We provide IT Staff Augmentation Services!

Senior Cloud Devops Engineer Resume

2.00/5 (Submit Your Rating)

SUMMARY

  • 8+ Competent in IT Industry, Years of Experience Consisting of Planning, 8+ Competent, Planning, Advancement, DevOps Device Integration, Cloud Computing, Setup Management, Non - Stop Integration (Long-standing involvement in the IT industry consisting of CI) & permanent alignment/carriage and cloud movement.
  • Integration wif devices such as Terraform, Ansible, Docker, Kubernetes, several scripting languages, check devices. Further development, integration.
  • Hands-on experience Administering Micrososft Azure services like Azure Web Application, App Services, Azure Storage, Azure SQL Database, Virtual Machines, Fabric Controller, Azure AD, Azure Search and Notification Hub.
  • Made Azure Automation Assets, Graphical runbooks, PowerShell runbooks that will robotize explicit errands. Ability in sending Azure AD Connect, designing ADFS verification stream, ADFS establishment utilizing Azure AD Connect.
  • Experience deploying Azure IaaS virtual machines (VMs) and cloud services (PaaS role instances) in secure virtual networks and subnets. Deploy Terraform modules to deploy apps across multiple cloud providers like AWS, Azure, and OpenStack.
  • ConfiguredAzure AppServices,ApplicationInsights,Azure DNS, Azure Network Watcher andimplementedAzureSite Recovery,AzureStack, Cosmos DB backupandautomation, API management wifAzure DevOps build andreleasepipelines.
  • UsedAzure Kubernetes Service to deploy a managed Kubernetes cluster in Azure andcreatingan AKS cluster in the Azureportal usingAzure CLI, alsousing template-baseddeployment options such astemplatesResource Manager and Terraform.
  • Hands on Experience Using AzureKubernetes Service to deploy and managed Kubernetes cluster in Azureand created an AKS cluster in the Azure portal, wif the AzureCLI, also used template driven deployment options.
  • Expertise in configuring Azure DevOps portalandrepositoriescreated forsource code management, Azure pipelinesconfigured for build operations,artifactsconfigured in Azure DevOpsto store artifacts,andcardsconfigured for daily scheduling, ticketing, andupdate.
  • Worked on migration projects from AWS to Azure, Jira to Azure DevOps, GitHub to Azure DevOps, and having experience installing and utilizing PaaS solutions (like Azure Database services, Azure Kubernetes, Azure Containers, DNS, Application gateway rerouting, Application Insights, Azure Container Monitors, etc.).
  • Work experience on single-node and multi-node open stack cloud platform, virtualization, and part of Open stack cloud software.
  • Created Prometheus-Grafana installation using Terraform/Ansible for different targets like Kafka, MySQL, node exporters etc.,
  • Hands-on experience setting up a database on AWS using RDS, storing it in an S3 bucket, and configuring instance backups on the S3 bucket to ensure fault tolerance and high availability.
  • Experience in migrating cloud training models to Terraform using Terraform import and securing Terraform state files in AWS services.
  • Well versed wif creating and managing AWS infrastructure such as EC2, RDS, VPC, Managed Networking & Security, Route 53, Direct Connect, IAM, Cloud Formation, AWS Ops Works (automated operations), Elastic Beanstalk, AWS S3 Experience in design and application deployment Amazon Glacier and Cloud Watch monitor management gateways.
  • Experience using Kubernetes to create new load-balancing projects and services and add them to routes wif external access, create groups via new apps, and track, extend, and remediate issues group troubleshooting, manifest management, and Helm chart versioning.
  • Hands on experience using Docker to securely virtualize, run, ship, and deploy applications to overcome build/release engineering. Have expertise in setting up Docker environments Docker Daemon, Docker Client, Docker Hub, Docker Registries, Docker Compose and managing multiple images by hosting them in containers for deployment.
  • Experience writing Ansible playbooks to deploy automated tasks to multiple servers using Python, managing AWS node configurations and testing playbooks on AWS instances using Python, and writing Ansible scripts to help servers develop.
  • Experience in branching, tagging and releasing maintenance in an environment using SCM tools such as Git, GitLab, GitHub and Subversion (SVN) on Linux and Windows platforms.
  • Experience working on version control systems such as Subversion, GIT using source code management client tools such as Tortoise SVN, Git Bash, GitHub, Git GUI and other command line applications.
  • Proficient in database technologies such as SQL, PLSQL, MySQL, RDS, including NoSQL databases (DynamoDB).
  • Experience wif task scheduling and system backup using Python, Ruby, Bash and Shell Scripting and Worked wif various bug tracking tools like JIRA, Bugzilla and Remedy.

TECHNICAL SKILLS

Cloud Platforms: Azure, AWS, OpenStack

Infrastructure Provisioning Tools: Terraform, Azure Resource Manager, Cloud Formation

Configuration Management Tools: Ansible, Chef, Puppet

CI /CD Tools: Jenkins, Bamboo, Azure Pipelines, Gitlab Pipelines

Build Tools: Maven, ANT, Gradle

Containerization Tools: Docker, Kubernetes, Mesos, OpenShift

Source Code Management: GIT, GitHub, Gitlab, Bitbucket, Azure Repos.

