Devops Engineer Resume
5.00/5 (Submit Your Rating)
Kansas, CitY
TECHNICAL SKILLS:
- Java / J2EE, Spring
- Core Java, Basics of JSP and Servlets, and PL/SQL
- MySQL, Oracle 10g, Oracle 11g, neo4j
- Apache Tomcat, Jboss EAP 6.1, Apache Web Server
- Shell, Maven, Ant, Gradle,ruby, python
- Jenkins, Docker, Kubernetes, Puppet, Sonar
- Nagios, Grafana, Prometheus, blackbox - exporter,Cabot nginx, HAProxy, Ansible, Soap UI, JIRA, ServiceNow,Oracle SQL Developer,
- AWS (EC2, VPC, ELB, S3, RDS, CloudTrail and Route 53, VDI), Linux, GIT VPC, EBS, IAM, ELB, Cloudwatch, DigitalOcean AWS CLI, AWS Auto Scaling
PROFESSIONAL EXPERIENCE:
Confidential, Kansas City
DevOps Engineer
Responsibilities:
- Containerized the microservices using docker swarm
- Auto Scaled neo4j database and implemented stack, storages with docker swarm
- Implemented monitoring functionality of docker containers using Grafana, Prometheus and blackbox-exporter
- Implemented reverse proxy mechanism, load balancing and health checks for all docker containers using Traefik
- Configured Jenkins builds for all microservices and implemented CICD Pipeline with docker swarm
- Implemented monitoring functionality with Cabot and written plugins for both email and SMS alerts using python.
- Implemented email notification functionality for hourly backups and store them in AWS S3
- Experienced in Installation and maintenance of Elastic search, Logstash and Kibana.
- Worked on Consul and Vault
- Created Releases via GitHub API
Confidential
Programmer Analyst
Responsibilities:
- Managed Ubuntu Linux and Windows virtual servers on AWS EC2 using Puppet
- Launching Amazon EC2 Cloud Instances using Amazon Images (Linux/Windows) and Configuring launched instances with respect to specific applications
- Experience in configuring Apache Web Server in the Linux AW S Cloud environment using Puppet automation
- Integrated Jira, GIT, Jenkins and Docker for continuous delivery and monitored containers and hosts using Weave Scope
- Implemented and maintained the monitoring and alerting of production and corporate servers/storage using AWS Cloudwatch /Splunk
- Knowledge on design applications on AWS taking advantage of disaster recovery
- Configured S3 versioning and lifecycle policies to and backup files and archive files in Glacier
- Migrating the website domain to Route 53
- Configured AWS Identity and Access Management (IAM) Groups and Users for improved login authentication
- Created Buckets in AWS and stored files. Enabled Versioning and security for files stored
- Performed S3 buckets creation, policies and on the IAM role based polices and customizing the JSON template
- Created AWS Multi-Factor Authentication (MFA) for instance RDP/SSH logon, worked, with teams to lock down security groups
- Experienced in Installation and administration of Jboss, zookeeper, Kafka servers in linux environment