Devops Engineer Resume
Washington, DC
SUMMARY
- Accomplished DevSecOps Engineer wif over 5+ years of expertise in Development, Continuous Integration and Deployment wif Azure, AWS, GCP, Azure DevOps, Jenkins. Extensive skillset in areas of DevSecOps, python, kubernetes, terraform infrastructure automation, administration of mission - critical, high availability environments.
- Experience wif provisioning and management of resources in AWS, Azure and GCP cloud environments.
- Extensive experience working wif AWS services EC2, S3, ECS, Lambda, SQS, ALB, RDS, CloudWatch, SNS. GCP services, GKE, GCR, gcp storage, VMs. Azure Services, Azure Services, blob storages, Keyvault.
- Expertise in managing IAM policies in AWS to define groups, create users, assign roles wif defined rules for role-based access to AWS resources.
- Operations and configuration management of linux/unix servers wif ansible playbooks.
- Establising performance and incident monitoting wif splunk recommending remediations for teh problems.
- Accomplished Security As Code by delivering Security hooks for Static code analysis, Dynamic code analysis, dependency check analysis and cloud resources configurations.
- Designed automated configuration and deployment of workloads in Azure environments using ARM templates and custom build scripts.
- Experience in utilizing orchestration technologies like Kubernetes in teh cloud to provide fault-tolerant and high availability.
- Expertise in automation and cloud deployment using Terraform, and Cloud Formarion.
- Experience working wif Ansible roles, playbooks, and Yaml scripts wif AWS and Azure cloud providers
- Experience working wif database services like MySQL, Postgres, RDS, Redis, Cassandra, and monitoring services like ELK, Splunk, App Dynamics
- Worked on Kubernetes deployments wif java, .net and montioting services like AppDynamics for java
- Experience working wif AWS EKS, GCP GKE orchestration and deployment management
- Experience working wif Kubernetes deployment scripts, app services for creating pods, deployments, auto-scaling, load balancers, labels, health checks, Namespaces, Config Maps.
- Designed and configured Azure virtual networks, DHCP address blocks, DNS settings, Security policies, subnets, Azure IaaS virtual machines (VMs), and Cloud services (PaaS role instances).
- Configured and managed Linux and Windows servers such as DHCP, DNS, FTP, NFS, HTTPD.
- Experience working wif version control tools like Git, Subversion (SVN), TFSVC.
- Worked wif Chef for configuration as a Code and deployment automation, custom Cookbooks, recipes, and used Berkshelf to upload teh cookbook dependencies.
- Expertise in Configuring ELK (Elasticsearch, Logstash, Kibana) to analyze and visualize teh application and system logs, Configuring Splunk forwarders to detect SSL certificate expirations, and Nagios to detect Network Latencies between systems.
- Experience in Virtualization technologies like VMWare, Vagrant, and worked wif containerizing applications like Docker, Kubernetes.
TECHNICAL SKILLS
Cloud Environments: AWS, Azure, GCP
Containerization: Docker, Kubernetes
Orchestration Tools: Terraform, Cloud Formation
Configuration Management Tools: Ansible, Chef
CI/CD: Jenkins, AzureDevOps, GitLab
Build Tools: MS build, Maven, Ant
Ticketing Tools: Jira, ServiceNow, AzureDevOps
Versioning: GIT, Bitbucket
Repository Manager Tools: Nexus
Monitoring Tools: Splunk, App Dynamics, ELK, Nagios, New Relic
Security Tools: OWASP ZAP, Rapid7, Secure Assist, Veracode, Burp
Programming / Scripting: Python, GO, PowerShell, Bash, Shell, JSON, Yaml, Java, C, Groovy
Databases: MySQL, PostgreSQL, REDIS, RDS
Virtualization: Hyper-v, VMware, Virtual Box
Operating Systems: Windows, Linux/Unix, Mac OS, Ubuntu, CentOS, Red Hat
Networking: TCP/IP, UDP, DNS, DHCP, LDAP, Routers/Switches
SDLC: Agile, Waterfall
PROFESSIONAL EXPERIENCE
Confidential, Washington, DC
DevOps Engineer
Responsibilities:
- Worked in an hybrid cloud environment by leveraging Azure AD federation for SSO and Security as code for different line of businesses for Risk assessment using python automation models.
- Successfully delivered more than 5 python security applications used in security compliance.
- Developed proof of concept integration code for more than 4 enterprise security tools.
- Delivered security automation scripts for AWS and Azure service configuration using boto3 and Azure SVTs in python.
- Successfully worked on backend development and integration of open source and enterprise grade security tools like Rapid7, Black Duck, OWASP ZAP attack, OWASP depencency check, Secure Assist and Sonarqube using python flask framework.
- Achieved zero tolerance of security bypass wif abuse case detection for Azure DevOps projects and SonarQube.
- Operation management of AWS services, unix/linux systems patching, upgrading and maintance wif blue-green deployment methodology.
- Created PowerShell and Python for various system admistration tasks to automate routine processes.
- Installed, configured, and administrated all UNIX/LINUX servers on AWS, includes teh design and selection of relevant hardware to Support teh installation/upgrades of Red Hat, CentOS operating systems.
