We provide IT Staff Augmentation Services!

Gcp Devops Engineer Resume

St Louis, MO


  • Cloud DevOps Professional with expertise on Linux System Administration, Server infrastructure development & CI/CD pipe lining with respect to On - premise, AWS (Amazon Web Services) & GCP Cloud environments.
  • Migrated and resettled the applications and server instances from on-premise environment to AWS and GCP cloud.
  • Provisioned servers & developed infrastructure for clients on AWS (Amazon Web Services) Cloud and also implemented multi-tier Virtual Private Clouds (VPC) based on the application requirements.
  • Experience in google cloud platform (GCP) cloud by provisioning compute engine, cloud load balancing, cloud storage, cloud SQL, stack driver monitoring components using the Terraform GCP Foundation modules
  • Setup AWS EC2 instances,S3, Route53, Load Balancing, SNS, SQS & Cloud Trail.
  • Specialized in provisioning the GCP Global HTTPS load balancer routes the traffic to GCP GKE cluster via Terraform modules.
  • Experience in configuring the GCP Firewall rules in Terraform script to allow or deny traffic to and from the VM's instances based on specified configuration and used GCP cloud CDN (content delivery network) to deliver content from GCP cache locations drastically improving user experience and latency.
  • Specialized in provisioning EKS Kubernetes cluster on AWS, GKE Kubernetes cluster on GCP including masters, slave, RBAC, helm, kubectl, ingress controllers via Terraform foundation modules.
  • Specialized in provisioning and managing the AWS EMR cluster on AWS, managing the Devops CICD pipeline provisioning the components for the AWS data lake infrastructure.
  • Experienced in provisioning and managing the KAFKA infrastructure on AWS, collecting the logs and storing the log files in the AWS S3 bucket.
  • Experience in setup and build GCP infrastructure using resources Shared service VPC model, Compute engine, Cloud Storage, Cloud SQL, IAM using the Terraform foundation modules.
  • Experience in configuring the Cloud Firewall rules to allow the inbound traffic to GCP GKE cluster.
  • Deployed the Micro services with SpringBoot on GCP / GKE Kubernetes Cluster configured with master nodes and worker nodes.
  • Configured GCP GKE ISTIO to handle the Ingress and egress and Service Discovery for micro service PODS inter communication.
  • Designed and implemented the GCP Organizations setup, Project setup, IAM access and GCP Service Account setup for development, QA and production support teams.
  • Configured the Stack Driver monitoring, Cloud Data Flow push the logs into Cloud Storage.
  • Worked on Git/GitHub/Bitbucket/SVN for the source code and feature release management.
  • Worked on Agile/Scrum/Kanban/Waterfall methodologies for developing several applications.
  • Involved in resolving incident tickets and change management using JIRA.
  • Performed documentation using Confluence.
  • Created Docker images and orchestrated multiple containers using Kubernetes.
  • Worked on CI (ContinuousIntegration) & CD (ContinuousDeployment) pipelines using Jenkins/Bamboo
  • Deployed feature releases and patches for Java, node JS and AngularJS applications.
  • Performed Proof of Concept POC for Ansible and Puppet.
  • Developed and configured infrastructure with provisioning tools like Puppet & Ansible.
  • Managed Ansible Playbooks with Ansible roles, group variables and host inventory files.
  • Created Puppet manifests to configure infrastructure using Puppet Enterprise.
  • Developed, built and deployed artifacts such as war and ear files from Source Code repositories by using build-ship integration tools like ANT, Gradle and Maven.
  • Knowledge on scripting languages like Python, Bash, PowerShell and Unix.
  • Developed Web application APIs and Java based applications on REST/SOAP style.
  • Performed database analysis with Oracle SQL, MySQL and NoSQL.
  • Utilized Nexus for code builds on-premise cloud and J-Frog Artifactory for storing builds on multi-cloud and hybrid environments.
  • Gathered Formal Software Specifications and wrote use-cases, UML and class diagrams for various applications.
  • Performed OS hardening tasks, secured networks by using IP tables/Dynamic firewall, monitored TCP/IP packets on RHEL 6, Windows server and RHEL 7 systems.
  • Performed Certificate to Operate testing for various OS.
  • Performed security and log analytics using Splunk and Elastic Stack.


