We provide IT Staff Augmentation Services!

Sr. Devsecops/cloud Engineer Resume

3.00/5 (Submit Your Rating)

Frederick, MD

SUMMARY

  • Professional Cloud/DevOps engineer having 8+ years of IT experience as a system administrator, worked on AWS, AZURE services, CI/CD pipeline, Build/release management and VMware technologies. Experience in tools like Terraform, Kubernetes, Ansible, Chef, Scripting and Monitoring tools. Expertise in Scrum Methodologies such as Agile, Kanban and Waterfall methods, software development lifecycle.
  • Expertise in AWS services Like EC2, Load Balancer, Lambda, S3, RDS, DynamoDB, Aurora, SQL, VPC, Route53, IAM, WAF, CloudFormation, Elastic Container Service (ECS), Elastic Kubernetes Service(EKS), Kinesis, EBS, Elastic Beanstalk, CloudWatch, CloudTrail, Security Groups, SNS, SQS, Direct Connect.
  • Expertise in writing AWS Cloud Formation templates in JSON to use them as blueprints for building & deploying multiple AWS resources. Worked on Kinesis Data Streams & Kinesis Firehose & integrated with AWS Lambda for serverless data collection.
  • Experience in implementing and configuring AWS Elastic Beanstalk for deploying and scaling web applications, developed with Java, PHP, Node.js, Python, Ruby and Multi Container Docker on familiar servers such as Apache, Nginx.
  • Played a pivot role in implementing DevSecOps Model across the organization, platform and implemented vulnerability checks at different phases.
  • Experience in DevSecOps strategy for security auditing, continuous monitoring of the entire infrastructure and applied Web Application Firewall (WAF) rules for blocking the attacks through SQL injection and patterns.
  • Experienced in Azure Cloud Services (PaaS & IaaS & SaaS), VM’s, Storage, Web Apps, Azure Active Directory, Azure Application Insights, Logic Apps, Data Factory, Service Bus, Azure Monitoring, Azure OMS, Key Vault, Cognitive - Services (LUIS) & SQL, ExpressRoute, Load Balancing, Application Gateways.
  • Knowledge of Azure Site Recovery and Azure Backup Installed and Configured the Azure Backup agent and virtual machine backup, Enabled Azure Virtual machine backup from the Vault.
  • Excellent understanding of Software Development Life Cycle (SDLC) methodologies like Waterfall, Agile and SCRUM.
  • Proficient on Terraform key features such as Infrastructure as code, execution plans, resource graphs, change automation and created infrastructure to deploy various applications across multiple cloud providers.
  • Hands on experience in writing Terraform API modules to manage infrastructure, for automatic creation of AWS services like RDS instances, VPCs, Autoscaling groups, Load balancers, SQS, S3 buckets.
  • Experience in creating the AWS cloud Infrastructure by using Terraform and Deployed IaC code using Jenkins CI/CD pipelines and configure AWS EC2 with Ansible Playbooks and Roles.
  • Experience in creating Docker Containers leveraging existing Linux Containers and AMI's in addition to creating Docker Containers from scratch.
  • Expertise in building Docker images and deploying Docker containers, and Kubernetes as container-based production clusters, managing docker volumes, creating and removing images.
  • Experience in Docker container orchestration framework using Kubernetes to create pods, ConfigMaps and deployments into cluster. Containerized legacy Java and Nodejs application, run it in AWS Elastic Kubernetes Service. Auto-scaled the application in both pods level and instance level.
  • Experience in building and deploying the application code using Kubernetes CLI called Kubectl, Kubelet, Kubeadm and schedule the jobs using Kube scheduler. Managed K8s charts using Helm and created reproducible builds of the Kubernetes applications.
  • Expertise in adding Service Mesh, a dedicated infrastructure layer for communication between Kubernetes microservices and balances inter-service traffic upon specific policies.
  • Experience in OpenShift platform in managing Docker Containers, Kubernetes Clusters, Ingress Rules, Services and Helm Charts and implemented a production ready, load balanced, highly available, fault tolerant Kubernetes infrastructure
  • Efficient in writing Jenkins CI/CD pipelines to drive all Microservices builds also creating Groovy Scripts for setting up Continuous Integration for new branches, build automation, Plugin management, Securing Jenkins.
  • Experience in Developing automated continuous integration/continuous delivery pipeline for code deployment using Jenkins. Used Jenkins as Continuous Integration tool: creating new jobs, managing required plug-ins, build trigger, build system and post build actions, scheduled automation builds.
  • Experience in Creating DSL Groovy scripts and integrating with Jenkins for end-end automation.
  • Worked extensively on Ansible Roles, inventory, Ansible Tower, Ansible Galaxy and used Ansible Control Server to deploy plays and playbooks to the machines and systems in the inventory.
  • Strong Experienced in managing Ansible Playbooks with Ansible roles, high-level child-branch strategies inventory management, group variables, copy and remove files on remote systems using file module.
  • Hands-on experience in configuring Chef Server Enterprise on-premise, workstation bootstrapped the nodes using knife and automated by testing Chef Recipes, Cookbooks with test-kitchen and chef spec.
  • Expertise on version control tools like Subversion (Centralized) and distributed version control tools like Bit Bucket, TFS, SVN, IBM Relational ClearCase, GIT including flavors like GitHub, GitLab etc.
  • Knowledge in Installing, configuring, and managing full end-to-end GitLab setup, Pipeline Management. Also, managed and utilized GitLab runners to support application testing and fill system level to support GitLab.
  • Experience in different log monitoring tools like Nagios, Datadog, Splunk, ELK (Elastic Search, Log Stash, Kibana) to see logs information, monitor, security and get the health notifications from nodes.
  • Proficient with Ruby, Perl, Power Shell, JSON, YAML, Groovy, Bash/Shell, Python. Developed python, and shell scripts for automation of the build and release process.
  • Expertise in Linux Administration like RAID levels, Grub, Disk management, patch management, Networking, Scripting, Kickstart, LVM, CRON jobs, Performance monitoring, troubleshooting on different distributions such as Red Hat, CentOS, Ubuntu and Debian. The file systems that were used were VxFS, ZFS, UFS, ext3 and ext4.

