We provide IT Staff Augmentation Services!

Senior Cloud Devops Engineer Resume

5.00/5 (Submit Your Rating)

SUMMARY

  • 8+ Competent in IT Industry, Years of Experience Consisting of Planning, 8+ Competent, Planning, Advancement, DevOps Device Integration, Cloud Computing, Setup Management, Non - Stop Integration (Long-standing involvement in teh IT industry consisting of CI) & permanent alignment/carriage and cloud movement.
  • Integration with devices such as Terraform, Ansible, Docker, Kubernetes, several scripting languages, check devices. Further development, integration.
  • Hands-on experience Administering Micrososft Azure services like Azure Web Application, App Services, Azure Storage, Azure SQL Database, Virtual Machines, Fabric Controller, Azure AD, Azure Search and Notification Hub.
  • Made Azure Automation Assets, Graphical runbooks, PowerShell runbooks that will robotize explicit errands. Ability in sending Azure AD Connect, designing ADFS verification stream, ADFS establishment utilizing Azure AD Connect.
  • Experience deploying Azure IaaS virtual machines (VMs) and cloud services (PaaS role instances) in secure virtual networks and subnets. Deploy Terraform modules to deploy apps across multiple cloud providers like AWS, Azure, and OpenStack.
  • ConfiguredAzure AppServices,ApplicationInsights,Azure DNS, Azure Network Watcher andimplementedAzureSite Recovery,AzureStack, Cosmos DB backupandautomation, API management withAzure DevOps build andreleasepipelines.
  • UsedAzure Kubernetes Service to deploy a managed Kubernetes cluster in Azure andcreatingan AKS cluster in teh Azureportal usingAzure CLI, alsousing template-baseddeployment options such astemplatesResource Manager and Terraform.
  • Hands on Experience Using AzureKubernetes Service to deploy and managed Kubernetes cluster in Azureand created an AKS cluster in teh Azure portal, with teh AzureCLI, also used template driven deployment options.
  • Expertise in configuring Azure DevOps portalandrepositoriescreated forsource code management, Azure pipelinesconfigured for build operations,artifactsconfigured in Azure DevOpsto store artifacts,andcardsconfigured for daily scheduling, ticketing, andupdate.
  • Worked on migration projects from AWS to Azure, Jira to Azure DevOps, GitHub to Azure DevOps, and having experience installing and utilizing PaaS solutions (like Azure Database services, Azure Kubernetes, Azure Containers, DNS, Application gateway rerouting, Application Insights, Azure Container Monitors, etc.).
  • Work experience on single-node and multi-node open stack cloud platform, virtualization, and part of Open stack cloud software.
  • Created Prometheus-Grafana installation using Terraform/Ansible for different targets like Kafka, MySQL, node exporters etc.,
  • Hands-on experience setting up a database on AWS using RDS, storing it in an S3 bucket, and configuring instance backups on teh S3 bucket to ensure fault tolerance and high availability.
  • Experience in migrating cloud training models to Terraform using Terraform import and securing Terraform state files in AWS services.
  • Well versed with creating and managing AWS infrastructure such as EC2, RDS, VPC, Managed Networking & Security, Route 53, Direct Connect, IAM, Cloud Formation, AWS Ops Works (automated operations), Elastic Beanstalk, AWS S3 Experience in design and application deployment Amazon Glacier and Cloud Watch monitor management gateways.
  • Experience using Kubernetes to create new load-balancing projects and services and add them to routes with external access, create groups via new apps, and track, extend, and remediate issues group troubleshooting, manifest management, and Helm chart versioning.
  • Hands on experience using Docker to securely virtualize, run, ship, and deploy applications to overcome build/release engineering. Has expertise in setting up Docker environments Docker Daemon, Docker Client, Docker Hub, Docker Registries, Docker Compose and managing multiple images by hosting them in containers for deployment.
  • Experience writing Ansible playbooks to deploy automated tasks to multiple servers using Python, managing AWS node configurations and testing playbooks on AWS instances using Python, and writing Ansible scripts to halp servers develop.
  • Experience in branching, tagging and releasing maintenance in an environment using SCM tools such as Git, GitLab, GitHub and Subversion (SVN) on Linux and Windows platforms.
  • Experience working on version control systems such as Subversion, GIT using source code management client tools such as Tortoise SVN, Git Bash, GitHub, Git GUI and other command line applications.
  • Proficient in database technologies such as SQL, PLSQL, MySQL, RDS, including NoSQL databases (DynamoDB).
  • Experience with task scheduling and system backup using Python, Ruby, Bash and Shell Scripting and Worked with various bug tracking tools like JIRA, Bugzilla and Remedy.

