Summary
Overview
Work History
Education
Skills
Certification
WORK PROFILE
Interests
Awards
Timeline
Generic
Muthaiah B

Muthaiah B

Wintel Server Admin
Bangalore

Summary

Seeking a career in Windows Server Administration, where I can make significant contribution towards the Organization’s immediate and future goals. With my esteemed experience in the Information Technology field, I am highly motivated with solid experience in Windows Server Administration, networking, and security. (Relevant Exp in Windows Server Admin: 7+ Yrs, and Total IT Exp: 14+ Yrs).

Overview

17
17
years of professional experience
4
4
Certifications
1
1
Language

Work History

Assist. Consultant (Wintel Server Admin & SCCM Patching\App Packaging)

TATA Consultancy Services (TCS)
05.2019 - 09.2025
  • Company Overview: TATA Consultancy Services (TCS) is a global IT services, consulting, and business solutions organization.
  • Client: AFI-Threadneedle Asset Management Holdings Ltd (UK client)

Wintel Server Admin

TeamLease Services Limited
06.2018 - 04.2019
  • Company Overview: TeamLease Services Limited is a leading human resource company offering a range of solutions.

IT Ops Sr. Analyst (Customer Support Tech Shift Lead)

Accenture Solutions Pvt Ltd
10.2014 - 05.2018
  • Company Overview: Accenture Solutions Pvt Ltd is a global professional services company with leading capabilities in digital, cloud, and security.

System Engineer at ABB Ltd

Info Services
03.2013 - 06.2014
  • Company Overview: Info Services is a company providing IT services and solutions.

System Administrator at HDFC Bank Ltd

Wipro Infotech Ltd
02.2010 - 03.2013
  • Company Overview: Wipro Infotech Ltd is a leading provider of IT services and solutions.

System Admin

HCL InfoSystems Ltd
07.2008 - 02.2010
  • Company Overview: HCL InfoSystems Ltd is a leading IT services and solutions company.

Education

BCA -

Alagappa University
Karaikudi, Tamilnadu

Diploma - Electronics & Communication Engineering

A.P.P College

Skills

Virtualization: Microsoft Hyper-V\Failover Cluster\SCVMM & VMware\vCenter\ESXi\Vsphere

Certification

ITIL Foundation Certified.

