We provide IT Staff Augmentation Services!

Aws/devops Engineer Resume

5.00/5 (Submit Your Rating)

SUMMARY:

  • Competitive IT Professional with 7+ of experience comprising of DevOps, Cloud Management, and Linux Administration
  • Experience in Linux Administration of various RedHat and Debian based servers
  • Good knowledge on best practices of Software Configuration Management (SCM) in Agile, Scrum, and Waterfall methodologies
  • Strong Experience with Version Control Systems like GIT, SVN (Subversion), CVS, Bitbucket
  • Experience with CI/CD pipelines with Jenkins, Azure DevOps, for end - to-end automation for all builds and deployments
  • Strong Experience with building deployable artifacts using Maven, Ant, MS Build for building deployable artifacts from source code
  • Proficient in deploying and managing repositories Jfrog Artifactory, Nexus
  • Hands-on experience using Ansible, Chef for the configuration management of the infrastructure
  • Experience in working on AWS services including VPC, EC2, IAM, ECS, EBS, RDS, S3, Lambda, etc.
  • Efficient in writing Infrastructure as a code (IaC) in Terraform, Azure resource management (ARM), AWS Cloud formation, created reusable Terraform modules in both Azure and AWS cloud environments
  • Experienced in containers-based deployments using Docker, building Docker images with Docker file
  • Strong experience on Docker orchestration and Docker containerization using Kubernetes
  • Experience in dealing with Azure IaaS - Virtual Networks (VNET's), Virtual Machines, Cloud Services, Resource Groups, Express Route, VPN, Load Balancing
  • Skilled in monitoring servers using Prometheus, Splunk, New Relic, AWS CloudWatch, and AppDynamics
  • Configuring AWS resources for highly available, scalable, and flexible systems to handle load bursts
  • Experience in AWS infrastructure to Serverless architecture (AWS Lambda, Kinesis) through the creation of a Serverless Architecture using Lambda, API gateway, Route53, S3
  • Provision Azure-based high-performance computing environment to support the massive computational requirements of client congres

PROFESSIONAL EXPERIENCE:

Confidential

AWS/DevOps Engineer

Responsibilities:

  • Configure GIT, managed branching, and merging, resolved conflicts, Push changes, etc. Setup and maintained Jenkins to implement the CI process and used Maven to schedule the builds Managed Amazon Web Services (AWS) Cloud services like EC2, S3, EBS, RDS, VPC, and IAM Build AWS services including EC2, creating auto - scaling, load balancers, Route 53, SES and SNS in the defined virtual private connection.
  • Develop Terraform modules for AWS using infrastructure as a code to build staging and production environments. Managed AWS environments and automate the build process for core AMIs using Ansible Automated AWS services which include ELB, EC2, Security Groups, and S3 using Python Created Terraform templates to create different AWS services for the deployment of web applications and databases Managed local deployments in Kubernetes, creating a local cluster and deploying application containers
  • Analyze CI / CD process and create new more secure and efficient microservices oriented process/tools Created Python scripts for various application-level tasks. Configured AWS IAM and Security Groups in public and private subnets in VPC Responsible for automated identification of application server and database server using Ansible scripts Created a CI/CD pipeline to deploy containerized applications using Docker in the AWS cloud for dynamic scaling capabilities Design detailed migration Plans for Workloads from any platform to AWS with minimal downtime Created several Terraform scripts to build the infrastructure in the AWS and configured it using Ansible Used Kubernetes to deploy scale, load balance, scale and manage containerized applications Setup Amazon Cloud Watch to monitor major metrics like Network packets, CPU utilization, etc. Setup Ansible playbooks to deploy various
  • Applications/Services on the host's servers Migrating the current Linux environment to AWS and used auto scaling feature Established infrastructure and service monitoring using Prometheus and Grafana Worked on EFK stack and its components like Elastic search, Fluentd, and Kibana. Handled installation, administration, and configuration of ELK stack on AWS Implemented a load-balanced, highly scalable, and available, fault-tolerant Kubernetes infrastructure Setup environments of different applications on AWS by provisioning on EC2 instances using Docker, EKS, and Terraform Integrated Ansible with
  • Terraform to configure and install packages on the newly created Infrastructure Experience in changing over existing AWS infrastructure to Serverless architecture (AWS Lambda) through the creation of a Serverless Architecture using Lambda Extensive experience in AWS migration by creating AWS VMs, storage accounts, VHDs, storage pools, migrating on premise servers to AWS Cloud and creating availability sets in AWS, backups, etc. Good working experience with databases like MySQL, Mongo DB, Dynamo DB and involved in cre

