AFIFSHEIKH *********************@*****.***
ABDULFATTAH
Linux Systems Administrator RHCSA Certified 6+ Years of Experience Rutgers University: Information Technology
EDUCATION
SKILLS
PROFESSIONAL SUMMARY CERTIFICATIONS
EXPERIENCE
Senior Linux Systems Administrator with 6+ years of enterprise experience architecting, automating, and securing large-scale RHEL/Linux infrastructures across hybrid and multi- cloud environments (AWS, Azure, OCI). Proven expertise in infrastructure as code
(Terraform, Ansible), CI/CD and GitOps workflows, and DevSecOps practices to drive automation, scalability, and security. Demonstrated success managing 1,000+ server environments with 99.9% uptime, implementing high availability (HA) and disaster recovery
(DR) strategies, and achieving 100% compliance through CIS, NIST, and STIG hardening. Strong background in Kubernetes/Docker containerization, monitoring, and ITIL-based incident management, with a track record of reducing MTTR and improving operational efficiency. RHCSA certified; effective in cross-functional collaboration to deliver secure, scalable, production-grade infrastructure.
OS / Linux: RHEL 6–9, CentOS 6–8, Ubuntu, Amazon
Linux, OEL, OpenShift, OpenStack, System Administration, Performance Tuning, Patch Management.
Cloud Platforms: AWS (EC2, S3, IAM, EBS, EFS,
ELB/ALB, CloudWatch, CloudFormation, Route53, Auto Scaling), Azure, OCI, Multi-Cloud Architecture, High Availability (HA), Disaster Recovery (DR).
Infrastructure as Code / Automation: Terraform, Ansible, Ansible Tower/AWX, Rundeck, Bash Scripting, Git, GitLab, Bitbucket, Configuration Management, Infrastructure Provisioning.
DevOps / SDLC: CI/CD Pipelines, Continuous Integration / Continuous Deployment, GitOps, DevSecOps, Secure
SDLC, Agile Methodologies, Active Directory Integration. Containers: Docker, Kubernetes, OpenShift, OpenStack
(Nova, Neutron, Cinder), Container Deployment &
Orchestration.
Virtualization: VMware ESXi, vSphere, vCenter, KVM. Monitoring / ITSM: Splunk, Prometheus, Nagios,
ServiceNow (ITIL – Incident, Change, Problem
Management), BMC Remedy, ManageEngine Patch
Manager Plus, Incident Management, Root Cause Analysis
(RCA).
Storage: SAN, NAS, LVM, NFS, RAID 0/1/5/10,
EXT3/EXT4/XFS.
Networking: TCP/IP, UDP, DNS, DHCP, SSH, LDAP, NIC Teaming, Load Balancing, Network Troubleshooting, HP iLO, Dell iDRAC.
Security: CIS Benchmark Hardening, Vulnerability
Remediation, SecOps Collaboration, NIST, STIG
Compliance, DISA Standards, System Auditing, Access Control, DevSecOps Integration.
Web / App Servers: Apache, Nginx, Tomcat, NFS, Samba, FTP, VSFTPD.
(848) - 305 - 7591
Piscataway, New Jersey, 08854
RedHat Certified System Administrator
(RHCSA).
First American, Santa Ana, CA
Senior System Administrator May 2024 - July 2025 Architected and administered enterprise RHEL 7–9, Ubuntu, Amazon Linux, and OpenShift clusters across hybrid multi-cloud infrastructure (AWS, Azure, OCI), sustaining 99.9% uptime across a 1,000+ server production fleet while partnering with SecOps to remediate vulnerabilities and enforce CIS, NIST, and STIG compliance standards. Drove end-to-end automation using Ansible and Terraform, integrating CI/CD and GitOps workflows via Ansible Tower and Rundeck—eliminating 30+ hours/week of manual effort, reducing ticket resolution time by 40%, and maintaining 100% patch compliance with automated rollback capabilities.
Designed and maintained a Golden AMI Bakery pipeline (AWS, Azure, OCI) delivering pre-hardened, compliance-ready server images; deployed ServiceNow Discovery and ACC agents to ensure accurate CMDB representation and full asset visibility across 1,000+ nodes.
