Resume
Cloud Infrastructure, EngineeR
PROFILE SUMMARY:
An ambitious IT Professional for 8 years who specializes in Cloud Engineering/Architecture and Linux System Administration/Engineering, looking for a great opportunity to grow my skills as well as help the organization meet its goals.
SUMMARY:
- 7+ years hands - on experience in building, configuring and maintaining Linux 5.x/6.x/7.x RedHat and CentOS
- Created new Access Control Lists on Redhat and CentOs systems 5/6/7
- Implemented load balancers to maintain the IIS Applications network traffic and also created SSL certificates for secure website connections
- Physical to Virtual and Virtual to Virtual migrations in Unix and Red Hat Systems
- Created Classic Elastic Load Balancers on Apache and NGINX servers and also configured, security groups, security settings and health checks through AWS Console
- By using AWS launched and configured EC2 instances settings and Auto Scaling Groups by applying 60% CPU Utilization
- Experience in deploying Linux (RHEL) for MySQL and Oracle Enterprise Database
- Proficient understanding of automated server build on puppet, PXE-Boot and Kickstart
- Experience creating scripts in Bash to automate daily administration tasks
- Experience with SAN enterprise storage
- Expert level skills in VMware Virtualization technology such as VMware vSphere 5.x/6.x, VCenter, VMotion, VMware HA, KVM and Clustering
- Proficient understanding of Network concepts like TCP/IP, UDP, DNS, DHCP, SSH and HTTP
- Modifying kernel parameters and modules by creating and running bash scripts to meet the given requirements
- Installed and deployed Oracle Database 11g Release 2 for RHEL/CentOs 5.x/6.x/7 systems
- Resolved any arising Oracle Database 11g Release 2 performance issues
- Knowledge of Active Directory (AD) and Windows servers 2008, 2012 and 2016
- Solid understanding of information security principles including Operating System hardening
- Knowledge of networking, client server architecture, cloud computing and enterprise system architecture
- Expertise in Symantec NetBackup
- Experience in SolarWinds monitoring setup and configuration
- Highly skillful in DB backup and recovery techniques
TECHNICAL SKILLS:
Operating Systems: RHEL, CentOs, Ubuntu and Debian 5/6/7, Windows 2008/2012/R2/2016 XP/7/8/8.1/10
Cloud Computing : AWS, Azure
Blockchain : Ethereum Consortium Blockchain, Ethereum Studio Blockchain Environment, BlockApps Multinode Blockchain, Parity Ethereum Proof of Authority
Artifical Intelligence : Deep Learning, Keras, Chainer, Microsoft Cognitive Toolkit, Microsoft Machine Learning Server 9.2.1, TensorFlow, Caffe, PyTorch, Theano and Mxnet Python Production software stack
Big Data Analytics/Data Science : Tableau Server, Alteryx Designer, Informatica PowerCenter, SAP HANA Express Edition, Cloudera and Azure Data Science Virtual Machines
Containerization : Kubernetes, Docker
Virtualization: VMware ESXI 5.x/6.x, KVM
Filesystems and Networking: EXT 3, EXT 4, NTFS, ReFS, Firewalls, Iptables, Selinux, WAN, LAN, Auto FS, LDAP, Active Directory, YUM, RPM, NFS, DNS, DHCP, NIS, Wireshark, Squid, VPN, SSH, VNC, Tcpdump, Netstat and Traceroute
Applications and Protocols: Ansible, Puppet, Nagios, Splunk, Mysql, Oracle Database 11g Release 2, Cronjobs, Bacula, Netbackup, RT and Remedy ticketing systems, Jboss, LAMP and LNMP Stack, Apache web server, Nginx, SSL Certificate, Mcafee Foudstone, LVM, Hardware and Software RAID, Samba, SAN, LUN, PXE Boot - Kickstart, Kernel tuning, Kernel Parameters, TCP/IP, UDP, NTP, FTP, SNMP, SMTP, IPOP and IMAP
Hardware Systems: Dell, HP, IBM, Oracle, HPC, Cisco UCS
EXPERIENCE:
Confidential
Cloud Infrastructure Engineer
Responsibilities:
- Provisioning AWS RDS MySQL databases on production environment with Ansible and specifying the appropriate VPCs, Security Groups, Region and Snapshots
- Conducting logging and monitoring of Development, Testing and Production environments on AWS Ec2 instances, RDS, DynamoDB and DocumentDB with CloudWatch
- To establish the organizations production network architecture safety in AWS public cloud setup and configured Elastic IP’s, Internet Gateways, Network ACL’s and security groups
- Enabling AWS Multi Factor Authentication on IAM for 2 step authentication os users access via Google Authenticator
- With the assistance of AWS IAM managing permissions and roles of users also granting the appropriate resources to the designated users