Confidential

Azure DevOps / Cloud Engineer

Responsibilities:

  • Setup and manage CI/CD pipeline with Azure DevOps (VSTS, TFS) with MS Build, Docker, Maven Configured Windows Azure IaaS - Virtual Networks, Virtual Machines, Cloud Services, Resource Groups, Express Route, VPN, Load Balancing, Application Gateways Facilitated other teams to configure webhooks in Bitbucket to trigger automated builds in Jenkins Hands-on experience setting up Azure Kubernetes Service (AKS) for running microservices Build and Installed servers using Azure Resource Manager Templates (ARM) Configured Azure DevOps (VSTS) pipelines for automation of build and Deployment process as CICD Automated environment for the DevOps services using Python and Shell scripts Work on Azure Storage, Key Vault, Traffic Manager, SQL Database, Scheduling, Auto Scaling, and automation using Power Shell Developed Terraform modules to provision cloud infrastructure in different environments Automated configuration management with Chef to quickly deploys critical applications, and updates Used Kubernetes to manage containerized applications which are responsible to maintain the runtime environment throughout the CI/CD Implemented Infrastructure auto-provisioning, code deployments and software installation using Azure Resource Manager (ARM) templates Deployed services using VSTS (Azure DevOps) pipeline to manage IAC of all applications.
  • Designed Network Security Groups to control inbound and outbound access to NICs, VMs, and subnets Build Docker images with Docker File, worked on creating an environment for Docker volumes. Configured Azure Active Directory and manage users and groups. Automated PowerShell scripts to administrative tasks and management of the server infrastructure Responsible for implementing containerized based applications by using Azure Kubernetes Service (AKS)
  • Kubernetes Cluster Created Azure services using ARM templates (JSON) and ensured no changes in the present infrastructure while doing the incremental deployment. Implemented New Relic based on the requirement and start using this tool for application monitoring. Worked on Power Shell scripts to automate the Azure cloud system creation of Resource groups. Setup Azure ExpressRoute to create private connections between Azure datacenters and infrastructure for on-premises and in a colocation environment.
  • Experienced working with microservices architecture, adapting best practices for developing microservices. Chef Recipes to automate our build/deployment process and do an overall process improvement. Monitor live traffic, logs, Memory utilization, disk utilization and other factors important for deployment using Azure Monitor and New Relic

Environment: Azure, Docker, Kubernetes, Ansible, Terraform, Azure ARM Templates, CI/CD, Azure DevOps, Chef, Bitbucket, Maven, Splunk, New Relic, Python, Power Shell, Azure Monitor

Confidential

DevOps Engineer

Responsibilities:

  • Involved in managing and maintaining the CI/CD pipeline using GitHub, Jenkins, JFrog Artifactory Integrated GIT with Jenkins to automate the code check - out process and continuous integration system Setup Azure environments by deploying Azure IaaS Virtual machines (VMs) and Cloud services (PaaS)
  • Worked on various Azure services including Storage, Network services, Azure Active Directory, API Management, Scheduling, Auto Scaling, Caching, SQL Azure, NoSQL, and PowerShell Automation Deployed and managed applications in production through Ansible Expertise in building Docker with Docker files and container-based deployments using K8s Created Pods, deployments, services, and replication controller in Kubernetes Used Power Shell for troubleshooting remote management of Azure Virtual Machines Create documentation for Chef best practices to be used by developers as a guide to Chef
  • Automation Configuring IAM roles for EC2 instances and assigns them policies granting specific level access to S3 buckets Configured internal load balancer, load-balanced sets, and Azure Traffic manager Used Cloud Formation template for creating infrastructure like EC2, S3 buckets, and RDS, etc. Using
  • Amazon RDS Multi-AZ for automatic failover and high availability at the database tier for MySQL Creating Jenkins Pipelines with Jenkins Scripted File Setup Jenkins CICD pipeline configurations for all the microservices Configured Ansible and wrote various playbooks to manage existing infrastructure
  • Monitored and tracked SPLUNK performance problems, administrations, and open tickets with SPLUNK Worked on build tools Maven and Ant for the building of deployable antifactory from source code Involved in setting up and customizing AppDynamics for Servers Used Jenkins pipelines to drive all microservices builds out to the Docker registry and then deployed to Kubernetes Installed Splunk in production servers for logging purposes. Built Splunk dashboards for monitoring Hands-on experience in Azure practices, SQL Azure and in Azure web and database deployments Automated the cloud deployments using Ansible and AWS Cloud Formation Templates Integrated Docker orchestration framework using Kubernetes, created pods, config maps, deployments Designed AWS Cloud Formation templates to create custom VPC's, NACL's, etc. as per requirement Use Ansible playbooks to automate
  • Kubernetes clusters Performed Cloud migration engineering assessment and oversaw cloud migration, cloud strategy Monitored & troubleshoot Network, Linux and Windows servers using Splunk

