Sr. Cloud Application Engineer Resume
SUMMARY
- Proficient in core AWS services (S3, EC2, ELB, EBS, Route53, VPC, Auto scaling etc.) and deployment services (Elastic Beanstalk, Ops Works and Cloud Formation) and security practices (IAM, Cloud Watch and Cloud trail).
- Experience in migrating On - premise infrastructure to cloud platforms like AWS/Azure /GCP and involved in virtualization using VMware, Openstack (Nova, Neutron, Keystone, Cinder, Glance) and infrastructure orchestration using containerization technologies like Docker, Docker Swarm, ECS, EKS, AKS and Kubernetes.
- Designed multiple VPC’s and public/private subnets with required number of IP’s using CIDR blocks, Route Tables, Security groups and Elastic Load Balancers. Worked on to grant granular permissions to AWS Users, Groups and Roles by creating IAM policies. Automated deployment and configuration tasks using Lambda.
- Implemented various services like AWS Device Farm, Kinesis, Fargate, SES, TimeStream, IoT Core, Aurora etc., and integrated with the existing tools and authentication methods.
- Worked with AWS CLI and AWS API to manage resources on AWS for many services such as EC2, S3, VPC, Cloud Watch, ELB, Auto-scaling. Created python script using AWS API Calls to manage all resources deployed on AWS.
- Worked on Implementing and setting up Route 53 (AWS DNS service) for AWS Web Instances; ELB, Cloud Front and Elastic Beanstalk on AWS Environment. Also worked on Route 53 for Failover and Latency Based Routing to the client's websites using Weighted Route Policies.
- Expertise in Azure DevOps and worked on Azure Web application, App Services, Azure storage, Azure SQL Database, Virtual Machines, Fabric Controller, Azure AD, Azure Search, and Notification Hub.
- Worked on various Azure services like Compute (Web Roles, Worker Roles), Azure Websites, Caching, SQL Azure, NoSQL, USQLS, Storage, Network services, Data Factory, Azure Active Directory, API Management, Scheduling, Auto Scaling, and PowerShell Automation.
- Implemented Azure Active Directory for single sign-on access to thousands of cloud SaaS applications like Office 365, Dropbox. Also configured Azure Role-based Access Control (RBAC) to segregate duties within our team and grant only the amount of access to users that they need to perform their jobs.
- Hands on Experience in designing and implementing Service Oriented Architecture underlined with Ingress and Egress using Azure Data Lake Store & Azure Data Factory by adding blobs to lakes for analytic results and to pull data from Azure data lake to the Blobs.
- Created reproducible builds of the Kubernetes applications, managed Kubernetes manifest files and releases of Helm packages. Scheduled, deployed and managed Container replicas onto a node cluster using Kubernetes.
- Developed multiple operators which provides lifecycle management for Calico exposed via the Kubernetes API defined as a custom resource definition (CRD).
- Improved Kubeadm rolling-update to include support for draining and validating Kubernetes clusters. Worked on support for air gapping Kubeadm installations and re-using share security groups and IAM profiles.
- Worked with Terraform for automating VPC's, ELB's, Security groups, SQS queues, S3 buckets and continuing to replace the manual involvement by writing Infrastructure as code from scratch using Terraform Scripts.
- Worked on AWS OpsWorks platform to integrate Ansible process to deploy various codes, DB configurations to modularize and optimize product configuration. Also, expertise in writing Ansible Playbooks, modules, roles and utilized Ansible for configuration management of hosted Instances within AWS and Azure.
- Developed Ansible Playbooks to install and configure Apache, Tomcat, Splunk, Jenkins, WebLogic, Rundeck and deployment automation and Integrated Jenkins, Rundeck and Ansible.
- Proficient in using Shell, Bash, and Python, to supplement automation provided by Ansible and Terraform for tasks such as encrypting EBS and scheduling Lambda functions for routine AWS tasks. Worked on creating database tables that can store, retrieve and serve any amount of data traffic using DynamoDB.
- Created a team specific Agile process flow in JIRA to move tasks from one activity to another and Administration of Visual SVN repositories and to support tortoise users.
- Monitor health and performance of servers and containers in Prometheus using Grafana and alert manager. Automated the deployment of Java and Python applications with the use of Jenkins.
