Technical Architect Resume
SUMMARY:
- Proficient in Data Structures & Algorithms, Web Development, CMS, Distributed Computing, SOA, Java EE, Design Patterns and Database modeling, development and management. Seasoned hands - on AWS Cloud development/deployment/DevOps Engineer.
- Core C/C++/Java/PHP/Python developer, excellent analytical and debugging skills with attention to detail in making sound design decisions. Hands on experience with security protocols/products/deployments (TLS, SAML, OAUTH, WS-*, CA, Secure coding using Fortify/Find-bugs/OWSAP) and Identity and access management (Ping Identity).
- Practical experience of networking protocols and the architecture of highly scaled systems, including performance tuning of Unix-based operating systems and popular web & application servers kernels and web programming languages.
- Practitioner of TDD and CI/CD, Web 2.0 architecture, patterns & templates, Agile/Scrum discipline methodologies. Secure Server-Side, Cloud-based (AWS) and Web Technologies using (C, C++, Java, PHP, Smalltalk, JEE, REST API, Web Services, PERL, Unix, Web & Application Servers - Apache, Tomcat, and JBOSS, LAMP-Stack, Methodologies - Agile Scrum).
- Strong ability to translate business needs to sound technology solutions; Design and development of multi tier enterprise applications employing the contemporary advancements in the technology. Effective working remote/alone and as a cooperative team member.
- Firsthand experience in triage management of incidents, production systems problems with RCA procedures & mitigation solution.
TECHNICAL SKILLS:
Platform: Linux (RH, CentOS) / Solaris (SUNCluster, Hypervisor, VMWare) & AWS Cloud Platform: EC2, VPC, IAM, S3, Route-53, SQS, DynamoDB ElastiCache, SNS, CloudFormation, CloudWatch, Aurora, RDS.
Programming: Java (J2SE & J2E), PHP5.4, C, C++ with STL, Smalltalk, Python.
Technologies: JBOSS/JETTY/Tomcat/TomEE+/WebSphere, Apache, REST, SpringBoot, Cxf/Camel, LAMP, JPA / JTA / JMS / JNI, AOP, SOA, AMQP/IBM-MQ, Hadoop, Hive.
Databases: Cassandra/Oracle/Postgres/MySQL/Mango,OCI/JDBC/ODBC/JDBI,Hibernate.
Protocols: TCP/IP, DNS, SSL/TLS, OAuth2.0, SAML, PKI, DRM, XACML, OWASP .
Other Tools: UML, XRI, XML, Perl, Xerces, GNU tools, Mercurial, GIT, JIRA, Ant, Maven, Gradle, Ruby. Ansible, Graphite, CI with CloudBees, Jenkins, Splunk.
Web framework: WordPress, Zend, CodeIgniter & Laravel; HTML,CSS,JavaScript,Ajax,JQuery,JSON
Statistical: Matlab, SAS, R, Python.
Interested in: Erlang, Clojure, .NET/C#, Ruby & Rails, Drupal, Joomla.
PROFESSIONAL EXPERIENCE:
Technical Architect
Confidential
Responsibilities:
- Leading a services oriented architecture team for cloud powered Omni-channel returns management system.
- SOA integration with several services (order, payment, treasury, kiosk) using a RESTful micro-service architecture.
- Using Confidential private open-stack cloud infrastructure to develop, deploy the web application with CICD enabled approach.
- Technologies used: JAX-RS, TomEE+, Websphere, Cxf/Camel, SpringBoot, Cassandra, Couchbase, Drools 5.6 Rules Engine, IBM-MQ, and TLS. Involved in ‘Strati’ framework development for cloud-configuration, metrics, transaction marking, messaging, service-registry, policy-service, JMS-service, data-sharding/fork-lift and IAM security platform services.
- UX Design for customer facing kiosk device implemented using Apache android Cordova and sumo notification framework.
Systems Architect
Confidential
Responsibilities:
- Lead a micro-services migration effort of converting a monolithic OSGI container based mid-tier backend system.
- Polyglot persistence using Cassandra for time-series data of energy controllers; and PostgreSql for Energy Management data.
- Enabling a backend service of RESTful endpoints for Mobile APIs using Spring Boot framework.
Senior Lead Engineer
Confidential
Responsibilities:
- Lead cloud migration effort of entire system including Oracle & MySQL DB:
- Evaluated EC2 v/s RDS Oracle DB feasibility, built HA multi-AZ EC2 Oracle DB with active Data-Guard replication.
- Implemented a multi-AZ, auto-scaled, multi-domain EC2 web application (collocated apache & java ReST service) behind an ELB routed by Route-53 DNS, uses Fast-Application-Failover for high resilience to database communication.
- Managed inception to implementation of LAMP stack based “Security Host” cluster of backend and front end for UV.
- Worked on ‘portal front end’ for retailers to coordinate SSO using 3-legged authorization via Reverse-SAML.
- Integrated Oauth-for-SAML exchange service for a major retailer as an alternative to mTLS.
- Lead a performance & scalability team to achieve a 4000+ TPS target for ultraviolet system:
- Evaluating the system deployment infrastructure for efficiency and optimal structure. Optimizing the Linux Hypervisor hosted backend systems to load-balance and resource utilization.
- Benchmarking layer 2 system layout for resource & capacity threshold; solve bottlenecks of each stack.
- Resolved contention between app-backend, Oracle RAC & network bandwidth using USE model.
