We provide IT Staff Augmentation Services!

Sr. Azure Devops Engineer Resume

4.00/5 (Submit Your Rating)

SUMMARY

  • Certified Microsoft Azure Administrator and Microsoft DevOps Engineer Expert with 8+ years of experience, profound knowledge of cloud platforms (AWS and Azure) and ability to Design, Automate, Develop and Integrate DevOps tools, Build/Release Management, Continuous Integration and Continuous Delivery (CI/CD), Configuration Management and provided support & maintenance across cloud and on - premises platforms.
  • Proficient in Administrating Microsoft Azure Iaas/Paas services like Azure Virtual Machines (VMs), Virtual Network (VNET), Azure Storage, SQL Databases, Azure Active Directory (AAD), Monitoring, DNS, Autoscaling and Load Balancing.
  • Designed, deployed and maintained and implemented cloud solutions using confidential Azure and underlying technologies using IAAS & PAAS services as part of SDLC/Agile Methods.
  • Hands on experience creating Cost Analysis reports for Microsoft Azure subscriptions and visualizing the output monthly in Tableau and PowerBI.
  • Participated in creating, validating and reviewing solutions for migrating toAzurecloud environment also conducting Proof of Concept for the latestAzurecloud-based service by using simplified automation using JSON Templates and PowerShell.
  • Seasoned in managing Azure Container Registry (ACR) to store the customized private Docker Images and allow Azure DevOps pipelines to use these Images via Service Connections to deploy Docker Images across all Environments.
  • Involved in planning and collaborating on code development, built and deployed applications using Azure DevOps services such as Azure Repos, Azure Boards, and Azure Test Plans.
  • Skilled in structuring cluster AutoScaler for Azure Kubernetes Service (AKS) using Terraform and worked with scheduling, deploying and managing pods and replicas in AKS.
  • Work experience in setting up alerts and deploying multiple dashboards for individual applications in Azure Kubernetes (AKS) clusters using tools like Prometheus and Grafana.
  • Contributed with Helm package manager in creating custom charts for various applications for implementing custom Helm Charts.
  • Experience diagnosing and mitigating service degradation using Azure Monitoring tools such as Azure Network Watcher, Azure Service Health and Azure Log Analytics. Used Grafana Monitor tool to troubleshoot services, root cause analysis and security solutions.
  • Expertise with Terraform templates for provisioning Infrastructure like Virtual Networks, Load Balancers, Storage Accounts, Virtual Machines, Virtual Machine Scale Sets, Azure Kubernetes Cluster (AKS), Key Vaults and Log Analytics Workspace in Microsoft Azure using Terraform modules.
  • Well versed with updating Azure Images in Azure Compute Galleries using Packer and update these Image references for Virtual Machines, Virtual Machine Scale Sets using Terraform across all environments.
  • Skilled in writing templates for Azure Infrastructure as code using Terraform to deploy Virtual Machines, OMS Agent extension on VMs, Log Analytics Workspace and Integrated Log Analytics with Azure VMs for monitoring the log files.
  • Strong knowledge on using Docker for virtualization, run, ship and deploy the application securely to fasten the build and release Engineering and experience in managing Docker volumes and Docker container snapshots.
  • Experience in Working with AWS Cloud platform's services which include EC2, VPC, EBS, AMI, SNS, RDS, EBS, CloudWatch, CloudTrail and Cloud Formation AWS configuration, Autoscaling, CloudFront, IAM and S3.
  • Hands-on experience creating IAM Roles and Policies to grant specific permissions to AWS Services based on the application and the environment in which the application is deployed (DEV, TEST and PROD).
  • Expertise in using AWS Cloud Formation templates creating services like VPCs, Subnets, EC2 and configured the launched instances with respect to the applications, created Snapshots and Amazon Machine Images (AMIs) for Backup in production Environment.
  • Well versed with installing, uninstalling and upgrading various plugins in Jenkins, setting up Global Credentials in Jenkins and leveraged these credentials as environment variables across multiple pipelines.
  • Integrated several tools with CloudBees Jenkins to set up a CI/CD pipeline that builds and runs Terraform script templates to build infrastructure in Microsoft Azure.
  • Seasoned in installing, updating and managing packages like azcli, python, kubectl, terraform, docker and git on Linux and Windows Virtual Machines across DEV, QA and PROD environments using Ansible Playbooks.
  • Hands on experience upgrading existing HDInsight clusters and Azure Kubernetes (AKS) clusters in Microsoft Azure to the latest version using Bash Scripting.