- Experience in writing Jenkins Pipeline Groovy Scripts for Continuous Integration and build workflows. Used Jenkins to upload Artifacts into Nexus Repository using the EC2 Container Service (ECS) plugin.
- Developed Puppet module for automation using a combination of Puppet Master, R10K Wrapper, GIT Enterprise, Vagrant & Jenkins.
- Worked on version control tools like Subversion, TFS, GIT, Bit bucket, CVS, Perforce Version and experienced with tagging, branching on platforms like Linux/Windows. Used Source code management client tools such as GIT Bash, GitHub, GIT-GUI and other CLI applications.
TECHNICAL SKILLS
Cloud Platforms: Amazon Web Services, Microsoft Azure, GCP, OpenStack
Container Orchestration Tools: Docker, Kubernetes, AWS Container Service (ECS), Azure Containers
Configuration Management: Chef, Ansible, Puppet
Version Control Tools: GIT, GITHUB, SVN, Perforce, Bitbucket
Web and Application: Servers JBOSS, Apache Tomcat, Web Sphere, Web Logic, Nginx, Send Mail
Monitoring Tools: Nagios, Splunk, Dynatrace, AWS ELK, Datadog, Grafana, Prometheus
Bug Tracking Tools: JIRA, ServiceNow, Bugzilla, HP ALM, Confluence, Rally, IBM ClearQuest
Build Tools: Maven, Ant, Gradle
Continuous Integration: Jenkins, Bamboo, Hudson
Scripting Languages: Shell, Ruby, Python, PHP, Groovy, JavaScript, PowerShell, JSON, YAML
Languages: Python, C++, Java
Database: MySQL, Aurora, RDS, Oracle, Dynamo DB, Mongo DB, Cassandra
Repository Management: Nexus, JFrog
Virtualization: VMware, Windows Hyper-V, Power VM, Vagrant, Virtual box
Operating System: Red Hat, Ubuntu, Debian, Fedora, CentOS, Windows, Solaris, Mac OS
Networking Protocols: TCP/IP, DNS, NFS, ICMP, SMTP, DHCP, OSPF, BGP, UDP and RIP
PROFESSIONAL EXPERIENCE
Confidential
Sr. Cloud Application Engineer
Responsibilities:
- Designed and maintained application deployment in AWS infrastructure utilizing services such as EC2, RDS, VPC and, managed network and security , Route 53, Direct Connect, IAM, Cloud Formation, AWS Ops Works (automate ops), Elastic Beanstalk, AWS S3, Amazon Glacier and Cloud Watch monitoring Gateway.
- Configured AWS Identity and Access Management (IAM) Groups and Users for improved login authentication . Provided policies to groups using policy generator and set different permissions based on the requirement along with providing Amazon Resource Name (ARN) .
- Designed and built a complex hybrid environment using AWS EC2, RDS, Route53, S3, EFS, Elastic cache and CloudFormation . Worked on AWS cloud watch for monitoring the app infrastructure and SNS for notifying.
- Used EC2, auto-scaling and VPC to build secure, highly scalable and flexible systems that handled expected and unexpected load bursts and used AWS Cloud Formation templates to create custom sized VPC, subnets , NAT to ensure successful deployment of Web applications and database templates.
- Configured cluster operations in AWS Kubernetes (EKS) to deploy microservices along with Kubernetes with CI/CD system, and used Kubernetes cluster to scale up operations of clusters, maintain the cluster services , ingress, network policies and to group Docker containers across different platform.
- Unencapsulated Calico networking in environments that support it, including AWS and other settings with L2 adjacency between nodes, and in deployments to peer with the infrastructure using BGP.
- Set up continuous delivery for the Pods by running Jenkins, Docker images , in Kubernetes and AWS EKS . Developed Jenkins Pipeline to automate and push the PODs to registry, and then deploying it in Kubernetes.
- Implemented POC using weave to create a mesh pod network between two K8s clusters. Mentored developers in K8s design and custom application implementation.
- Deployed Dev, Test and Prod environments for different applications on AWS by provisioning Kubernetes and EKS clusters on EC2’s & AWS Fargate using Docker, ECS, Ruby/Bash, Chef, and Terraform .
