We provide IT Staff Augmentation Services!

Sr. Azure Devops Engineer Resume

Atlanta, GA

SUMMARY

  • Proficient in Administrating Microsoft Azure IAAS, SAAS and PAAS services such as Compute Azure Virtual Machines, Virtual Network, Blob storage, Azure Data Factory, Cloud Services, Resource Groups, AKS, Express Route, Traffic Manager, Load Balancers, Application Gateways, Auto - Scaling, deploying Web Apps, monitoring by Azure Application Insights, and creating Web-Jobs.
  • Experience in configuring Azure Web Apps, Azure App services, Azure Application insights, Azure Application gateway, Azure DNS, Azure Traffic Manager, Analyzing Azure Networks with Azure Network Watcher, Implementing Azure Site Recovery, Azure stack, Azure Backup and Azure Automation.
  • Hands on Experience in designing and implementing Service Oriented Architecture underlined with Ingress and Egress using Azure Data Lake Store, Azure Data Bricks & Azure Data Factory by adding blobs to lakes for analytic results and so pull data from Azure data lake to the Blobs.
  • Experienced in migrating on-premises applications, DevOps platform to Azure DevOps CI/CD processes by utilizing ARM templates, Azure DevOps, Azure CLI, App services such as Repos, Pipelines, Web Apps, PowerShell and to monitor applications with Application Insights.
  • Hands on experience on Implementing CI/CD pipeline using Azure DevOps (VSTS, TFS) in both cloud and on-premises with GIT, MS Build, Docker, Maven along with Jenkins plugins.
  • Experienced in Amazon Web Services (AWS) cloud platform and services like Lambda, DynamoDB, EBS, ELB, IAM, Elastic Beanstalk, CloudFront, CloudWatch, Ops Work SNS, Glacier, Auto-Scaling, IAM, Route53, EC2, S3, RDS, VPC, VPN, Security-Groups and through AWS management console.
  • Used various triggers and configured various AWS messaging services like SNS, SQS, SES, Pinpoint and acquainted with database services like Amazon Aurora, RDS, DynamoDB and RedShift.
  • Created, managed AWS CloudFormation Stack and integrated it with CloudTrail for monitoring the infrastructure. Stored versioned CloudFormation templates in GIT, visualized CloudFormation templates as diagrams and modified them with the AWS CloudFormation Designer.
  • Experience in writing Infrastructure as a code (IaC) in Terraform, Azure resource management, AWS Cloud formation. Created reusable Terraform modules in both Azure and AWS cloud environments.
  • Expertise in delivering Agile projects from end-to-end Continuous Integration/Continuous Delivery (CI/CD) pipeline by integration of tools like Jenkins, Chef and AWS for VM provisioning. Integrated Jenkins with Docker container using Cloud bees Docker pipeline plugin and provisioned the EC2 instance using Amazon EC2 plugin.
  • Hands on Experience in Creating fully automated build (CI) and deployment (CD) infrastructure and processes for multiple projects using Docker, Jenkins (Cloud bees), Sonar Cube, VMWare, RHEL, Kubernetes, Artifactory, Ansible & GitLab.
  • Proficiency in using Docker Hub, Docker Engine, Docker images, Docker Weave, Docker Compose, Docker Swarm, and Docker Registry and used containerization to make applications platform when moved into different environments.
  • Expertise in using Kubernetes for running/managing containers, images, and container snapshots, while creating a platform for automating, deploying, scaling of application containers across clusters of hosts.
  • Hands-on experience in Deploying Kubernetes Cluster on cloud environment with master/minion architecture and wrote many YAML files to create many services like pods, deployments, auto scaling, load balancers, labels, health checks, Namespaces, Config Map, etc.
  • Expertise in configuring the monitoring and alerting tools according to the requirement like Prometheus and Grafana setting up alerts and deployed multiple dashboards for individual applications in Kubernetes.
  • Experience in Implementing DevSecOps strategies at different stages in Infrastructure and used DSAT, SAST models to avoid security flaws.
  • Experienced in DevSecOps strategy for security auditing, continuous monitoring of the entire infrastructure which facilitates enhanced compliance and eliminates security breaches and vulnerabilities.
  • Experience in creating the Ansible Playbooks to install and configure Apache, Tomcat, Splunk, Jenkins, WebLogic, Rundeck and for the deployment automations also Integrated Jenkins, Rundeck and Ansible.
  • Hands on Experience working with Ansible and Ansible Tower as Configuration management tool, to automate repetitive tasks, quickly deploys critical applications, and proactively manages change and Experience in managing Ansible Playbooks with Ansible roles, group variables, inventory files, copy and remove files on remote systems using file module.
  • Experience with build, design and maintain the platform automation infrastructure using Chef and Involved in setting up Chef Workstation, Nodes, Cookbooks, and Recipes using Ruby Scripting and familiar with Knife in Chef.
  • Expertise in Installing, Configuring, and managing the Puppet Ecosystem Components for both opensource and enterprise version of Puppet and involved in Designing and Implementing Puppet with Orchestration and code manager with R10K along with Git, GitLab and Git Hub.

