We provide IT Staff Augmentation Services!

Aws Solutions Architect/devops Architect Resume

2.00/5 (Submit Your Rating)

SUMMARY

  • Software Engineer with expertise in cloud native engineering, container orchestration, serverless development, microservices, devops, cicd, automation, process improvement and technical team leadership
  • AWS Certified Solutions Architect - Professional
  • AWS Serverless Event Driven application development
  • AWS Automation with Terraform, Cloud Formation and Python
  • Highly effective working Remotely
  • Expertise in C#, Node.js, React and Python development
  • Expert in automation to include IAC and CICD
  • Extensive expertise in implementing best practice agile development methodologies
  • Successful in implementing greenfield K8s container orchestration, microservices, cloud native solutions
  • Successful in implementing repeatable, cost effective solutions that immediately increase the efficiency of the project team and help to ensure the release of high-quality software

TECHNICAL SKILLS

Programming Languages/Frameworks: C#, .Net Core, SQL, C++, Java, Shell, Python, Node.js, React

Cloud Technologies: AWS, Python Boto2-3, Terraform, Cloud Formation, Serverless Framework

Containerization: Docker, Kubernetes (K8s)

Operating Systems: Linux (Ubuntu, RedHat, Debian, Amazon) Windows (up to Windows 10) Mac

CICD Tools: Jenkins, Team City, GitHub, BitBucket, Git, GitLab/GitLab CI, AWS Code Build/Code Pipeline

Configuration Management: Ansible, Packer, Fabric

Database Platforms: Oracle 8i-11g, MS SQL Server, MySQL, PostgreSQL, Cassandra, DynamoDB, AWS RDS (Aurora Postgres/MySQL)

PROFESSIONAL EXPERIENCE

AWS Solutions Architect/DevOps Architect

Confidential

Responsibilities:

  • Designed and implemented Confidential Serverless Backend leveraging AWS Amplify REST APIs, GraphQL APIs (DynamoDB) and S3 Storage to streamline development and reduce time to market
  • Developed an AWS Rekognition Content Moderation API integrated with AWS Amplify and Cognito allowing for Image Verification prior to upload.
  • Designed and implemented DynamoDB GraphQL Schemas
  • Developed and implemented Confidential Node.js AWS SDK Cognito Authorization Lambda API
  • Managed Serverless functions with the Serverless Framework allowing for cloud provider flexibility
  • Automated developer onboarding to include developer database creation and user creation
  • Developed Angular Typescript classes that implemented GraphQL mutations, queries, and subscriptions
  • Developed Confidential MySQL utility class for use in automation
  • Implemented various AWS SDK Boto3 utilities to include Secrets Manager, Systems Manager and Cognito
  • Developed Serverless Framework AWS Lambda functions
  • Developed AWS Cognito utilities (node.js) for use in automation
  • Developed Confidential robust AWS to MS Teams event driven Chat Bot integrating AWS CodeStar Events (CodeCommit, CodePipeline) with MS Teams channels
  • Developed Confidential road map for CICD Pipeline (AWS CodePipeline) refactoring and streamlining
  • Optimized Docker containers through multi-stage builds and secure baseline images
  • In support of an existing consulting team roll-off, documented and provided guidance on the existing AWS Infrastructure allowing for Confidential seamless transition
  • Implemented Postman/Newman test via CodeBuild/Code Pipeline for GraphQL APIs
  • Managed an AWS environment over 3 accounts supporting an S3 hosted, Cloud Front Typescript app backed by ECS/API Gateway microservices and an Aurora MySQL database.
  • Developed Docker containers to allow for the building and packing of an Android APK from Ionic
  • Developed and managed AWS Infrastructure as Code leveraging Terraform, AWS CDK (Typescript) and Serverless Framework
  • Implemented MFA across all AWS and Rackspace accounts
  • Implemented TLS in an OpenVPN Access Server leveraging LetsEncrypt Certbot
  • Secured AWS CloudFront environments by restricting access to VPN only via AWS WAFV2
  • Reviewed existing AWS environments, identified, and removed unused and unneeded services
  • Implemented least privilege access for existing users and services
  • Defined and managed IAM Roles, Groups and Users
  • Provided guidance on least privilege best practice for user/role/group management

AWS Solutions Architect/DevOps Architect

Confidential

Responsibilities:

  • Analyzed security requirements and recommended technical solutions meeting each requirement
  • Provided Cost Estimates for AWS Services based on security and budget requirements
  • Designed AWS Infrastructure meeting client and recommend AWS Workspace security requirements
  • Designed and implemented Confidential secure DaaS solution leveraging AWS Workspaces
  • Provided training and guidance to client Development and Support staff.
  • Developed Cloud Formation templates implementing Confidential secure AWS Infrastructure to include VPC, Subnets, Routing Tables, NACLs, Security Groups, Nat Gateway, required EC2 Instances, S3 Buckets, IAM Roles and Active Directory.
  • Developed Ansible playbooks to manage Amazon Linux Workspace Images
  • Leveraging Ansible, implemented OSSEC/Wazuh Host Based Intrusion Detection Server and Agents for monitoring Amazon Workspaces and integrating with an ELK stack.
  • Developed Event Driven Lambda functions, to configure Security Groups to meet security standards
  • Developed Lambda functions automate Amazon Workspace environment configuration
  • Architected and developed Confidential Serverless daily health check AWS Amplify React Application
  • Developed an Event Driven Python AWS Lambda function for daily email reminders and summary reports
  • Implemented the application as an S3 static hosted site, hosted on Route53 behind Confidential Cloud Front distribution. This approach simplified hosting and reduced costs while allowing for TLS
  • Leveraged AWS Cognito, Cloud Front, S3, SNS, SES, Cloud Watch, Lambda and Route53

