Site Reliability Engineer Resume
Sunnyvale, CA
SUMMARY
- Experienced DevOps Engineer with 8+ years of experience in the fields of automation, configuration management, cloud operations, DevOps tool stack.
- Hands on experience in automating and optimizing large scale mission - critical deployments on AWS EKS Kubernetes clusters.
- Experience in Build & Release Engineering including end-to-end code configuration, building binaries and deployments.
- Hands on AWS solution architect with several years of experience in managing enterprise scale solutions that leverage AWS services like EC2, SSM, EKS, S3, IAM, Route53, VPC, Autoscaling, CloudWatch, RDS, DynamoDB, Lambda, Elastic Beanstalk with focus on integrated and automated service delivery.
- Strong experience working with Jenkins, Artifactory, Docker, Kubernetes, Maven, Gradle, Git, Ansible, AWS, Azure.
- Designed and Implemented CICD pipelines achieving the end to end automation from code check in to artifacts deployment.
- Develop deployment templates and Docker images for Microservices utilizing Helm Charts and Kubernetes manifests.
- Designed AWS Cloud Formation and Terraform templates to create custom sized VPC, subnets, NAT Gateway, Encrypted EBS, S3, VPC Endpoints, EKS Cluster.
- Experience on Architecting and securing AWS Infrastructure using IAM, KMS, Cognito, API Gateway, Cloud Trail, Clous Watch, Trusted Advisor, Security Groups, NACL, etc.
- Extensive experience in creating Ansible playbooks and galaxy roles for installing/upgrading of internal tools and services.
- Build automation around Jenkins and created configuration as code templates for version controlling Jenkins and Artifactory configurations.
- Implemented monitoring of CI/CD systems using Splunk, alert based rules with Prometheus/Grafana.
- Experience in automating, configuring and deploying applications on AWS/Azure cloud environments.
- Actively take part in code reviews, re-factoring and release activities in an Agile environment.
TECHNICAL SKILLS
Configuration & Deployment: Ansible/Chef, CloudFormation, Terraform
Cloud Technologies: AWS, Azure, OpenStack
Continuous Integration: Jenkins, Spinnaker, Maven/Gradle
Web/Application Server: Apache Tomcat, NGINX
Scripting & Programming: Bash shell, Python, Golang, Java/J2EE
Container & Virtualization: Docker, Kubernetes, EKS, Vagrant
Testing & Code Quality: Junit, TestNG, SonarQube
Monitoring & Analytics: Prometheus/Grafana, AWS CloudTrail, Splunk, CloudWatch
Databases: MySQL, Postgres, DynamoDB, AWS Aurora
Operating Systems: Red Hat Linux, Centos, Ubuntu
PROFESSIONAL EXPERIENCE
Confidential, Sunnyvale, CA
Site Reliability Engineer
Responsibilities:
- Worked as a liaison between DevOps, Build/Release, Application and SRE teams to achieve a scalable and reliable CICD pipeline.
- Deploy production grade AWS EKS clusters and automate provisioning
- Created AWS Launch configurations using customized AMI’s, configure auto scaling groups, route traffic using AWS Route53.
- Designed Terraform templates to deploy AWS EKS clusters and AWS Solutions using EC2, S3, and EBS, Elastic Load balancer (ELB), auto-scaling groups.
- Designed & Implemented CICD pipelines using AWS CodePipeline, Codebuild, CodeCommit, GitHub.
- Created AWS Python (Boto3) scripts to create, configure AWS services such as EC2, S3, KMS, SQS.
- Created Helm templates for application deployment and setup Jenkins ephemeral agents as Docker containers running on Kubernetes Clusters.
- Developed Infrastructure as Code templates using Terraform for AWS cloud resources and used AWS S3 as backend for terraform state file to provide version control and consistency.
- Developed cloud infrastructure pipeline using Terraform, Jenkins to streamline provisioning for AWS-Azure multi cloud environment.
- Created Kubernetes manifests and Helm charts to deploy Microservices onto Kubernetes clusters.
