Infrastructure & Cloud Engineer Resume
Plano, TX
SUMMARY
- Experienced Infrastructure & Cloud Engineer with expertise in public and private Cloud Architecture, Security, Routing, Switching, Firewalls, Linux, SDN, Virtualization and Network Automation. Over 6 years of experience in system administration, consulting and cloud architecting in the IT industry for several companies.
TECHNICAL SKILLS
Operating Systems: Windows 7/8/10, RHEL 5.x, 6.x, 7.x. 8.x, Centos, Ubuntu, Fedora, Debian, and Mac OS
Public Cloud: Amazon Web Service (AWS) VPC, EC2, Lambda, API Gateway, S3, EBS, RDS, IAM, Route53, Cloudfront, Dynamo DB, Cloudwatch, ECS, ECR, CodePipeline, Codebuild, Athena, Elastic Beanstalk, CloudFormation
Private Cloud: VMware Enterprise PKS
Web Servers: IIS, Apache
Networking: TCP - IP, Network Security, Subnetting, VPN, DNS, DHCP, Routing (OSPF, BGP, EIGRP), iptables, tcpdump, ssh
Languages/Script and web technologies: HTML, XML, Bash, yaml, json, Python, C++, C#, Swift
Hardware: Cisco Routers, Cisco Catalyst Switches, Juniper Routers, Fortinet (Fortigate, FortiSwitch, etc), Arista 7050/7010/7049 , CradlePoint, Palo Alto, Alcatel 7750, ADVA 825/206/114, Overture 140/4800, D-link, Netgear, Netapp, Datrium DVX, Aruba Switches
Network Virtualization: NSX-T Data Center
Automation: Ansible, Terraform
Other: Jenkins, Docker, Splunk, Kubernetes, vSphere, Wireshark, Nginx, Kubernetes, NFS, Qualys, Sophos, LogicMonitor, Graylog, Tenable, JIRA, Confluence, ServiceNOW, Slack, Git, GitHub CodeTools, NewRelic
PROFESSIONAL EXPERIENCE
Confidential, Plano, TX
Infrastructure & Cloud Engineer
Responsibilities:
- Migrated VMWARE VMs to AWS and worked with internal teams to plan migration of applications to AWS cloud
- Knowledge of Amazon EC2, VPC (NAT, Peering, VPN), IAM, EC2 Container service, S3, CloudFront, RDS, DynamoDB, Elastic Cache, Direct Connect, Route 53, Cloudwatch, Glacier, Cloud Formation, Cloud Trial, SNS, SQS, and API Gateway
- Designed secured, cost optimized, highly available and resilient infrastructure in AWS, ensured data integrity and data security by implementing AWS best practices
- Built a set of security policies which helps in identifying, categorizing and protecting the assets on AWS, managing access to AWS resources using accounts, users and groups
- Implemented security best practices in AWS including multi factor authentication, access key rotation, role-based permissions, enforced strong password policy, configured security groups and NACLs, S3 bucket policies and ACLs, etc
- Optimized cost through reserved instances, selection and changing of EC2 instance types based on resource need, S3 storage classes and S3 lifecycle policies, leveraging Auto Scaling etc
- Implemented and maintained the monitoring and alerting of corporate servers/storage using AWS CloudWatch
- Provisioned Linux machines on AWS, created AMIs, user administration on AWS, assigned Elastic IPs, created machines under VPC, configured auto scaling and defined cloud formation JSON templates (CFT)
- Built S3 buckets and managed access permissions using bucket policies and access control lists (ACL) and dealt with object life cycle management and versioning to automate the object archival
- Experience using Terraform for AWS Resource Provisioning. Automated and created AWS services which includes VPCs, Internet gateways, routes, web servers, ELB, CloudFront distribution, database, EC2, database security groups, S3 bucket and application configurations
- Written Templates for AWS infrastructure as a code using Terraform to build stage and prod environments
- Responsible for the design, configuration, installation, management, and support for all Linux servers and services
- Responsible for the planning, testing and performing upgrades and patches on all Linux servers
- Hands-on experience with Docker Containerization on Linux, created Docker images using a Docker file, worked on Docker container snapshots, removing images and managing Docker volumes
- Installed, configured and upgraded Jira, Confluence, Bitbucket and Bamboo
- Migrated and modernized applications from legacy AWS accounts to current accounts.
- Designed Networked Attached Storage (NAS) solutions for complex applications and environments, resulting in highly available and high-performing storage infrastructure
- Evaluation/design/development/deployment of additional technologies and automation for managed services on AWS
- Managed development of system requirements to ensure compliance with security regulations for MFA
- Designed and deployed scalable, highly available, Secured and fault tolerant systems on AWS.
- Used AWS Route 53 for configuring the High-Availability and Disaster recovery to make the environment up and running in case of any unexpected disaster.
- Created configuration for establishing a VPN tunnel between on premise network and AWS VPC.
- Coordinated with the Development, DBAs, QA, and IT Operations teams to ensure there are no resource conflicts.
- Participated in deep architectural discussions to build confidence and ensure customer success when building new solutions and migrating existing data applications on the AWS platform.
- Ordered, configured, installed, and maintained a wide range of network equipment (routers, switches, firewalls).
Confidential, Plano, TX
Cloud Engineer
Responsibilities:
- Responsible for Creating AWS IAM Users, Policies, Groups etc.
- Provisioned AWS resources like EC2, VPC, EBS, AMI, S3 buckets, creation of subnets using Ansible.
- Designed, Deployed and maintained security, network and systems management applications within an AWS environment
- Physical to virtual migration of customer workloads from on-site data center
- Performed remote and on-site product/solution proof-of-concepts, initial configurations, and product training
- Developed and implemented the technical architecture and physical design of the network: analyze existing voice and data networks and recommend solutions
- Performed data migration from on premises environments into AWS
- Integrated new company acquisitions and mergers including circuit cutovers, equipment upgrades, and detailed walkthroughs with onsite technical personnel
Confidential
Systems Administrator
Responsibilities:
- Created and documented standard operating procedures for deploying, securing, and maintaining a high volume (+250) of remotely accessed Linux servers.
- Developed process for performing vulnerability testing and deploying mitigation strategies to deployed servers.
- VMWare administration and maintenance.
- Responsible for patching and maintenance of Linux and Windows systems
- Setup new SSL VPN service and installed and configured client applications
- Administered LAN and provided troubleshooting for systems or networking related issues.
- Executed configurations for routers, switches, wireless AP's, and WLAN controllers using Cisco/Juniper/Palo Alto hardware
- Used Wireshark and in-house tools to troubleshoot complex throughput, and degraded performance
- Proficient with BGP, OSPF, QoS, VLANs, VPN and IPSec tunnels on Palo Alto, Cisco, Fortinet devices
- Monitored the network in order to identify any irregularities in user activity and provide quality documentation.
- Created and maintained network topology documentation as new sites were integrated.
- Exposure to cloud environments - AWS (with VPC/VPN)