Friday, March 9, 2012

Websphere Administrator Resume

The websphere is nothing but a family of IBM software products that provide a development and deployment environment for basic web publishing and for transaction intensive. The applicant must have knowledge of this software product in order to provide required environment in given company. 
Following is the sample resume for the post of websphere administrator with required details and particulars. The applicant can modify this resume as per the requirements. 



Sam Bucknan,
1234, West 67 Street,
Carlisle, MA 01741,
(123)-456 7890.
Objective:
Obtain position as websphere administrator to apply my skills and knowledge in order to develop company and gain my knowledge further.
Summary of Qualification:
  • B.E. in Information Technology from Amber ton University, TX (1999).
  • Completed Diploma in IT from Alliant International University, CA (1996).
Work Experience:
Fishkill Company New York, NY(2007 - Present)
Websphere Administrator
Duties:
  • Deployed Enterprise Applications.
  • Carried out modification and reconfiguration of deployed applications in a company.
  • Managed the security of application by using different processes.
  • Deployed application tuned for performance and workload management.
  • Handled all related tasks in a company.
STR Technologies Ltd., New York, NY (2000 - 2007)
Websphere Administrator
Duties:
  • Installed and configured WebSphere product such as Websphere Commerce, WebSphere MQ, WebSphere Portal etc.
  • Understudied ESB architecture and it's components in details.
  • Enabled and configured payments framework in a company.
  • Responsible for the installation of all websphere products in a company.
Skills/Abilities/Knowledge:
  • Responsible for deploying all enterprises application in a company.
  • Have good knowledge of WebSphere Application Server Network Deployment (WAS ND) and integration with IHS (IBM HTTP Server)/Apache plug-in.
  • Have superb knowledge of all products.
  • Uncommon ability to secure application from malicious attacks.
  • Exceptional capability to modify and reconfigure application.


0 comments:

Post a Comment