TECHNICAL SKILLS

Operating System: Linux (RedHat, CENTOS), Unix, Solaris, Ubuntu, Windows, MacOS.

Cloud Platforms: AWS, Azure, GCP

Automation Tools: Jenkins, Jfrog, Nexus, Docker, Kubernetes, Ansible, Terraform, compliance, Kitchen, chef solo, Puppet, Vagrant, Cloud Foundry

Version control tools: GIT, GITHUB, SVN, Bitbucket, GitLab, IBM Rational ClearCase, AWS Code Commit

Containerization Tools: Kubernetes, Docker, Docker Swarm, AWS Fargate, OpenShift

Networking/Protocol: DNS, DHCP, Cisco Routers/Switches, NIS, NFS, WAN, LAN, FTP/TFTP, TCP/IP

Application/Web Server: Tomcat, Apache, Application Server, IIS, Oracle WebLogic

Scripting: Python, Groovy, Shell Scripting, Ruby Scripting, Power Shell

Virtualization Technologies: VMWare ESX/ESXi, Windows Hyper-V, Power VM, Virtual box, Citrix Xen

Monitoring and Logging Tools: Nagios, Splunk, CloudWatch, CloudTrail, Datadog, ELK

Testing and ticketing tools: SonarQube, Selenium, JIRA, ServiceNow, Remedy, GitLab

PROFESSIONAL EXPERIENCE

Confidential - Frederick, MD

Sr. DevSecOps/Cloud Engineer

Responsibilities:

  • Designed, configured and managed cloud infrastructures utilizing Amazon Web Services including core services EC2, S3, Glacier, Auto Scaling Groups, ELB, EBS, ECS and Database services RDS, DynamoDB, Aurora, Elastic Search and application layer services like API Gateway, Lambda and network layer services like VPC and its sub components and Security layers services like IAM, SSM, Cloud trail, Cloud watch, KMS and Integration layer Services like Kinesis, SNS, SQS, Route53 and Orchestrated application workflows using AWS Fargate, EKS.
  • Automated deployments of web applications based on Node.js, Python, Java, PHP using Elastic Beanstalk, and Jenkins and secured by creating IAM roles and policies for services and users.
  • Migrated existing AWS infrastructure to Serverless Architecture (AWS Lambda) deployed via Terraform and Implemented AWS Lambda functions to run scripts in response to CloudWatch events in the Amazon Dynamo DB table and S3 bucket to HTTP requests using Amazon API gateway and invoked the code using API calls made using AWS SDKs.
  • Provisioned the AWS App Mesh for network traffic controls on EC2 instances, ECS, EKS, AWS Fargate and integrated monitoring tool cloud watch to automatically export the data to Splunk and Kibana .
  • Configured Auto Scaling in customized VPC’s based on Elastic load balancer traffic and deployed Autoscaling policies to scale up/down EC2 instances based on ELB health checks in response to the triggers.
  • Worked on the Amazon Aurora database service on the AWS cloud and Implemented automatic machine Disaster recovery on AWS cloud and also setting up databases using RDS, storage using S3 bucket, Amazon Glacier by configuring instance backups to the S3 bucket and deployed instances multiple availability zones to ensure fault tolerance and high availability through Terraform.
  • Integrated the AWS Elastic Kubernetes Service with AWS CloudWatch, Auto Scaling Groups, SQS and VPC for monitoring, scaling and load-balancing the application and used AWS Fargate Engine for container services, security is improved through application isolation by design.
  • Composed Python, Groovy and Shell Scripts to do CI/CD using Jenkins, Git in GitHub, to access the databases to retrieve and archive data and to improve application security and worked on Automation tool (Maven) and artifact repository for pushing successful build code.
  • Responsible for writing reusable Infrastructure as a Code (IaC) Modules by using Terraform for IaaS, PaaS and SaaS AWS cloud resources and mentoring the peers to write consumable code to automate the infrastructure provisioning for cloud applications.
  • Implemented POC’s and Performed POT’s and introduced Terraform Enterprise there by automated installation, configuration of TFE for administration and audit activities and also worked with Security compliance squads to configure Sentinel policies (Policy as a Code) to perform pre provisioning security compliance rules validations prior to infrastructure provisioning and extended scope to perform post provisioning infrastructure scans using AWS Spec and Inspec frameworks.
  • Transformed Terraform as an enterprise level cloud infrastructure automation solution by maintaining prewritten cloud formation scripts and converting Python BOTO3 CLI scripts as a custom wrapper in terraform null resources.
  • Implemented Security Scans like Static and Dynamic Application testing at each layer of DevOps life cycle and converted the existing DevOps methodologies/workflows to DevSecOps model.
  • Applied Key Management service (KMS) for encrypting data when residing on one environment and implemented SSL encryption during data transportation.
  • Configured applications that run multi-container Docker applications by utilizing the Docker-Compose tool
  • Integrated Docker container-based test infrastructure to Jenkins CI/CD test flow and executed build environment by integrating with Jira to trigger builds using Webhooks and Slave Machines.
  • Virtualized the servers using Docker for the test environments and dev-environments needs, also configuration automation using Docker containers.
  • Used Kubernetes Tekton pipeline for building a Continuous integration and continuous delivery for a set of shared components for the application.
  • Created the Kubernetes cluster on AWS EC2 instances and deployed containerized application, created Microservices application and integrated with AWS services using Amazon EKS.
  • Used RBAC for defining Roles within namespace for securing the Aurora database access for specific users and Cluster Roles across the namespaces for common AWS resources and integrated with AWS cloud watch.
  • Maintained the secrets using TLS certificates and passed as Environment variables form one application to other application using ConfigMaps in Kubernetes.
  • Triggered Application load balancer (ALB) by using AWS ALB Ingress controller for the EC2 instance and declared ingress resource to route HTTPS traffic to specific pods in a Kubernetes cluster by balancing the traffic and provided integrated access logs and health checks.
  • Responsible for writing Jenkins shared libraries and configured generic Continuous Integration and Continuous Delivery pipelines to achieve CDaaS (continuous delivery as a service) with end to end unit and integration test cases using Groovy Spock/Junit frameworks and adopted Semantic Versioning concepts to achieve consistency and stability across application releases.
  • Experienced in managing on-prem (Linux, Windows systems) as well as cloud environment with Ansible Playbooks and Roles. Have built around 50 Ansible Roles to support apps running in environment.
  • Configured and Manage Ansible and Ansible Tower to automate repetitive tasks, configure AMIs, support apache/tomcat and configure Ec2 as Web Servers and proactively manages change and Experience in managing Ansible Playbooks with Ansible Roles, group variables, inventory files with integration of Molecule test cases.
  • Managed and Configured Infrastructure for AWS ECS, RDS Aurora, S3, ECR, SNS, SES on building out a full automated App Deployment in microservices function from the development code and pipeline that are managed in GitLab.
  • Implemented Security operations configurations to GitLab pipeline running in environment which pass through CIS benchmark list, ARAP docker images configured which pass security threat hunting process.
  • Using AWS Kinesis stream implemented an architecture design that integrate AWS CloudWatch log groups and server-side logs with Splunk for reporting and monitoring purpose.
  • Developed Enterprise level monitoring solutions in python and deployed it on to AWS Lambda which can collects the application flow logs at resource level and stream them to Splunk dash boards and Configured ELK (Elasticsearch, Logstash, Kibana)to audit the Jenkins builds and performance.

