We provide IT Staff Augmentation Services!

Aws Engineer Resume

2.00 Rating

SUMMARY

  • Total 7 years of experience in IT.
  • 2 years of experience in Amazon Web Services.
  • Experienced working with Amazon Web Services (AWS) functionalities like EC2, VPC, Auto Scaling, Elastic IP, IAM, ELB, Database, Storage, IGW, S3, Private Subnets, Public Subnets, Cloud Security.
  • Providing Security using IAM, Security Groups and NACL.
  • Experience in Implementing AWS VPN
  • Supporting AWS Database servers ( RDS, REDSHIFT and DYNAMO DB)
  • Worked on Hybrid Clouds Platforms
  • Automation using Chef in AWS for CI an CD
  • Automating AWS infrastructure using OPSWorks
  • Worked on Windows 2003, Windows 2008, Windows 2012 Cross domain Infrastructure.
  • Good Working knowledge of Active Directory
  • Managing Enterprise wide Group policy related activities.
  • Working with SAMI for deploying Automated Windows images across the Enterprise.
  • Hardening servers based on the inputs from security team
  • Strategizing on AD groups and Managing AD groups and users across the enterprise.
  • Experience managing Windows firewall through Group policies.
  • Working knowledge on securing files/folders with NTFS permissions
  • Good working knowledge on Windows 2003 and Windows 2008 clusters
  • Troubleshooting performance related Capacity related issues.

PROFESSIONAL EXPERIENCE

AWS Engineer

Confidential

Responsibilities:

  • Created, configured and implemented Virtual Private Cloud (VPC), Security Groups, Network Access Control List (NACL), Elastic Compute Cloud (EC2 instances), Elastic Block Store (EBS), Simple Storage Service (S3), Elastic Load Balancer (ELB), RDS MySQL, Subnets, Snapshots, Auto - Scaling groups, Route 53 DNS, Glacier, Elastic File System (EFS), Cloud Front, Cloud Watch, Cloud Trail
  • Assigned Roles and Policies to Users, Security Groups by using Identity and Access Management (IAM)
  • Deployed Cloudera Hadoop Cluster onAWSfor Big Data Analytics
  • Architecting High Available, Autoscalable platforms inAWScloud on Windows & Linux.
  • Designing Database High Availability Solutions on MS SQL & MySQL Multi AZ RDS.
  • Managing 24x7 support for clients onAWSCloud across various regions.
  • Migrated different client applications like Microsoft applications, Database applications including routing and switching.
  • Migrating Fileserver to EFS systems, Database to RDB and live instances to EBS. Also migrated existing virtual servers like VmWare and Rackspace to AWS.
  • Migrated large databases to AWS using the DMS service.
  • Experience in setting up Jenkins continuous build integration system.
  • Converting the ANT Build projects to Maven Build projects.
  • Working on build Systems such as Make, Maven.
  • Build and configured Jenkins slaves for parallel job execution.
  • Installed and configured Jenkins for continuous integration and performed continuous deployments.
  • Pulled a code from the development line using cherry-pick, creating a tag and pushing it to the main line using GIT version control after integration and build.
  • Manage customers in AWS like patching, OS upgrade, monitoring.
  • Monitor cloudwatch alarms, and put them in monitoring tools like Zenoss, Nagios using API.
  • Assisted in Requirement gathering, created statement of work (SOW), Methods of procedure (MOP) during project implementation.
  • Scale up or Scale down the environment, update security and users, Decommission resources.

Network Administrator

Confidential

Responsibilities:

  • Performed configuration, deployment and support of cloud services including Amazon Web Services (AWS).
  • Store, manage & Monitor applications on S3 storage, including accessibility, Cross Region Replication and create and monitor Events, using Cloudberry Explored and s3cmd CLI.
  • Configured and managed AWS Glacier, to move old data to archives based on the retention policy of databases/ applications (AWS Glacier Vaults).
  • Provided security and managed user access and quota using AWS Identity and Access Management (IAM), including creating new Policies for user management in JSON
  • Defined AWS Security Groups which acted as virtual firewalls dat controlled the traffic allowed to reach one or more AWS EC2 instances
  • Set the security groups, Elastic Load Balancer and AMIs, Auto scaling to design cost TEMPeffective, fault tolerant and highly available systems.
  • Install and support LANs, WANs, network segments, Internet, and intranet systems.
  • Install and maintain network hardware and software.
  • Analyze and isolate issues.
  • Monitor networks to ensure security and availability to specific users.
  • Evaluate and modify system's performance.
  • Identify user needs.
  • Determine network and system requirements.
  • Maintain integrity of the network, server deployment, and security.
  • Ensure network connectivity throughout a company's LAN/WAN infrastructure is on par with technical considerations.
  • Design and deploy networks.
  • Perform network address assignment.
  • Assign routing protocols and routing table configuration.
  • Assign configuration of autantication and authorization of directory services.
  • Maintain network facilities in individual machines, such as drivers and settings of personal computers as well as printers.
  • Maintain network servers such as file servers, VPN gateways, and intrusion detection systems.

IT Support Technician

Confidential

Responsibilities:

  • Disconnect/ Reconnect of PC's, Printers, servers
  • Desktop Rollout from one site to another
  • Decommission and Recommission of desktop, IT equipment.
  • Network testing and troubleshooting
  • IT Auditing
  • Talking to 100's of corporate employees everyday
  • Completing Asset Tracking log sheets.

Systems Administrator

Confidential

Responsibilities:

  • Installed new / rebuilt existing servers and configured hardware, peripherals, services, settings, directories, storage, etc. in accordance with standards and project/operational requirements.
  • Installed and configured systems, Developed and maintained installation and configuration procedures.
  • Contributed to and maintained system standards.
  • Researched and recommended innovative, and where possible automated approaches for system administration tasks.
  • Identified approaches dat leverage resources and provided economies of scale.
  • Operations and Support: Performed daily system monitoring, verified the integrity and availability of all hardware, server resources, systems and key processes, reviewed system and application logs, and verified completion of scheduled jobs such as backups.
  • Performed regular security monitoring to identify any possible intrusions, daily backup operations, ensuring all required file systems and system data are successfully backed up to the appropriate media, recovery tapes or disks are created, and media is recycled and sent off site as necessary.
  • Managed regular file archival and purge as necessary.
  • Created, changed, and deleted user accounts per request.
  • Repaired and recovered from hardware or software failures.
  • Coordinated and communicate with impacted constituencies.
  • Maintenance Applied OS patches and upgrades on a regular basis, and upgraded administrative tools and utilities.
  • Configured / added new services as necessary.
  • Upgraded and configured system software, maintained operational, configuration, or other procedures.
  • Performed periodic performance reporting to support capacity planning; ongoing performance tuning, hardware upgrades, and resource optimization as required.

Desktop Support Officer

Confidential 

Responsibilities:

  • Supported LANs, WANs, network segments, Internet, and intranet systems.
  • Maintained system efficiency.
  • Ensured design of system allows all components to work properly together.
  • Troubleshot problems reported by users.
  • Made recommendations for future upgrades.
  • Maintained network and system security.
  • Analyzed and isolated issues.
  • Monitored networks to ensure security and availability to specific users.
  • Evaluated and modified system's performance.
  • Identified user needs.
  • Maintained integrity of the network, server deployment, and security.

We'd love your feedback!