WORK PROFILE

  • Job Title: Wintel Server Admin
  • Reporting to: Client Leads\Managers
  • Microsoft Hyper-V\FCM\SCVMM:
  • Currently working as a Wintel Server Admin in TCS for an UK Client (CT\IAFI).
  • Administering and Managing 3700+ 2k16\2k19 VMs in on-perm (HV VMs & VMware VMs together), and 200+ instances on AWS\Azure Cloud.
  • Administering and managing 50+ Dell Physical Servers (including Hyper-V Hosts), and 100+ Dell\Cisco ESXi Hosts.
  • Building new virtual machine servers in Hyper-V\FCM\SCVMM and imaging the servers using ISO Image\SCVMM template\SCCM template with the help of JEA PowerShell scripting method(automation) and uplifting the Disk\RAM\CPU.
  • Creating Golden Image OS Template using SysPrep and SCVMM console for the new server builds.
  • Adding and configuring additional HV host to Cluster\SCVMM and Uncluster the decom’d\retired.
  • Performing LUN(CSV) cleanup and balancing the VMs\CSVs equally among the HV nodes manually and using JEA PowerShell.
  • Analyzing the LUN space and expanding the VM’s Disk space if any LUN(CSV) is overcommitted.
  • Involving in DR exercise activity during BCP to failover the VMs from Primary to Secondary vice-versa.
  • Restoring the broken\corrupted VMs using Replica copy by doing Failover method.
  • Enabling\building Replication using Hyper-V Broker for Production critical virtual machines and making them as HA in Cluster.
  • Rebuilding the replication and fixing the issue for the VMs where replication is broken\corrupted.
  • Restoring the crashed\corrupted VMs using replica copy and latest backup (Commvault).
  • Decommission of unused Prod\Non-Prod VMs using JEA PowerShell scripting method(automation).
  • We slowly started migrating the VMs from Hyper-V to VMware using Commvault backup data.
  • Working on vendor engagement with Dell\Cisco\HP for any hardware related of HV hosts.
  • MS Endpoint Mgr(SCCM Patch Management \ Apps Packaging Deployment):
  • Administering and managing the server’s patching and Apps packaging deployments via SCCM.
  • Grouping the 2nd Tuesday MS patches and distributing them to the distributed points(DPs) using Automatic Deployment Rule(ADR) for deploying them to Dev-SIT\UAT\PROD (E1\E2\E3) collections via SCCM as per the respective maintenance window schedule.
  • Creating custom ADR and enabling required products using Software Update Point(SUP) to be scheduled for auto-run.
  • Aligning the resources for E1\E2\E3 monthly patching work via SCCM and driving it with full ownership as per the patching assignment spreadsheet.
  • Creating packages for any MSI & EXI installable files and Security tools\Apps (like Flexera, FireEye, Bit9, SEP, etc.) and deploying them to the client servers via SCCM.
  • Working on Baselines Creation\Deployment, and OSD\Task Sequence via SCCM as per the client requirements.
  • Patching 2016 & 2019 OS image template using SCCM with the monthly patches for the new server provision\builds in Vcenter.
  • Upgrading SCCM Config Mgr by applying the required Hotfixes of current branch version.
  • Post ConfigMgr upgrade, we do upgrade SCCM client agent version on all the client servers via SCCM.
  • Creating some custom reports using SCCM with the subscriptions as per client requirements.
  • Creating SCCM-WQL query on required collections to classify the hostnames as per Prod & Non-prod environment (E1\E2\E3).
  • Analyzing and fixing the issue when Contents are failing to distribute for the DPs.
  • Fixing SCCM client broken issue and Patch failure issue by analyzing the required Logs.
  • Creating SCCM boundaries for the Subnets & IP range as per the client requirements.
  • Working with NW team to open required SCCM ports between source\destination in case of any FW block.
  • Identifying and addressing the security Vulnerabilities on client servers via SCCM by creating Baselines.
  • Generating SCCM Patching compliance report and tracking using Power-BI to be publishing for SCE team.
  • Coordinating with Info Security team (SCE) for the non-compliant servers tracking with the SNOW ticket.
  • Generating the Asset Inventory report using SCCM and publishing via email to the team on weekly basis.
  • Engaging Microsoft vendor if any critical issues in SCCM Site Components and patching\packaging issues.
  • Having theoretical Knowledge in Intune since didn’t get a chance for the hands-on experience on it.
  • VMware\vCenter ESXi\Vsphere:
  • Building new virtual machine servers in Vcenter using JEA PowerShell scripts and monitoring using vSphere console and uplifting the Disk\RAM\CPU.
  • Patching and updating the ESXi hosts using Life Cycle Controller\Update Manager.
  • Identifying and troubleshooting the ESXi Host Unresponsive issues, and Performing Firmware upgrade.
  • Working on ESXi accounts password rotation as per client security standards.
  • Enabling HA & DRS in the cluster using vSphere console.
  • Migrating the VMs to other ESXi host in Vcenter using vMotion.
  • Performing P2V & V2V migration using VMware vCenter Converter Standalone tool.
  • Adding and configuring additional ESXi host to Cluster and Uncluster the decom’d\retired ESXi hosts.
  • We use vROPs that is integrated with SCOM and Service-Now to monitor and suppress the alerts, also to collect the data from Vcenters\Clusters\ESXi Hosts\VMs\DataStores to identify\fix the issues.
  • Migrating the VM’s from one DC to another DC using Zerto Virtual Replication tool.
  • Working on vendor engagement with Dell\VMware Broadcom\Cisco for any hardware related of ESXi.
  • AWS\Ansible & Azure related tasks\Patching:
  • Patching the AWS VMs via WSUS\Ansible and building the servers, Also changing the Instance Type for the AWS VMs as per client user requirement.
  • Patching the Azure VMs using Azure Update Manager (AUM) and building the servers, Also changing the Instance Type for the Azure VMs as per client requirement.
  • Executing some customized scripts through Ansible Automation Playbook to remotely achieve few things since Remote PowerShell & File Share Folder access isn't allowed on any AWS servers.