Confidential, ST. LOUIS, MO



  • Deployed GKE on GCP with the help of Gitlab-Jenkins-Terraform integration.
  • Automated Compliance Policy Framework for multiple projects in GCP.
  • Setup CloudSQL and Proxy for DR situations.
  • Created Service accounts, VM instances, VPC networks using Terraform on GCP.
  • Configured Apigee Adapter and ISTIO mesh for our applications on GKE.
  • Aggregated logs from Stack Driver and monitored pod and node health by creating metric based dashboards on GCP.
  • Integrated Jenkins/Helm/Kubernetes/Vault with GCP to perform semi-automated and automated releases to lower and production environments.
  • Created DR plans, SRE scorecards, Error Budget reports, BlueGreen planning assessments for auditor approval.
  • Renewed certificates in NonProd and Prod clusters and re applied them to the namespaces.
  • Setup ISTIO across a shared cluster in the production and configured it properly to send requests to the gateway.
  • Performed change planning and CAB for production maintenance and application deployments.
  • Automated the creation of VM, security policies, instance templates, K8 cluster creation, databases and proxy using TF and Jenkins pipelines.
  • Created alerts and dashboards on Stackdriver and logging.
  • Maintained SRE and DevOps runbooks for all the processes and provided project documentation on the confluence.

ENVIRONMENT: ELK Stack, EKS, ECS, Docker, Kubernetes, Splunk, Open Policy Agent, Morpheus Data, Service Catalog, Terraform/Terragrunt, Cloud Formation, GCP/AWS, CloudWatch, AWS Lambda Functions, AWS CodeCommit, S3, SQS, Elastic Beats, Spinnaker, Kube Apps, Helm Charts, CJOC, GitLab, AWS Athena, AWS Config, CloudTrail and SNS.

Confidential, DENVER, CO



  • Performed change requests and deployments during production upgrades and maintenance.
  • Updated Google Kubernetes Engine VM scopes with zero downtime.
  • Deployed MongoDB on Google Kubernetes Engine.
  • Installed secure Helm and ISTIO on Google Kubernetes Engine with TLS.
  • Converted AWS Cloud Formation templates to the Terraform templates and integrated with wrapper tools like Terragrunt to make the code more reusable across various platforms.
  • Automated Infrastructure-as-a-code deployments with CJOC Jenkins and GitLab.
  • Deployed Open Policy Agent for Terraform and EKS based deployments and wrote policies from scratch to implement the best security standards.
  • Standardized the EKS, trained and supported the application teams to move their applications from on-premise to the highly scalable and secured containerized cloud environments.
  • Deployed beats agent on various application servers using Ansible AWX.
  • Wrote and loaded custom ILM policies and index templates for various applications.
  • Fetched the logs from CJOC and Spinnaker, secure applications and visualized the important metrics by creating dashboards based on the Application team requirements.
  • Wrote Terraform and Cloud Formation templates for deploying EKS cluster, Morpheus Data, IAM roles and policy creation, S3 bucket access, SQS event creation, Lambda Function etc. from scratch.
  • Integrated Morpheus Data with Ansible and wrote roles to manage and deploy the infrastructure.
  • Generated Billing reports using AWS services like billing dashboards, trusted adviser, cost explorer and Cloud Trail for cost optimization and Fin-Ops pipeline.
  • Helped to formulate the Fin-Ops guidelines across the WU environments for better resource utilization.
  • Logged Cloud Trail events and queried them by using Amazon Athena for sharing the data across multiple teams with WU.
  • Integrated CloudTrail with CloudWatch and set alarms and SNS notifications for important events.
  • Used custom lambda scripts and AWS config service to identify non-compliant resource creations and then force tagged them with default tags for cost exploration.
  • Enabled cross-VPC peering for S3 and CloudWatch log access.
  • Performed Proof of Concepts on Splunk, ELK Stack, Morpheus Data, Service Catalog, Kube-Apps and Elastic Cloud Enterprise.
  • Deployed Elastic Cloud Enterprise on AWS with the help of custom-written Terraform, Ansible and Shell scripts.
  • Migrated more than a dozen applications from Splunk to ELK.
  • Designed and Deployed open-source ELK stack on the EC2 with Auto Scaling groups using Terraform and Ansible.
  • Designed and deployed open-source ELK stack on the EKS Cluster with the help of Helm Charts.
  • Monitored and visualized VPC Flow Logs, Infrastructure Logs, Cross Account EKS and CloudWatch logs using the ELK stack.
  • Moved dozens of applications from Splunk to ELK stack for better cost optimization.
  • Deployed function beat to send the logs from AWS services like S3, Cloud Trail and Cloud Watch to the ELK installation in cross-account environments.
  • Set up the Xpack /Watcher API on Elastic and set up alerts for application logs based on Elastic Query DSL.
  • Also enabled the SMTP server for Kibana alerts using Elastic GUI.
  • Written custom GROK, Regex patterns, KV filters, Mutate, Split filters etc, for multiple applications while onboarding them to the ELK.
  • Re-indexed, Bulk-indexed json and CSV formatted logs on the ELK.
  • Configured DLQ for logstash pipelines for various applications.
  • Developed sample policies on Cloud Custodian for use-cases like tagging, identifying untagged resources etc.
  • Supported L2/L3 teams on sitescope and dynatrace alert and dashboard creation.
  • Setup metric beats on Logstash servers to visualize the performance of those servers using Elastic APM agent.
  • Wrote Transform and ML jobs in ELK for complex alerts creation and analysis.

