We provide IT Staff Augmentation Services!

Sr. Devsecops/cloud Engineer Resume

5.00/5 (Submit Your Rating)

Medley, FL

PROFESSIONAL SUMMARY:

  • Professional Cloud/DevOps engineer having 8+ years of IT experience as a system administrator, worked on AWS, AZURE services, CI/CD pipeline, Build/release management and VMware technologies.
  • Experience in tools like Terraform, Kubernetes, Ansible, Chef, Puppet, Scripting and Monitoring tools. Expertise in Agile framework such as Scrum, Kanban and Waterfall methods in software development lifecycle (SDLC).
  • Expertise in AWS services Like EC2, Load Balancer, Lambda, S3, RDS, DynamoDB, Aurora, SQL, VPC, Route53, IAM, WAF, CloudFormation, Elastic Container Service (ECS), Elastic Kubernetes Service(EKS), Kinesis, EBS, Elastic Beanstalk, CloudWatch, CloudTrail, Security Groups, SNS, SQS, Direct Connect.
  • Expertise in writing AWS Cloud Formation templates in JSON to use them as blueprints for building & deploying multiple AWS resources. Worked on Kinesis Data Streams & Kinesis Firehose & integrated with AWS Lambda for serverless data collection.
  • Experience in implementing and configuring AWS Elastic Beanstalk for deploying and scaling web applications, developed with Java, PHP, Node.js, Python, Ruby and Multi Container Docker on familiar servers such as Apache, Nginx.
  • Played a pivot role in implementing DevSecOps Model across the organization, platform and implemented vulnerability checks at different phases.
  • Experience in DevSecOps strategy for security auditing, continuous monitoring of the entire infrastructure and applied Web Application Firewall (WAF) rules for blocking the attacks through SQL injection and patterns.
  • Experienced in Azure Cloud Services (PaaS & IaaS & SaaS), VM’s, Storage, Web Apps, Azure Active Directory, Azure Application Insights, Logic Apps, Data Factory, Service Bus, Azure Monitoring, Azure OMS, Key Vault, Cognitive - Services (LUIS) & SQL, ExpressRoute, Load Balancing, Application Gateways.
  • Knowledge of Azure Site Recovery and Azure Backup Installed and Configured the Azure Backup agent and virtual machine backup, Enabled Azure Virtual machine backup from the Vault.
  • Excellent understanding of Software Development Life Cycle (SDLC) methodologies like Waterfall, Agile and SCRUM.
  • Proficient on Terraform key features such as Infrastructure as code, execution plans, resource graphs, change automation and created infrastructure to deploy various applications across multiple cloud providers.
  • Hands on experience in writing Terraform API modules to manage infrastructure, for automatic creation of AWS services like RDS instances, VPCs, Autoscaling groups, Load balancers, SQS, S3 buckets .
  • Worked on Hashi corp Vault secret tool to provide security for credentials, tokens and API keys.
  • Experience in creating the AWS cloud Infrastructure by using Terraform and Deployed IaC code using Jenkins CI/CD pipelines and configure AWS EC2 with Ansible Playbooks and Roles.
  • Experience in creating Docker Containers leveraging existing Linux Containers and AMI's in addition to creating Docker Containers from scratch.
  • Expertise in building Docker images and deploying Docker containers, and Kubernetes as container-based production clusters, managing docker volumes, creating and removing images.
  • Experience in Docker container orchestration framework using Kubernetes to create pods, ConfigMaps and deployments into cluster. Containerized legacy Java and Nodejs application, run it in AWS Elastic Kubernetes Service. Auto-scaled the application in both pods level and instance level.
  • Experience in building and deploying the application code using Kubernetes CLI called Kubectl, Kubelet, Kubeadm and schedule the jobs using Kube scheduler. Managed K8s charts using Helm and created reproducible builds of the Kubernetes applications.
  • Expertise in adding Service Mesh, a dedicated infrastructure layer for communication between Kubernetes microservices and balances inter-service traffic upon specific policies.
  • Experience in OpenShift platform in managing Docker Containers, Kubernetes Clusters, Ingress Rules, Services and Helm Charts and implemented a production ready, load balanced, highly available, fault tolerant Kubernetes infrastructure
  • Efficient in writing Jenkins CI/CD pipelines to drive all Microservices builds also creating Groovy Scripts for setting up Continuous Integration for new branches, build automation, Plugin management, Securing Jenkins.
  • Experience in Developing automated continuous integration/continuous delivery pipeline for code deployment using Jenkins. Used Jenkins as Continuous Integration tool: creating new jobs, managing required plug-ins, build trigger, build system and post build actions, scheduled automation builds.
  • Experience in Creating DSL Groovy scripts and integrating with Jenkins for end-end automation.
  • Worked extensively on Ansible Roles, inventory, Ansible Tower, Ansible Galaxy and used Ansible Control Server to deploy plays and playbooks to the machines and systems in the inventory.
  • Strong Experienced in managing Ansible Playbooks with Ansible roles, high-level child-branch strategies inventory management, group variables, copy and remove files on remote systems using file module.
  • Hands-on experience in configuring Chef Server Enterprise on-premise, workstation bootstrapped the nodes using knife and automated by testing Chef Recipes, Cookbooks with test-kitchen and chef spec.
  • Expertise on version control tools like Subversion (Centralized) and distributed version control tools like Bit Bucket, TFS, SVN, IBM Relational ClearCase, GIT including flavors like GitHub, GitLab etc.
  • Knowledge in Installing, configuring, and managing full end-to-end GitLab setup, Pipeline Management. Also, managed and utilized GitLab runners to support application testing and fill system level to support GitLab.
  • Experience in different log monitoring tools like Nagios, Datadog, Splunk, ELK (Elastic Search, Log Stash, Kibana) to see logs information, monitor, security and get the health notifications from nodes.
  • Proficient with Ruby, Perl, Power Shell, JSON, YAML, Groovy, Bash/Shell, Python. Developed python, and shell scripts for automation of the build and release process.
  • Expertise in Linux Administration like RAID levels, Grub, Disk management, patch management, Networking, Scripting, Kickstart, LVM, CRON jobs, Performance monitoring, troubleshooting on different distributions such as Red Hat, CentOS, Ubuntu and Debian. The file systems that were used were VxFS, ZFS, UFS, ext3 and ext4 .