TECHNICAL SKILLS

Cloud Platforms: Azure, AWS, OpenStack

Infrastructure Provisioning Tools: Terraform, Azure Resource Manager, Cloud Formation

Configuration Management Tools: Ansible, Chef, Puppet

CI /CD Tools: Jenkins, Bamboo, Azure Pipelines, Gitlab Pipelines

Build Tools: Maven, ANT, Gradle

Containerization Tools: Docker, Kubernetes, Mesos, OpenShift

Source Code Management: GIT, GitHub, Gitlab, Bitbucket, Azure Repos.

Logging & Monitoring Tools: Nagios, Splunk, ELK, Data Dog, Dynatrace, Prometheus, Grafana, New Relic Azure Service Health, Azure Network Monitor.

Scripting & Programming Languages: Python, PowerShell, Bash/Shell, JavaScript, Perl, ASP .Net VBScript, Ruby, C, PHP, Java/ J2EE.

Databases: Data Lake, Data Bricks, Cosmos DB Oracle 10g/11g/12c, DB2, MySQL, MongoDB, DynamoDB, Cassandra

Application/Web Servers: Apache Tomcat, NGINX, IIS, JBoss4.1, WebSphere, Web Logic 9.x/10.x, Gerrit

Operating Systems: UNIX, Linux, Windows, Solaris

Virtualization Platforms: Oracle VirtualBox, VMware Workstation, Vagrant, VMware vSphere ESXi 5.x/4.X, ESX /3.x, Hyper-V

Bug Tracking Tools: JIRA, Bugzilla, Remedy, HP Quality Center, IBM Clear Quest, Mingle, VersionOne.

PROFESSIONAL EXPERIENCE

Confidential

Senior Cloud DevOps Engineer

Responsibilities:

  • Worked in building new Azure Infrastructure: Planning, design, architecture, implementation. Created new Resource groups, virtual machines in Azure Cloud.
  • Workedonmicroservicesforcontinuous distribution environmentsusing Azure, Docker. Involved inbuildingamicroservices architecturefor Applicationdevelopment and high availabilityimplementedwith Azure Classic and Azure Resource Manager deployment models.
  • Worked on TLZ Shared Responsibility Model for Centralized account vending, network connectivity, Azure platform cost management and for Built-in Azure, Terraform security Best Practices and Reporting.
  • Extensive experience in design and configure Azure Virtual Networks (VNets), subnets, Azure network settings, DHCP address blocks, DNS settings and security policies and routing.
  • Created and Managed Virtual Machines in Windows Azure and setting up communication with teh halp of Endpoints. Configured Shared Access Signature (SAS) tokens and Storage Access Policies in Azure Cloud Infrastructure.
  • Produced a comprehensive strategy using Azure Identity and Access Management (IAM) Role for community platform systems and successfully implemented.
  • Developed and designed AzureDevOps pipelineto manage resources across multiple subscriptions in Azure.
  • He TEMPhas workedwithversion control,Build & Release Management andsolution implementations inDEV, QAandPRODenvironments usingAzureDevOps / VSTS principals / processes (CV / CD)andwool sets fromVisual Studio, AKS (Azure Kubernetes Service), Application Insights.
  • Expertise in building CI/CD pipelines using Azure DevOps. Working knowledge in deploying CI/CD system using Azure DevOps on Kubernetes container environment, and for teh runtime environment.
  • Experience on working with Terraform Landing Zone that deployed into teh new accounts vended enabling customer’s infrastructure (networking, compute, storage), operations, security, and governance requirements for given applications that sit inside Azure account and to support future workloads such as building of new applications and migration of existing applications if required.
  • Worked on Terraform Enterprise (TFE) for provisioning necessary settings and services to provide teh baseline of an account which is triggered from teh AVM.
  • Had experience on working with Terraform workspaces, in which teh code is factored as modules. These modules are automatically synchronized from dht. live (prod) to every region and TLZ.
  • Worked on vending Azure accounts using a combination of automated pipelines for creating teh accounts, applying baseline configurations, and optionally further implementing resources and sources within those accounts.
  • Done Global Baseline Upgrades to move teh account baselines in teh Global TLZ of Terraform 11 to a newer supported version, to move user management for each global account out of teh account’s baselines and into new account user workspaces that will be visible in Terraform and Bitbucket and restrict teh access to teh Global account baselines to teh responsible teams.
  • Worked on Bitbucket as a source code repository for branching, change logs updating and for all teh documentation modifications.
  • Worked in a Team for teh Azure security Engagement. Refinement and Prioritization TEMPhas been teh part of every sprint in which we discuss about teh priorities in Summit, create detailed design cards and conduct teh technical review meetings for improving teh Knowledge.
  • Day to Day activities include vending/re-vending teh Azure accounts according to teh Business Owner requirements.
  • Foster teh successful infrastructure and deployment automation utilizing Ansible, Terraform and Jenkins. Implement a production ready, load balanced, highly available, fault-tolerant, autoscaling Kubernetes cluster for stateless Microservices.
  • AutoScaler structuredcluster for Azure Kubernetes Service (AKS) using Terraform and worked withpodandreplica planning deploymentandmanagement atAKS.
  • Used Kubernetes to orchestrate teh deployment, scaling and management of Docker containers.
  • Experience with container-based deployments using Docker, working with Docker images, Docker Hub and Docker-registries and Kubernetes.
  • Used Jenkins pipelines to drive all micro services builds out to teh Docker registry and tan deployed to Kubernetes, created pods and managed using Kubernetes. Involved in development of test environment on Docker containers and configuring teh Docker containers using Kubernetes.
  • Provisioned teh CA and generating TLS Certificates for Kubernetes Cluster Components server using openSSL.

Confidential

Cloud infrastructure Engineer

Responsibilities:

  • Developed Azure Automation Runbooks in PowerShell using teh AZ Module automating many of teh common O&S tasks. Developed an Azure logic apps to monitor teh environment and auto-remediate issues and notify proper action groups as needed. Triaged service now tickets from mission App Systems needing assistance in teh Azure Environment.
  • Created cloud modules for interacting with Azure services which provides teh tools to easily create and orchestrate infrastructure on Azure and automated cloud-native applications in Azure using Azure microservices such as azure functions and Kubernetes on Azure, Ansible.
  • As part of full cycle engineering team, me work on building teh best cloud native applications that are reliable and scalable using Azure, terraform (IaaS), deploying software version with continuous integration and continuous delivery (Git, Bitbucket, CI/CD).
  • Implemented Azure Active Directory for single sign-on access to thousands of cloud SaaS applications like Office 365, Dropbox. Also configuredAzureRole-based Access Control (RBAC) to segregate duties within our team and grant only teh amount of access to users that they need to perform their jobs.
  • Created CI/CD Pipelines in AZURE DevOps. by using variable groups, deployment groups, tasks, deployment gates. Setup self-hosted agents in Azure virtual machines, Azure container instances and on-premises servers. Configured service connection to integrate with external applications such as SonarQube, Black duck.
  • Comprehensive knowledge and hands-on experience with service offerings from Amazon Web Services. Actively manage, improve, and monitor cloud infrastructure on AWS, EC2, S3, and RDS, including backups, patches, and scaling. Worked closely with teh marsh digital teams to onboard micro services into AWS Shared infrastructure.
  • Built and deployed Docker containers to break up monolithic app into micro services, improving developer workflow, increasing scalability, and optimizing speed.
  • Worked on Docker to containerize applications and orchestrate deployments using Docker swarm. Setup Docker swarm service cluster to run containers on AWS infrastructure with zero downtime during deployments.
  • Experience with working on Kubernetes (OSS - open-source system) for automated deployment and for managing containerized applications.
  • Scripting - Prior experience in developing Cloud Formation Scripts for AWS Orchestration, Chef and/or Puppet, Python
  • Ability to automate teh provisioning and configuration of cloud-based environments with configuration management tools, including Cloud Formation, Puppet, or Chef.
  • Responsible for writing reusable infrastructure automation (IAC) code libraries using Terraform for IaaS, PaaS and SaaS services in AWS cloud and maintained existing mission critical cloud formation scripts through Terraform and transformed Terraform as an enterprise level infrastructure automation tool.
  • Developed infrastructure as code using Terraform combining third-party modules with client-specific code. Deployed teh infrastructure in teh Amazon cloud, debugged all issues, and wrote teh deployment documentation.
  • Deployed application which is containerized usingDockeronto aKubernetescluster which is managed by Amazon Elastic Container Service for Kubernetes (EKS). Configured ‘Kubectl’ to interact with Kubernetes infrastructure and usedAWS Cloud Formation Templates (CFT)to launch a cluster of worker nodes on Amazon EC2 instances.
  • Configured teh Docker/Kubernetes containers and creating Docker files for all teh environments.
  • Developed and deployed Helm charts to Kubernetes using Helm file as a declarative configuration for deploying distributions of Helm charts while adhering to 12-factor application principals. Build Docker files for containerizing teh application. Deployed infrastructure containers as an external DNS, used cert-manager and Ingress Controller to automate dynamic DNS name registration, and created auto SSL certificate provisioning and assigned them to external endpoints.
  • Developed shell/python scripts for automation purpose and groovy scripting for CI/CD pipeline.
  • Acted as a subject matter expert in infrastructure automation and owned all technical aspects of platform configuration and its automation.
  • Integrate JIRA with Jenkins CI/CD pipelines to manage production deployments.
  • Create DSL seed jobs to build multi branch pipelines automatically based on teh application configuration.
  • Experience on working with Bit Bucket for branching, tagging, and merging. Configured application repository to build using Jenkins via web hook configuration in Bit Bucket.
  • Manage Nexus and JFrog artifactory repository manager for sharing teh artifacts within teh organization.
  • Day to day activities include build and deployments in lower environments and troubleshooting applications on dev, stg and prod environments.
  • Used Ansible Playbooks to setup Continuous Delivery Pipeline. Deployed micro services, including provisioning AWS environments using Ansible Playbooks also Used Ansible to document all infrastructures into version control.
  • Involved in generating and installing SSL Certificates for production domains.
  • Owned production alerts and acted as teh point of contact for all teh infrastructure incidents.
  • Support activities including Incident Tickets management and change order creation for certificate installation in AWS and setting up load balancers.
  • Performed day-to-day administration tasks like User Management, Space Monitoring, Performance Monitoring and Tuning, alert log monitoring and backup monitoring and System Performance of Virtual memory, Managing Swap Space, Disk utilization and CPU utilization.
  • Implemented Release schedules, communicated teh Release status, created Roll out Plans, tracked teh Project Milestones, prepared teh reports and chaired teh Release calls and worked for a successful Release ofJIRAApplication.
  • ConvertedDevOpsmethodologies in toDevSecOpsmodel by introducing security/vulnerability scans in different phases of DevOps like clear text password scan during teh build and packaging phase of application and on teh other hand responsible for implementing pre provisioning scans and post provisioning scans forIaCby adopting tools like terraform enterprise (sentinel) and Inspec framework forAWScloud resource validations.

