We provide IT Staff Augmentation Services!

Aws Devops/cloud Engineer Resume

5.00/5 (Submit Your Rating)

SUMMARY:

  • 5+ years of leading the implementation of operational effectiveness and accomplishing technical solutions.

TECHNICAL SKILLS:

AWS: VPC Designing including VPN, EC2/Auto Scaling, S3 Life Cycle, RDS with Multi AZ, ElasticCache(Redis & Memcached) Route 53 DNS Designing, IAM policies, JSON, AWS Migration, SNS with CloudWatch alarms, Kinesis, Direct Connect, AWS CodeCommit, AWS Systems Manager, EC2 Lifecycle Manager, AWS Config, Lambda

Platforms: AWS, Linux: RHEL; Programming Languages: Python, Bash, JSON, Go, Groovy.

Configuration Management & DevOps Tools: CodeCommit, CodeBuild, CodeDeploy, Ansible, Jenkins, CI/CD pipeline, Sonarqube, nexus, ansible, Gradle, Maven, Docker, Kubernetes, Helm, Prometheus, Grafana, Terraform, CloudFormation & GitHub.

EXPERIENCE:

Confidential

AWS Devops/Cloud Engineer

Responsibilities:

  • Developed Terraform and CloudFormation base codes for infra provisioning in AWS. built multiple CI/CD Pipelines for continuous integration and deployment/delivery.
  • Built Docker images to be used in production.
  • Utilized Sonarqube to scan for bugs and vulnerabilities.
  • Created Kubernetes Deployment.yml files for orchestration in production.
  • Written Jenkinsfile in both declarative and scripted format.
  • Created Ansible playbooks in YAMl format.
  • Utilized Prometheus and Grafana for monitoring pipelines
  • Implemented security best practices in AWS including multi factor authentication, access key rotation, role - based permissions, enforced strong password policy, configured security groups and NACLs, S3 bucket policies and ACLs.
  • Optimized cost through reserved instances, selection and changing of EC2 instance types based on resource need, S3 storage classes and S3 lifecycle policies, leveraging Autoscaling.
  • Stop ec2 instances nightly with the help of the boto3 SDK in lambda
  • Configure CloudWatch alarm rules for operational and performance metrics for our AWS resources and applications.
  • Leverage STS to generate and provide temporal credentials to users.
  • Setup and configured logs files for detail monitoring and alerts notification.
  • Configure S3 events to set up automated communication between S3 and other AWS services.
  • Designed highly available infrastructure using Elastic load balancer and auto-scaling for Web servers which Scale in and Scale out automatically, also isolated environment by having security groups and NACL across subnets for EC2 instances.
  • Architected and Implemented AWS Cloud cost effective solution for Non-Production environment such as Development, and Test.
  • Managed tools like JIRA, Confluence, Jenkins and their usage / process ensuring traceability,repeatability, and quality.

Confidential

AWS Solutions Architect/Cloud Engineer

Responsibilities:

  • Designed and implemented Cloud solutions with AWS Virtual private cloud (VPC), Elastic Compute Cloud(EC2), Elastic Load Balancer (ELB), S3, Auto scaling, RDS, Cloud watch, and other AWS services.
  • Setup and configured Security Groups, NACL for VPC specific to the environment.
  • Created AMI images of critical EC2 instances as backup using AWS CLI and Console.
  • Created and managed DNS records in AWS Route53.
  • Created SSL/TLS using ACM and implemented the same using ELB and Route53.
  • Understand security best practices, policies, and standards to design highly secure cloud architecture for internal and external cloud solutions.
  • Developed Terraform and CloudFormation base codes for infra provisioning in AWS.
  • Architected a highly secure infrastructure with public and private subnets for multi-tier web applications.
  • Experienced on AWS compute services (EC2, Lambda, Elastic Beanstalk, autoscaling).
  • Designed highly scalable resources (horizontal and vertical scaling).
  • Provision secured resources in VPC subnets with security groups and NACLs.
  • Architect a secure infrastructure with a NAT Gateway to allow instances in a private subnet to access the internet for updates.
  • Leveraged data migration services (Snowball, Direct Connect etc.) for data migration.
  • Created IAM users, roles, and granted required access permissions and privileges to the users.
  • Designed secured, cost optimized, highly available and fault tolerant architecture designs and infrastructure in AWS.

We'd love your feedback!