ENVIRONMENT: ELK Stack, EKS, ECS, Docker, Kubernetes, Splunk, Open Policy Agent, Morpheus Data, Service Catalog, Terraform/Terragrunt, Cloud Formation, GCP/AWS, CloudWatch, AWS Lambda Functions, AWS CodeCommit, S3, SQS, Elastic Beats, Spinnaker, Kube Apps, Helm Charts, CJOC, GitLab, AWS Athena, AWS Config, CloudTrail and SNS.

Confidential, NEWARK, DE



  • Upgraded infrastructure for high availability and resiliency.
  • Developed Python web applications using Django and Flask frameworks.
  • Performed LAMP setup on RHEL with configuration management tool Ansible.
  • Researched and implemented Docker and Kubernetes proof of concept.
  • Refactored and improved self-service internal tools in public AWS and private VMWare clouds with PowerShell, C# and JavaScript.
  • Collaborated with software, infrastructure, application and other engineers to design and implement solutions and troubleshoot Linux and Windows infrastructure and deployment pipeline.
  • Created, tested and deployed an End to End CI/CD pipeline for various applications using Jenkins as the integration server for Dev, QA, Staging, UAT and Prod Environments with Agile methodology.
  • Configured VPC and subnets using the knowledge of Cloud Formation for various applications.
  • Designed and deployedAWSsolutions using E2C, S3, RDS, EBS, IAM Elastic Load Balancer, & Auto scaling groups.
  • Installed the Splunk server and configured AWS for Splunk add-on to receive logs.
  • Created Ansible playbooks and setup systems to a desired State with the help of Ansible to create configuration files to manage hosts.
  • Used YAML Ansible playbooks to launch AWS instances and manage the web applications, configuration files, mount points and packages.
  • Worked onMavento create artifacts from source code and deploy them in Nexus central repository for internal deployments.
  • Managed services using the Docker Engine for the test and dev environment needs.
  • Worked withAnsibleplaybooks for virtual and physical instance provisioning, configuration management, patching and software deployment. MaintainedAnsibleplaybooks usingAnsibleroles,AnsibleGalaxy, utilized combination of different module inAnsibleplaybook with YAML scripting to configure the files on remote servers.
  • UsedAnsibleto manage systems configuration to facilitate interoperability between existing infrastructure and new infrastructure in alternate physical data centers.
  • Worked on deployment automation of all the microservices to pull images from the private docker registry using Ansible.
  • Configured Event Grid in to save undelivered messages in Azure storage.
  • Performed Automatic testing of Django applications with Azure pipelines.
  • Deployed web applications to Azure using Azure DevOps.
  • Automatically deployed and configured Event Hubs, Stream Analytics, and CosmosDB using Terraform.
  • Leveraged Azure Key Vault and used them secrets in Azure serverless applications.
  • Deployed Azure Web Apps via ARM as a part of Continuous Deployment.
  • Deployed Splunk on Azure VM’s with the help of Terraform and ARM.
  • Installed universal forwarders on various application servers to ship the logs to Splunk.
  • Added the Splunk add on for CIM normalization and then configured the Infosec and Splunk Enterprise Security apps on Splunk to track Palo Alto NW, Firewalls and Unusual activity from IP address.

