Senior Solutions Architect Resume
SUMMARY
- Friendly and engaging Solutions Architect and leader able to inspire team to perform their best. Detail oriented and experienced security analyst about cloud computing. A multi - tasker who excels at staff training and Implementing upgradable, scalable, Hyper-converged infrastructure and micro-services across multiple platforms (Linux, Windows, AWS, and Oracle) with a track record of inspiring great customer service and customer satisfaction. Regularly exceed and meets goals.
TECHNICAL SKILLS
Environment: /Tools/Resources: VPC, VPC Peering, IAM, EC2, S3, EBS, ELB, ECS, ELK, EKS, SNS, SQS, AMI, Lambda, Arista CVP/vEOS, Expedition, Aviatrix, Cloud Formation, Cloud Watch, Cloud Trail, NACL, Route 53, Auto Scaling Group, Slack, Elastic Beanstalk, AWS Code Deploy, AWS Code Commit, AWS Code Build, AWS Code Pipeline, Puppet, Apache Mesos, Docker, Terraform, Jenkins, Bamboo, Ansible, Kubernetes, AWS, SDK, Gradle, Git, Bitbucket, Amazon Redshift, RDS. CLI, PowerShell, Linux, Windows Shell, Jira, Amazon Guard Duty, AWS Firewall, AWS X-Ray, Cloud Passage, Cortex, Palo Alto BPA, Pal Alto Prisma, Palo Alto Panorama, Nagios, Barracuda Guardian, F5, Rapid7, WAFs, Control Tower, Security Hub, Guardrails Configuration, IAM, Security Groups, DevSecOps
Programming Language: Python, BOTO 3, Json, Yaml
Database Query Language: ElasticSearch, MySQL, NoSQL/DynamoDB, PostgresDB, PostgesSQL, OracleDB
PROFESSIONAL EXPERIENCE
Confidential
Senior Solutions Architect
Responsibilities:
- Built VPCs from scratch, creating private and public sub-nets, creating security groups and network access lists, configuring internet gateways. Open VPN, creating AMI, understanding of user access management/role-based access/multi factor authentication and API access, configuration of auto scaling and elastic load balancer for auto-scaling services if a configured threshold has been exceeded. Configuration of SNS to send notifications and Cloud Watch to collect logs and metrics, spinning both Windows and Linux EC2 instances
- Participated in deep architectural discussions to build confidence and ensure customer success when building new or migrating existing applications, software, or resources on the AWS platform. Thorough- put completion in the execution of the SLA and SOW
- Tasked with build activities using Maven and Jenkins tool and Deployment of files in Tomcat application servers Using Jenkins jobs. Created new jobs in Jenkins and managing the build related issues. Configured software's to Linux machines. Automated build process for creating JAR/WAR artifacts using Maven
- Coordinated with the Development team to fix the Build related issues as well as configured continuous integration pipeline using DevOps strategies and DevOps tools.
- Exposed to all aspects of Software Development Life Cycle (SDLC) such as Analysis, Planning, Developing, Testing and Implementing and Post-production analysis of the projects and methodologies such as Agile, SCRUM
- Developed network/application monitoring tools (ELK Stack, etc.). Hosting serverless websites in Amazon Web Services within EC2 instances deploying them to different regions globally using Polly service
- Tasked with mission critical applications in CI/CD pipeline and infrastructure in an operational context, while the management of IAM Users and Roles in AWS were granted least privileges across globally. Monitored the AWS environment with CloudWatch and CloudTrail. Set alarms and SNS events to ensure the health checks are performed in timely manner
- Implemented architectural standards that enable DevOps practices such as infrastructure as code, and automated continuous integration/continuous deployment (CI/CD)
- Attach a resource policy to the CodeCommit repository that denies members of the IAM developer group the actions of pushing commits, merging pull requests, and adding files to the master branch
- Integrated services like Bitbucket, AWS CodePipeline, Bamboo and AWS Elastic Beanstalk to create a deployment pipeline.
- Assisted users in creating an optimized data storage using EFS and EBS storage with different storage classes
Confidential
AWS Cloud Engineer
Responsibilities:
- Daily use of monitoring tools such as Cloud Watch and essentials for Windows Administrators on AWS.
- Archived all customers compliance documents using AWS S3 buckets to Auto archive it to AWS Glacier
- Created Lambda Functions using Python/NodeJS and upload it to EC2 Instances. Wrote AWS Lambda functions in python for AWS's Lambda which invokes python scripts to perform various transformations and analytics on large data sets in EMR clusters
- Assisted DevOps & Cloud teams in supporting both customer-facing and internal systems
- Managed internal and external DNS using Route53, and other network infrastructure. Created and Managed the S3 Buckets to storage the Users data and secure them successfully evaluated and establish proof of concepts for migrating various databases to Amazon Cloud
- Designed architecture, deployments, migration of on-premise Oracle databases to Amazon Cloud (EC2 and RDS) focusing on high-availability, fault tolerance, and auto-scaling. Performed Oracle to RDS PostgreSQL migration. C Migrated and implemented multiple applications from on-premise to cloud using AWS services like SMS, DBMS, CloudFormation, S3, Route53, AWS Glacier, EC2, RDS, SQS, SNS, Lambda and AWS VPC
- Increased EBS backed volume storage capacity when the root volume is full using AWS EBS Volume feature. Utilized AWS data backup (EBS, RDS Snapshot) techniques, along with data-at-rest security within AWS
- Designed and implemented system security and data assurance while managing and supporting AWS security related issues, such as IAM and S3 policies for user access as per business needs (ELB, SNS, EC2, Route53, S3, RDS, cloud watch, IAM and VPC)
- Built servers in cloud based and physical infrastructure and setup/managing Linux servers on Amazon (EC2, EBS, ELB, Security Groups, RDS and IAM)
- Created step functions to handle nested or parallel executions of multiple AWS Lambda functions.
- Container management using Docker by writing Docker files and set up the automated build on Docker HUB and installed and configured Kubernetes
- Understanding of shell scripts (Bash), Perl, Python and PowerShell for automating tasks.
- Setup NAT gateway as a route out to the internet for instances in private subnet, internet gateway as a route out to the internet for instances in public subnet.
- Responsible for creating VPCs for Dev/test team, thereby simulating a production environment for web/application servers and database traditional servers in public and private subnets respectively
Confidential
IT SECURITY ANALYST
Responsibilities:
- Utilized tools to monitor network security and to detect and respond to IT security incidents. Performed vulnerability and risk assessments and supported information security assessment and authorization process and documentation
- Supported network security architecture development. Assessed system architecture and design for security compliance
- Defined standards and processes for continuous security monitoring activities. Developed system security plans for Information systems to include documenting description of information systems, environment and boundaries, and security control implementation
- Executed the system security plan (SSP) and validate assigned security controls. Assisted in formulating security architectural design, functional specifications, interfaces and documentation of hardware or software systems
- Reported system security incidents, vulnerabilities, and virus attacks. Developed security requirements for hardware, software, and service acquisitions
- Performed security vulnerability patch management. Identified, assessed, and presented options for meeting the functional and technical requirements including hardware and software updates or upgrades
- Built Incident response processes, procedures and maintained security documentation
- Established and maintained DR procedures for current and new technologies
- Produced metrics and reports on the state of system security, threat, vulnerability, and patch management
- Built effective relationships with key stakeholders who own and support IT infrastructure, applications, processes, and operations. Brief technical risks and issues to executives and business leaders
- Demonstrated experience working with senior management on highly sensitive projects that require the utmost discretion and maintaining strict confidentiality on all data, records, and tasks as required