- Worked with Scheduling, deploying and managing Container Replicas onto a node cluster using Kubernetes and worked with building Kubernetes run time environment of the CI/CD system to build, test and deploy.
- Onboarded multiple tenant Kubernetes clusters in a single control plane cluster using cluster API (CAPI) and Custom Resource Definitions (CRD’s) for AWS providers, and responsible for managing Kubernetes services.
- Deployed Virtual Kubelets using KIP (Kubelet in pod) for cost reductions by saving compute resources.
- Worked on POC for Deploying the AWS infrastructure using Terraform, CloudFormation . Configured Redshift Cluster for data-warehousing which is responsible for Security audits using security groups and Network ACL .
- Created terraform templates for provisioning AWS virtual networks, subnets, VM Scale sets, Load balancers, and NAT rules and used terraform graph to visualize execution plan using the graph commands. Configured BGP routes to enable AWS Storage Gateway connections between on-premise data centers and AWS cloud.
- Integrated Jenkins with Docker container using Cloud Bees Docker pipeline plugin to drive all microservices builds out to the Docker Registry and then to deploy to Kubernetes cluster . Also, integrated Selenium automation regression test suite in Jenkins build pipeline to create test cases.
- Written Ansible Playbooks , and roles for automating infrastructure configuration in AWS, Webservers, SQL Server , and Monitoring tools. Mitigated AWS costs by writing the Ansible playbook for auto start/stop of AWS resources Confidential any time of the day by triggering it from Jenkins pipelines .
- Integrated Ansible Tower with Jenkins to quickly deploy critical applications, manage changes and to provide encryption needed for task files with Ansible Vault .
- Using Ansible , deployed and configured Elasticsearch, Log Stash and Kibana ( ELK ) for log analytics, full text search, application monitoring in integration with AWS Lambda & CloudWatch in AWS ECS container .
- Configured Ansible to manage AWS environments and automate the build process for core AMIs used by all application deployments ( Jfrog ) including Auto scaling , and Cloud formation scripts .
- Created scripts in Python which integrate with Amazon API in SaaS environment to control instance operations and to implement zero downtime deployment process in WebLogic using Python, Shell script .
- Improved the virtualization of the servers using the EKS for the test, prod & dev environments, and Worked in a team to run Jenkins in an EKS container in Amazon AWS cloud configuration.
- Maintained Bitbucket Repositories which includes Jenkins for Integration; enabling GIT to ignore, branching, merging, creating pull requests and to access control strategies from Bitbucket and JIRA for the collaboration.
- Created and managed S3 buckets for CloudWatch logging , Artifactory repository and to Static Webhosting . Generated SSL certificates and installed them into Tomcat servers for the secured HTTPS protocol .
- Implemented Grafana, Prometheus, Alert manger and Nagios deployments for the Kubernetes cluster which helps to actively monitor, and alerts based on the rules configured on the nodes.
- Built EAR and WAR files with custom configuration settings using Maven Tool Kit and further developed Ansible Playbooks to pull the Artifacts stored in Nexus to continuously deploy the archives on to Apache Tomcat Web Server, IIS Servers and WebSphere Application Servers .
- Worked on Amazon AWS EC2 cloud services for installing, configuring and troubleshooting on various Amazon images like Amazon Linux AMI , Red-hat 6.x,7.x, Ubuntu 14.x, 15.x .
- Designed and implemented an automated Linux (Centos, Amazon) infrastructure using AWS and move existing applications. Performed many Linux Kernel and operating system upgrades on both on-prem and cloud servers.
Confidential - Boca Raton, FL
Sr. Cloud Engineer
Responsibilities:
- Implemented and maintained dev, test, staging and production environments leveraging infrastructure as code using Azure ARM templates (Infrastructure as code, JSON / YAML config).
- Designed and Configured Azure App - Cloud Services, PaaS, Azure Data Factory, Azure Blob Storage, Web API, VM creation, ARM Templates, PowerShell scripts, IAAS, storage, network and database.
- Configured Azure Virtual Networks, subnets, DHCP address blocks, Azure network settings, DNS settings, security policies and routing . Also, deployed Azure IaaS virtual machines and Cloud services (PaaS role instances) into secure Virtual Networks and subnet.