TECHNICAL SKILLS

Cloud Technologies: AWS (VPC, EC2, S3, CloudWatch, RDS, Elastic Cache, IAM), Microsoft Azure

Configuration Management: Chef, Puppet, Ansible, Docker.

CI Tools: Jenkins, Bamboo, Hudson, Maven.

Middleware: File Systems WebLogic, WebSphere and Tomcat, UFS, VMware, vSphere

Scripting languages: Bash, Python, Ruby, Shell Scripting

Version Control Systems: GIT, Sub Version, CVS

Proxy Server: NGINX

Database: Elasticsearch, Oracle 10.x, MySQL 5.0.2, SQL Server 2005, Postgres SQL, MongoDB

Operating Systems: Linux (Red Hat, SUSE), Solaris, HP-UX, Ubuntu, Fedora, CentOS, Windows

Networking: TCP/IP, NIS, NFS, DNS, DHCP, Cisco Routers/Switches, WAN, SMTP, LAN, FTP/TFTP

Web Technologies: Servlet, JDBC, JSP, HTML, JavaScript, XML

Web Server: Web logic, WebSphere, Apache Tomcat, JBOSS, Nginx, HAProxy

System Monitoring Tools: Nagios, Splunk, Dynatrace

Reporting tools: ServiceNow, Bug tracker, Jira, Bugify, OIA

PROFESSIONAL EXPERIENCE

Sr. Azure DevOps Engineer

Confidential, Atlanta, GA

Responsibilities:

  • Provisioning Azure resources of different providers Compute, Network, Service Fabric, Application gateway using ARM template and implemented and maintained dev, test, staging, and production environments leveraging infrastructure as code using Azure ARM templates (Infrastructure as code, JSON / YAML config).
  • Implemented Enterprise Integration architecture using Azure Service Bus, AppService, Active Directory, Storage, hybrid connection manager, active directory authentication for Azure SQL server and other services offerings by Azure.
  • Configured and deployed Azure Automation Scripts for a multitude of applications utilizing the Azure stack for Compute, Web and Mobile, Blobs, Resource Groups, Azure Data Lake, HDInsight Clusters, Azure Data Factory, Azure Databricks, Azure SQL, Cloud Services, and ARM Services and utilities focusing on Automation.
  • Implemented Office 365 and Azure Active Directory for single sign on, authentication, authorization, and Azure Role-based Access Control (RBAC).
  • Configured private end point for Azure Cosmos DB using Azure Private Link through automatic approval method, combined with NSG policies to secure data.
  • Implemented to Navigate all traffic to the service that can be routed through the private endpoint, so no gateways, NAT devices, ExpressRoute or VPN connections, or public IP addresses are needed.
  • Configure continuous integration from source control, setting up build definition Using Azure DevOps (VSTS) and configure continuous delivery to automate the deployment of ASP.NET MVC applications to Azure web apps.
  • Implemented Azure DevOps services such as Azure Boards for managing work in sprints, providing us with live features for planning & retrospectives. We use the Azure Repos feature for Git version control of our code.
  • Deployed the services by Azure DevOps pipeline, Created and Maintained pipelines to manage the IAC for all the applications.
  • Created Azure infrastructure using ARM templates, Azure pipelines to build, test, and release, and managed Azure Container Registry to store private Docker images, which are deployed.
  • Used Azure Kubernetes Service to deploy a managed Kubernetes cluster in Azure portal, with the Azure CLI, also used template driven deployment options such as Resource Manager templates and Terraform.
  • Implemented greenfield project leveraging Docker and Azure Kubernetes Service (AKS) for use, including configuration standards, implementing infrastructure with secure networking, and CI/CD pipelines. Used Azure Kubernetes Service to deploy a managed Kubernetes cluster in Azure.
  • Created terraform templates for provisioning virtual networks, VM Scale sets, Load balancers and NAT rules and used terraform graph to visualize execution plan using the graph command. Used Terraform to deploy the infrastructure necessary to create development, test, and production environments for software development.
  • Written Ansible Playbooks in YAML as the Wrapper to Manage Configurations of Azure Nodes and Test Playbooks on Azure instances using Python SDK and Automated various infrastructure activities like continuous deployment, application server setup, stack monitoring using Ansible playbooks.
  • Implemented Ansible Tower to schedule jobs and to manage complex network deployments with the addition of control and delegation to Ansible powered environment and automated the infrastructure using Ansible roles downloaded and managed from Ansible Galaxy.
  • Setup DataDog monitoring across different servers and AWS services.
  • Created DataDog dashboards for various applications and monitored real-time and historical metrics.
  • Created system alerts using various DataDog tools and alerted application teams based on the escalation matrix.
  • Integrated CloudCheckr, Datadog, Splunk Dashboard with AWS accounts.
  • Involved in developing custom scripts using Python, Shell to automate the deployment process and for Task scheduling, Systems backups for RHEL.
  • Functioned as a key player/coach in the implementation of DevSecOps model across the organization and implemented security/vulnerability scans at multiple phases.
  • Introduced DevSecOps specific policies and procedures that enabled organizations to keep up with the pace of application development in a DevOps environment. Worked on OWASP Web/API vulnerabilities and compensating controls (CSRF, XSS, SQLI, etc.).
  • Configured AppDynamics cluster agent to monitor AKS pod failures and restarts, node starvation, missing dependencies such as Services, Config maps and Secrets.
  • SNMP, SMTP, Ethernet, IOS, netstat, NFS, NIS, nslookup, RIP, OSPF, BGP, TCP/IP, and tcpdump.