- For backup and storage solutions on AWS creating S3 buckets and administering policies for S3 buckets as well as utilizing Glacier
- Constructing Amazon Elastic Load Balancing for web application servers to control the traffic flow
- Installing and configuring Redis clusters on production AWS Centos/RHEL 7 while turning on Multi-AZ with Auto-Failover and automatic backups
- Managing firewalld settings on production level Centos/RHEL 7 servers to allow and block the appropriate network traffic
- Changing the SSH parameters on production Centos/RHEL 7 instances for a more secure login for all users
- Built a central logging server with Rsyslog to monitor all the messages coming from production Centos/RHEL 7 machines
- Managing system logs with logrotate on production Centos/RHEL 7 machines
- Created VMware Vcenter High Availability cluster on Vsphere client 6.7 for production environment
- Encrypting Windows server 2012/2016, Ubuntu 18.04 LTS, Debian 9 and Centos/RHEL 7 on VMware Vsphere Client 6.7
- Utilizing system performance charts in the VMware Vsphere client to analyze and troubleshoot issues related to CPU, Network, Disk and Memory
- Deploying multiple Ubuntu 18.04 LTS, Debian 9 and Centos/RHEL 7 production AWS Ec2 instances with Ansible AWS Ec2 module while turning on Cloudwatch monitoring
Confidential
Cloud Operations Engineer
Responsibilities:
- Generate, set up and activate SSL Certificates for Apache and Nginx on 30 RHEL 6/7 and Centos 6/7 servers
- Security hardened 300+ RHEL, Centos 6/7, OpenSUSE leap 15 and Ubuntu 16.04 LTS and Debian 9 and Kali Linux machines by following and applying the CIS benchmarks version 2.2.0.1
- Utilize Docker EE Containerization platform advanced tier for deploying 60+ verified images on the development environment on AWS
- Spun up 10 certified docker database images which were Oracle 12C Enterprise Edition and MySQL server Enterprise Edition 5.7 on Testing environment
- Ran the docker bench for security tool on all 90 docker containers in Development and Testing environment for vulnerability assessment
- Created many dockerfiles for development environment such as alpine linux and redis server
- Construct Docker Compose files and inside it included Dockerfiles, ports and volumes to complete a successful development environment web application workflow
- Installing and configuring Kdump and Sysrq on all the RHEL 6/7 and Centos 6/7 systems
- Utilizing Kdump tools such as crash and assessed kernel buffer messages and the processes running to analyze the root cause of RHEL and Centos crashes
- Upgraded 20 VMware ESXI 6.5 Development environment hosts to 6.7
- Created 3 TB worth of datastores on VMware ESXI 6.5 Development environment
- Work with Git create github repositories for Dev, Test and Prod Environments
- Used Git to commit and push dockerfiles and docker compose after the web developers sent the code on Dev, Test and Prod Environments
- Completing Continuous Integration with Travis CI by synchronizing github repositories
- Making .travis.yml files and instructing it to manage docker by building the dockerfiles and then running the tests
- Accomplishing Continuous Deployment with the assistance of AWS Elastic Beanstalk by informing Travis CI to send the docker web application on Elastic Beanstalk
- Specifying the appropriate variables in the .travis.yml file to successfully deploy the docker web application on to AWS Elastic Beanstalk with load balancer
- Set up access and error logs on AWS Cloudwatch for all the Prod apache web servers on RHEL and Centos 6/7 nodes
- Configured custom 1 minute memory utilization metrics on all the Prod hosts for AWS Cloudwatch
- Selecting the suitable AWS EC2 instances for projects recommended the Solutions Architects based on storage, database and compute requirements
- Created and configured LUKS encrypted partitions and logical volumes on all linux virtual machines
- Worked on and observed many issues in connection with the virtual machines performance such as processes, CPU and disk I/O
- The tickets were completed by the Jira Service Desk system and the uploaded and updated the technical documentation on Confluence
- Installed and configured sftp servers on 30 RHEL 6/7 production nodes
- Checking and fixing corrupt MySQL databases on Development RHEL and Centos 6/7 systems
- On VMware ESXI 6.5 installed and configured RHEL, Centos 6/7 and Ubuntu 16.04 LTS