- Performed real time data analysis using AWS Kinesis for data ingesting, and AWS Rekognition , AWS Sagemaker to analyze and process the data.
- Parallelly, Automated the infrastructure for Kafka clusters different instances as per components in cluster for creating multiple AWS EC2 instances & attaching ephemeral or EBS volumes as per instance type in different availability zones & multiple regions in AWS .
- Used security groups, network ACLs, Internet Gateways, NAT instances and Route tables to ensure and establish a secure zone for the organization in AWS public cloud.
- Configured and maintained the AWS Lambda function to trigger when there is a Jenkins build kicked off, which internally gets stored on AWS S3 bucket for everybody to access. Created Route53 to route traffic between different regions and worked with Security groups & Network ACLs .
- Used AWS Beanstalk for deploying and scaling web applications and services developed with Java, Node.js , Python and Ruby on familiar servers like Apache, Nginx, Tomcat .
- Set up Elasticache using Memcached . Configured Redis & Memcached services on Linux environment for faster session access.
- Used Python API for uploading all the agent logs into Azure blob storage . Managed internal deployments of monitoring and alarm services for the Azure Infrastructure (OMS).
- Developed microservice onboarding tools leveraging Python and Jenkins for easy creation and maintenance of build jobs, and Kubernetes to deploy services.
- Created monitors, alarms, and notifications for AWS EC2 hosts using Cloud Watch Monitored System . Managed Disk Space LVM (Logical Volume Manger) and performed system Backup and Recovery.
- Provisioned Azure data lake store and azure data lake analytics , and leverage U-SQL to write federated queries across data stored in multiple azure services.
- Configured and deployed Azure Automation Scripts for a multitude of applications utilizing the Azure stack services including Compute, Web & Mobile, Blobs, ADF, Resource Groups, Azure Data Lake, HDInsight Clusters, Azure SQL and ARM focusing on automation, created quality gates in SonarQube dashboard and enforced in the pipelines to fail the builds when conditions not met.
- Configured the Kubernetes provider with Terraform to interact with resources supported by Kubernetes to create several services such as Deployments, services, ingress rules, Config Map, secrets etc.
- Worked on setting-up continuous deployment pipelines using Jenkins across multiple Kubernetes clusters to stress the clusters with new infrastructure tools for Kubernetes in development environments using Tekton .
- Configured Jenkins on Kubernetes container environment , utilizing Kubernetes and Docker for the runtime environment for the CI/CD system to build and test and deploy.
- Implemented multiple Tekton Pipelines in Kubernetes cluster and deployed various applications using Helm charts to create a Custom Resource Definition ( CRD) application with flux tool .
- Implemented jobs to create Azur e and AWS Infrastructure from GitHub repositories containing Terraform code and created on-premises active directory authentication using automation with ansible play books.
- Written Ansible Playbooks in YAML as the Wrapper to Manage Configurations of virtual-machines and Test Playbooks on AWS instances using Python SDK, and Automated various infrastructure activities like continuous deployment, application server setup, stack monitoring using Ansible playbooks.
- Installed WebLogic/tomcat , deployed WAR, JAR, and EAR files across all the environments through Ansible playbooks. Also, configured Spark Standalone and Cassandra Multi-node Clusters using Ansible.
- Created Jenkins pipelines involving several Down/Upstream job configs based on dependencies from other apps Release methodologies. Used Version control system and project management on Git and JIRA .
- Developed Chef cookbooks for deployment automation of Docker containers for microservices as well as Test scripts using Inspect for Integration testing and compliance governance Support infrastructure as code using DevOps and Agile methodologies , through CI/CD Pipeline with Jenkins, Azure DevOps and Kubernetes .
- Used Elasticsearch (ELK stack) for centralized logging and analytics in the continuous delivery pipeline to store logs and metrics into Azure storage and S3 using storage function.
- Worked with Version Control, Build & Release Management and Deployments of the Solutions to the DEV, QA & PROD Environments leveraging Azure DevOps/VSTS principles/process (CI/CD) and toolsets of Visual Studio , AKS, EKS, Application Insights, Log Analytics .