Environment: Azure, PowerShell, XL Release, XL Deploy, Kubernetes, Kafka, GIT, Python, AWS, Redis, VMware, Jenkins, Terraform, Ansible, DataDog, SVN, Puppet, Open Stack, Docker, Jira, Maven, VSTS, Apache Tomcat Application Server, Salt stack

Cloud Enterprise DevOps Engineer

Confidential, Cincinnati, Ohio

Responsibilities:

  • Configured AWS application deployment infrastructure services like VPC, EC2, S3, RDS, Dynamo DB, Mongo DB, IAM, EBS, Route53, SNS, SES, SQS, CloudWatch, CloudTrail, Security Group, Auto Scaling Group ASG, and RDS using CloudFormation, Terraform templates.
  • Designed AWS Cloud Formation templates to create custom sized VPC, subnets, NAT to ensure successful deployment of Web applications and database templates.
  • Implemented AWS Lambda functions to run scripts in response to event in Amazon Dynamo DB table, S3 buckets, and HTTP requests using Amazon API Gateway. Also wrote AWS Lambda functions in python for AWS Lambda which invokes python scripts to perform various analytics on large data sets in EMR clusters.
  • Performed POTs in Azure implementation and POC's to implement in the Organization and involved in migration from AWS to Azure cloud.
  • Provisioned Azure resources of different providers Compute, Network, Service Fabric, Application gateway using ARM template and implemented and maintained dev, test, staging, and production environments leveraging infrastructure as code using Azure ARM templates (Infrastructure as code, JSON / YAML config).
  • Setup Azure Virtual Appliances (VMs) to meet security requirements as software-based appliance functions (firewall, WAN optimization and intrusion detections) and implemented high availability with Azure Classic and Azure Resource Manager deployment models.
  • Designed and configured Azure Virtual Networks (VNets), Subnets, Azure Network Settings, DHCP Address Blocks, DNS Settings, Security Policies and Routing.
  • Created Azure Automation Assets, Graphical runbooks, PowerShell runbooks that will automate specific tasks. Expertise in deploying Azure AD Connect, configuring ADFS authentication flow, ADFS installation using Azure AD Connect.
  • Responsible for creating and managing Azure AD tenants, manage users and groups, and configure application integration with Azure AD. Integrate on-premises Windows AD with Azure AD, configure multi-factor authentication (MFA) and federated single sign-on (SSO).
  • Migrated data from on-premises SQL Database servers to Azure SQL Database servers sent by designing the Azure Data Factory Pipelines using the Azure Data Factory copy tool and Self-Hosted Runtimes.
  • Configured applications that run multi-container Docker applications by utilizing the Docker-Compose tool which uses a file configured in YAML format. Installed Docker Registry for local upload and download of Docker images and from Docker Hub. Created Docker files to automate the process of capturing and using the images.
  • Created reproducible builds of the Kubernetes applications, managed Kubernetes manifest files and releases of Helm packages. Scheduled, deployed, and managed Container replicas onto a node cluster using Kubernetes.
  • Responsible for build and deployment automation using VMWare ESX, Docker, Kubernetes containers and Ansible.
  • Deployed Virtual Kubelets using KIP (Kubelet in pod) for cost reductions by saving compute resources.
  • Wrote many RBAC policies to define user permissions in Kubernetes and created Ingress, Egress rules for regulating the inbound and outbound traffic of the Kubernetes cluster.
  • Created a Jenkins pipeline to drive all micro-services builds out to Docker Hub and then deployed to Kubernetes, created pods, and configured Kubernetes Replication controller.
  • Installed and configured Jenkins for Automating Deployments and providing an automation solution and Created inventory and managed results in Jenkins Dashboard view using Plugin Dashboard View and added Sonar Dashboard view into Jenkins.
  • Worked with Terraform key features such as Infrastructure as code, Execution plans, Resource Graphs, Change Automation, and Implemented Terraform modules for the deployment of applications across Azure.
  • Implemented CI/CD using Jenkins and configured DevSecOps strategies, used SAST (Static Analysis Security Testing) and DAST (Dynamic Analysis Security Testing) to eliminate security flaws, vulnerabilities present in the source code and running application.
  • Added security layer on top of DevOps methodology and implemented security/vulnerability scans at every phase of DevOps life cycle starting from design to monitoring like FOSS, Fortify and DAST to create DevSecOps operational model.
  • Managed and administrated of all UNIX servers, includes Linux operating systems by applying relative patches and packages at regular maintenance periods using Red Hat Satellite server, YUM, RPM tools.