- Increased RAM and SSD sizings for production linux hosts on VMware ESXI 6.5
- Setup MEAN stack on 10 development RHEL, Centos 6/7 and Debian 9 systems
- Installed Jboss application servers on 7 development RHEL 6/7 instances
- Installed, configure, monitored and secured 6 Production Intersystems Cache instances, also enabled high availability, disaster recovery and database encryptions
Confidential, NY
Senior Cloud Engineer
Responsibilities:
- Assisted in creating an Azure Operational Runbook for the Center of Excellence team which consisted information regarding Network Topology, Access Control, Availability Sets, Antimalware and Incident Management
- Constructed Compute Standards for Azure Production Environment which comprised of FS series for Web, Application and Database servers
- Collaborated with Solutions Architects on multitude of projects to provide an estimation for their Virtual Machines, Managed Disks, Unmanaged Disks and other resources
- Utilized Powershell scripts to spin up 765 servers based on hardened images of Windows 2012 R2, Windows 2016, RHEL 7.2, Ubuntu 17.10 and Debian 9.0
- Added associated ports for protocols such as HTTP, SSH and RDP in Production, Quality Assurance and Development Environments for secure inbound and outbound connections
- Created 923 TB worth of Managed and Unmanaged disks in Azure for multitude of projects
- Installed and troubleshooted many databases like Oracle 12.1.0.2 Enterprise Edition, SQL Server 2017 Enterprise and Postgres 9.3.6
- Deployed lots of Data Analytics Applications such as Tableau Server, Alteryx Designer, Informatica PowerCenter, SAP HANA Express Edition and Cloudera
- Monitored the Azure Infrastructure with Solarwinds and mitigated vulnerabilities like SNMP Traps, CPU and Memory Utilization
- Utilized the Check Point Firewall to assess network activity, processes, files and prevent Bot and Malware attacks
- Installed Visual C++ 2015 Redistributable on Opentext Content and Archive Windows 2012 R2 and Windows 2016 servers for Document Management Project
- Setup and configured Apache Tomcat 8.0.30, Apache Spark 2.1.2, Apache Maven 3.5.2 and Apache Ant 1.10.1 on Linux and Windows VMs
- Downloaded JDK and JRE Version 8 (64-bit) on Centos 7.2, RHEL 7.4 also set the JAVA HOME and JRE HOME Environment Variables
- Installed SQL Server 2014 SP2 64-bit on Windows 2016 instances and opened port 1433 on the Production Network Security Group in Azure
- Set SQL Database collation with full recovery mode enabled on Content and Archive Virtual machines
- Turned on IIS role services such as WebDAV Publishing, ISAPI Extensions, HTTP Logging and TCP Port Sharing on Windows 2012 R2 and 2016 instances
- Verified and enabled .NET Framework 3.5 and 4.5 on all the Windows servers
- Configured full back ups on all Unix/Linux Ext 4 and XFS File Systems via the Commvault Commcell Console V11
- Performed full, Archive Log and Control File Backups on 38 Oracle Databases 12.1.0.2 Enterprise Edition and 23 Postgressql 9.3.16 on Commvault Commcell Console V11
- Added Azure 347 TB of block storage disk and Blob storage on SoftNAS using its console for automated backups and file sharing
- Enabled SNAP High Availability on SoftNAS for automatic replication of volumes to a different node in case of maintenance or an issue
- Deployed and configured Azure Ethereum Consortium Blockchain which included a set of load-balanced transaction nodes and a set of mining nodes to record transactions
- Assisted Solidity developers by setting up Azure Ethereum Studio Blockchain Environment package and its components encompassed of Ethereum Sandbox, UI for Ethereum based system and Unit testing for evaluating smart contracts
- Created Azure BlockApps Multinode Blockchain which provided Strato API, Bloc instance, Block Explorer and API docs for Bloc
- Installed Parity Ethereum Proof of Authority for robust and fast Ethereum implementations
- Spun up 43 Deep Learning Virtual Machines in Azure on Windows 2016 Server which comprised of popular frameworks like Keras, Chainer and Microsoft Cognitive Toolkit
- Responsible for provisioning 35 Data Science Virtual Machines in Azure on Ubuntu with NVIDIA driver CUDA 8 and cuDNN 6, also contained many tools such as single node local Hadoop, H2O, Deep water and Sparkling Water
- On Windows Server 2016 deployed 18 Microsoft Machine Learning Server 9.2.1