TECHNICAL SKILLS

Cloud Platforms: Microsoft Azure, Amazon Web Services

Container Orchestration Tools: Docker Swarm, Kubernetes, EC2 Container Services, Azure Container Services

Configuration Management: Chef, Ansible, Puppet

Version Control Tools: GIT, GITHUB, SVN, Perforce, Bitbucket

Web and Application Servers: JBOSS, Apache Tomcat, Web Sphere, Web Logic, Nginx, Send Mail

Monitoring Tools: Nagios, Splunk, Dynatrace, ELK, Datadog, Grafana, New Relic

Build Tools: Maven, Ant, Gradle

Continuous Integration: Jenkins, Bamboo, Hudson

Scripting Languages: Shell, Ruby, Python, PHP, Perl, JavaScript, PowerShell, JSON, YAML

Languages: Java, J2EE, Python

Database: MySQL, Oracle, Dynamo DB, Mongo DB, Cassandra

Repository Management: Nexus, JFrog

Virtualization: VMware, Windows Hyper-V, Power VM, Vagrant, Virtual box

Operating System: Red Hat, Ubuntu, Debian, Fedora, CentOS, Windows, Solaris, Mac OS

Networking Protocols: TCP/IP, DNS, NFS, ICMP, SMTP, DHCP, OSPF, BGP, UDP and RIP

PROFESSIONAL EXPERIENCE

Confidential

Sr. Azure DevOps Engineer

Responsibilities:

  • Worked extensively with Microsoft Azure Cloud services such as Application Gateways, Load Balancing, Virtual Machines, Virtual Networks, Subnets, Express Route, Azure Active Directory(AD), Azure Resource Manager(ARM), Blob Storage and SQL Database.
  • Will versed with Azure Networking solutions including Virtual Networks (VNET), Gateways for point-to-site and site-to-site VPN connectivity, Load Balancers and Application Gateways.
  • Responsible for configuring Alert notifications to monitor Heartbeat, CPU and Memory Alerts in Azure Monitor and integrating them with PagerDuty to notify the team.
  • Worked extensively on creating and managing Azure Key Vault Keys, Secrets, and Certificates along with assigning Access Policies for Service Principal's to access these Key Vaults.
  • Volunteered in Enabling Microsoft Azure Defender for Containers and implemented advanced threat protection features for Virtual Machines, SQL Databases, Containers and Web applications.
  • Participated in migrating on-premises to Windows Azure by creating an Azure Disaster Recovery Environment, Azure Recovery Vault, and Azure Backups from ground-up using PowerShell scripts.
  • Assisted in setting up end-to-end pipelines in Azure DevOps using YAML scripts and configuring service connections in across multiple Projects in Azure DevOps Organization.
  • Extensive experience using the Azure DevOps pipeline to deploy all Microservices builds to the Docker registry preceded by Kubernetes deployment, pod creation and Kubernetes management.
  • Extensive experience in developing Azure DevOps pipelines to build light weight Alpine Base Images using Docker files, tag the custom images and push the image to Docker Hub.
  • Focused on creating resources in Microsoft Azure such as VNETs, Virtual Machines, Application Gateways, Event Hubs, Storage Accounts, Azure Kubernetes Cluster, Key Vaults, and PostgreSQL across all environments using reusable Terraform Modules.
  • Resolved state lock issues in the production environment of Terraform state files in Azure, also being proficient in importing Terraform resources into state files to resolve the issues.
  • Played a significant role in using Terraform along with Jenkins and Packer tools to create custom machine Images in Azure Compute Galleries and used Ansible to install the software dependencies once the infrastructure was provisioned.
  • Collaborated in deploying Event Hub Name Space (EVNS) and Event Hubs in Microsoft Azure, as well as working with Terraform modules to assign roles for users to access at the EVNS and Event Hubs levels.
  • Configured Bitbucket for Continuous Builds, Test and Deploy applications to Azure Cloud and created Bitbucket repositories across multiple projects as well as generating PAT tokens to access them.
  • Assisted in deploying and configuring Prometheus to monitor Kubernetes nodes with node-exporter, monitor Kubernetes API and resources with Kube-state-metrics.
  • Validated Kubernetes deployments by establishing a local development workflow that used Minikube and implementing the Kubernetes interface by creating RESTful APIs to read, delete, store, and update bucket information on the Kubernetes Console.
  • Involved in implementing the concept of hardening the Azure Kubernetes (AKS) cluster to make it secure and resilient while administering and supporting the Azure Kubernetes infrastructure.
  • Assisted in setting up Azure Monitoring tools like Azure Log Analytics and Azure Application Insights for resource level logs of entire subscription and store the logs in the Event Hub.
  • Responsible for writing Ansible Playbooks to Patch and Reboot the Ubuntu, Centos, RedHat and Windows Virtual Machines across all environments and written Ansible Playbooks to send the final report to the team through Email.
  • Extensive experience using Ansible and Ansible Tower to manage user accounts and admin accounts across all Cloud and On-Premises Virtual Machines and to send notifications to users if the password was about to expire in 30 days.
  • Proficiency using PowerShell scripts in various environments to tag the existing Microsoft Azure infrastructure, which is currently without any tags associated.
  • Involved in the creation of Virtual Networks and the setup of site-to-site VPNs using PowerShell together with the deployment of Virtual Machines across subnets and enabled communication between subnets.