- Managed Linux/unix servers configuration wif periodic health checks and email notifications using ansible roles and playbooksmonitor and anlysis of system logs using splunk.
- Deployment of GCP services like GCS, Big Data, pubsub using Terraform.
- Successfully done POC for Application Performance Monitoring wif App Dynamics for Java application.
- Successfully completed migration of on-prem nexus repositories to GCP nexus respository wif python.
- Worked on Kubernetes to manage containerized applications on nodes, Config Maps, Services, and deploy application containers as pods.
- Developed and deployed Kubernetes services in EKS and GKE ckusters using Jenkins.
- Worked on setting up teh Jenkins Pipelines, Jobs, and administration of Jenkins infrastructure for release automation of Java-based applications.
- Worked wif Docker for containerizing microservices in teh cloud and managed clusters using Kubernetes
- Performed Certification and Accreditation of Web Applications for java, .Net, Cloud services configuration.
- Worked on data visualization of application metrics wif Power BI and Power Automate modules.
- Implement Terraform modules to deploy various resources across multiple cloud providers like AWS, Azure and manage infrastructure.
- Worked on Nessus scans for Network security auditing, vulnerability scannings, Ncat for data transfer debugging
- Automate deployment of NSClient to capture OS-level performance metrics onto teh Nagios XI server. Create Nagios template config files to set up alert notifications on teh monitoring metrics
Environment: /Tools: Azure, AWS, GCP, Terraform, Python, Flask, RESTful API, Jenkins,, ADFS, Docker, Kubernetes.
Confidential, Alpharetta, GA
Cloud/DevOps Engineer
Responsibilities:
- Worked on teh migration of On-Premise to teh Azure Cloud, deployment of platform services including architecture management, provisioning, configuration, deployment of applications in teh cloud
- Developed automation frameworks for hybrid cloud infrastructure deployments
- Configured Storages accounts for web applications and Azure Data Lake for total applications servers in teh backend
- Managed and designed monitoring services like Grafana, Stream Analytics Job, Application Insights, Log Analytics
- Designed and managed different data movement from source systems to targets via apache Kafka
- Worked on development and unit testing of data migration wif kafka, maintaining and testing applications as part of troubleshooting.
- Deployed Cloud Witness for Failover Cluster by creating Quorum for File sharing in Azure Cloud
- Configured environments wif PowerShell and ARM Templates, migrated current Azure SQL Data Center environment wif Azure Disaster Recovery (ADR)
- Created Service Fabric Cluster using ARM Templates and attached node types deployed applications
- Deployed State full, Stateless services and worked on reliable actors, troubleshoot cluster provisioning failure and seed node recovery
- Created Terraform custom templates to generate dedicated VPC’s, NAT subnets for Web & databases applications, data processes
- Automated cloud infrastructure using Terraform and making it auditable by storing all teh infrastructure changes pushing into teh GIT repository
- Configured teh scale up and scale down VM sizes, create VMs & V-nets, scale sets, configured and modified teh VM scale capacity wif PowerShell scripting and Terraform templates
- Integrated ansible tower to Jenkins services for efficient critical application deployments, managed changes and provided encryption for task files wifin vault.
- Wrote Ansible Playbooks to implement various roles for applications to ensure deployment of Applications/Services on teh Kubernetes Cluster Nodes
- Created customized modules, using existing modules in Ansible that can control Package System Resources and integrated Ansible to manage all existing servers and automate teh build/configurations of new services
- Used Azure DevOps (VSTS) pipelines to build and deploy microservices onto Kubernetes cluster of Pods and Docker containers serving as Master/Slave nodes servers end users
- Implementation of CI/CD pipeline for teh Azure cloud-based analytical data ecosystem using VSTS GIT as versioning and controlling tool
- Troubleshooting of network issues using DHCP, DIG, DNS, SNMP, SMTP, Ethernet, IOS, netstat, NFS, NIS, NS lookup, OSPF, BGP, TCP/IP, and TCP dump
Environment: /Tools: Azure (Virtual machines, Blob storage, Azure DNS, VNets, Load balancer, Traffic Manager, CDN, Disk Storage, App Service, etc) VSTS, Terraform, Docker, Kubernetes, Linux, GitHub, Python, TFS, PowerShell, ServiceNow
Confidential
Linux System Administrator
Responsibilities:
- Configured kickstart server and updating/applying patches to teh servers using teh RedHat Satellite server.
- Installed and configured various services like DNS, LDAP, DHCP, RPM, Send mail, Apache Web Server, Web Logic, NIS, SSH, Tomcat.
- Installed Firmware Upgrades, kernel patches, systems configuration, performance tuning on Unix/Linux systems
- Developed, customized, and build packages on Solaris and RPMs on Linux for deployment on various servers through teh Software Development Life Cycle (SDLC).
- UsedLDAPto set Permissions, as an administrator to allow only certain people to access theLDAP database.
- Worked on checking systems error logs and Hardware logs, server monitoring using Splunk,created custom Splunk, dashboards, and reports to reduce user requests.
- Working noledge on teh TCP/IP protocols RSH, SSH, RCP, SCP.
- Updated YUM Repositories and Red Hat Package Manager (RPM).
- Handling teh day-to-day Operations, Troubleshooting& Solve Server Problems in Linux.