Environment: Git, Maven, Jira, Apache Tomcat, XML, Python Script, PowerShell, Terraform, UNIX/Linux, Red hat Enterprise, Oracle, bit bucket, Jenkins, TFS and Artifactory, AWS, AZURE, docker and Kubernetes.

AWS Cloud Administrator

Confidential, Detroit, MI

Responsibilities:

  • Design highly available, cost effective and fault tolerant systems using multiple AWS EC2 instances, Auto Scaling, AWS Elastic Load Balance and AWS Amazon machine image (AMIs), DNS mapping with subdomain using Route 53.
  • Used IAM for creating roles, users, groups and implemented MFA (Multi Factor Authentication) to provide additional security to AWS account and its resources.
  • Design roles and groups for users and resources using AWS Identity Access Management (IAM) and implement Multi-Factor Authentication (MFA) on externally available servers and on AWS Console, Monitoring and alerting leveraging Cloud Watch and Cloud Trail.
  • Implemented AWS Lambda functions to run scripts in response to event in Amazon Dynamo DB table, S3 buckets, and HTTP requests using Amazon API Gateway. Also wrote AWS Lambda functions in python for AWS Lambda which invokes python scripts to perform various analytics on large data sets in EMR clusters.
  • Used AWS Elastic Beanstalk for deploying and scaling web applications and services developed with Java, Node.js, Python and Ruby on familiar servers like Apache, Nginx, Tomcat.
  • Created monitors, alarms, and notifications for EC2 hosts using Cloud Watch Monitored System Performance Managed Disk Space LVM (Logical Volume Manger) and performed system Backup and Recovery.
  • Orchestrated and migrated CI/CD processes using Cloud Formation and Terraform templates and Containerized the infrastructure using Docker, which was setup in Vagrant. Used Chef to configure the built resources and troubleshoot the build issues with ELK and work towards the solution.
  • Developed pipe-lining workflow that created Dockerized individualized development environments code commits trigger builds in Jenkins, creating and storing a new Docker image in a local Docker registry to be used downstream of build.
  • Integrated Docker container-based test infrastructure to Jenkins CI/CD test flow and executed build environment by integrating with Jenkins and Jira to trigger builds using Webhooks and Slave Machines.
  • Set up Jenkins server and built jobs to provide continuous automated builds based on polling the GIT SCM during the day and periodically scheduled the builds overnight to support development.
  • Expertise in Terraform for creating stacks of VPCs, ELBs, Security groups, SQS queues, S3 buckets in AWS and updated the Terraform Scripts based on the requirement on regular basis.
  • Written several chef cookbook and recipes to automate the installation of web logic domain and JDK installations and have customized recipes from chef supermarket to align with current requirements.
  • Created and managed S3 buckets for CloudWatch logging, Artifactory repository and to Static Webhosting. Generated SSL certificates and installed them into Tomcat servers for the secured HTTPS protocol.
  • Used Nagios as a monitoring tool to identify and resolve infrastructure problems before they affect critical processes and worked on Nagios Event handlers in case of automatic restart of failed applications and services.
  • Maintained Bitbucket Repositories which includes Jenkins for Integration; enabling GIT to ignore, branching, merging, creating pull requests and to access control strategies from Bitbucket and JIRA for the collaboration.
  • Worked on Amazon AWS EC2 cloud services for installing, configuring, and troubleshooting on various Amazon images like Amazon Linux AMI, RedHat 6.x,7.x, Ubuntu 14.x, 15.x.

