Aws Solutions Architect/devops Architect Resume
SUMMARY
- Software Engineer with expertise in cloud native engineering, container orchestration, serverless development, microservices, devops, cicd, automation, process improvement and technical team leadership
- AWS Certified Solutions Architect - Professional
- AWS Serverless Event Driven application development
- AWS Automation with Terraform, Cloud Formation and Python
- Highly effective working Remotely
- Expertise in C#, Node.js, React and Python development
- Expert in automation to include IAC and CICD
- Extensive expertise in implementing best practice agile development methodologies
- Successful in implementing greenfield K8s container orchestration, microservices, cloud native solutions
- Successful in implementing repeatable, cost effective solutions that immediately increase the efficiency of the project team and help to ensure the release of high-quality software
TECHNICAL SKILLS
Programming Languages/Frameworks: C#, .Net Core, SQL, C++, Java, Shell, Python, Node.js, React
Cloud Technologies: AWS, Python Boto2-3, Terraform, Cloud Formation, Serverless Framework
Containerization: Docker, Kubernetes (K8s)
Operating Systems: Linux (Ubuntu, RedHat, Debian, Amazon) Windows (up to Windows 10) Mac
CICD Tools: Jenkins, Team City, GitHub, BitBucket, Git, GitLab/GitLab CI, AWS Code Build/Code Pipeline
Configuration Management: Ansible, Packer, Fabric
Database Platforms: Oracle 8i-11g, MS SQL Server, MySQL, PostgreSQL, Cassandra, DynamoDB, AWS RDS (Aurora Postgres/MySQL)
PROFESSIONAL EXPERIENCE
AWS Solutions Architect/DevOps Architect
Confidential
Responsibilities:
- Designed and implemented Confidential Serverless Backend leveraging AWS Amplify REST APIs, GraphQL APIs (DynamoDB) and S3 Storage to streamline development and reduce time to market
- Developed an AWS Rekognition Content Moderation API integrated with AWS Amplify and Cognito allowing for Image Verification prior to upload.
- Designed and implemented DynamoDB GraphQL Schemas
- Developed and implemented Confidential Node.js AWS SDK Cognito Authorization Lambda API
- Managed Serverless functions with the Serverless Framework allowing for cloud provider flexibility
- Automated developer onboarding to include developer database creation and user creation
- Developed Angular Typescript classes that implemented GraphQL mutations, queries, and subscriptions
- Developed Confidential MySQL utility class for use in automation
- Implemented various AWS SDK Boto3 utilities to include Secrets Manager, Systems Manager and Cognito
- Developed Serverless Framework AWS Lambda functions
- Developed AWS Cognito utilities (node.js) for use in automation
- Developed Confidential robust AWS to MS Teams event driven Chat Bot integrating AWS CodeStar Events (CodeCommit, CodePipeline) with MS Teams channels
- Developed Confidential road map for CICD Pipeline (AWS CodePipeline) refactoring and streamlining
- Optimized Docker containers through multi-stage builds and secure baseline images
- In support of an existing consulting team roll-off, documented and provided guidance on the existing AWS Infrastructure allowing for Confidential seamless transition
- Implemented Postman/Newman test via CodeBuild/Code Pipeline for GraphQL APIs
- Managed an AWS environment over 3 accounts supporting an S3 hosted, Cloud Front Typescript app backed by ECS/API Gateway microservices and an Aurora MySQL database.
- Developed Docker containers to allow for the building and packing of an Android APK from Ionic
- Developed and managed AWS Infrastructure as Code leveraging Terraform, AWS CDK (Typescript) and Serverless Framework
- Implemented MFA across all AWS and Rackspace accounts
- Implemented TLS in an OpenVPN Access Server leveraging LetsEncrypt Certbot
- Secured AWS CloudFront environments by restricting access to VPN only via AWS WAFV2
- Reviewed existing AWS environments, identified, and removed unused and unneeded services
- Implemented least privilege access for existing users and services
- Defined and managed IAM Roles, Groups and Users
- Provided guidance on least privilege best practice for user/role/group management
AWS Solutions Architect/DevOps Architect
Confidential
Responsibilities:
- Analyzed security requirements and recommended technical solutions meeting each requirement
- Provided Cost Estimates for AWS Services based on security and budget requirements
- Designed AWS Infrastructure meeting client and recommend AWS Workspace security requirements
- Designed and implemented Confidential secure DaaS solution leveraging AWS Workspaces
- Provided training and guidance to client Development and Support staff.
- Developed Cloud Formation templates implementing Confidential secure AWS Infrastructure to include VPC, Subnets, Routing Tables, NACLs, Security Groups, Nat Gateway, required EC2 Instances, S3 Buckets, IAM Roles and Active Directory.
- Developed Ansible playbooks to manage Amazon Linux Workspace Images
- Leveraging Ansible, implemented OSSEC/Wazuh Host Based Intrusion Detection Server and Agents for monitoring Amazon Workspaces and integrating with an ELK stack.