Environment: CI/CD, AWS, Azure, Docker, Maven, Ant, Jenkins, Kubernetes, Ansible, Git, Terraform, Ruby, Linux, Cloud Formation, Bash, Power Shell, New Relic, SonarQube, Jfrog Artifactory, Microservices.

Confidential

Site Reliability Engineer

  • Set up CI/CD pipelines for Microservices and integrated tools such as Maven, Git, Nexus, Slack for providing immediate feedback to DEV teams after code check - in. Worked on GIT / GITlab for code check-ins/checkouts and branching and various other functions Configured continuous integration and formal builds using Jenkins with Maven, Ant, and Gradle Configured Jenkins for doing builds and deployments in production and non- production environments Configured and managed AWS services, including Elastic load balancers for incoming loads Maintained Apigee for building application
  • Providing security over cyber threats in giving better assistance to the team's developer Create Chef Cookbooks and Recipes to maintain and automate various parts of the infrastructure Worked on implementing Docker file to created various Docker images for the testing environment Managed clusters efficiently while providing resource Isolation through Mesosphere Troubleshooting Linux network, security related issues, capturing packets using tools such as IP tables Experience in managing source control repositories like Bitbucket by creating new repositories Deployed Nagios to identify and resolve infrastructure problems before they affect critical processes Managed Red Hat Linux user accounts, groups, directories, and file permissions. Configured AWS IAM and Security Group in Public and Private Subnets in VPC Automated scripting using Bash
  • Shell, Yaml for various administration tasks for automation. Designed AWS Cloud Formation templates to create VPC, to set up IAM policies for users, subnets, NAT to ensure successful deployment of Web applications, database templates, and security groups. On-call support for 24/7 for troubleshooting production issues Implemented technical solutions for system logging for clients using Graylog

Environment: Gitlab, Jenkins, Maven, Linux, Chef, AWS, Cloud Formation, Ant, Gradle, CICD, Bash, Nagios, Bitbucket, Docker, Mesosphere, Apigee

Confidential

Linux Administrator

Responsibilities:

  • Server's monitoring and administration, patches, user administration, hardware failure, monitoring log files, backup, software up - gradation, configuration changes, and documentation Administered Red hat Linux servers for several functions including managing Apache/Tomcat server, Mail server, MySQL database and firewalls in both development and production Worked with Linux Utilities: KICKSTART, SSH, FTP, Quota Management, wrappers, User Management, Process Management, Memory Management, and Text processing tools Log Management, Package Management, Disk Management, and Swap
  • Partition/Files Management Involved in Planning, installation, configuration, monitoring, and deployment of Linux environments Managed Red Hat Linux user accounts, groups, directories, and file permissions Installed, Configured and Maintained Debian/RedHat Servers at multiple Data Centers Proficient in
  • Bash Shell, Perl Scripting for Administration, Monitoring, Installation and configuration, Peer-review tasks across the UNIX platforms Strong working knowledge in Networking including the OSI LAYERS and protocols such as TCP/IP, NIS, DNS, NFS, FTP, DHCP, SFTP, HTTP, HTTPS, and SMTP Supported applications running in Web Logic, JBoss and Tomcat and participated in the on-callrotation for 24/7 production support Responsible for setting up firewall rules and configuring security for servers Worked together with the team members in resolving various application issues Expertise in implementation and designing of disaster backup and recovery plan Password-less setup and agent-forwarding done for SSH login using SSH-keygen tool

Environment: Linux, Unix, Solaris, YUM, RPM, NFS, FTP, SAMBA, Red Hat Linux 8/9, RHEL 3.x/4.x/5.x, Red Hat Satellite 6, OEL 4/5.x and SUSE Linux 10.x/11, Debian, Bash Scripting, Power Shell, Windows

We'd love your feedback!