information Systems / Network Engineering (06/2001)