TECHNICAL SKILLS:

Operating System: Linux (RedHat, CENTOS), Unix, Solaris, Ubuntu, Windows, MacOS.

Cloud Platforms: AWS, Azure, GCP

Automation Tools: Jenkins, Jfrog, Nexus, Docker, Kubernetes, Ansible, Terraform, compliance, Kitchen, chef solo, Puppet, Vagrant, Cloud Foundry

Version control tools: GIT, GITHUB, SVN, Bitbucket, GitLab, IBM Rational ClearCase, AWS Code Commit

Containerization Tools: Kubernetes, Docker, Docker Swarm, AWS Fargate, OpenShift

Networking/Protocol: DNS, DHCP, Cisco Routers/Switches, NIS, NFS, WAN, LAN, FTP/TFTP, TCP/IP

Application/Web Server: Tomcat, Apache, Application Server, IIS, Oracle WebLogic

Scripting: Python, Groovy, Shell Scripting, Ruby Scripting, Power Shell

VMWare ESX/ESXi, Windows Hyper: V, Power VM, Virtual box, Citrix Xen

Monitoring and Logging Tools: Nagios, Splunk, CloudWatch, CloudTrail, Datadog, ELK

Testing and ticketing tools: SonarQube, Selenium, JIRA, ServiceNow, Remedy, GitLab

WORK EXPERIENCE:

Confidential, Medley, FL

Sr. DevSecOps/Cloud Engineer

Responsibilities:

  • Designed, configured and managed cloud infrastructures utilizing Amazon Web Services including core services EC2, S3, Glacier, Auto Scaling Groups, ELB, EBS, ECS and Database services RDS, DynamoDB, Aurora, Elastic Search and application layer services like API Gateway, Lambda and network layer services like VPC and its sub components and Security layers services like IAM, SSM, Cloud trail, Cloud watch, KMS and Integration layer Services like Kinesis, SNS, SQS, Route53 and Orchestrated application workflows using AWS Fargate, EKS.
  • Architected and configured a virtual data center in the AWS cloud to support Enterprise Data Warehouse hosting including Virtual Private Cloud (VPC), Public and Private Subnets, Security Groups and Route Tables.
  • Worked on migration services like AWS Server Migration Service (SMS) to migrate on-premises workloads to AWS in easier and faster way using Rehost "lift and shift" methodology and AWS Database Migration Service (DMS), AWS Snowball to transfer large amounts of data and Amazon S3 Transfer Accelerat
  • Provisioned the AWS App Mesh for network traffic controls on EC2 instances, ECS, EKS , AWS Fargate and integrated monitoring tool cloud watch to automatically export the data to Splunk and Kibana .
  • Configured Auto Scaling in customized VPC’s based on Elastic load balancer traffic and deployed Autoscaling policies to scale up/down EC2 instances based on ELB health checks in response to the triggers.
  • Worked on the Amazon Aurora database service on the AWS cloud and Implemented automatic machine Disaster recovery on AWS cloud and also setting up databases using RDS, storage using S3 bucket, Amazon Glacier by configuring instance backups to the S3 bucket and deployed instances multiple availability zones to ensure fault tolerance and high availability through Terraform .
  • Integrated the AWS Elastic Kubernetes Service with AWS CloudWatch, Auto Scaling Groups, SQS and VPC for monitoring, scaling and load-balancing the application and used AWS Fargate Engine for container services, security is improved through application isolation by design.
  • Composed Python, Groovy and Shell Scripts to do CI/CD using Jenkins, Git in GitHub, to access the databases to retrieve and archive data and to improve application security and worked on Automation tool (Maven) and artifact repository for pushing successful build code.
  • Implemented POC’s and Performed POT’s and introduced Terraform Enterprise there by automated installation, configuration of TFE for administration and audit activities and also worked with Security compliance squads to configure Sentinel policies (Policy as a Code) to perform pre provisioning security compliance rules validations prior to infrastructure provisioning and extended scope to perform post provisioning infrastructure scans using AWS Spec and Inspec frameworks.
  • Provisioned the Hashi Corp Vault and Consul Cluster writing the code in Terraform (IaC) and setting up the Jenkins Pipeline to build the configuration in AWS environment.
  • Worked on Terraform modules, providers and resources to setup vault elements like LDAP Authentication Methods, Namespaces, and Secret Engines etc.
  • Implemented Security Scans like Static and Dynamic Application testing at each layer of DevOps life cycle and converted the existing DevOps methodologies/workflows to DevSecOps model.
  • Applied Key Management service (KMS) for encrypting data when residing on one environment and implemented SSL encryption during data transportation.
  • Worked on to setup for the various Jenkins CICD pipeline configurations for all the micro services.
  • Worked on the build activities for all the existing micro services.
  • Configured applications that run multi-container Docker applications by utilizing the Docker-Compose tool
  • Integrated Docker container-based test infrastructure to Jenkins CI/CD test flow and executed build environment by integrating with Jira to trigger builds using Webhooks and Slave Machines.
  • Virtualized the servers using Docker for the test environments and dev-environments needs, also configuration automation using Docker containers.
  • Created Kubernetes YAMLs using different objects like Pods, Deployments, Services and ConfigMaps.
  • Created reproducible builds of the Kubernetes applications and managed Kubernetes manifest files, Kubernetes charts using Helm and releases of Helm packages.
  • Monitoring and analysis of Kubernetes pods logs using Elastic search and Grafana.
  • Triggered Application load balancer (ALB) by using AWS ALB Ingress controller for the EC2 instance and declared ingress resource to route HTTPS traffic to specific pods in a Kubernetes cluster by balancing the traffic and provided integrated access logs and health checks.
  • Responsible for writing Jenkins shared libraries and configured generic Continuous Integration and Continuous Delivery pipelines to achieve CDaaS (continuous delivery as a service) with end to end unit and integration test cases using Groovy Spock/Junit frameworks and adopted Semantic Versioning concepts to achieve consistency and stability across application releases.
  • Experienced in managing on-prem (Linux, Windows systems) as well as cloud environment with Ansible Playbooks and Roles. Have built around 50 Ansible Roles to support apps running in environment.
  • Configured and Manage Ansible and Ansible Tower to automate repetitive tasks, configure AMIs, support apache/tomcat and configure Ec2 as Web Servers and proactively manages change and Experience in managing Ansible Playbooks with Ansible Roles, group variables, inventory files with integration of Molecule test cases.
  • Using AWS Kinesis stream implemented an architecture design that integrate AWS CloudWatch log groups and server-side logs with Splunk for reporting and monitoring purpose.
  • Developed Enterprise level monitoring solutions in python and deployed it on to AWS Lambda which can collects the application flow logs at resource level and stream them to Splunk dash boards and Configured ELK (Elasticsearch, Logstash, Kibana)to audit the Jenkins builds and performance.
  • Skilled in monitoring servers using Nagios, Cloud watch and using ELK Stack Elasticsearch Fluentd Kibana.
  • Performed Log analysis using ELK Stack (Elasticsearch, Logstash, Kibana) and created monitoring charts.