- Integrated TensorFlow, Caffe, PyTorch, Theano and Mxnet Python Production software stack for running on GPU or CPU
- Provisioned Jenkins on Azure Ubuntu 16.04 LTS for Continuous Integration and Continuous Delivery purposes
- Ansible Tower installation was completed with pre-built Ansible playbooks and the availability of Ansible Galaxy
- Managed Kubernetes master and many slave node clusters on Ubuntu plus utilized CoreOS flannel for the pods network connectivity
- Completed deployment of Nginx 1.13.3 on Kubernetes master and slave clusters, also applied Nginx 1.13.4 and 1.13.4 updates
- Completed setting up Docker Enterprise Edition for Azure on RHEL 7.2 with Universal Control Plane and Docker Trusted Registry
- Pulled Apache Cassandra 2.1.20 images from Docker Hub repository on RHEL 7.2 instances
- Created multiple Azure Load Balancers to distribute network load efficiently across nodes
Confidential, NY
Senior Linux Systems Engineer
Responsibilities:
- Built and Deployed different OS (Red Hat, CentOS, Fedora, AIX) using PXE boot with Kick Start files
- Upgraded BIOS and Firmware on HP Proliant Servers for low latency issues
- For low latency optimization Changed BIOS settings in the Dell PowerEdge Servers
- Spinned up RHEL, CentOs, Ubuntu, Debian and Windows EC2 instances, EBS Volumes and snapshots in the AWS console
- Created AWS S3 buckets, objects, storage classes, Object Lifecycles and Permissions
- Provisioned MySQL RDS Database and launched it on MySQL Workbench on AWS
- Set up AWS Metrics and Alarms in the CloudWatch Dashboard and SNS triggers such as CPU utilization
- Utilized McAfee Network Security Platform 8.2 to block DDoS traffic and managed advanced malware policies
- Scanned web applications with McAfee Foundstone Vulnerability Manager and remediated any risk on the Security Analysis team
- Dissected different types of ICMP Packet Structure with Wireshark such as Type 3 Destination Unreachable codes and Type 12 Parameter Problem Codes and fixed these issues accordingly
- Automated Server build process using Puppet
- Created puppet manifests to manager resources such as user, packages, services and SSH keys
- Installed and configured Puppet Enterprise Edition, adding nodes by signing certificated
- Troubleshooted Puppet master and agent connectivity issues
- Installed Puppet modules from puppet forge to manage infrastructure
- Utilized Nagios XI to check the integrity of HPC applications
- Built local Yum repo server and maintaining it
- Used Puppet for configuration management purposes as well as inventory management
- Managed different kinds of servers such as Apache and MySQL
- Installed and monitored Virtual Center 2.x and ESXI 3.x servers
- Managed virtual and physical servers which include VMWare, KVM, Sunfire, Dell and HP
- Data center exposure with customizing and monitoring Dell PowerEdge R710 and Sun Fire X4170 servers
- Server configuration by utilizing automation tools such as PXE boot Kickstart and VMWare Power CLI
- Automated VMWare VSphere infrastructure with the assistance of VMware Vrealize Orchestrator
- Extended and reduced logical volumes and standard partitions with LVM
- Attached NAS and DAS storage to Linux servers
- Created passwordless SSH authentication utilizing SSH key pair
- Synchronized the time zone with the NTP server
- Worked with multiple RAID levels such as 0,1,5,6 and 10 on Sunfire, Dell and HP servers
- Used Wireshark and Tcpdump to troubleshoot complex network connectivity issues
- Completed NIC bonding on Red Hat systems
- Launched different types of EC2 instances such as Amazon Linux AMI 2016.09.1 (HVM), SSD Volume Type and Red Hat Enterprise Linux (RHEL) 6
- Automated some tasks with puppet such as constructing and installing MySQL resources like granfts
- Used Amazon’s Elastic Load Balancing to keep the systems running efficiently
- Created SSD Elastic Block Storage on EC2 instances and also made snapshots of the EBS drives for backups
- Patched critical production/testing servers using custom scripts
- Troubleshooted Boot and GRUB issues and Performance tweaking
- Knowledgeable in constructing different RAID levels
- Upgraded OS/firmwares when deemed necessary
- Configured RHEL Satellite Server as well as Kickstart Server
- Proficiency in troubleshooting and building RedHat Cluster
- Acquaintance with SAN Storage management
- Broad understanding of NFS
- Analyzed and managed system logs with Splunk and syslog
