We provide IT Staff Augmentation Services!

Devops Engineer Resume

Kansas, CitY

TECHNICAL SKILLS:

  • Java / J2EE, Spring
  • Core Java, Basics of JSP and Servlets, and PL/SQL
  • MySQL, Oracle 10g, Oracle 11g, neo4j
  • Apache Tomcat, Jboss EAP 6.1, Apache Web Server
  • Shell, Maven, Ant, Gradle,ruby, python
  • Jenkins, Docker, Kubernetes, Puppet, Sonar
  • Nagios, Grafana, Prometheus, blackbox - exporter,Cabot nginx, HAProxy, Ansible, Soap UI, JIRA, ServiceNow,Oracle SQL Developer,
  • AWS (EC2, VPC, ELB, S3, RDS, CloudTrail and Route 53, VDI), Linux, GIT VPC, EBS, IAM, ELB, Cloudwatch, DigitalOcean AWS CLI, AWS Auto Scaling

PROFESSIONAL EXPERIENCE:

Confidential, Kansas City

DevOps Engineer

Responsibilities:

  • Containerized the microservices using docker swarm
  • Auto Scaled neo4j database and implemented stack, storages with docker swarm
  • Implemented monitoring functionality of docker containers using Grafana, Prometheus and blackbox-exporter
  • Implemented reverse proxy mechanism, load balancing and health checks for all docker containers using Traefik
  • Configured Jenkins builds for all microservices and implemented CICD Pipeline with docker swarm
  • Implemented monitoring functionality with Cabot and written plugins for both email and SMS alerts using python.
  • Implemented email notification functionality for hourly backups and store them in AWS S3
  • Experienced in Installation and maintenance of Elastic search, Logstash and Kibana.
  • Worked on Consul and Vault
  • Created Releases via GitHub API

Confidential

Programmer Analyst

Responsibilities:

  • Managed Ubuntu Linux and Windows virtual servers on AWS EC2 using Puppet
  • Launching Amazon EC2 Cloud Instances using Amazon Images (Linux/Windows) and Configuring launched instances with respect to specific applications
  • Experience in configuring Apache Web Server in the Linux AW S Cloud environment using Puppet automation
  • Integrated Jira, GIT, Jenkins and Docker for continuous delivery and monitored containers and hosts using Weave Scope
  • Implemented and maintained the monitoring and alerting of production and corporate servers/storage using AWS Cloudwatch /Splunk
  • Knowledge on design applications on AWS taking advantage of disaster recovery
  • Configured S3 versioning and lifecycle policies to and backup files and archive files in Glacier
  • Migrating the website domain to Route 53
  • Configured AWS Identity and Access Management (IAM) Groups and Users for improved login authentication
  • Created Buckets in AWS and stored files. Enabled Versioning and security for files stored
  • Performed S3 buckets creation, policies and on the IAM role based polices and customizing the JSON template
  • Created AWS Multi-Factor Authentication (MFA) for instance RDP/SSH logon, worked, with teams to lock down security groups
  • Experienced in Installation and administration of Jboss, zookeeper, Kafka servers in linux environment

Hire Now