Environment: AWS (EC2, S3, EBS, VPC, Elasticsearch, Route53 (DNS), API Gateway, Lambda, CloudFormation, DynamoDB, RDS, RedShift, SNS, SES, SQS, Fargate, Docker, Kubernetes, Ansible, Maven, Jenkins, GIT, Java, Python, Linux, Jira

Confidential, TN

Cloud/DevOps Engineer

Responsibilities:

  • Configured and leveraged AWS services and resources like AWS EC2 instance, Amazon API Gateway, Serverless function lambda, Infrastructure as a code like Cloud Formation, JSON template, security services like AWS security groups, Route53, SSL, Security Hub, KMS and network services like VPN, Network peering.
  • Created AWS CloudFormation template by using JSON/YAML and implemented Tomcat and Apache Web servers for deployment and coordinated with offshore and onshore teams for production, Triggered jobs for recovering crucial data of production by using AWS REST API to store on Dynamo DB .
  • Created S3 buckets and managing policies, utilized s3 bucket and glacier for storage and backups.
  • Migrated On-Premise VM’s to AWS using AWS Direct Connect Service and defined comprehensive strategy around security as part of AWS migration strategy.
  • Optimized EBS Volumes and EC2 Instances and created multi Availability Zone VPC instances and maintained the traffic using Route 53 Weight Routing Policies and used AWS SNS for notifications in AWS cloud.
  • Involved in Design discussions of Tier 0 application implementations with IT Architecture and application squads and provided strategic solutions using Canary and Blue/Green deployment methodologies.
  • Built an application environment to operate at high availability in different Azure regions by using CDN, Azure Traffic Manager, App Services-Web Apps, Active Directory, Storage Queues, Cognitive Services, Azure Search, Storage Blobs, Redis cache, and SQL Database.
  • Experienced in Azure Role-based Access Control (RBAC) to segregate duties within our team and grant only the amount of access to users that they need to perform their jobs.
  • Creating and Managing Virtual Machines in Windows Azure and setting up communication with the help of Endpoints. Configured Shared Access Signature (SAS) tokens and Storage Access Policies in Azure Cloud Infrastructure.
  • Migrated On-Prem Windows App to Azure VMs and worked with Vnet Engineer to configure traffic routing’s and manage Transit Hubs workflows.
  • Maintained complex applications Cloud Formation IaC stacks using Terraform and provided generic modules to support Immutable deployments thereby converted terraform as enterprise Infra automation tool and used Terraform Graphs to visualize TF plans.
  • Working with Middleware Engineering Team and write custom Ansible Playbooks to automate Amazon machine Images using Packer features and performed immutable deployments by leveraging the concepts of create before destroying through Terraform.
  • Configured Grafana docker container to use RDS endpoint URL to store user sessions, route53 DNS record as server root URL, it can be used as callback URL while setting oauth single sign on solution.
  • Configured Flux CD on Kubernetes container environment, utilizing Kubernetes and Docker for the runtime environment, monitoring the docker images reelkpositories, triggered the deployments and update the running configurations of Kubernetes cluster
  • Implemented Istio as service mesh in Kubernetes for secure communication across pods from Ingress to service and to pods and implemented Nginx for providing reverse proxy .
  • Managing and Monitoring Kubernetes clusters using Prometheus as a data aggregator and Grafana as a data visualization platform.
  • Migrated from Chef Configuration tool to Ansible by implementing POC’s, automated the deployment by installing ansible and ansible tower on EC2 instances, written playbooks and maintained hosts in the inventory.
  • Used the Chef Cookbooks and transferred data/files to Ansible Playbooks and built the ansible on Control node and agentless configuration service is provided to managed node.
  • Designed DevOps workflow for multiple applications by orchestrating Test, Build, Release and Deploy phases through various CI/CD pipelines using Git, Jenkins.
  • Automated the application and infrastructure deployment by writing the Jenkins shared libraries in groovy with end to end testing using Groovy Spock/Junit testing frameworks for CI/CD life cycles and created Generic pipelines.
  • Monitored the servers and applications’ health status using Splunk, responded to alerts, and configured threshold settings. Also Configured Splunk to monitor Linux servers with Ansible automation
  • Migrated Windows Active Directories and .net applications from AWS to Azure cloud by implementing POC’s in the organization and Performing POT’s in Azure implementation.
  • Experience in administration and configuration of ELK Stack (Elasticsearch, Logstash, Kibana) on AWS and performed Log Analysis.
  • Implemented and Managed GitLab Instances and Runners along with its Admin Area to manage Projects, Pipelines, Kanban boards and created GitLab System Hooks for changing the existing information in servers.
  • Wrote Python scripts for pushing data from DynamoDB to MySQL Database. Also created and maintained the Python deployment scripts for Web Sphere, web application server.
  • Used MAVEN as a Build tool for building deployable artifacts (war & jar) from source code. Worked with Maven in Java environment for authoring pom.xml files for Java projects and managing maven repositories.