Environment: Azure, Terraform, Kubernetes, Ansible, Shell, Python, Linux, Jira, Bitbucket, My SQL, Jenkins, Apache Tomcat 7.x, Azure-DevOps, Docker, NoSQL, ARM, Virtualization, Kubernetes, Nagios, Splunk, App Dynamics Nginx, LDAP, JDK1.7, XML, SVN, Git, Windows, Maven.

Confidential

Cloud Infrastructure Engineer

Responsibilities:

  • Configured and maintained Azure Storage Firewalls and Virtual Networks that use Virtual Network Service Endpoints to enable administrators to create network rules that allow traffic only from specific VNets and subnets thereby creating a secure network boundary for their data.
  • Responsible for configuring Azure Identity Access Management (IAM) for improved login Authentication and created Groups, adding Users and Service Principals to those groups in Azure Active Directory(AD).
  • Assisted in troubleshooting Virtual Machines, Virtual Machine Scale Sets through Serial Console and Connection Troubleshoot when there is a problem with SSH logging.
  • Played a significant role in creating APP Registrations across all environments, assigning Contributor roles to these service principals at subscription level and using them in Azure DevOps and Jenkins pipelines.
  • Focused on using ARM templates (JSON) to deploy, update and delete multiple Azure resources and involved in migrating on-premises resources to Azure with Azure Site Recovery (ASR) and Azure Backups.
  • Worked extensively configuring Azure DevOps Pipeline to pull the latest Docker Images from Docker Hub, tag the image with a Build Number and push the image to Azure Container Registry (ACR) in Azure.
  • Utilized Azure DevOps Services to create Azure Pipelines for Build and Release and Azure Boards for planning and tracking work, code effects and issues using Kanban and Scrum.
  • Hands-on experience configuring CRON Jobs in Azure DevOps to trigger the Build and Release jobs every alternate week.
  • Used Terraform modules and automated infrastructure management across multiple environments and created Infrastructure in Microsoft Azure using a reliable version of Terraform.
  • Strong understanding of the use of Terraform templates to manage Azure infrastructure and create Storage Accounts and Blob containers to store remote state files using Terraform modules.
  • Proficiency with using Kubernetes Nodes, Config Maps, selector, services, and deployed application container as Pods to manage containerized applications.
  • Responsible for setting up the Azure Kubernetes Service (AKS) to deploy spring applications, configure the Azure Container Registry (ACR) to store Docker Images and manage the Azure Kubernetes cluster.
  • Have Worked on performing Azure Kubernetes (AKS) Cluster upgrades at Productivity Environment once the testing was successfully completed at Lower Environments.
  • Implemented PowerShell scripts to deploy new storage accounts across all the Azure Regions to reduce latency and increase redundancy.
  • Played a significant role in setting up the Jenkins pipeline and using CRON Jobs to make it build periodically to purge unused Docker Images and Docker Containers on Jenkins host.
  • Proficient in using GIT Webhooks and Poll SCM with Jenkins to automate Jenkins tasks and responsible for writing Groovy scripts for Jenkins Pipelines.
  • Contributed to install SonarQube as a Docker container integrating it with Jenkins and configuring the build process to run code analysis to improve code metrics and quality.
  • Extensive experience with container-based deployments using Docker Images, Docker file, Docker Hub, Docker Compose and Docker registry. Used Docker-Swarm to maintain the cluster of containers.
  • Focused on writing Ansible Playbook to install OMS Agent extension on Linux hosts in DEV, QA and PROD Environment using uri module and used copy module to update and restart OMI Agent.
  • Performed configuration and management operations across multiple remote hosts using Ansible roles, Ansible files, Ansible handlers, Ansible tasks, Ansible templates and Ansible variables that were downloaded and managed from Ansible Galaxy.