- Developed Event Driven Lambda functions, to configure Security Groups to meet security standards
- Developed Lambda functions automate Amazon Workspace environment configuration
- Architected and developed Confidential Serverless daily health check AWS Amplify React Application
- Developed an Event Driven Python AWS Lambda function for daily email reminders and summary reports
- Implemented the application as an S3 static hosted site, hosted on Route53 behind Confidential Cloud Front distribution. This approach simplified hosting and reduced costs while allowing for TLS
- Leveraged AWS Cognito, Cloud Front, S3, SNS, SES, Cloud Watch, Lambda and Route53
DevOps Architect Consultant/AWS Solutions Architect
Confidential
Responsibilities:
- Developed Terraform modules for several AWS assets to include EKS, ElastiCache, Redis, Aurora, DynamoDB, S3, Route 53, Subnets, ALB, Security Groups, Route Tables, VPC Endpoints, Internet Gateway, and Nat Gateway
- Implemented environments via Terraform leveraging developed modules and S3 remote state
- Implemented and Managed EKS Nodes via Cloud Formation
- Developed and implemented secure AWS Lambda serverless functions in Python and Node.js
- Leveraging AWS APIs, IAM and Node.js, developed an event driven Lambda function triggered on put object to S3 that converted Confidential html file to Confidential PDF file for customer delivery
- Leveraging Python and boto3, developed Confidential secure VPC enabled Lambda function allowing for KMS decryption of Vault unseal tokens and unsealing of Confidential target Vault implementation
- Developed and implemented Confidential Python boto3/AWS Cognito Lambda function Login service
- Managed Serverless functions with the Serverless Framework allowing for cloud provider flexibility
- Provided training and guidance on effective Serverless implementation
- Implemented Cloud Watch events to keep Lambda functions warm ensuring quick response time
- Configured Nginx servers with 301 http to https redirects
- Configuration management with Ansible, Terraform, Python and Cloud Formation
- Leveraging Cloud Watch Agent, implemented memory based Autoscaling on EKS Node resources via Cloud Formation
- Implemented resource tagging strategy to manage resources via tag-based AWS Resource Groups
- Implemented AWS Config for continuous monitoring of resources (SNS Subscription based)
- Leveraging AWS Trusted Advisor, monitored resource security to ensure security compliance
- Recommended secrets mgmt via AWS Secrets Manager, KMS and Systems Manager Parameters
- Recommended extending spring cloud config manager to include AWS Secrets Manager
- Recommended TLS microservice communication be enforced via Itsio
- Designed and implemented serverless approach for customer specific html to pdf conversion
- Implemented IAM Role/Group security for AWS assets and K8s
- Developed and implemented Confidential K8s Namespace approach allowing for isolated development
- Implemented and Managed K8s via EKS
- Implemented and managed EKS Nodes via Cloud Formation
- Implemented role-based security for AWS and K8s
- Developed utilities for managing deployments, services, pods and other assets
- Managed multiple microservices environments and namespaces across multiple EKS clusters.
- Provided guidance to dev, test and devops teams on effective K8s management
- Developed AWS Automation libraries leveraging boto2-3
- Developed AWS asset automation scripts for various AWS assets
- Developed automation to generate Terraform based only on AWS resource tags
- Developed database management scripts for environment automation
AWS Solutions Architect/DevOps Architect
Confidential
Responsibilities:
- Configured and migrated GitLabs repositories and docker registries
- Configured GitLab Runner with docker executor and custom build container within AWS
- Developed CloudFormation templates for AWS environment management
- Developed Ansible playbooks to manage GitLab GitRunner and additional infrastructure
- Provided AWS services cost estimates for Confidential Rancher/K8s GitLab environment
- Leveraging AWS CloudFormation and Ansible delivered Confidential Rancher solution within AWS
- Provided architectural recommendations for migration of existing infrastructure to AWS
- Provided infrastructure architecture, build flow and development documentation and guidance to management and development teams on Confidential complex system inherited from Confidential previous vendor
AWS Solutions Architect/DevOps Architect Consultant
Confidential
Responsibilities:
- Facilitated tool and infrastructure selection resulting in the selection of K8s, AWS and GitLabs
- Provided training and guidance on K8s, AWS, Jenkins, GitLabs, Docker and .Net Core 2.0
- Implemented Confidential Microservices CICD solution in AWS using Jenkins, GitLabs, Docker, Ansible and K8s
- Implemented Confidential load balanced, highly available, fault tolerant, auto scaling K8s solution in AWS
- Implemented CICD allowing for continuous deploy to multiple client K8s/AWS environments
- Leveraging Ansible and Packer implemented automated environment spin up and or recovery in minutes
- Managed AWS assets to include VPC, Subnets, Route Tables, Security Groups, EC2 and Route 53
- Developed and maintained Dockerfiles for Debian .Net Core microservices
- Developed microservice onboarding tools leveraging Python and Jenkins
- Performed administration on AWS Assets, Jenkins, GitLabs and K8s
- Provided guidance on effective microservice architectures
- Provided continuous support for system upgrades and team training
DevOps Consultant
Confidential
Responsibilities:
- Implemented Confidential Docker delivery pipeline allowing for CICD of java/tomcat web service containers
- Managed Jira Agile Scrum/Kanban boards and developed queries for project management teams
- Implemented AWS asset management to control AWS costs
- Managed Confidential PAAS system leveraging Jenkins, Nexus, Ansible, Packer and AWS
- Implemented Netflix OSS components Zuul and Ribbon client in support of Confidential CI environment
- Developed Python class libraries for AWS Automation leveraging Python boto2
- Managed Jenkins in Confidential multiple VPC AWS environment
- Automated the configuration of AWS assets such as ASGs, ELBs, AMI's, and EC2 Instances
- Performed administration on AWS Assets, Jenkins, Stash, Nexus (CICD Environment)