We provide IT Staff Augmentation Services!

Infrastructure Architect, Aws Cloud Engineer Resume

5.00/5 (Submit Your Rating)

New York, NY

PROFESSIONAL SUMMARY:

  • Experienced Infrastructure Architect well - versed in designing and delivering a wide range of infrastructure solutions to translate customer challenges to solutions. Strategic and tactical planner with a decisive approach and analytical problem-solving skills. Looking for a full-time position with room for advancement.
  • Monitored the network and troubleshoot network flow issues thereby increasing team productivity by an estimated 90%
  • Created policy to detect, control and protect networks against access by compromised devices which lowered compromised network access by 97%
  • Led optimization program that drastically reduced AWS infrastructure cost by 30%,

TECHNICAL SKILLS:

Cloud Platform: AWS

Data and File Storage: Amazon S3, EBS, EFS and Storage Gateway

Network Management: VPC, CloudFront, Route53, ELB.

Cloud Automation: Terraform, Ansible

CI|CD Tools: Jenkins, CodePipeline

Data and Application Migration: DMS, SMS, Snowball & Snowball Edge

Management and Auditing: CloudWatch, CloudTrail, AWS Config, Trusted Advisor, SNS, AWS OrganizationTeamwork, Multitasking, Effective Communication

PROFESSIONAL EXPERIENCE:

INFRASTRUCTURE ARCHITECT, AWS CLOUD ENGINEER

Confidential - New York, NY

Responsibilities:

  • Design for high availability and business continuity using self-healing-based architectures, fail-over routing policies, multi-AZ deployment of EC2 instances, ELB health checks, Auto Scaling, and other disaster recovery models
  • Maintain and configure various user accounts, create groups, and grant granular permissions to various developers
  • Design and implement end-to-end Continuous Integration and Continuous Delivery (CI/CD) pipelines while working with Developers using both Jenkins and AWS pipeline for continuous software development and deployment for both Java, JavaScript and Node.js applications using Maven, Gradle, npm as Build tools and package managers respectively
  • Infrastructure Development on AWS by employing services such as EC2, RDS, Cloud Front, Cloud Watch, VPC, etc
  • Engaged with security and development teams to ensure a secured Cloud Environment across different accounts
  • Create Identity Access Management roles for various resources like EC2, RDS and S3 to communicate with each other
  • Configure user accounts for Development, Test, Pre-Production and Production environments
  • Migrate multiple applications, servers, and databases from on premise to AWS cloud using migration services like Server Migration Service (SMS), Database Migration Service (DBMS) and Cloud Endure
  • Build and configure a virtual data center in the AWS Cloud by provisioning a Virtual Private Cloud, Public and Private Subnets, Security Groups, NACL's, Route Tables and Elastic Load Balancers
  • Build Terraform templates from scratch to create multi region web applications and databases
  • Perform patching and upgrading multiple Development, Test and Production environment databases using services such as System Manager Maintenance Window
  • Develop enterprise level microservices architectures and implemented containers in AWS using ECS and complementary services including integration patterns with container-based workloads in AWS
  • Experience working in Agile Scrum Software Development Lifecycle with respect to delivery operations, functional and technical specifications, development, testing and maintenance
  • Provision various compute, networking and database AWS resources like launching EC2 Instances, creating RDS, security groups and auto scaling groups
  • Responsible for monitoring instances by creating alarms and SNS notifications using cloud watch
  • Perform patching and upgrading multiple Development, Test and Production environment databases using services such as System Manager Maintenance Window
  • Manage Amazon Web Service like IAM, EC2, S3, RDS, using SNS and CloudWatch
  • Established metrics and carefully monitored the health/utilization of AWS resources on a wide scale by making use of highly sophisticated Amazon CloudWatch.

AWS CLOUD ENGINEER

Confidential - WA

Responsibilities:

  • Deployed databases in private subnets and configured bastion hosts and NAT Gateway for access to the internet
  • Centrally administered multiple accounts using AWS Organizations
  • Implemented various security policies using NACL, AWS WAF, AWS Shield, security groups, private subnets, encryption in transit and at rest
  • Created AWS Lambda functions to trigger AWS resources
  • VPC build with Private and Public Subnet coupled with VPNs setup back to on premise datacenter and cooperate offices
  • VPC peering with other Accounts allowing access and routing to service and users of separate account to communicate
  • Troubleshoot applications hosted in the AWS platform to identify performance, connectivity and security issues
  • Designed disaster recovery architectures relative to RTOs and RPOs efficiently
  • Used Cloud Watch to set alarms, generate notifications and remediate potential security lapses in the AWS environment
  • Used Route 53 policies to route traffic according to geographical locations
  • Designed and implemented for elasticity and scalability using ElastiCache, CloudFront - Edge locations, RDS (read replicas, instance sizes)
  • Created AWS Multi-Factor Authentication (MFA) for instance RDP/SSH logon, worked with teams to lock down security groups
  • Used Jira to plan, track, support and close requests, tickets and incidents
  • Delegated access across AWS accounts using IAM cross account roles

We'd love your feedback!