Environment: AWS, Azure, Docker, Chef, Flux, Kubernetes, Jenkins, CI/CD, Maven, Git, Splunk, GitHub, WebLogic, Ansible, Apache Tomcat, DynamoDB, MySQL, Linux, VMWare Servers, PowerShell, Bash, Python.

Confidential

Cloud Engineer

Responsibilities:

  • Built environment in AWS using EC2 instance creation, Route 53 DNS routing, Cloud Watch alarming, VPC setups, AWS Elastic Load Balancing , Auto Scaling groups and databases like RDS, DynamoDB and networking services like Route53, Direct Connect .
  • Implemented AWS Beanstalk for deploying web applications based on .Net, Node.js, python along with EC2 instances, Elastic Load Balancing (ELB), which performed balance across instances in multiple availability zones. Launched Amazon EC2 instances using AWS ( Linux/ Red Hat/Windows ).
  • Defined AWS Security Groups , which acted as Virtual Firewalls that controlled the traffic allowed to reach one or more AWS EC2 instances. Worked on Multiple AWS instances, set the security groups, Elastic Load Balancer and AMIs, auto scaling to design cost effective, fault tolerant and highly available systems.
  • Improvements done to agile software development teams by working with GitHub by Continuous integration and continuous delivery.
  • Worked on Git, Issue Tracking, pipeline management and Documentation with GitHub to Automate and integrate the code checkout process.
  • Developing and maintaining the build environment, the source code control system and managing build packages using GIT and GIT Hub .
  • Implemented the Docker for wrapping up the final code and setting up development and testing environment using Docker Hub.
  • Implementation of JIRA to track all issues pertaining to SDLC and Integration of JIRA with GIT repository to track all code changes.
  • Written several chef cookbook and recipes to automate the installation of web logic domain and JDK installations and have customized recipes from chef supermarket to align with current requirements.
  • Executed Azure functions in Python to invoke scripts for data transformations call Storages by REST API.
  • Utilized Atlassian tools (Bitbucket, JIRA, Bamboo, Confluence) to support DevOps initiative workflows.
  • Worked on Linux installation, configuration, upgrades and maintenance and troubleshooting of the systems.

Environment: AWS, Docker, YAML, Maven, Git, GitHub, GitLab, Jira, Windows, Apache Tomcat, Apache Tomcat, Java, Python, Virtualization, Nagios, Linux/RHEL.

Confidential

Linux System Administrator

Responsibilities:

  • Provided administration and maintenance for daily operations of information systems that support critical applications to servers. Systems support includes openSUSE , LVM, Ubuntu . Utilized LVM and Software Raid to manage disks and file systems.
  • Installation, Configuration of NFS, DNS, SAMBA, and APACHE severs in RedHat, Debian, and Ubuntu Linux Servers. Configured and managed SELinux (Linux Firewalls) and allowed appropriate ports with help of iptables.
  • Involved in design, configuration, installation, implementation, management, maintain and support for the Corporate Linux servers RHEL 4.x, 5.x, SLES 9, CENTOS 5.x, Solaris for business critical with Disaster Recovery.
  • User account management, worked with Perl , Shell Scripting (bash) to automate administration tasks, analyzed security-based events, risks and reporting instances.
  • Dealt with Linux Utilities: KICKSTART, SSH, FTP, AUTOFS, Quota Management, Wrappers, User Management, Process Management, Memory Management, and Text processing tools, Log Management, Package Management, Disk Management and Swap Partition/Files Management.
  • Wrote Bash Shell Scripts for automation of daily tasks and involved in development of automation scripting to deploy some applications.
  • Log monitoring, monitoring and manage CPU performance, storage on KVM, troubleshooting networking protocols TCP/IP, NFS, DNS, DHCP, SMTP. Creation of Logical volumes (LVM) for Linux operating systems.
  • Supporting Application Team, Storage Team, DBA Team at OS system level.
  • Performed troubleshooting of DNS, DHCP and Active directory.

Environment: Linux, Python, Ruby, Nginx, Kickstart, LVM, MySQL, Java, PowerShell, Apache, JBoss, Shell Scripting, Bash Scripting, TCP/IP, DNS, DHCP.

We'd love your feedback!