- Indexed /var/log with Splunk gui interface to be read and examined for any underlying issues
- Worked with and investigated Splunk operational and search strings
- Experience with virtual and bare metal machine deployment such as PXE
- Installing, configuring and troubleshooted new or existing virtual and physical servers
- Delivering tier 1, 2 & 3 support for clients
- Racked and stacked new physical apache and MySQL servers, Install and configure hardware components, settings, storage in accordance to the guided instructions
Confidential, NY
Linux Systems Administrator
Responsibilities:
- Provisioned ILO, IDRAC and ILOM on ESXI servers for remote management access
- Resized Hard drives by applying the parameters of Logical Volume Manager on Linux machines
- Connected multiple hosts on Nagios server for analyzing system performance, defined many services like SSH, HTTPD, ping and CPU utilization for monitoring and also added team members emails to receive any alerting notifications
- Fixed network security concerns with the help of changing settings of certain tools such as Iptables and Selinux to harden the system
- Read and examined different kinds of logs which contains information about kernel, daemons, authentication, mail, and Cronjobs under /var/log to claim in depth information and repair any issues
- Used commands such as dig, route, host, arp and ethtool to locate the underlying network problems and resolve them accordingly
- For Vulnerability Management Mcafee FoundStone was used and a full infrastructure system scan was completed on a monthly basis, reports were analyzed for any discrepancies
- Managed the memory usage of processes through the assistance of ps command and then killed or stopped the command based on its significance
- Investigated the statistics of CPU Utilization by entering the mpstat and sar command which will show the indications of idle time, iowait, kernel and user application interaction with the CPU
- Disk related interruptions were scanned with the dstat command which presented the size of read and write operations on the disk
- Worked together with SAN Engineers to add storage capacity to a lot of different servers
- Installed LNMP and LAMP stack for https interface and fixed any correlated connectivity problems
- Appointed Remote Access to users with RSA security Console Server
- Found resolutions for average to advance problems ranging from desktop not turning on to server being sluggish
- SSH server was safeguarded for password less login and local network by changing the iptables settings accordingly.
- Cisco any connect VPN certificates were produced for the clients and also network connectivity concerns were taken care of
- Executing OS patches on a steady basis as well as update administrative utilities
- Accomplished consistent hardware upgrades, and configured CPU, memory, and disk partitions as needed
- Generated back up policies, downloaded NetBackup client on Linux and Windows systems, confirming that the all the backups for networked machines are working smoothly
- Repaired failed backups from the NetBackup database
- Worked with V-Motion to migrate VMS, also exposed to VM Workstation, VMware converter structure
- Configured Samba servers to provide an entry for UNIX home directories on Windows machines
- Reimaged, configured and profiled 600 HP Elitebook laptops with the application support team
- Pushed and removed applications and templates packages to client machines HP Z640, Z620, 8300, 8200 remotely through smtools and registry everyday
- Restored 2007 and 2010 Microsoft Excel crashes starting it in safe mode, disabling add ins, and using the diagnostic tool
- Assisted users over the phone while queue managing like resetting the Bitlocker Encryption keys on a regular basis
- Assessed and resolved many issues with opening Excel spreadsheets for example unchecking Dynamic Data Exchange option in the advanced tab daily
- Configured 6 Remote Desktop Connections and Remote Pc for Managing Directors and Traders every 4 days
- Configured and activated 13 new and replaced Blackberry devices every two weeks
- Assigned 17 tickets through Remedy and Maximo to the tech teams daily by Queue Managing
- Mapped and troubleshoot 4 printers with error 49, b200, 5200 and 5100 on the trading floors bi-weekly, forwarded escalated tickets to HP team
- Assisted the clients with the authorization process to the Good Work Application on their smartphones bi-weekly