Environment: AWS (EC2, S3, EBS, VPC, Elasticsearch, Route53 (DNS), API Gateway, Lambda, CloudFormation, DynamoDB, RDS, RedShift, SNS, SES, SQS, Fargate, Docker, Kubernetes, Ansible, Maven, Jenkins, GIT, Java, Python, Linux, Jira

Confidential - Chattanooga, TN

Cloud/DevOps Engineer

Responsibilities:

  • Configured and leveraged AWS services and resources like AWS EC2 instance, Amazon API Gateway, Serverless function lambda, Infrastructure as a code like Cloud Formation, JSON template, security services like AWS security groups, Route53, SSL, Security Hub, KMS and network services like VPN, Network peering.
  • Created AWS CloudFormation template by using JSON/YAML and implemented Tomcat and Apache Web servers for deployment and coordinated with offshore and onshore teams for production, Triggered jobs for recovering crucial data of production by using AWS REST API to store on Dynamo DB.
  • Created S3 buckets and managing policies, utilized s3 bucket and glacier for storage and backups.
  • Implemented AWS Lambda functions to run python scripts in response to event in Amazon Dynamo DB table, S3 buckets, and HTTP requests using Amazon API Gateway.
  • Migrated On-Premise VM’s to AWS using AWS Direct Connect Service and defined comprehensive strategy around security as part of AWS migration strategy.
  • Optimized EBS Volumes and EC2 Instances and created multi Availability Zone VPC instances and maintained the traffic using Route 53 Weight Routing Policies and used AWS SNS for notifications in AWS cloud.
  • Involved in Design discussions of Tier 0 application implementations with IT Architecture and application squads and provided strategic solutions using Canary and Blue/Green deployment methodologies.
  • Maintained complex applications Cloud Formation IaC stacks using Terraform and provided generic modules to support Immutable deployments thereby converted terraform as enterprise Infra automation tool and used Terraform Graphs to visualize TF plans.
  • Working with Middleware Engineering Team and write custom Ansible Playbooks to automate Amazon machine Images using Packer features and performed immutable deployments by leveraging the concepts of create before destroying through Terraform.
  • Configured Grafana docker container to use RDS endpoint URL to store user sessions, route53 DNS record as server root URL, it can be used as callback URL while setting oauth single sign on solution.
  • Configured Flux CD on Kubernetes container environment, utilizing Kubernetes and Docker for the runtime environment, monitoring the docker images repositories, triggered the deployments and update the running configurations of Kubernetes cluster
  • Managed Kubernetes charts using Helm. Created reproducible builds of the Kubernetes applications, templatize Kubernetes manifests, provide a set of configuration parameters to customize the deployment and Managed releases of Helm packages.
  • Implemented Istio as service mesh in Kubernetes for secure communication across pods from Ingress to service and to pods and implemented Nginx for providing reverse proxy.
  • Managing and Monitoring Kubernetes clusters using Prometheus as a data aggregator and Grafana as a data visualization platform.
  • Migrated from Chef Configuration tool to Ansible by implementing POC’s, automated the deployment by installing ansible and ansible tower on EC2 instances, written playbooks and maintained hosts in the inventory.
  • Used the Chef Cookbooks and transferred data/files to Ansible Playbooks and built the ansible on Control node and agentless configuration service is provided to managed node.
  • Designed DevOps workflow for multiple applications by orchestrating Test, Build, Release and Deploy phases through various CI/CD pipelines using Git, Jenkins.
  • Automated the application and infrastructure deployment by writing the Jenkins shared libraries in groovy with end to end testing using Groovy Spock/Junit testing frameworks for CI/CD life cycles and created Generic pipelines.
  • Monitored the servers and applications’ health status using Splunk, responded to alerts, and configured threshold settings. Also Configured Splunk to monitor Linux servers with Ansible automation
  • Migrated Windows Active Directories and .net applications from AWS to Azure cloud by implementing POC’s in the organization and Performing POT’s in Azure implementation.
  • Migrated On-Prem Windows App to Azure VMs and worked with Vnet Engineer to configure traffic routing’s and manage Transit Hubs workflows.
  • Implemented and Managed GitLab Instances and Runners along with its Admin Area to manage Projects, Pipelines, Kanban boards and created GitLab System Hooks for changing the existing information in servers.
  • Wrote Python scripts for pushing data from DynamoDB to MySQL Database. Also created and maintained the Python deployment scripts for Web Sphere, web application server.
  • Used MAVEN as a Build tool for building deployable artifacts (war & jar) from source code. Worked with Maven in Java environment for authoring pom.xml files for Java projects and managing maven repositories.