DevOps Architect Consultant/AWS Solutions Architect

Confidential

Responsibilities:

  • Developed Terraform modules for several AWS assets to include EKS, ElastiCache, Redis, Aurora, DynamoDB, S3, Route 53, Subnets, ALB, Security Groups, Route Tables, VPC Endpoints, Internet Gateway, and Nat Gateway
  • Implemented environments via Terraform leveraging developed modules and S3 remote state
  • Implemented and Managed EKS Nodes via Cloud Formation
  • Developed and implemented secure AWS Lambda serverless functions in Python and Node.js
  • Leveraging AWS APIs, IAM and Node.js, developed an event driven Lambda function triggered on put object to S3 that converted Confidential html file to Confidential PDF file for customer delivery
  • Leveraging Python and boto3, developed Confidential secure VPC enabled Lambda function allowing for KMS decryption of Vault unseal tokens and unsealing of Confidential target Vault implementation
  • Developed and implemented Confidential Python boto3/AWS Cognito Lambda function Login service
  • Managed Serverless functions with the Serverless Framework allowing for cloud provider flexibility
  • Provided training and guidance on effective Serverless implementation
  • Implemented Cloud Watch events to keep Lambda functions warm ensuring quick response time
  • Configured Nginx servers with 301 http to https redirects
  • Configuration management with Ansible, Terraform, Python and Cloud Formation
  • Leveraging Cloud Watch Agent, implemented memory based Autoscaling on EKS Node resources via Cloud Formation
  • Implemented resource tagging strategy to manage resources via tag-based AWS Resource Groups
  • Implemented AWS Config for continuous monitoring of resources (SNS Subscription based)
  • Leveraging AWS Trusted Advisor, monitored resource security to ensure security compliance
  • Recommended secrets mgmt via AWS Secrets Manager, KMS and Systems Manager Parameters
  • Recommended extending spring cloud config manager to include AWS Secrets Manager
  • Recommended TLS microservice communication be enforced via Itsio
  • Designed and implemented serverless approach for customer specific html to pdf conversion
  • Implemented IAM Role/Group security for AWS assets and K8s
  • Developed and implemented Confidential K8s Namespace approach allowing for isolated development
  • Implemented and Managed K8s via EKS
  • Implemented and managed EKS Nodes via Cloud Formation
  • Implemented role-based security for AWS and K8s
  • Developed utilities for managing deployments, services, pods and other assets
  • Managed multiple microservices environments and namespaces across multiple EKS clusters.
  • Provided guidance to dev, test and devops teams on effective K8s management
  • Developed AWS Automation libraries leveraging boto2-3
  • Developed AWS asset automation scripts for various AWS assets
  • Developed automation to generate Terraform based only on AWS resource tags
  • Developed database management scripts for environment automation

AWS Solutions Architect/DevOps Architect

Confidential

Responsibilities:

  • Configured and migrated GitLabs repositories and docker registries
  • Configured GitLab Runner with docker executor and custom build container within AWS
  • Developed CloudFormation templates for AWS environment management
  • Developed Ansible playbooks to manage GitLab GitRunner and additional infrastructure
  • Provided AWS services cost estimates for Confidential Rancher/K8s GitLab environment
  • Leveraging AWS CloudFormation and Ansible delivered Confidential Rancher solution within AWS
  • Provided architectural recommendations for migration of existing infrastructure to AWS
  • Provided infrastructure architecture, build flow and development documentation and guidance to management and development teams on Confidential complex system inherited from Confidential previous vendor

AWS Solutions Architect/DevOps Architect Consultant

Confidential

Responsibilities:

  • Facilitated tool and infrastructure selection resulting in the selection of K8s, AWS and GitLabs
  • Provided training and guidance on K8s, AWS, Jenkins, GitLabs, Docker and .Net Core 2.0
  • Implemented Confidential Microservices CICD solution in AWS using Jenkins, GitLabs, Docker, Ansible and K8s
  • Implemented Confidential load balanced, highly available, fault tolerant, auto scaling K8s solution in AWS
  • Implemented CICD allowing for continuous deploy to multiple client K8s/AWS environments
  • Leveraging Ansible and Packer implemented automated environment spin up and or recovery in minutes
  • Managed AWS assets to include VPC, Subnets, Route Tables, Security Groups, EC2 and Route 53
  • Developed and maintained Dockerfiles for Debian .Net Core microservices
  • Developed microservice onboarding tools leveraging Python and Jenkins
  • Performed administration on AWS Assets, Jenkins, GitLabs and K8s
  • Provided guidance on effective microservice architectures
  • Provided continuous support for system upgrades and team training

DevOps Consultant

Confidential

Responsibilities:

  • Implemented Confidential Docker delivery pipeline allowing for CICD of java/tomcat web service containers
  • Managed Jira Agile Scrum/Kanban boards and developed queries for project management teams
  • Implemented AWS asset management to control AWS costs
  • Managed Confidential PAAS system leveraging Jenkins, Nexus, Ansible, Packer and AWS
  • Implemented Netflix OSS components Zuul and Ribbon client in support of Confidential CI environment
  • Developed Python class libraries for AWS Automation leveraging Python boto2
  • Managed Jenkins in Confidential multiple VPC AWS environment
  • Automated the configuration of AWS assets such as ASGs, ELBs, AMI's, and EC2 Instances
  • Performed administration on AWS Assets, Jenkins, Stash, Nexus (CICD Environment)

We'd love your feedback!