Mohamad Al-azm
Sr. VMware Engineer at EdgeConneX- Claim this Profile
Click to upgrade to our gold package
for the full feature experience.
Topline Score
Bio
Experience
-
EdgeConneX
-
United States
-
Telecommunications
-
100 - 200 Employee
-
Sr. VMware Engineer
-
Jul 2021 - Present
Managed/Deployed vSphere 6.0, 6.5 and 6.7 Environments Worked with vendors to deploy/rack/configure equipment in new Datacenters around the world. Managed Cisco UCS blade and network solution. Managed/Deployed Cisco 4500 and 3750 series switches. Managed/Deployed Sophos Firewalls (Physical and Virtual) in a HA configuration Managed/Deployed QNAP and Nimble Storage Managed a Windows Server (2012 - 2019) and Linux (Centos 7,8) Environment Worked with local Engineers around the world to solve hardware issues at our Datacenter sites Worked with different development teams to provide them with resources they need (VMs, DNS changes, upgrades). Worked with the Information Security team to deploy software such as Password Manager Pro. Setup/Configured/Managed a new Dell solution that included Servers, Switches, Storage. Managed DR/Backup software called Zerto. Managed/Deployed monitoring tool Zabbix Show less
-
-
-
Salient CRGT
-
United States
-
IT Services and IT Consulting
-
500 - 600 Employee
-
Sr. VMware Engineer
-
May 2019 - Jul 2021
Maintained vSphere 6.0, 6.5 and 6.7 Environments Upgraded Standalone ESXi hosts from 6.0 to 6.7 on newer hardware. Managed Cisco UCS blade and network solution. Lead a project to harden servers using DISA guidelines. Assisted customers with connectivity issues to network and server environment. Worked with different development teams to provide them with resources they need (VMs, DNS changes, upgrades). Worked with Vendors and did research for future hardware and software purchases. Managed Change Management System for new changes in the Environment. Setup/Configured/Managed a new Dell solution that included Servers, Switches, Storage. Configured and managed a Veeam backup solution for onsite and AWS tape backups. Built and managed an SCCM solution for patching Servers. Show less
-
-
-
DXC Technology
-
United States
-
IT Services and IT Consulting
-
700 & Above Employee
-
Sr. VMware Engineer
-
Jul 2016 - Mar 2021
Worked with security on a monthly basis to insure the production environment is up to date and in compliance. Was systems lead for obtaining ATO for two different environments. This included delegating the testing and deployment of patching to GPO and registry changes. Updated a lab environment from vSphere 5.0 to 6.0, than 6.5 Planned, documented, and migrated production from vSphere 5.0 to 6.0. Cleaned up and documented the network configuration of the lab for redundancy. Planned, tested, documented and implemented two different SCCM deployments for production. Managed and taught others how to properly manage SCCM. Managed an environment of over 500 Windows 2008 R2, 2012 R2, and 2016 servers (Mix of virtual and physical) Created and modified GPOs to comply with government policies. Configured an F5 in a lab environment to balance the load between Cisco Ironports. Wrote up documentation for F5 configuration needed for Production. Assisted in VMware type questions for future hardware purchases, and current load analysis. Worked on a project to replace all self-signed certs for Windows/iLO/VMware with CA signed certs. Show less
-
-
-
KSH Solutions, Inc.
-
United States
-
IT Services and IT Consulting
-
1 - 100 Employee
-
System Engineer
-
Apr 2014 - Jul 2016
Administered Windows 2003 and 2008 Servers, hosted both physical and virtual machines.Administered a robust VMware ESXi 5.1 (Which I upgraded to 5.5) environment, which consisted of three locations managed by two vCenter servers.Setup and deployed a new NetApp appliance, Cisco 3750 switch stack, and ESXi hosts for two new sites. This included racking/stacking/IPing/cabling/configuring/administering.Created a test environment, which consisted a NetApp appliance, Cisco 3750 switch stack, and ESXi hosts.Configured a VPN solution using a Juniper MAG appliance.Added four additional Cisco blades to UCS chassis, and used template to setup additional ESXi hosts.Setup and executed a plan to renew a subordinate-CA certificate which was used to provide workstation certificates which allowed for 802.1x authentication. This included renewing all workstation certificates.Built and administered a new Root-CA and Subordinate CA infrastructure-using Windows server 2008.Built and administered a System Center Distribution Point at three remote locations to allow for better patch management.Built a System Center Service Manager site for internal ticketing system use.Configured and administered a VDI environment which consisted of admin boxes, and a training room.Worked with team in migrating users from one AD environment to another.Assisted IA with patch management and server STIGing.Assisted Desktop Support team in testing and building new workstation images.Worked on deploying and remotely managing iPads and iPhone using the DISA EMMC and Mobile Iron console. Show less