Environment: Azure, Azure-DevOps, Jenkins, Web logic, Nexus, JIRA, Ansible, Oracle, Terraform, Kubernetes, Prometheus, Python,Maven, Java, GitHub, Linux, ELK, GIT, LDAP, NFS, NAS, MS Share point, Windows, Splunk, PowerShellScripts, Shell Scripts, Chef, Ansible, OpenStack, Docker, Service-Now, Kubernetes.

Confidential

Cloud/DevOps Engineer

Responsibilities:

  • Worked on escalated tasks related to interconnectivity issues and complex cloud-based identity management and user authentication, service interruptions with Azure Virtual Machines and associated Virtual storage (Blobs, Tables, Queues).
  • Responsible for creating Azure Resource Manager (ARM) templates and PowerShell scripts to automate deployment and resource provisioning across multiple Azure subscriptions.
  • Expertise in identifying and troubleshooting performance, connectivity and other issues for the applications that were hosted in Microsoft Azure platform.
  • Focused on using Terraform templates to deploy infrastructure like Elastic Load Balancer(ELB), CloudFront, SQL-NOSQL Databases and S3 across different environments on AWS.
  • Involved in migrating existing AWS infrastructure to server less architecture (AWS Lambda) deployed via Terraform and Created functions in AWS Lambda to run python scripts.
  • Well versed in using Elastic Container Registry (ECR) and Docker Hub to store the Docker Images and used those Images in Jenkins pipeline to deploy across DEV, QA and PROD Environment.
  • Built jobs in Jenkins to build AWS infrastructure from GitHub repositories containing Terraform code, managed builds in Jenkins and integrated tools from different DevOps stacks like JFrog, SonarQube, and chef.
  • Hands-on experience deleting Dangling Docker Images and Unused Docker Containers across multiple nodes by scheduling CRON Jobs on them using Ansible.
  • Designed, configured and managed public/private cloud infrastructure utilizing Amazon Web Services (AWS) including Virtual Private Cloud (VPC), Network Security Group (NSG), Public and Private Subnets, Route Tables, Elastic Load Balancer (ELB) and NAT Gateways.
  • Created custom sized VPCs, Subnets, and NAT using AWS Cloud Formation templates to ensure the successful deployment of Web applications and Database templates.
  • Implemented a serverless architecture using API Gateway, Lambda and Dynamo DB, and deployed AWS Lambda code from Amazon S3 buckets and additionally created a Lambda deployment function and configured it to receive events from your S3 bucket.
  • Played a significant role in writing Bash scripts and deploying CRON Jobs on remote Linux servers to execute these scripts under root user.