Implemented Splunk-based monitoring and centralized logging across the enterprise server fleet; automated log forwarding via Ansible and provisioned Kubernetes clusters to support containerized microservices in high-availability (HA) environments. Led cross-functional incident bridge calls aligned with ITIL Incident and Problem Management, driving root cause analysis (RCA), implementing long-term remediation strategies, and reducing MTTR while improving system reliability and operational resilience.
Citi Bank, New Castle, DE
Linux Systems Engineer March 2022 - May 2024
Managed full RHEL server lifecycle across hybrid physical and virtual environments— provisioning, configuring, and decommissioning systems while administering LVM in SAN storage, RAID 0/1/5/10, and filesystem maintenance to ensure high availability (HA) and data integrity.
Monitored host resources using Prometheus and syslog analysis for proactive incident detection; configured NFS and Samba for cross-platform integrations and managed secure file transfers via SCP/SFTP/FTP in compliance with enterprise security standards. Accenture, New York, NY
Linux System Administrator January 2020 - March 2022 Managed full server lifecycle across hybrid RHEL environments—provisioning, configuring, and decommissioning infrastructure while administering LVM in SAN storage, RAID configurations, and filesystem integrity to support high-availability (HA) systems.
Performed OS patching, vulnerability management, and operational readiness testing on RHEL systems; implemented Prometheus-based observability and logging solutions for proactive incident detection and rapid escalation. Configured NFS and Samba for enterprise network integration; enforced STIG and NIST compliance standards through access controls, least-privilege policies, and secure file transfer protocols (SCP, SFTP, FTP).
Collaborated within Agile and SDLC frameworks to deploy fixes across environments; supported CI/CD pipelines and Git-based workflows, improving deployment efficiency and system consistency.
Produced comprehensive documentation including runbooks, SLA policies, and disaster recovery procedures to support audits, compliance, and operational continuity. New York Presbyterian Hospital, New York, NY
IT Operator (Linux) January 2019 - December 2019 Supported enterprise data center operations including server lifecycle management, hardware optimization, and performance tuning within a mission-critical healthcare environment.
Administered Linux package management (YUM/RPM) and implemented system hardening using SSH key-based authentication, access controls, and security best practices aligned with compliance standards.
Diagnosed and resolved TCP/IP network issues using tools such as ping, traceroute, and tcpdump; administered RAID configurations and maintained system documentation to support operational continuity and compliance.
Achieved and sustained 100% patch compliance across 1,000+ cloud servers by engineering fully automated patching workflows via ManageEngine and Ansible,
eliminating manual tracking overhead and ensuring
continuous audit readiness.
Reduced recurring service desk ticket resolution time by 40%+ by architecting a reusable library of Ansible and Rundeck auto-remediation playbooks, directly improving SLA performance and reducing operational toil by 30+ hours/week.
Designed and delivered a Golden AMI Bakery pipeline across AWS, Azure, and OCI — standardizing pre-hardened, CIS-compliant server images and dramatically reducing time- to-production for new infrastructure deployments.
Deployed ServiceNow Discovery and ACC agents across entire cloud infrastructure, achieving full CMDB CI accuracy and real-time asset visibility across 1,000+ nodes — directly strengthening ITSM workflows and change management processes.
Enforced enterprise-wide CIS Benchmark and STIG
hardening through automated Ansible playbooks, achieving full compliance with internal security policies and regulatory requirements across all managed systems and satisfying internal and external audit requirements.
Worked within Agile and SDLC frameworks to deploy fixes across development, staging, ACHIEVEMENTS and production environments; enforced secure SDLC and DevSecOps practices while managing user/group access and ensuring adherence to least-privilege principles. Provided 24x7x365 on-call support for mission-critical systems; leveraged HP iLO and Dell iDRAC for out-of-band recovery during production outages, maintaining SLA commitments and supporting disaster recovery (DR) operations. Maintained operational documentation including runbooks, escalation procedures, and disaster recovery (DR) plans to support audits, compliance requirements, and knowledge continuity.