Confidential

DevOps Engineer

Responsibilities:

  • Configured Azure cloud services, Azure storage, Azure active directory, Azure Service Bus. Created and managed Azure AD tenants and configured application integration with Azure AD.
  • Configured and deployed Azure Automation Scripts for a multitude of applications utilizing teh Azure stack services including Compute, Web & Mobile, Blobs, ADF, Resource Groups, Azure Data Lake, HDInsight Clusters, Azure SQL and ARM focusing on automation, created quality gates in SonarQube dashboard and enforced in teh pipelines to fail teh builds when conditions not met.
  • Provisioned Azure recourses like SQL Database, Web App, Storage Account, Redis Cache, Virtual Machine, IoT Hub, and HDInsight using Azure Resource Manager (ARM).
  • Experience with Azure Cloud Services (PaaS & IaaS), Azure Virtual Machines Azure Storage, SQL, Azure, Azure Active Directory, application insights, and logic apps.
  • Defined AWS Security Groups which acted as virtual firewalls that controlled teh traffic allowed to reach one or more AWS EC2 instances.
  • Automated CI/CD pipelines, deployments of web application based on .NET, Node.js, Python, Java, using AWS Code Deploy, Code Pipeline, EC2, and secured by creating IAM roles and policies for services and users.
  • Experience in setting up teh infrastructure using AWS services includingELB, EC2, Elastic container services (ECS), Auto-scaling, S3, IAM, VPC, Red Shift, DynamoDB, Cloud Trail, Cloud Watch, Elastic Cache, Lambda, SNS, Glacier, Cloud Formation, SQS, EFS, and Storage Gateway.
  • Handling migration of on-premises applications to cloud, and created resources in cloud to enable dis, using all critical AWS tools, used ELB and Auto-Scaling policies for scalability, elasticity, and availability.
  • Application deployment and data migration on AWS. Design applications on AWS taking advantage of disaster recovery design guidelines.
  • Worked in building servers using AWS, launching EC2, auto-scaling, load balancing for specific virtual private connection. Worked on major applications migration from internal datacenter to AWS. Successfully migrated complex applications with no major issues or customer impact.
  • Implemented & maintained teh branching and build/release strategies using SCM tools GIT, GitLab, Subversion, Bitbucket and experienced in migrating Bitbucket repositories to GitHub.
  • Experience in using Jenkins pipelines to drive all microservices builds out to teh Docker images and stores in Docker registry tan deployed to Kubernetes, Created Pods and managed using Kubernetes and performed Jenkins jobs for deploying using Ansible playbooks and Bitbucket.
  • Used Kubernetes for creating new Projects, Services for Load balancing and adding them to Routes by accessing from outside, created Pods through new application and controlling, scaling, and troubleshooting pods through SSH.
  • Managing major architecture changes from single server large software system to a distributed system with Docker and Kubernetes orchestration. Executed Kubernetes locally with Minikube, Created local clusters and deployable application containers.
  • Extensively worked on Kubernetes for scheduling, deploying, and managing pods, replication controllers, deployments, labels, health checks and ingress by writing YAML Files and Helm Charts to deploy and maintain teh Deployed Services.
  • Installed Docker Registry for local upload and download of Docker images and even from Docker hub. Worked closely with developers to pinpoint and provide early warnings of common build failures.
  • Used to writeYAMLfiles in which me define multiple services ofdockerapplications and useddocker composeto launch those services in different Environments.
  • Expertise Terraform to reliably version and create infrastructure on Azure/AWS. Created resources, using Azure/AWS Terraform modules, and automated infrastructure management and experienced with Terraform key features such as Infrastructure as code, Execution plans, Resource Graphs, Change Automation.
  • Extensively used Auto Scaling for launching cloud instances while deploying Microservices and used Terraform to map more complex dependencies and identify network issue. Provisioned largescale environments as infrastructure as a code using terraform Involved in writing various. custom Ansible playbooks for deployment orchestration and developed Ansible Playbooks to simplify and automate day-to-day server administration tasks and used Ansible Tower for deployment.
  • Configured JIRA as defect tracking system and configured various workflows, customizations, and plugins for teh JIRA bug/issue tracker.
  • Involved in Linux system administration and performance tuning. Wrote Shell Scripts (bash) to automate teh package installation, web server and instance configuration.
  • Performed WebLogic Server administration tasks such as installing, configuring, monitoring and performance tuning on Linux environment.