Environment: AWS EC2, Auto Scaling, Elastic Load Balancer, Amazon Machine Image( AMI’s), DNS Mapping, Route 53, IAM, MFA, AWS Lambda, Java, Node.js, Python, Ruby, Apache, Nginx, Tomcat, Elastic Beanstalk, LVM, Integrated Docker, Jenkins, GIT SCM, Terraform, CloudWatch, JIRA.

Cloud Engineer

Confidential, Louisville, KY

Responsibilities:

  • Design highly available, cost effective and fault tolerant systems using multiple AWS EC2 instances, Auto Scaling, AWS Elastic Load Balance and AWS Amazon machine image (AMIs), DNS mapping with subdomain using Route 53.
  • Worked on AWS CLI for spinning up RDS, Redis Elastic cache so that cloud applications can use Redis elastic cache for the data reads, thereby increasing performance for the application.
  • Managed multiple AWS accounts with multiple VPC's for both production and non-production where primary objectives included automation, build out, integration and cost control.
  • Configuring S3 versioning and lifecycle policies to store data and thereby archiving files through Glacier.
  • Worked on AWS Cloud Watch, Cloud Formation, Cloud Trail services and Cloud Front to set up and manage cached content delivery.
  • Managed AWS infrastructure and automation with CLI and API. Working on Inbound and Outbound services with automation of puppet. Deployed multiple resources simultaneously, using CloudFormation templates in AWS.
  • Integrated Jenkins with repositories like GitHub to build Automation tool (Maven) and artifact repository for pushing successful build code.
  • Worked on Jenkins, Git Hub, Puppet, Artifactory and all internal build systems for the core development team on an enterprise-level Java-based cloud orchestration/automation tool.
  • Writing modules for Puppet and good understanding analyzing Manifests.
  • Installing and configuration of an automated tool Puppet that included installation and configuration of Puppet Master, Agent nodes and an admin control workstation.
  • Using the AWS CLI create deployment command to deploy revision from GitHub on behalf on GitHub accounts for the specified applications.
  • Involved in hardening, Linux Server and Compiling, Building, and installing Apache Server from sources with minimum modules.
  • Managed all the bugs and changes into a production environment using the Jira tracking tool.

Environment: GitHub (GIT), Maven, Chef, Web Logic, Jenkins, Shell, Linux, Tomcat, Apache, AWS (Amazon Web Service), MongoDB, XL-Deploy, XL-Release, OpenShiftEnterprise3, JSON, YAML.

Linux System Administrator

Confidential

Responsibilities:

  • Involved in configuration, installation, implementation, maintain and support for the Linux servers, RHEL, CentOS, Ubuntu, Solaris, Fedora.
  • Configured and maintained Linux virtualization in test and prod environment using VMware, vSphere, Client and HPSA for Red Hat Linux OS installation.
  • Performed installation, configuration, upgrades, package administration and support for Linux systems on the client side using RedHat satellite network server and worked on patches installation, patch upgrades on RedHat Linux servers by using RPM & YUM.
  • Worked on server-based operating system kernel configurations on RedHat, Ubuntu, Kernel Parameter & Tuning, Trouble Shooting of System, Network & Performance Issues.
  • Experience in using monitoring tools such as Nagios for general disk space usage and conduct systems performance monitoring and tuning.
  • Involved in helping others Linux Administrators to deploy Splunk in a Linux and windows environment. Troubleshooting and monitoring the machines 24x7.
  • Responsible for keeping the servers up and running as well as providing direct user support for any technical issues related to Linux and Windows Systems.

Environment: Linux Servers, RHEL, CentOS, Ubuntu, Solaris, Fedora, VMware, vSphere, Client and HPSA, RedHat Linux OS, RPM & YUM, Splunk.

Hire Now