-
-
Sr. Systems Administrator
-
Dec 2013 - Apr 2014
Administered Windows 2003 and 2008 Servers, hosted both physical and virtual machines.Wrote maintenance plans and setup CCBs for bi weekly patch management and server maintenance.Worked after hours for maintenance windows to minimize user downtime.Worked with IA in preparing for ATO, which consisted of STIGing servers using DISA standards.Managed a multi-domain AD environment, which consisted of GPOs to apply domain policy.Updated SOPs to provide standardization.Administered daily server backups using Symantec Backup Exec 2010.Assisted development team is migrating applications from Windows 2003 to 2008 servers.Worked with Network team to re-home all server and network equipment (This consisted or racking/stacking, cabling, and working with firewall team to allow the traffic).Administered a VMware ESXi 5.1 environment, which I was able to expand by adding two additional hosts.Rebuilt VMware Vcenter server after a crash, which included rebuilding the Virtual Distribution Switch. Show less
-
-
-
Insight Global
-
United States
-
Staffing and Recruiting
-
700 & Above Employee
-
System Engineer
-
Oct 2013 - Dec 2013
Completed the SCCM 2012 setup (Reporting agent, OS Deployment, Windows Updates), which included client deployment and testing. Configured the SCSM 2012 and SC Orchestrator to automate user creation, VM creation, and ticketing system. Used VMM and Amazon’s cloud service to create and manage Virtual Machines (Server 2008 R2, 2012, and Ubuntu Server). Based on the developers requirements, provided them with new Virtual Servers. Setup LUNs on a Dell SAN and connected it to two Dell Servers, which are hosting ESXi 5.1. Configured a new ESXi 5.5 host, which will be used for a developer environment. Work with a team to replace their entire infrastructure from racking and configuring switches to setting up firewalls. Show less
-
-
-
SAIC
-
United States
-
IT Services and IT Consulting
-
700 & Above Employee
-
Network Engineer
-
Apr 2010 - Oct 2013
Managed Cisco 6500 (Old HQ) and 3700 Series Layer 3 Switches in a campus layout, including STP, VLANS, VTP, Access Lists, Authentication, and Port Security.Maintained a mainly fiber optic network covering seven buildings, 600+ end users and the local data center (Old HQ).Assisted in the setup and administration of a Cisco UCS/flexpod solution, which included Cisco Fabric Interconnects, Cisco Blade Servers, and NetApp SAN.Assisted in the planning and deployment of a VDI solution we used in our training room. I currently am managing this solution as well.Cisco switch troubleshooting, including ROMMON startup, Duplex Mismatch, hardware failure and wiring faults.Managed Windows 2003 and 2008 servers hosted on VMware ESXi 4.0 hosts which were upgraded to 5.0.LAN Room electrical load balancing issues – developed a balanced approach to load tolerance.Managed several NetApp SANs, hosting CIFS for user data, and LUNs for VMware Servers.Used Active Directory and ARS to Manage Users/Groups/Computers.Tested new equipment for future purchase (Laptops, tablets, Mobile Devices).Worked with Security to meet our ATO, managed HBSS and Retna Server.Setup one of the first ACAS systems in Navy Medicine. This included a Nessus Scanner, Security Center, and Passive Vulnerability Scanner. Used x-tools to convert DISA STIGs into Audit files.Assisted IA with closing out any open IAVA.Edited local HIPS, DLP and Firewall Policies.Managed a Symantec Antivirus server, as well as McAfee Antivirus through HBSS.Assisted in applying patches for vulnerabilities which retina has detected. Used Gold Disk to apply STIGTested Windows Server 2008 and Windows 7 for STIG and user requirements.Created/Updated and tested Group Policy Objects in order to comply with security requirements.Edited scripts and batch files for patch management.Worked with Ghost imaging software to create standard images for BUMED customers. Used images for both troubleshooting and deployment. Show less
-
-
Tier 2 Connectivity and Communication Specialist
-
Jul 2009 - Apr 2010
Used resources such as the CIT Knowledge Base, Active Directory, Exchange Manager, Blackberry Enterprise Server, Command Line, NIH Applications Manager, Security Portal, and the internet to provide level 2 IT phone support for all NIH users (Approximately 45,000).Assisted with wide array of issues which includes: Blackberry, Microsoft Office, Network, VPN (Cisco), Domain Accounts, Entourage, Listserv, and Remote Access.Used Remedy ticketing system for following up, resolution and if needed escalating any issues. Show less
-
-
Continuity Assurance Specialist
-
Dec 2007 - Jul 2009
Monitor network systems to proactively assess problems.Manage identified incidents and coordinating necessary IT resources.Hosted incident reviews sessions to assess the issue, and assure continuity.Maintain accurate system and contact information.Used resources such as Remedy to create different Tickets, Hot News, Bulletin Boards (HTML), and Outage Calendar items.
-
-