Aws Solutions Architect Resume
Lewisville, TX
SUMMARY:
A self - motivated AWS certified Solutions Architect, DevOps Engineer, SQL BI Developer and Linux System Administrator offering above 8 years of experience in AWS/Linux/ environment with proficiency in several distributions of Linux including (Red Hat, CentOS, Ubuntu, Debian), SQL BI (ETL, T-SQL, Power Visualization), DevOps (Ansible, Docker, Git, Kubernetes, Jenkins etc.) and AWS (VPC, EC2, S3, RDS, ROUTE 53, CDN, IAM, Redis, ELB, CloudWatch, CloudFormation, CloudTrail, Trusted Advisor, Direct Connect, Kinesis, Lambda, System Manager, etc.)
TECHNICAL SKILLS:
AWS: VPC Designing including: EC2/Auto Scaling, S3 Life Cycle, RDS Multi AZ, ROUTE 53 DNS Designing, IAM policies, JSON, AWS Migration, SNS topic with CloudWatch alarms, Kinesis, Direct Connect, VPN connection, Cloud Formation, System Manager automation etc.
Platforms: AWS, Linux: RHEL, CentOS, Ubuntu, Debian
Programming Languages: Bash, Ansible Playbooks, JSON, YAML
Containerization: Docker Compose, Docker file, Kubernetes manifest etc.
Configuration Management & DevOps Tools: CloudFormation, Ansible, AWS, Jenkins, Docker, Kubernetes, Git & GitHub.
PROFESSIONAL EXPERIENCE:
AWS Solutions Architect
Confidential, Lewisville, TX
Responsibilities:
- Managed provisioning of AWS infrastructures using CloudFormation.
- Design for high availability and business continuity using self-healing-based architectures, fail-over routing policies, multi-AZ deployment of EC2 instances, ELB health checks, Auto Scaling and other disaster recovery models.
- Developed SSM automation documents for multi-region and multi-account execution
- Setup necessary permissions for multi-region and multi-account Automation execution
- Created patch management using Systems Manager automation for multi-region and multi region execution
- Implemented preventive guardrails using Service Control Policies (SCPs)
- Implemented detective guardrails using Cloud Custodian policies and AWS config
- Designed and implemented for elasticity and scalability using Elastic Cache, CloudFront - Edge locations, RDS (read replicas, instance sizes) etc.
- Implemented security best practices in AWS including multi factor authentication, access key rotation, encryption using KMS, firewalls- security groups and NACLs, S3 bucket policies and ACLs, mitigating DDOS attacks etc.
- Implemented AWS Organization to centrally manage multiple AWS accounts including consolidated billing and policy-based restrictions
- Installed and used Ansible for configuration management with ansible playbooks.
- Implemented Jenkins, GitHub and Git for version control, code build, testing and release and CI/CD.
- Exported DynamoDB tables to on-premise servers using data-pipeline jobs.
- Monitored end-to-end infrastructure using CloudWatch and SNS for notification
- Used AWS system manager to automate operational tasks across AWS resources
- Built kinesis dashboards and applications that react to incoming data using AWS provided SDKs; and exported data from kinesis to other AWS services including EMR for analytics, S3 for storage, Redshift for big data and Lambda for event driven actions
- Developed and documented security guardrails for AWS Cloud environments.
Confidential, Lewisville, TX
AWS Solutions Architect
Responsibilities:
- Managed provisioning of AWS infrastructures using CloudFormation.
- Design for high availability and business continuity using self-healing-based architectures, fail-over routing policies, multi-AZ deployment of EC2 instances, ELB health checks, Auto Scaling and other disaster recovery models.
- Developed SSM automation documents for multi-region and multi-account execution
- Setup necessary permissions for multi-region and multi-account Automation execution
- Created patch management using Systems Manager automation for multi-region and multi region execution
- Implemented preventive guardrails using Service Control Policies (SCPs)
- Implemented detective guardrails using Cloud Custodian policies and AWS config
- Designed and implemented for elasticity and scalability using Elastic Cache, CloudFront - Edge locations, RDS (read replicas, instance sizes) etc.
- Implemented security best practices in AWS including multi factor authentication, access key rotation, encryption using KMS, firewalls- security groups and NACLs, S3 bucket policies and ACLs, mitigating DDOS attacks etc.
- Implemented AWS Organization to centrally manage multiple AWS accounts including consolidated billing and policy-based restrictions
- Installed and used Ansible for configuration management with ansible playbooks.
- Implemented Jenkins, GitHub and Git for version control, code build, testing and release and CI/CD.
- Exported DynamoDB tables to on-premise servers using data-pipeline jobs.
- Monitored end-to-end infrastructure using CloudWatch and SNS for notification
- Used AWS system manager to automate operational tasks across AWS resources
- Built kinesis dashboards and applications that react to incoming data using AWS provided SDKs; and exported data from kinesis to other AWS services including EMR for analytics, S3 for storage, Redshift for big data and Lambda for event driven actions
- Developed and documented security guardrails for AWS Cloud environments.
AWS Architect / SQL Developer
Confidential, Dallas, TX
Responsibilities:
- VPC peering with other Accounts allowing access and routing to service and users of separate account to communicate.
- SSL setup for Apache and Nginx application couple with AWS ELB SSL for all http to https thereby maximizing security
- Network, CPU, Disk and connectivity monitoring with CloudWatch and setup to trigger alarm and notify system administrators.