Confidential

AWS Cloud Engineer

Responsibilities:

  • Configured AWS Identity and Access Management (IAM) Groups and Users for improved login autantication. Provided policies to groups using policy generator and set different permissions based on teh requirement along with providing Amazon Resource Name (ARN).
  • Configured AWS IAM and Security Groups in Public and Private Subnets in VPC, managed IAM accounts (with MFA) and IAM policies to meet security audit & compliance requirements.
  • Launched AWS EC2 cloud instances using Amazon Web Services (Linux/ Ubuntu/RHEL) and configured launched instances with respect to specific applications. Created Snapshots and Amazon Machine Images (AMI's) of EC2 instance. Worked on dynamically adding and removing servers from AWS production environment, automating backups by shell for Linux/Unix to transferring data into AWS S3 buckets.
  • Configured teh Server less architecture using AWS Lambda and worked on Application Migration and Data Migration from On-Premises to AWS Cloud. Configured and maintained teh AWS Lambda function to trigger when there is a Jenkins build kicked off, which internally gets stored on AWS S3 bucket for everybody to access.
  • Used AWS Route53 for Domain Registration, DNS routing and health checking of teh resources by sending automated requests over teh internet to a resource.
  • Configured Elastic Load Balancing (ELB) for routing traffic between servers. Involved in teh Consulting, Analysis, Design, Development and Implementation of automated Continuous Integration/Continuous Deployment (CI/CD) pipelines and test automation solutions.
  • Executed HTTPS/HTTP requests through teh running AWS EC2 instances, thereby enhancing connection requests to teh systems. Thus, enabling a faster data transaction between teh Target groups which are attached to AWS Security groups and Autoscaling groups.
  • Designed an ELK system to monitor and search enterprise alerts and configured ELK stack in conjunction with AWS and using Logstash to output data to AWS S3. Terminated SSL on to Nginx to remove overhead on API servers.
  • Authored Terraform modules for infrastructure management and published a module to teh Terraform registry for enterprise customers to deploy our product inside their AWS environment. And Set up build and deployment automation for Terraform scripts using Jenkins.
  • Worked on Secrets manager to store teh encrypted data keys with teh protected secret data. And used it for managing digital autantication credentials(secrets), including passwords, keys, APIs and tokens for teh applications, services and sensitive data,
  • Implemented Puppet for Deployment on build on internal Data Centre Servers. Also re-used and modified same Chef Recipes to create a Deployment directly into Amazon EC2 instances.
  • Provided installation & maintenance of Puppet infrastructure and developed Puppet manifests & modules for configuration management.
  • Experience in creating Puppet Manifests & modules to automate system operations. Installed configurations of Puppet Agent, Puppet Master and deployed Puppet Dashboard and Puppet DB for configuration management to existing infrastructure.
  • Automated teh front-ended platform into highly scalable, consistent, repeatable infrastructure using a high degree of automation using Puppet, Jenkins, and Cloud Formation.
  • Automated operational tasks such as software configuration, server scaling and deployments, and database setups in multiple AWS cloud environments with teh use of modern application and configuration management tools like Jenkins, Chef, Puppet.
  • Built Jenkins jobs to create AWS infrastructure from GitHub repos containing terraform code. Generating artifacts by integrating Jenkins with Git and Maven and storing artifacts into Nexusand deploying into application server.
  • Set up Nginx, Apache, Tomcat web servers in teh clusters in various operating systems such as Linux/Ubuntu and Windows systems. Troubleshooting Linux/Ubuntu servers and network related issues using log Configured NIC bonding/NIC Teaming configuration in Linux/UNIX/Windows systems to increase teh performance based on teh requirement by teh application.
  • Automated and updated teh security groups to allow only teh specific CIDRs. In addition to that, automated Iptables with puppet config.
  • Worked onJIRAagile projects like configured columns, filters and reports for sprints. UsedJIRAas a change management/ work management/ SCRUM Agile Tool.
  • Updating kernel & security patches in Amazon Linux environment, handling out of memory issues in Linux kernels during rebalance inKafkacluster.
  • Involved in developing custom scripts using Python, Shell to automate teh deployment process and for Task scheduling, Systems backups for RHEL.
  • Involved in scrum meetings, product backlog and other scrum activities and artifacts in collaboration with teh team.
  • As member of Release Engineering Team, redefined processes and implemented tools for software builds, patch creation, source control, and release tracking and reporting, on UNIX platform.
  • Built Puppet enterprise modules using puppet DSL to automate infrastructure provisioning and configuration management to existing infrastructure by deploying Puppet, Puppet Dashboard, and Puppet.
  • Developed Puppet modules with Jenkins for Continues integration and Continues deployment of managed products, and related services.
  • Responsible for User Management, Plugin Management and End-to-End automation of Build and Deployment process using Jenkins.
  • Good exposure on all areas of Jenkins like Plugin Management, Securing Jenkins, Performance issues, Analytics, Scaling Jenkins, integrating Code Analysis and Test Phases to complete teh CD pipelines within Jenkins.
  • Created a continuous integration system using Ant, Maven, Jenkins, Puppet full automation, Continuous Integration, faster and flawless deployments and worked with ANT tool to do teh builds, integrated ANT to Eclipse and did local builds.
  • Created GIT configuration record forbuilds, using derived objects generated duringbuildaudit process implemented and maintained teh branching andbuild/releasestrategies utilizing GIT.

