Your browser is outdated!

To ensure you have the best experience and security possible, update your browser. Update now

×

Marcus Little

Marcus Little

Devops Linux Engineer

40 years old
Employed Available
Senior Systems Engineer with 8 years’ experience in system virtualization and network security. A motivational team leader with the ability to align cross-functional teams with business objectives to achieve key metrics. Served in the United States Air Force, Early Unix Security in the Pentagon and worked as the Lead Engineer for Special Forces in Iraq and Afghanistan. After trading in the boots for slacks and collars best known for excellence in defining and integrating cutting-edge technologies to improve automation and reliability.
Resume created on DoYouBuzz
  • Responsible for vulnerabilities for all 3000+ Virtual Red Hat Servers for both Aetna and Coventry.
  • Troubleshooting servers from Jira requests as well as on the fly alarms for all environments adhering to SLA standards.
  • Spearhead multiple provisions from AIX to Linux J2EE servers.
  • Responsible for recommendations to team members to java tuning, storage provisioning, and server architecture.
  • Responsible for all Ionic Enterprise Key/Enrollment installation,troubleshooting and configurations for all environments.
  • Spearhead multiple Java Application planning meetings as a Linux consultant from purchase to production.
  • Utilizing Red Hat Enterprise Linux Satellite 5.6 to maintain security, packaging and upgrades.
  • Linux engineering (Ubuntu, RedHat/CentOS) with a focus on Jboss/Wildfly Application Server administration troubleshooting and tuning experience.
  • Responsible for deploying, testing and documenting development, pre-production, and production environments.
  • Backup cloud and on-premise resources for all linux servers in the AWS environment.
  • SME for team with Red Hat Subscription Management and Red Hat ticketing service.
  • Employ auto scaling in AWS environment as well as AWS Elastic LoadBalancer.
  • Has very Cautious/Conservative Attitude in regards to System Changes.
  • Ability to work in a fast paced and agile environment, and make recommendations to improve.
  • Managed and monitored all installed systems and infrastructure to ensure the highest level of availability using both internal linux monitoring tools as well as Amazon CloudWatch
  • Ubuntu, RedHat/CentOS) with a focus on Jboss/Wildfly Application Server administration troubleshooting and tuning experience.
  • Deep familiarity and prior experience with Red Hat Satellite 5.6 and Version 6.0, Puppet and Ansible Tower
  • Understanding and experience with commercial product release engineering practices, specifically with Scrum Teams and Agile methodologies.
  • Extensive experience with virtualization technologies such as VMWare, or VirtualBox, experience in new server builds in RHEL, CentOS and Ubuntu.
  • Experience working with Enterprise IT and Operations teams in support towards application deployments, building new systems and upgrading and patching existing systems.
  • Very capable of learning on the job and explore new technologies with little supervision.
  • Single point of administration for patches, updates, backups and security on 40 Red Hat Linux servers worldwide throughout the DIA Enterprise Datacenters.
  • Proficient in RHEL/Debian for multiple server installations to include APCs Data Center Operations Server.
  • Subject matter expert on site for DCIM tool Data Center Expert(DCE) 7.2 and Data Center Operations(DCO) 7.3.6.
  • Sole administrator for DCIM Server backups and restoration.
  • Architect for multiple Data Centers using DCIM tool (DCO and DCE) for monitoring of cooling, power, rack space, humidity.
  • Participated in establishing a standard for data center rack elevations for the DIA Intelligence Community using 3 dimensional modeling and real-time device associations.
  • Trained local data center managers on using the DCIM tool.
  • Provided system administration support on RHEL/Centos, Solaris, JEDI, Windows Server and applications to include Sybase, Oracle, Jboss, ARCIMS and Apache.
  • Supports hardware, software and linux installations and modifications/configurations, installation of patches (application and security) network troubleshooting and technical recommendations to Sun T5240 / Sun T-4 Servers across multiple security domains.
  • Managed multiple Virtual Zones on RHEL Servers with 4 different domains and levels of security.
  • Administered all patches to RHEL, Centos, Solaris and solely responsible for auditing at local site.
  • Required to understand and maintain Information concepts by bi-annual certifications and training including security policies, standards, and guidelines as they pertain to system configurations.
  • Linux engineering and application support for government classification transfer system (ISSE Guard)
  • Day to day system support that includes troubleshooting hardware and operating system issues to isolate and diagnose.
  • Provide Tier 3 support and administration DoDIIS trusted network, service, and user account support.
  • Provides RHEL(Red Hat Enterprise Linux) virtual server support for Thin Client Desktops, maintaining over 300 thin clients over multiple secure domains.
  • Well established customer service skills, ability to communicate with both technical and non-technical clients.
  • Familiar with Jira as well DoD Ticketing Apps for all Service Requests and Trouble Calls.
  • Managed Active Directory for Users, Groups and Printers on both unclassified and classified systems.Initiated and Scheduled backups for local data on SIPR Servers.