- Utilized CloudWatch, CloudTrail, SQS, Redis and Elasticsearch for message queuing and log aggregation.
- Used Splunk for real time log analysis, distributed alerts with SNS topics or other integrated API’s and stored the reports in AWS S3 buckets.
- Provisioned RDS instances like Aurora, Aurora serverless, etc. for database services.
- Deploy Application Load Balancer (ALB) ingress controllers for AWS Elastic Kubernetes Clusters to enable Layer 7 path-based routing.
- Develop Ansible playbooks for automating AWS EC2 instance provisioning and configurations.
- Setup and configure stateful Jenkins Servers via configuration as code templates (JCasc).
- Developed Ansible playbooks for disk storage management and docker prune tasks.
- Assisted in migration and maintenance of development, staging and production environments in AWS using Terraform (Infrastructure as Code).
- Develop Python automation scripts for Artifactory repo cleanup, GitHub code updates, Jenkins helper scripts.
- Implemented monitoring of CICD jobs running in Jenkins using Splunk dashboards and alerts, monitor production Linux Hosts using Prometheus/Grafana logging and setup rule-based alerts using PagerDuty.
- Developed Grafana Dashboards for all our prod applications and Artifactory instances using Prometheus exporters and deployed with Ansible playbooks.
- Developed Docker Builder Images to serve as build images for running CI jobs in Jenkins, utilized HashiCorp Vault for secrets management.
- Demonstrated proficiency in using Jenkins, YAML, Artifactory, GitHub, Python, BASH Scripting, Maven/Gradle to improve the build and release process.
- Improve existing Artifactory Server by enabling high availability features, create database backups by using cloud storage services like S3 buckets, modify PostgreSQL database with master-slave architecture.
- Writing Dockerfiles with best practices along with docker linting, Docker container management along with volumes, container-based DB and services, Docker Artifactory configuration and setup.
- Create Jenkins jobs using declarative pipelines with Docker build agents and Maven, Gradle projects.
- Maintain and troubleshoot Artifactory and build automation process around it for installations, upgrades and also apply security hardening protocols around it.
- Troubleshoot Maven, Jenkins build failures to enable an error free continuous integration build pipeline for JAVA Applications.
- Develop REST API collections using POSTMAN and integrate with automation scripts for getting insights from the Artifactory server.
- Utilized HashiCorp Vault, AWS KMS to manage mission critical secrets, enable security standards for secret management.
- Partner with Ops and Product stakeholders to support cloud security risk reduction, perform risk analysis.
- Compile Nginx from source and create automation scripts to compile and store Nginx tar balls.
Environment: AWS, Azure, Ansible, Shell, Python, Java/J2EE, Maven/Gradle, Artifactory, Linux/Centos, Confluence, Jenkins, NGINX, Docker, EKS, Kubernetes, Splunk, Slack, Linux Scripting, Prometheus/Grafana, Terraform/CloudFormation
Confidential, Chicago, IL
Systems/Cloud Engineer
Responsibilities:
- Experienced in Cloud automation using AWS Cloud Formation templates to create custom sized VPC, subnets, NAT, EC2 instances, VPC Endpoints, ELB and Security groups.
- Implemented Restful API with API Gateway and DynamoDB to serve as CI functions.
- Involved in writing various custom Ansible Playbooks for deployment orchestration on AWS and developed Ansible Playbooks to simplify and automate day-to-day server administration tasks.
- Used Amazon Route53 to manage DNS zones & to give public DNS names to ELB's and CloudFront for Content Delivery.
- Configured CloudWatch to alert the security team of any users without MFA setup while logging onto AWS Console.
- Worked with Fuel for deployment of OpenStack Controllers and other OpenStack Core services, worked with Ansible to upgrade and deploy new changes to production OpenStack environments.
- Worked with Ansible for deployment of OpenStack components like Glance, Nova, Swift, Cinder, Keystone, Horizon.
- Worked with different cloud platforms and prototyped Terraform templates to deploy infrastructure on Microsoft Azure platform.