Environment: Azure, AWS, Linux, Troubleshooting, Jenkins, Docker, Dynatrace, Gradle, Ansible, MS Build, Shell Scripting, Kubernetes, Terraform, Bitbucket, GIT, MySQL, MongoDB, Node.js, .Net, Splunk, Slack, Teams.

Confidential

Cloud Engineer

Responsibilities:

  • Involved in resolving problems that arose during code build, integration, and deployments and developed scripts for backing up essential Linux environment files and folders.
  • Well versed with AWS Services like Elastic Compute Cloud (EC2), AWS Lambda, Amazon S3, Cloud Formation, Route53, Elastic Load Balancer (ELB), Elastic Block Store, Virtual Private Cloud (VPC), Security Groups, Cloud Watch and Elastic Beanstalk.
  • Designed scalable and highly available Domain Name System (DNS) within AWS cloud to route traffic to AWS cloud from users connected using AWS Direct connect for larger Deployments.
  • Have Worked on IAM policies management for organizations in AWS to define groups, create users, assign roles and define rules for role-based access to AWS resources.
  • Considerable experience and knowledge in developing plans to speed up release and deployment for continuous integration, delivery and deployment using Bamboo.
  • Expereince in using Source Code Management (SCM) tools like Subversion (SVN), GIT and TFS on Linux Platforms in maintaining, tagging and branching the versions on multiple environments.
  • Experience in writing Chef Cookbooks to automate the installation and update process of Apache Tomcat, MYSQL and Java in the horizontal clusters by using Jenkins Pipelines.
  • Worked on writing Shell scripts to delete the Log files older than 90 days on Linux hosts.
  • Worked extensively on experience setting up Java environment for the installation of ANT on Linux.

Environment: AWS, AMI, Elastic IP’s, Beanstalk, LDAP servers, Linux/Unix, Chef, Jenkins, Bamboo, Python, GIT, ANT.

Confidential

Build & Release Engineer

Responsibilities:

  • Efficient in writing Jenkins Pipeline groovy scripts for Continuous Integration and build workflow in addition to uploading artifacts into Nexus Repository using Jenkins.
  • Built Jenkins jobs to manage weekly Builds and manage GitHub repositories containing Terraform code to create infrastructure in AWS.
  • Hands-on experience integrating Jenkins GitHub hook trigger with GitHub repository to run pipeline whenever developers commit changes to code in GitHub repository.
  • Working expereince on GIT as version control tool for versioning the Automation scripts and performing merging with the new code and git commands.
  • Practical experience setting up Puppet, Puppet Dashboard for configuration management of existing Infrastructure, and managing Web Applications using Puppet.
  • Expertise in Integrating Infrastructure Automation using Puppet and created Puppet manifests and modules to automate system operations.

Environment: RHEL 6.3/6.4/6.5, Key Vault, LVM, UNIX, Oracle 7.x/8.x, Solaris, Jumpstart, Kickstart, LDAP, YUM, Apache/Tomcat server, VMWare, Telnet, SSH, SMTP.

Confidential

System Administrator

Responsibilities:

  • Responsible for the regular maintenance of Linux operating systems like RHEL, CentOS, Ubuntu, and SUSE.
  • Overseeing setting up and connecting to SSH using SSH clients like Putty and Cyber Duck, as well as copying files remotely using SCP, WINSCP, and FileZilla.
  • Worked on installing and setting up Linux systems logical volume manager (LVM) for managing disk and file systems.
  • Experience in using rpm, yum, apt and dpkg for package management across multiple Linux hosts in different environments.

Environment: NFS, FTP, Linux, UNIX, RHEL, CentOS, Ubuntu, NIS, DHCP, FTP, Telnet, Nagios, Kickstart, SSH, VM Sphere, VMWare, Virtual Box, RPM, and YUM.

We'd love your feedback!