ENVIRONMENT: Agile Kanban/Scrum, AWS, AZURE, RHEL 8.0, RHEL 7.0, Splunk, RDS, EBS, IAM, ELB, ELK Stack, Docker, Ansible, YAML, Cloudbees Jenkins, Maven, Sonatype Nexus, NoSQL, REST APIs and Ansible Galaxy.

Confidential, STAMFORD, CT



  • Created bitbucket repositories including merging and building feature branches.
  • Co-engineered comprehensive cross-region backup solution with Simple Storage Service (S3), Simple Queue System (SQS), Simple Notification Service (SNS), Access Control Lists (ACL), and Python Automated deployment, reporting, server creation/decommission/deletion, and maintenance tasks via Ansible.
  • Integrated logging aggregation API calls into various processes, platforms and tools. Contributed for daily build processes, including monitoring builds, break/fix management, issue tracking (JIRA), and identifying and resolving a wide variety of build-related issues for different products and versions.
  • Worked on installation of Docker using Docker toolbox. Server setup and NGINX including F5 load balancing.
  • Worked and installed Elastic search on the servers for Restful SOA applications.
  • Performed Database tasks with Oracle, MySQL & DB2.
  • Performed Continuous Delivery goal on a high scalable environment, using Docker coupled with load-balancing tool NGINX.
  • Deployed various enterprise applications on managed servers and cluster environments and maintained Load Balancing, High Availability and Failover.
  • Creating the AWS Security groups to enable the firewall.
  • Developed ECS Terraform module to deploy microservices into AWS.
  • Written Templates for AWS infrastructure as a code using Terraform and Cloud Formation to build staging and production environments.
  • Worked on tickets and incidents with tools like JIRA, Navigator, ALM & Service Catalog.
  • Maintain automation & network simulators, develop Python test scripts, run regression/sanity test release binaries.
  • Configured S3 versioning and lifecycle policies to back up files, and archive files in Glacier.
  • Developed build and deployment scripts using ANT and MAVEN as build tools in Jenkins to move from one environment to other environments.
  • Indexed MongoDB, S3 and CloudWatch logs using Elastic Stack.
  • Structured unstructured data using GROK and Regex patterns using Logstash.
  • Built autocomplete functionality using Elasticsearch DB for retail based applications.

ENVIRONMENT: Agile Scrum, AWS, AZURE, Bitbucket, Python, JIRA, SOAP/REST APIs, ALM, Service Catalog, Terraform, Cloud Formation, ANT, MAVEN, Oracle, MySQL, MongoDB, S3, Glacier, NGINX, IBM WAS, Docker and Docker Swarm.

