Aws Devops/cloud Engineer Resume
SUMMARY:
- 5+ years of leading the implementation of operational effectiveness and accomplishing technical solutions.
TECHNICAL SKILLS:
AWS: VPC Designing including VPN, EC2/Auto Scaling, S3 Life Cycle, RDS with Multi AZ, ElasticCache(Redis & Memcached) Route 53 DNS Designing, IAM policies, JSON, AWS Migration, SNS with CloudWatch alarms, Kinesis, Direct Connect, AWS CodeCommit, AWS Systems Manager, EC2 Lifecycle Manager, AWS Config, Lambda
Platforms: AWS, Linux: RHEL; Programming Languages: Python, Bash, JSON, Go, Groovy.
Configuration Management & DevOps Tools: CodeCommit, CodeBuild, CodeDeploy, Ansible, Jenkins, CI/CD pipeline, Sonarqube, nexus, ansible, Gradle, Maven, Docker, Kubernetes, Helm, Prometheus, Grafana, Terraform, CloudFormation & GitHub.
EXPERIENCE:
Confidential
AWS Devops/Cloud Engineer
Responsibilities:
- Developed Terraform and CloudFormation base codes for infra provisioning in AWS. built multiple CI/CD Pipelines for continuous integration and deployment/delivery.
- Built Docker images to be used in production.
- Utilized Sonarqube to scan for bugs and vulnerabilities.
- Created Kubernetes Deployment.yml files for orchestration in production.
- Written Jenkinsfile in both declarative and scripted format.
- Created Ansible playbooks in YAMl format.
- Utilized Prometheus and Grafana for monitoring pipelines
- Implemented security best practices in AWS including multi factor authentication, access key rotation, role - based permissions, enforced strong password policy, configured security groups and NACLs, S3 bucket policies and ACLs.
- Optimized cost through reserved instances, selection and changing of EC2 instance types based on resource need, S3 storage classes and S3 lifecycle policies, leveraging Autoscaling.
- Stop ec2 instances nightly with the help of the boto3 SDK in lambda
- Configure CloudWatch alarm rules for operational and performance metrics for our AWS resources and applications.
- Leverage STS to generate and provide temporal credentials to users.
- Setup and configured logs files for detail monitoring and alerts notification.
- Configure S3 events to set up automated communication between S3 and other AWS services.
- Designed highly available infrastructure using Elastic load balancer and auto-scaling for Web servers which Scale in and Scale out automatically, also isolated environment by having security groups and NACL across subnets for EC2 instances.
- Architected and Implemented AWS Cloud cost effective solution for Non-Production environment such as Development, and Test.
- Managed tools like JIRA, Confluence, Jenkins and their usage / process ensuring traceability,repeatability, and quality.
Confidential
AWS Solutions Architect/Cloud Engineer
Responsibilities:
- Designed and implemented Cloud solutions with AWS Virtual private cloud (VPC), Elastic Compute Cloud(EC2), Elastic Load Balancer (ELB), S3, Auto scaling, RDS, Cloud watch, and other AWS services.
- Setup and configured Security Groups, NACL for VPC specific to the environment.
- Created AMI images of critical EC2 instances as backup using AWS CLI and Console.
- Created and managed DNS records in AWS Route53.
- Created SSL/TLS using ACM and implemented the same using ELB and Route53.
- Understand security best practices, policies, and standards to design highly secure cloud architecture for internal and external cloud solutions.
- Developed Terraform and CloudFormation base codes for infra provisioning in AWS.
- Architected a highly secure infrastructure with public and private subnets for multi-tier web applications.
- Experienced on AWS compute services (EC2, Lambda, Elastic Beanstalk, autoscaling).
- Designed highly scalable resources (horizontal and vertical scaling).
- Provision secured resources in VPC subnets with security groups and NACLs.
- Architect a secure infrastructure with a NAT Gateway to allow instances in a private subnet to access the internet for updates.
- Leveraged data migration services (Snowball, Direct Connect etc.) for data migration.
- Created IAM users, roles, and granted required access permissions and privileges to the users.
- Designed secured, cost optimized, highly available and fault tolerant architecture designs and infrastructure in AWS.