  • Validating the Patching SSM Ansible job and retriggering the SSM job using Ansible for the Failed\FALSE.
  • Working on Config Drift failure remediation using Ansible Automation Playbook.
  • Working with AWS vendor for any EC2 instances are failed with 3/3 status checks.
  • Working on Vulnerability management\remediation for AWS & Azure servers using Ansible.
  • Working on AWS & Azure servers are decommission\retirement that are no longer needed.
  • Server monitoring tool (SCOM, OME\OMS\SumoLogic):
  • Monitoring the performance and utilization of the servers CPU\Memory\Disk in SCOM console and troubleshooting accordingly.
  • Updating the Company Knowledge for the critical\essential alerts that needs to be called-out by AMTO team, so that AMTO team will be calling out over the email\phone calls for any critical alerts\issues.
  • Pushing the SCOM agent for the newly provisioned servers via SCOM Management console.
  • Migrating the SCOM agent from UAT to Prod, and then Prod to UAT vice-versa as if any mismatch in host naming convention.
  • Suppressing the unnecessary scom alerts(by modifying the Boolean value) that are no longer needed using the respective SCOM Management pack.
  • And ensuring the servers health check, fixing the Monitoring agent corruption (greyed out issue) by renaming Health Service State folder and service not started issues.
  • Collecting the App error logs\Windows error logs of servers using SCOM console and fixing the issues.
  • Enabling\scheduling the maintenance window for the client servers using SCOM MW collection\group.
  • Generating the report from SCOM for server’s resource utilization (CPU\RAM\DISK) pertains to previous month\date with the graph manner.
  • We use Dell Open Manage Essentials (OME) for monitoring the Dell Physical servers.
  • AD \ Group Policy tasks:
  • Doing user management like Hostname Creation\Deletion\Movement among OUs, Password reset & ID unlock\GPO creation as per Service-Now ticket and approvals.
  • Based on requirement we create new group policy objects and apply on production OUs for restricting RUN option\CMD\Task Manager\USB access for some client specific servers.
  • Restoring the deleted AD objects using AD Administrative Center \ PowerShell with the GUID.
  • Performing Group Policy hardening for newly provisioned Non-Domain Joined servers to meet client project’s security standards.
  • File Servers\DFS Servers Management:
  • Providing folder permissions access to individual domain ids and service account ids.
  • I create NewFolders and enabling DFS replication to be replicated among DFS servers.
  • Assigning Inheritance permissions for parent folders to be accessed the child\sub-folders
  • Creating DFS namespace\Enabling replication for multiple DFS servers Namespace and adding multiple virtual shared folders of multiple File servers into domain based DFS.
  • Performing DFS quarterly audit and enhancing the disk space as per the audit findings.
  • JEA PowerShell\OS IPU Antivirus\ Additional Tasks:
  • Writing the basic codes based upon client requirements and asking the Automation Team to plug-in and publish them into JEA PowerShell server to be centrally available for the entire Team.
  • Performing In-place Upgrade(IPU) from 2012\2012r2 to 2016 OS using JEA PowerShell scripts.
  • Performing Firmware\BIOS upgrade for Servers and iDRACs.
  • Logging tickets and coordinating with various vendors for Hardware issues by generating Memory Dump Logs\System Event Logs using iDRAC and sharing with them.
  • AD integration and configuration for all the Dell iDRACs to login with the individual domain IDs.
  • Hardware, Basic Networking and OS related troubleshooting on servers.
  • Working on Config Drift deviations and Security Vulnerability remediation for Windows servers.
  • Preparing and Publishing DC Dashboard on daily basis.
  • Installation and configuration SCEP\SEP12x, SEP14x on 2016\2019 Servers.
  • Performing SOX audit against Servers, Service Accounts, and Shared Accounts as per client request.
  • Backup and Storage related tasks:
  • Monitoring the Commvault backup and re-firing the failed backups by analyzing the logs.
  • Working on backup restoration as per end user requirement.
  • Generating backup reports and publishing with DC dashboard to respective teams on daily basis.
  • Working on Dell\ECS storage related issues by engaging the vendor.
  • Ticketing tool (Service-Now\JIRA):
  • Working on Request\Incident\Change\Problem Management adhering SLA using Service-Now.
  • Working on CMDB\Stale Records\REC\Orphan tickets, etc. by engaging CMDB team.
  • Working with CMDB and Snow Admin\Developer team to fix the discovery issues of servers.
  • Joining the Daily Ops call to justify the cause of aged PBMs\Tickets\RFCs, etc.
  • Creating the Change Requests and coordinating with change team to be reviewed and approved.
  • Working on JIRA tickets for essential activities\project related work.

Interests

Hobbies: Reading Books\Listening music

Awards

Recognized as a Contextual Master in TCS for iDRAC AD integration and configuration done for the Client., Received many Ammy awards and Appreciations from TCS Client for the extended support., Received Star of Business Award & Received 2 Luminaries Award in ACCENTURE., Received highest Appreciations and Award for the Best Customer Satisfaction in WIPRO.

Timeline

Assist. Consultant (Wintel Server Admin & SCCM Patching\App Packaging)

TATA Consultancy Services (TCS)
05.2019 - 09.2025

Wintel Server Admin

TeamLease Services Limited
06.2018 - 04.2019

IT Ops Sr. Analyst (Customer Support Tech Shift Lead)

Accenture Solutions Pvt Ltd
10.2014 - 05.2018

System Engineer at ABB Ltd

Info Services
03.2013 - 06.2014

System Administrator at HDFC Bank Ltd

Wipro Infotech Ltd
02.2010 - 03.2013

System Admin

HCL InfoSystems Ltd
07.2008 - 02.2010

Diploma - Electronics & Communication Engineering

A.P.P College

BCA -

Alagappa University
Muthaiah BWintel Server Admin