- Aide setup for and configured for logs files detail monitoring and alerts notification when changes are made.
- Performed root-cause analysis of recurring issues, system backup, and security setup
- Security groups configured and locked down to the various authorized subnet and IP addresses in AWS
- Automated deployment, configuration and security settings using Ansible
- Experienced in GitHub (cloning a Git repository, creating a branch, pushing to Git from local, making a PR etc.)
- Architected and implemented continuous integration and deployment pipelines using Jenkins and other CI
- Experienced in GitHub
- Monitoring from end-to-end view of runtime systems CPU, bandwidth, disk space and log files using Nagios Xi
- Created the schema, implemented all stored procedures and 4 SSIS packages Created the deployment scripts and managed the code in Microsoft Team Foundation Server.
- Perf Performed unit tests on all code and packages.
- Additional projects included automation of a manual process as the start of a data warehouse project.
- Updated existing and created new reports using Microsoft SQL Server Reporting Services.
- Performed front line code reviews for other development teams.
AWS Architect
Confidential, Plano, TX
Responsibilities:
- Designed secured, cost optimized, highly available and fault tolerant infrastructure in AWS
- Architected and configured Dev/Stage/QA environments in AWS (VPC, subnets, security groups, EC2 instances, load balancer, RDS, Redis, route53 etc.)
- Implemented security best practices in AWS including multi factor authentication, access key rotation, role-based permissions, enforced strong password policy, configured security groups and NACLs, S3 bucket policies and ACLs etc.
- Optimized cost through reserved instances, selection and changing of EC2 instance types based on resource need, S3 storage classes and S3 lifecycle policies, leveraging Auto Scaling etc.
- Leveraged EC2 Create Snapshot API call to create snapshots of EBS Volumes on scheduled intervals
- Configured CloudWatch alarm rules for operational and performance metrics for our AWS resources and applications
- Setup and configured logs files for detail monitoring and alerts notification when changes are made.
- Configured S3 events to set up automated communication between S3 and other AWS services
- Deployed and configured infrastructure using Ansible
Linux Systems / AWS Administrator
Confidential
Responsibilities:
- Maintained server integrity by applying updates and patches per our maintenance policies
- Configured and Managed NFS and Samba for File Sharing
- Configured and Managed Firewalld
- Configured and Managed Apache Web Service
- Controlled access to files and directories using ACL permissions
- Performed package management, system updates using yum and rpm
- Created partitions, including raid, logical volumes and swap, formatted with ext3 and ext4, zfx, resized and created logical partitions
- Managed and Configured Postfix for Relay SMTP
- Configured and Managed Unbound DNS
- Hardened Linux servers based on recommendations provided by our security team and best practice.
Linux Administrator /AWS Architect
Confidential, Arlington, Virginia
Responsibilities:
- Volume Managed Partitions, created VGs, LVs, and Swaps File systems for Resource Sharing in Linux
- Performed applications installation, upgrades/patches, troubleshooting, maintenance, and monitoring Linux servers
- Installation, configuration and administration of Enterprise Linux
- Created, managed and administered user accounts security and ssh password-less login
- Editing the Sudoers file& configuration files as necessary
- Network configuration & troubleshoot issues with respect to network and configuration files
- Configuring Apache, NFS, FTP, SMB and Autofs
- Implement ACL and TCP Wrappers
- Create users, groups and give permissions on bear metal servers
- Task automation, service management and application deployment using Ansible and Jenkins
- Shell scripting & task automation by creating cron jobs
- Build and configured Linux servers from scratch with type one hypervisors for virtualization and network components
- Installation using yum & rpm for Red Hat and apt-get for Debian & Ubuntu
- Perform security setup, networking, system backup and patching for both AWS, and on-premise environments.
- Architect high availability environment with auto scaling & Elastic Load Balancer
- Securely deploy MySQL Primary DB and its read replica in private subnet with multi AZ for disaster recovery and best practice
- Expert in AWS import/export migration of on-premise VMs to AWS
- Migration of high availability webservers and databases to AWS EC2 and RDS with minimum or no downtime
- Life cycle configuration for data to live and cycle within buckets in accordance with how often it can be accessed thereby minimizing cost.
- Ensured data recoverability by implementing systems snapshot, AMIs, RDS Replicas and application level backup to S3
- VPC build with Private and Public Subnet couple with VPNs setup back to on premise datacenter and corporate offices.
Confidential
Linux Administrator
Responsibilities:
- Developed holistic solutions by analyzing client needs and employing critical thinking in the development of specifications and the evolution of design, implementation and test
- Designed systems utilizing Sun Solaris 10, Red Hat Enterprise Linux 6 and AIX 5L
- Significantly increased storage space; analyzed and matched workloads to a cost effective solution
- Created shell scripts and cron jobs that monitored and reported security issues
- Resolved security vulnerabilities by analyzing and recommending improvements in communications and network security at the component level
- Ensured business continuity by designing, implementing and testing disaster recovery systems
- Managed, monitored and tested individual and group user access privileges and security
- Created checklists and collected audit data for compliance with SOX and PCI s
- Developed, implemented and verified security policy and access management compliance
- Monitored system performance and prevented resource exhaustion using ssh, sar, vmstat, iostat, netstat and nmon