Confidential, ST. LOUIS, MO



  • Developed Python/Flask applications with MongoDB, Flask-mongo engine and deployed them to the cloud.
  • Deployed and Configured CloudWatch agent to monitor Infrastructure and Applications.
  • Worked on the AWS cloud to provision new instances, S3 Storage Services.
  • Used EBS stores for persistent storage and also performed access management using IAM service.
  • Launched Amazon EC2 Cloud Instances using Amazon Images (Linux/ Ubuntu) and Configuring launched instances concerning specific applications.
  • Designed AWS Cloud Formation templates to create custom-sized VPC, subnets, NAT to ensure successful deployment of Web applications and database templates.
  • Responsible for day-to-day Build and deployments in Dev, Test, pre-production, and production environments.
  • Implemented AWS high-availability using AWS Elastic Load Balancer (ELB), which performed balance across instances in multiple availability zones.
  • Setup and build AWS infrastructure various resources, VPC EC2, ECS, S3, IAM, EBS, Security Group, Auto Scaling, and RDS in CloudFormation JSON templates.
  • Created alarms in CloudWatch service for monitoring the server's performance, CPU Utilization, disk usage, maintained user accounts IAM, RDS, and Route53 services in AWS Cloud.
  • Created S3 buckets and managed policies for S3 buckets and a Utilized S3 bucket and Glacier for Archival storage and backup on AWS.
  • Used configuration management tools Puppet, Docker for configuration management automation.
  • CI/CD pipeline management through Jenkins.
  • Administration and maintenance of Docker runtime environment, Versioning and lifecycle management of Docker images.
  • Automated AWS volumes snapshot backups for the enterprise using Lambda and python scripts.
  • Designed chef cookbooks & wrote Ansible playbooks to manage configurations and automate the installation process.
  • Used AWS Beanstalk for deploying and scaling web applications and services developed with Java, NODE.JS, Python and Ruby on familiar servers such as Apache, and IIS.
  • Setup Elastic Load Balancer for distributing traffic among multiple Web Logic servers and involved in deploying the content cloud platform on Amazon Web Services using EC2, S3 and EBS.
  • Installed, tested, and deployed monitoring solutions with SPLUNK services.

ENVIRONMENT: Agile, Waterfall, AWS, AZURE, CloudWatch, JSON, Shell Scripting, Cloud Formation, Route 53, ELB, VPC, AWS Lambda(Python JRE), Docker Swarm, Kubernetes, Splunk, RDS, AWS Beanstalk, Puppet, AWS EBS and IIS.




  • Developed and tested Windows-based Java Desktop applications with Swing Framework.
  • Involved in Agile process, Sprints, and daily Scrums to discuss the progress of developing and deploying client applications.
  • Built and released Java-based applications to DEV, Test, Pre-Production, and Prod Environments.
  • Prioritized JIRA issues and stayed up to date with what's going on within the project.
  • Performed RDBMS installation, restoration, and log generation.
  • Hardened OS to prevent DDoS attacks & performed SSH authentication to secure the environment.
  • Configured network services, enabled servers and client instances to run automatically at boot, configure the firewall using firewall-cmd, open and block ports to ensure system security and general security administration.
  • Installed and configured LAMP servers to manage VMs in the RHEL environment.
  • Created and modified host-based firewall rules using IP-TABLES.
  • Performed Branching, Tagging, Release Activities on Version Control Tools like GIT, GitHub, and GitLab.
  • Perform operating system upgrades, security patches, and maintain system repositories on Red Hat.
  • Used Logical Volume Management Commands to create, manage, grow and extend LVM volumes.
  • Wrote UNIX Scripts on several shells like /bin/bash, /bin/sh/ bin/sh to build and deploy it to the APACHE TOMCAT servers.
  • Supported patching on RHEL environments.
  • Developed automation and deployment utilities using BASH, POWER-SHELL, PYTHON.
  • Configured DHCP, DNS, web (Apache, IIS), mail (SMTP, IMAP, POP3), and file servers on Linux servers.
  • Worked with RED HAT Linux tools like RPM and YUM to install packages and patches for Red Hat Linux Servers.
  • Performed server backups and data restore.
  • Utilized Linux Terminal Server for removing fat client management, save on administration and provide users with a more reliable & secure environment.
  • Created different file systems such as XFS, EXT3, EXT4, and (NFS) network file systems and configured (ACL) access control lists, encryption, and permissions.
  • Created multiple subnets within the private network and allowed network flow between them.
  • Involved in writing SQL queries to implement the scheme-related changes for internationalization and debugged the build errors using SQL queries to make sure the Database is not corrupted.

ENVIRONMENT: Agile Scrum, Bash, PowerShell, Apache Tomcat, RHEL, SQL, RPM and YUM packages, Patching, SOAP/REST APIs, MAVEN, LAMP stack, GitHub, Gradle, Java(Spring Framework) and JavaScript.

Hire Now