Deployed Network/Server Engineering

SGIS - Afghanistan
August 2009 to August 2010
Mazar-e Sharif
Afghanistan
  • Position was directly working with Special Operation Forces and required critical on the fly multitasking and team oriented resolutions.
  • Network Design and Configuration utilizing VLANS & Point to Point Tunnels.
  • Server Install and Maintenance.
  • Video Teleconference Coordination and set up using Tandberg Suites for VIPs and Military Execs.
  • Managed daily monitoring of over 75 CISCO VOIP phones, 120 Windows workstations, 15 servers, and several critical applications and processes.
  • Administered application patches, upgrades, and backups site wide for over 120 workstations.
  • Used Active Directory on the classified as well as the unclassified networks to create accounts and manage security permissions.
  • Experience standing up new operations and IT organizations.

Linux/Windows System Engineer

National Geospatial Intelligence Agency
March 2007 to August 2009
  • Responsible for daily monitoring of over 320 workstations (Windows and 10 RHEL servers, and several critical applications and processes.
  • Duties include data backup and archive, networking, restoration, disaster prevention and recovery, software/hardware troubleshooting and resolution, upgrades and enhancements, data trace actions, maintenance and warranty requirements, and operational supply procurement and establish and implement Contingency of Operations.
  • Assisted Government users and other on-site engineers in systemproblem diagnosis and troubleshooting, collection of problem information,writing discrepancy reports (DRs), and recommending fixes.
  • Administered application patches, upgrades, and backups site wide for over 300 workstations.
  • Maintained Wireless Services for all Blackberries Cellphones with the Agency.
  • Responsible for providing support and maintenance for over 1000 pieces of hardware, 800 articles of media, and over 600 analysts.

UNIX System Administrator/ISSO

Pentagon Telecomm Center
December 2006 to March 2007
Arlington,VA
  • Install, configure, and maintain Certificate Authority Workstations (CAW), Ciphernet 3000, Windows 2000/XP, SCO-UNIX, Administrative Directory User Agents (ADUA), DMS Clients, CAW Interface Adapters, and Type 2 Cryptographic Support Servers.
  • Provide support external interface troubleshooting, develop workarounds to user problems, conduct training of Government users,coordinate with third party maintenance providers, and other operational support activities including software installations and upgrades.
  • Maintained accountability records essential to NSA oversight of DMS programs and meets security standards with the transfer of records to national archives.
  • Expertly inventoried and accounted for element crypto material - element received "Outstanding" rating with zero discrepancies during an agency disaster recovery inspection.
  • Strictly adhered to National Security Agency (NSA) policies for control and dissemination of DMS assets.
  • Created Defense Messaging Systems (DMS) encryption cards for wide distribution using National Security Agency provided Certificate Authority Workstation devices that verified recipient's access and clearance thereby protecting classified information at all levels.
  • Strictly adhered to NSA policies for control and dissemination of DMS assets with 100% accuracy in the issuance of tightly controlled encrypted media.
  • Responsible for receiving, processing, and coordinating shipment of requests for encryption cards supporting both classified and unclassified messages.
  • Programmed and tracked more than 3,000 DMS encryption cards across the globe.
  • Coordinated closely with other Air Force and Department of Defense offices to integrate DMS Public Key Infrastructure with the DoD PKI to the maximum extent possible.

-

  • Cloud Computing
  • AWS
  • Docker
  • RHEL
  • CentOS
  • Apache
  • Java Tuning
  • Satellite
  • JBoss
  • Git
  • Ansible
  • VMWare ESX Server
  • Puppet
  • Network Security
  • Auditing
  • Storage Virtualizatioin
  • Kubernetes