- Worked with CentOS, Red Hat Linux , memory upgrades, and swaps area . Installed RedHat Linux using Kickstart & Sun Solaris with JumpStart . Configured DNS, DHCP, NFS in Sun Solaris 8, 9 & other Network Services.
Confidential
DevOps Engineer
Responsibilities:
- Launched EC2 Instances using AWS (Linux/ Ubuntu/RHEL) and Configured launched instances with respect to specific applications.
- Worked on AWS cloud to provision new resources, S3 Storage, AWS EC2, AWS SNS and SQS, Cloud watch services and CI/CD pipeline through Cloud Formation, Terraform and Created IAM policies for administration.
- Performed AWS cloud deployments for web applications with AWS Beanstalk and monitoring using CloudWatch to manage network configurations and SNS for notifications.
- Provided POC's to provision the AWS infrastructure using Ansible playbooks which includes checking the health status, monitoring and gathering facts about the EC2’s , ELB , auto scaling groups and other resources.
- Used Ansible for configuration management of hosted Instances within AWS Configuring and Networking of VPC. Designed AWS CloudFormation templates to create custom sized VPC, subnets, NAT to ensure successful deployment of Web applications and database templates .
- Worked on Ansible playbooks to manage Web applications, Environments and Ansible Tower to automate repetitive tasks, to deploy critical applications quickly and proactively manage the changes.
- Integrated Ansible with Jenkins to provide automation, continuous integration & Continuous Deployment through Jenkins and wrote Playbooks to automate Ansible servers using YAML scripting. Implemented Jenkins Workflow and Plugins for repeatable deployments of multi-tier applications, artifacts, and services to Docker.
- Worked on Jenkins for continuous integration and for End-to-End automation for all build and deployments, Implementing CI/CD tools Upgrade, Backup, Restore , DNS and SSL setup .
- Administered RedHat Linux 4.x/5 servers for several functions including managing Apace Tomcat Server , Mail Server , MySQL database and Firewalls in both development and production environments.
- Extensively worked on Jenkins for continuous integration and for End-to-End automation for all build and deployments. Set up Continuous Integration for major releases in Jenkins .
- Built and Installed PXE boot server, DHCP server, Kickstart to load OS on test machines in LAB environment.
- Integrated Docker container-based test infrastructure to Jenkins CI test flow and set up build environment integrating with GIT and JIRA to trigger builds using Web-Hooks and Slave Machines.
Confidential
IT Release Manager
Responsibilities:
- Created partition of disks using parted and f-disk and maintained file systems and performed RAID configuration on Unix/Linux. Troubleshooting network administration, IIS configuration, DNS setup and modifications, firewall rule sets, local and distributed director, connectivity, and supporting applications.
- Built Red Hat Satellite Server for automated installation of Red Hat Enterprise Linux boxes and creating image of Red Hat Enterprise Linux system with System Imager that automates Red Hat Enterprise Linux installs.
- Setup of full networking services and protocols on UNIX , including NIS/NFS, DNS, SSH, DHCP, NIDS, TCP/IP, ARP , applications and print servers to insure optimal networking, application, and printing functionality.
- Set up Jenkins server and built jobs to provide continuous automated builds based on polling the GIT SCM during the day and periodically scheduled the builds overnight to support development.
- Managed Nexus repository to download artifacts during builds in Jenkins and integrated Ant and GIT to deploy project related tags and Created branching & tagging strategy to maintain the source code in the GIT repository.
- Configured GIT with Jenkins and schedule jobs using POLL SCM option and integrated to automate the code checkout process. Wrote JUnit test cases for unit, integration, and functional tests, run automatically by Jenkins in the builds triggered by each push to GIT.
- Created Jenkins jobs and distributing load on Jenkins server by configuring Jenkins nodes for parallel builds. Performed automation of CI/CD pipeline through SonarQube in Jenkins pipeline for checking code quality.
- Built end to end CI/CD Pipelines in Jenkins to retrieve code, compile applications, perform tests and push build artifacts to Nexus and Orchestrate changes across servers and components and configured SonarQube for code analysis in Jenkins.
- Scheduled the Linux Cron jobs and Jenkins jobs for build automation. Developed Perl and shell scripts for automation of the build and release process to perform deployments to JBoss and Tomcat Web servers .