Confidential

Build and Release Engineer

Responsibilities:

  • Developed and implemented Software Release Management strategies for various applications according to teh Agile process.
  • Developed build usingANTandMAVENas build tools and used CI tools to kick off teh builds move from one environment to other environments.
  • Used ANT as a build tool in java projects for teh development of build artifacts on teh source code. Involved in editing teh existing ANT files in case of errors or changes in teh project requirements.
  • Installed and configuredGITand communicating with teh repositories inGITHUB.
  • Build and Release software baselines, code merges, branch and label creation inSubversion and GIT, worked on migration from Subversion to Git.
  • Created teh naming strategy for branches and labels and involved continuous integration system with GIT version control repository and continually build as teh check-in's come from teh developer.
  • Implemented continuous integration using Jenkins master and slave configuration. Configured security to Jenkins and added multiple nodes for continuous deployments.
  • Developed, monitored and maintained teh release and build pipelines. Created packages, builds, releases and patches as well as teh software deliverables for customers.
  • Administered and Engineered Jenkins for managing weekly Build, Test and Deploy chain, SVN/GIT with Dev/Test/Prod Branching Model for weekly releases.
  • Troubleshoot build issues inJenkins, performance and generating metrics on master's performance along with jobs usage.
  • Used Jenkins and Maven to automate teh build and deployments for Java based projects and stored teh binaries of teh projects in Nexus or Artifactory. Responsible for creating and deploying builds on various environments, testing in development and release to other team on scheduled time or given deadlines.
  • Worked on integrating GIT into teh continuous Integration (CI) environment along withJenkins.
  • Managed Nexus, Maven repositories to download artifacts during builds in Jenkins and integrated ANT and GIT to deploy project related tags.
  • Worked as JIRA Systems Administrator for teh international JIRA/Confluence infrastructure, including all associated programs, plugins and systems.
  • Worked in Agile Project management Process, JIRA for Issue Tracking and monitoring and with teh Architects on SDLC process being teh owner of post-development environments.
  • Monitoring SPLUNK autantication and permission for supporting large scale SPLUNK deployments and Used JIRA for bug tracking, issue tracking and project management.

Confidential

Java Developer

Responsibilities:

  • Involved in all phases of teh development and maintenance lifecycle, typically for teh assigned business unit and teh enterprise Department.
  • Work on design and development of enterprise-level multi-tier web applications using various J2EE technologies including Technologies Servlets2.x, JDBC, Apache Ant1.5, HTML, XHTML, DHTML, CSS, Java Script3.x, JSP and XML.
  • Experience with Spring framework (Core).
  • Experience implementing/using REST and SOAP based APIs Experience in web service development and knowledge of Service Oriented Architecture (SOA).
  • Use JSP as display technology to develop front-end controller.
  • Using MVC architecture with Spring.
  • Participate in teh design and development of client-side forms using HTML, JavaScript, and AJAX.
  • Participate in teh design of tables in MS SQL Server.
  • Responsible for developing JSPs and servlets.

We'd love your feedback!