William Coldiron
101 Watts St, Apt 22
Muldraugh, KY 40155
502-653-9325
wbcoldiron@gmail.com
UNIX Systems Engineer * UNIX Applications Support * Web Engineer
Overview
UNIX Systems Engineer with over 10 years experience in installation, administration, configuration, and
securing. Additional experience includes web engineering, applications support, technical writing,
operations support, and information security. Background includes UNIX variants such as Solaris and
Linux, Windows Server operating systems, and Oracle database administration. Reputation for writing
clear and concise explanations for technical and nontechnical users. Ability to act as technical lead and
mentor to promote efficiency and perform knowledge transfer. A broad understanding of computer
hardware and software, including installation, configuration, management, troubleshooting, and support.
Compliant with DoD 8570 IAT Level II with RHEL, Solaris, and Security+ certifications.
• Systems Analysis
• Information Security
• Remote Support
• Escalated Technical Support
• Technical Writing
• Network Monitoring
• Database Administration
• Security & Compliance
• Process & Efficiency Improvements
• Technical Lead
Professional Experience
HPE/US ARMY HUMAN RESOURCES COMMAND, Fort Knox, KY
January 2010 to Present
Lead UNIX Systems Engineer/Security Administrator/LDAP Administrator
Contracted by HEWLETT PACKARD ENTERPRISE to the DoD (Department of Defense) for Solaris and
Linux support on NIPR/NASE and RSN. Provided technical expertise to a team of 7 supporting Linux,
Solaris. HP-UX and AIX.
• Acted as a field support engineer on TDY to the US Air Force for the initial build out of the Red Hat
infrastructure with two RHN Satellites and kickstarted 28 VMs as well as trained two Junior
adminstrators who remained on site.
• Acted as a Level 3 support engineer for escalated incidents and problems for more efficient resolution
and recovery.
• Worked collaboratively with application owners and other stakeholders to define the scope of
potential projects and initial requirements.
•
Functioned as a technical expert in LDAP & Kerberos for single sign on services,OID (Oracle Internet
Directory), application support, and NFS V4.
• Supported the resolution of Internal Audit, regulatory, or Risk Management related issues that could
impact the confidentially, availability or integrity of data or processes.
• Performed patch, STIG/SCAP, and IAVA compliance within established change control procedures.
• Automated security STIG/SCAP compliance of RHEL servers using Red Hat Network Satellite and
Configuration channels.
• Kickstarted Linux servers via Satellite for automated builds which were secured to STIG standards
and updated.
• Created and administered 200+ servers consisting of physical as well as Virtual Machines (VMs)
virtualized under VMware, RHEV 3 (Red Hat Enterprise Virtualization), and KVM (Kernel Virtual
Machines).
• Configured RHCS (Red Hat Cluster Suite for HA (High Availability) for 10 two node Oracle Clusters.
• Designed, coded, and tested scripts in PERL, Bourne Shell (sh), Bash, and Korn Shell (ksh) to
automate processes.
• Resolved over 90% of the tickets in our Remedy queue on a monthly basis.
• Mentored and instructed less experienced administrators.
TEKSYSTEMS/JP MORGAN CHASE, Columbus, OH
March 2009 to November 2009
Solaris Implementation Engineer
On a project basis, prepared Solaris 10 servers to move to production in data centers in the US, UK, and
Malaysia.
• Provided support for large projects from requirements through implementation.
• Acted as technical lead for assigned projects.
• Monitored our Service Center queue and resolved trouble tickets in Peregrine service center.
• Administered Solaris 10 servers running zones/containers, logical domains (ldoms on Sun4v T
series), and dynamic system domains (DSD on M5000).
• Secured servers using Symantec ESM to scan for and correct OS vulnerabilities.
• Verified servers followed security guidelines.
• Coordinated multiple projects simultaneously and assisted other implementation engineers on their
projects to provide Follow-the-sun support across multiple time zones.
• Managed SAN storage using Veritas Volume Manager (VxVM) 5, ZFS, SVM, and raw devices (ASM).
• Supported DBA and AD teams on multiple projects and resolved their problems and requests.
SSI/STATE OF OHIO COMPUTING CENTER, Columbus, OH
July 2008 to March 2009
Solaris Consultant/Technical Writer
Contracted by SOPHISTICATED SYSTEMS INC to provide on-site Solaris 9 and Sun Cluster support for
SACWIS. (Statewide Automated Child Welfare Information System)
• Administered 11 servers running Solaris 9: 7 V880s and 4 V240s.
• Cross-trained non-Solaris administrators in Solaris and shell scripting.
• Edited and updated previously documented internal procedures.
• Reviewed and rewrote internal Korn shell scripts.
• Administered Sun Cluster 3.1 in a three-node V880 cluster.
• Troubleshot, researched and corrected system errors.
• Analyzed systems for security defiencies and made recomendations.
• Administered Veritas Volume Manager (VxVM) 4.1 under Solaris and HP-UX.
• Researched and implemented increased security using the HP-UX Standard Mode Security
Extensions (SMSE).
• Wrote a Perl script for log rotation for HP-UX which does not support it natively.
• Implemented shell scripts for HP-UX to archive daily user login/logouts for auditing.
• Documented systems procedures to create a Solaris manual.
KING'S DAUGHTERS MEDICAL CENTER, Ashland, KY
August 2007 to July 2008
UNIX Systems Administrator/Oracle DBA/VMware Administrator
Employee. Served as the only UNIX administrator in a small health care IT environment.