- Scripting infrastructure and (Linux) machine provisioning using bash and the Python(boto) AWS-SDK.
- Hands on experience in setting up database in AWS using RDS, storage using S3 bucket and configuring instance backups to S3 bucket to ensure fault tolerance and high availability.
- Configured AWS IAM and Security Group in Public and Private Subnets in VPC. Architected, Designed and Developed the Backup and Archiving, Disaster Recovery in AWS Cloud.
- Migrated VMware VMs from on-premise to AWS cloud and migrated applications using AWS services.
- Managed the user accounts (IAM), RDS, ROUTE53, VPC, RDB, Dynamo DB, SES, SQS and SNS services in AWS cloud.
- Creating CloudWatch alerts for EC2 instances and using them in AWS Auto Scaling launch configurations.
- Created SNS notifications and assigned ARN to S3 for object loss notifications.
- Created elastic load balancers (ELB) and used Route53 with failover and latency options for high availability and fault tolerance.
- Deployed Nginx Ingress controllers onto Kubernetes clusters for enabling load balancing for microservices.
- Handled Linux/Centos servers to serve as Jenkins Agents and created automation for disk cleanup tasks.
- Worked onAWS Auto Scaling for providing high availability of applications and EC2 instancesbased on CPU utilization metrics.
Environment: AWS, OpenStack, Ansible, Shell, Python, Java/J2EE, Linux/Centos/Ubuntu, Jenkins, Docker, Kubernetes, Splunk, Elastic Load Balancer/Nginx, Terraform
Confidential, KS
Systems Engineer
Responsibilities:
- Developed UI using a wide range of front-end technologies like AngularJS, HTML, CSS, JavaScript.
- Provision and manage VPC, EC2, S3, Subnets on AWS using cloud formation templates.
- Used Maven dependency management system to deploy snapshot and releaseartifacts to Nexus to share artifacts across projects.
- Perform front-end validations using JavaScript, unit testing using Junit.
- Troubleshoot, resolve AWS cloud deployment issues, optimize deployment pipelines by writing Python/BASH scripts.
- Managing systems routine backup, scheduling jobs like disabling and enabling Cron jobs, enabling system logging, network logging of servers for maintenance, performance tuning, testing.
- Containerized Java, Node JS applications using Docker and enabled CICD pipelines using Jenkins.
Confidential
Systems Engineer
Responsibilities:
- Integration of Jenkins Automated Build with Deployment Pipeline by using Ansible to pick up the Build Artifacts from Nexus repository and deploy in target environments (Integration, QA, and Production).
- Experience in RDS, MySQL and PostgreSQL to perform basic database administration and manage virtual cloud resources as required.
- Developed Chef cookbooks to configure production environments, eliminate reliability issues related to configuration drift.
- Built and Deployed Java/J2EE to Apache Tomcat server in an Agile continuous integration environment through Jenkins pipelines with Maven as a build tool.
- Created JAR, WAR, and EAR files using Maven script and deploy the project onto Tomcat server.
- Managed ESXi hosts using vCenter Server/ vSphere Client and VMware Web Client.
- Worked with Version Control Systems SVN (Subversion), Git/GitHub for creating repositories, feature branches, merges, resolving merge conflicts and tagging.
- Setting up Nagios monitoring on both Linux and Windows Environments.
- Designed, configured, and supported BIND DNS, DHCP and SNMP on Linux machines.
- Applied patches every quarter regularly to meet audit requirements using Oracle OPS Center, Redhat Satellite server, YUM and RPM tools.
- Handled various storage devices, Disk Management, Logical Volume Management (LVM) and Logical Partitioning.
- Managed LDAP Server, replications and LDAP Client configuration for different environments.
- Developed test suites for unit testing Java applications using Junit test cases.
- Worked in an Agile environment and collaborated with cross functional teams for requirement gathering, provided support for software release process.
Environment: Shell, Python, Java/J2EE, Linux/Centos/Ubuntu, Jenkins, Apache Tomcat, GitHub, RedHat Linux, Chef, Ansible