- Redesigning an efficient and secure deployment infrastructure to reach 4000 TPS. Recommending a revamp of data-model and app-backend to leverage Oracle RAC strengths to scale system to excess TPS.
- Working on micro-services feature for on-demand capacity & scaling needs using AWS cloud infrastructure. Currently rolling out both transaction reporting and stream licensing micro-services on cloud using AWS EC2, Dynamo-DB, Postgres/MySQL & SQS services with auto-scaling and cloud-formation deployment capabilities.
- Rolled out a massively efficient E-Tag (conditional REST requests) infrastructure to alleviate transaction traffic performance. The effort yielded 40% efficiency in REST services culminating 64% of conditional requests. Direct cost savings of 300K per year due to replacing the third party (terra-cotta distributed) cache service is the net result attributed to the current E-Tag service.
- Worked on an Oracle RAC Shard solution to further improve significant backend performance.
- Caching Layer based on Http/1.1 protocol & aware of security constraints and necessary to support the massive transaction bound REST services. A remote region specific apache proxy cache using distributed Mango DB.
- Lead effort to scale the system to active/active clustering mode to double the throughput capacity. Developed active-active (HA) deployment architecture and backward compatible disaster strategies.
- Arbitration, development and delivery of software architecture that is based on REST, ORM using spring application framework. URL based mutual TLS protection and SAML for data exchange. Involved in implementing security services of the UVVU system - including OAuth 2.0, SAML, SSO, Identity Federation & Secure Token Services (STS), SSL, PKI, and DRM;
- Implemented Ultraviolet IDP using SAML, mutual TLS, and XML signatures.
- SAML Metadata management and Multi factor authentication schemes
- STS exchange to enable the issuance and dissemination of credentials within different trust domains
- Supported Several DRM integration including OMA and Play Ready.
- During the span of the system evolution from inception to current data, have been responsible for evaluating and choosing right technologies and frameworks, tech refreshes as the new technologies emerge - JBoss to Jetty, Java6 to Java8, Frameworks like Spring/Hibernate/CXF upgrades, monolithic to polyglot persistence based AWS cloud micro services, in-house data center to cloud based infrastructure, traditional delivery pipeline to more Agile and DevOps based Continuous delivery pipeline.
Senior Software Engineer
Confidential
Responsibilities:
- Involved in architecture, design and development of Mobile Barcode Registry project from scratch as part of the enterprise registry service solutions. Lead engineer to the implementation of the barcodes registry product based on ‘Open XRI’ standard.
- Enhanced and maintained an Extensible Provision (RFC 5730) Protocol server that communicates with customers (registrars/i-brokers) to perform protocol translations with downstream provisioning cluster server.
- Managed and maintained DNS registry for several domains. Lead an internal 'command & control' management system development to centralize monitoring and managing multi TLD registry systems. Software tools include: apache HTTPD, tomcat, and Oracle, Berkeley DB, MQ, PHP, C, C++ and Ant, Maven, Java.
Senior Systems Engineer
Confidential
Responsibilities:
- Design & Developer of DSI cluster system using Solaris cluster. The DSI framework resembles micro-kernel SOA at the core with data-driven components. The application framework of DSI itself is highly configurable for any customer use-case to cater for any business rules independent of any domain. The transaction-processing framework is highly modularized and very much component based architecture that embodies variety of patterns to make it highly agile in application usage.
- Design & Developer of Web based distributed device management system on Solaris. Confidential is used to authorize, configure and control the whole DSI System from a single GUI frame; same Confidential is also used to monitor the DSI application for fault and progress. I was instrumental in integrating DSI, DotHill Raid services, DSI Transporter and general framework of Confidential as components EMS. Confidential general framework integrates the enterprise level device management services; conceives the ideas of Service Engines supported by the external services of devices like DSI, GSX, PSX etc., and uses the HTTP/SOAP Binding Components to integrate them.
- Confidential is hosted on JBOSS web server and uses WS-BEPL (WSDL) Service Engine to communicate with remote services.
- Confidential provides critical visibility into the network with sophisticated tools for traffic reporting, alarm management, real-time event management and more. Its powerful traffic management module observes network traffic levels to avoid uncontrolled congestion situations. Network Health reports allow operators to quickly analyze network behavior, perform trend analysis and react to potential/existing problems in proactive and efficient manner.
- Confidential also provides troubleshooting and capacity planning with a greater level of granularity for traffic management, configuration, and user privileges.
- CORBA, RMI/JNI, Confidential, Sun-Custer and proprietary massaging interconnects used: DSI application needs to interact with third-party systems - transparent middle tier interface supported by CORBA for platform/language independence is used to collaborate these third-party systems.
- Confidential and proprietary messaging models were used to collaborate the internal services of DSI cluster.
Senior Designer
Confidential
Responsibilities:
- HA with Active components to leverage the maximum utilization of available resource usage while rendering the fault tolerant feature to the overall system.
- Integrating 3 different systems Confidential ’s - Master Scribe Service Order, Daleen’s - BillPlex plus and CrossKey’s auditing, using DataStream Manager, CORBA- IONA’s Orbix and Actional COM/DCOM bridge.
- DB Connector, Correlation Connector, and ASN.1 Connector: each of these components capable of transforming data from a known format to other formats supported by DataStream Manager. Involved in component life cycle from inception to integration.
- Embedded AMA System application for Unisphere’s SMX-2100 switch -to facilitate Bellcore AMA standard billing records.