Environment: AWS, Azure, Docker, Chef, Flux, Kubernetes, Jenkins, CI/CD, Maven, Git, Splunk, GitHub, WebLogic, Ansible, Apache Tomcat, DynamoDB, MySQL, Linux, VMWare Servers, PowerShell, Bash, Python.

Confidential - Sacramento, CA

Cloud Engineer

Responsibilities:

  • Built environment in AWS using EC2 instance creation, Route 53 DNS routing, Cloud Watch alarming, VPC setups, AWS Elastic Load Balancing, Auto Scaling groups and databases like RDS, DynamoDB and networking services like Route53, Direct Connect.
  • Implemented AWS Beanstalk for deploying web applications based on .Net, Node.js, python along with EC2 instances, Elastic Load Balancing (ELB), which performed balance across instances in multiple availability zones. Launched Amazon EC2 instances using AWS (Linux/ Red Hat/Windows).
  • Defined AWS Security Groups, which acted as Virtual Firewalls that controlled the traffic allowed to reach one or more AWS EC2 instances. Worked on Multiple AWS instances, set the security groups, Elastic Load Balancer and AMIs, auto scaling to design cost effective, fault tolerant and highly available systems.
  • Migrated from AWS to Azure services by developing the POC’s and POT’s in the organization, implementation in Azure
  • Managed Azure Infrastructure Azure Web Roles, Worker Roles, SQL Azure, Azure Storage.
  • Worked on Power Shell scripts to automate the Azure Cloud system in creation of VM, Resource groups, Web Applications, Azure Storage Blobs & Tables, firewall rules and used Python scripts to automate day to day administrative tasks
  • Worked on POC for Deploying the Azure infrastructure using Terraform
  • Worked with Nagios for Windows Active Directory & LDAP and Data consolidation for LDAP users and monitored system performance using Nagios, maintained Nagios servers.
  • Improvements done to agile software development teams by working with GitHub by Continuous integration and continuous delivery.
  • Worked on Git, Issue Tracking, pipeline management and Documentation with GitHub to Automate and integrate the code checkout process.
  • Developing and maintaining the build environment, the source code control system and managing build packages using GIT and GIT Hub.
  • Implemented the Docker for wrapping up the final code and setting up development and testing environment using Docker Hub.
  • Implementation of JIRA to track all issues pertaining to SDLC and Integration of JIRA with GIT repository to track all code changes.
  • Written several chef cookbook and recipes to automate the installation of web logic domain and JDK installations and have customized recipes from chef supermarket to align with current requirements.
  • Executed Azure functions in Python to invoke scripts for data transformations call Storages by REST API.
  • Utilized Atlassian tools (BitBucket, JIRA, Bamboo, Confluence) to support Devops initiative workflows.
  • Worked on Linux installation, configuration, upgrades and maintenance and troubleshooting of the systems.

Environment: AWS, Azure, Terraform, Docker, YAML, Maven, Git, GitHub, GitLab, Jira, Windows, Apache Tomcat, Apache Tomcat, Java, Python, Virtualization, Nagios, Linux/RHEL.

We'd love your feedback!