• Administered 17 servers running Solaris 10, Linux, VMware GSX and ESX.
• Created and configured dynamic system domains (DSD) on the Sun M5000.
• Administered Solaris Cluster 3.2 in a two node M5000 cluster.
• Created and administered Oracle databases under Solaris.
• Analyzed internal systems for procedural and security deficiencies.
• Wrote scripts to secure and automate repetitive tasks.
• Configured a Jumpstart server to automate Solaris network installations.
•
Integrated Samba Linux servers in to a Windows 2003 Domain.
• Mentored and performed knowledge transfer to other systems administrators.
• Implemented LDAP using the Sun Directory Server 6 and pam_ldap to perform system
authentication.
• Administered Veritas Volume Manager (VxVM) 5 in a clustered and standalone environment.
• Implemented CentOS to standardize on a Red Hat Enterprise Linux (RHEL).
• Supported virtual servers under Solaris 10 zones and VMware.
FORCE 3/US Department of HUD, Charleston, WV
November 2005 to July 2007
Sun UNIX Systems Engineer/Web Engineer/Technical Writer
Contracted by FORCE 3 to EDS for the HUD HITS contract. Assisted in the UNIX modernization project
to migrate from Solaris 8 to 10. Helped engineer the web development and production environments.
• Achieved a 65% reduction in the total number of physical servers using Solaris 10 zones.
• Administered Solaris Volume Manager and Veritas Volume Manager.
• Trained and managed a junior UNIX Administrator.
• Supported developers migrating from Coldfusion 5 to MX 7.
• Administered Coldfusion MX 7 under the Sun Web server.
• Configured reverse proxies and load balancers under Sun web and application servers.
•
Functioned as a liaison between the Oracle DBAs and the UNIX team.
• Assisted in the development of security, installation, and configuration standards.
• Monitored the Help Desk queue and closed tickets in CA Service Desk.
• Produced documentation related to deployment, management, and administrative processes.
• Wrote scripts to secure servers according to security guidelines.
• Documented using the Sun Directory Server for LDAP.
Technical Expertise
• UNIX
:Solaris 8 - 10, Red Hat Enterprise Linux 5-6 (RHEL), CentOS 5-6 (RHEL clone)
• Virtualization: Solaris 10 Zones and LDOMs, VMware, Sun Virtualbox, RHEV, KVM
• LDAP : Oracle/Sun Directory Server, Red Hat/389 Directory Server
• Database :Oracle 8i - 10g, MySQL, PostgreSQL, SQL, PL/SQL, SQL*PLUS
• Development
:PERL, Sed, [NG]awk, Bash, Bourne, Korn Shell, Sun Studio, gcc
• Web Support :Java, JBoss, JRun, Coldfusion, Apache, PHP, Sun Java Web/Application/Proxy
Server
• Net Services : TCP/IP, HTTP(S), SNMP, DNS, LDAP, NFS, Samba, Apache
• Security :Spawar Navy SCAP SCC, DISA STIG, OpenSCAP
Technical Certifications
RHCSA, RedHat, July 2013. 130-127-277: Red Hat 6 Certified Systems Administrator
ITIL V 3, CSME, Inc., October 2012. ITIL Foundation in IT Service Management
Security+ CE, CompTIA, Oct. 2010. Code: MV3DRLLDLKBEC2F8
SCSA, Sun Microsystems/Oracle, May 2010. Solaris 10 Sun Certified Systems Administrator
OCA, Oracle, March 2005. Oracle 9i PL/SQL Developer Certified Associate
OCP, Oracle, August 2003. Oracle 9i Database Administrator Certified Professional
SCSECA, Sun Microsystems, March 2003. Solaris 9 Sun Certified Security Administrator
OCP, Oracle, November 2002. Oracle 8i Database Administrator Certified Professional
SCSA, Sun Microsystems, August 2002. Solaris 8 Sun Solaris Certified Systems Administrator
CCNA, Cisco, June 2001. Cisco Certified Network Associate
Network+ CE, CompTIA, March 2001. Code: Z6DEBMCGBDR1Y5N2
A+ CE, CompTIA, June 2000. Code: JHPCR9PJBGE457J5
Military Certifications and Training
HIPAA and Privacy Act, Defense Health Agency, Department of Defense, May 2016. This course on the
Health Insurance Portability and Accountability Act of 1996 provides an understanding of how to handle
and protect PII (Personally Identifiable Information) and PHI (Personal Health Information).
DoD Cyber Awareness Challenge, US Army Signal Center, Fort Gordon, GA, April 2016. Affect physical
security of computer hardware and software. Limit access to computer equipment to authorized users
only. Prevent computer fraud, waste and abuse. Implement effective contingency planning. Report
security problems to the chain of command. Protect computer files from infection by malicious logic.
OPSEC Awareness, Defense Security Service (DSS), Department of Defense, December 2015. This
course on Operational Security provides information on the basic need to protect unclassified information
about operations and personal information to ensure safe and successful operations and personal safety.
Cyber Security Fundamentals, US Army Signal Center, Fort Gordon, GA, November 2015. This course
provides individuals an understanding of the information systems security policies, roles, responsibilities,
practices, procedures, and concepts necessary to perform the functions of an Information Assurance
Security Officer (IASO).
Security Clearance
Active Secret, Department of Defense, April 2010
Education
Ohio University, Athens, OH
BBA, Business, Minor: Economics
Professional Memberships
InfraGard, March 2011. FBI sponsored National Security organization.