Logging & Monitoring Tools: Nagios, Splunk, ELK, Data Dog, Dynatrace, Prometheus, Grafana, New Relic Azure Service Health, Azure Network Monitor.

Scripting & Programming Languages: Python, PowerShell, Bash/Shell, JavaScript, Perl, ASP .Net VBScript, Ruby, C, PHP, Java/ J2EE.

Databases: Data Lake, Data Bricks, Cosmos DB Oracle 10g/11g/12c, DB2, MySQL, MongoDB, DynamoDB, Cassandra

Application/Web Servers: Apache Tomcat, NGINX, IIS, JBoss4.1, WebSphere, Web Logic 9.x/10.x, Gerrit

Operating Systems: UNIX, Linux, Windows, Solaris

Virtualization Platforms: Oracle VirtualBox, VMware Workstation, Vagrant, VMware vSphere ESXi 5.x/4.X, ESX /3.x, Hyper-V

Bug Tracking Tools: JIRA, Bugzilla, Remedy, HP Quality Center, IBM Clear Quest, Mingle, VersionOne.

PROFESSIONAL EXPERIENCE

Confidential

Senior Cloud DevOps Engineer

Responsibilities:

  • Worked in building new Azure Infrastructure: Planning, design, architecture, implementation. Created new Resource groups, virtual machines in Azure Cloud.
  • Workedonmicroservicesforcontinuous distribution environmentsusing Azure, Docker. Involved inbuildingamicroservices architecturefor Applicationdevelopment and high availabilityimplementedwif Azure Classic and Azure Resource Manager deployment models.
  • Worked on TLZ Shared Responsibility Model for Centralized account vending, network connectivity, Azure platform cost management and for Built-in Azure, Terraform security Best Practices and Reporting.
  • Extensive experience in design and configure Azure Virtual Networks (VNets), subnets, Azure network settings, DHCP address blocks, DNS settings and security policies and routing.
  • Created and Managed Virtual Machines in Windows Azure and setting up communication wif the help of Endpoints. Configured Shared Access Signature (SAS) tokens and Storage Access Policies in Azure Cloud Infrastructure.
  • Produced a comprehensive strategy using Azure Identity and Access Management (IAM) Role for community platform systems and successfully implemented.
  • Developed and designed AzureDevOps pipelineto manage resources across multiple subscriptions in Azure.
  • He has workedwifversion control,Build & Release Management andsolution implementations inDEV, QAandPRODenvironments usingAzureDevOps / VSTS principles / processes (CV / CD)andwool sets fromVisual Studio, AKS (Azure Kubernetes Service), Application Insights.
  • Expertise in building CI/CD pipelines using Azure DevOps. Working noledge in deploying CI/CD system using Azure DevOps on Kubernetes container environment, and for the runtime environment.
  • Experience on working wif Terraform Landing Zone that deployed into the new accounts vended enabling customer’s infrastructure (networking, compute, storage), operations, security, and governance requirements for given applications that sit inside Azure account and to support future workloads such as building of new applications and migration of existing applications if required.
  • Worked on Terraform Enterprise (TFE) for provisioning necessary settings and services to provide the baseline of an account which is triggered from the AVM.
  • Had experience on working wif Terraform workspaces, in which the code is factored as modules. These modules are automatically synchronized from dht. live (prod) to every region and TLZ.
  • Worked on vending Azure accounts using a combination of automated pipelines for creating the accounts, applying baseline configurations, and optionally further implementing resources and sources wifin those accounts.
  • Done Global Baseline Upgrades to move the account baselines in the Global TLZ of Terraform 11 to a newer supported version, to move user management for each global account out of the account’s baselines and into new account user workspaces that will be visible in Terraform and Bitbucket and restrict the access to the Global account baselines to the responsible teams.
  • Worked on Bitbucket as a source code repository for branching, change logs updating and for all the documentation modifications.
  • Worked in a Team for the Azure security Engagement. Refinement and Prioritization has been the part of every sprint in which we discuss about the priorities in Summit, create detailed design cards and conduct the technical review meetings for improving the Knowledge.
  • Day to Day activities include vending/re-vending the Azure accounts according to the Business Owner requirements.
  • Foster the successful infrastructure and deployment automation utilizing Ansible, Terraform and Jenkins. Implement a production ready, load balanced, highly available, fault-tolerant, autoscaling Kubernetes cluster for stateless Microservices.
  • AutoScaler structuredcluster for Azure Kubernetes Service (AKS) using Terraform and worked wifpodandreplica planning deploymentandmanagement atAKS.
  • Used Kubernetes to orchestrate the deployment, scaling and management of Docker containers.
  • Experience wif container-based deployments using Docker, working wif Docker images, Docker Hub and Docker-registries and Kubernetes.
  • Used Jenkins pipelines to drive all micro services builds out to the Docker registry and then deployed to Kubernetes, created pods and managed using Kubernetes. Involved in development of test environment on Docker containers and configuring the Docker containers using Kubernetes.
  • Provisioned the CA and generating TLS Certificates for Kubernetes Cluster Components server using openSSL.

Confidential

Cloud infrastructure Engineer

Responsibilities:

  • Developed Azure Automation Runbooks in PowerShell using the AZ Module automating many of the common O&S tasks. Developed an Azure logic apps to monitor the environment and auto-remediate issues and notify proper action groups as needed. Triaged service now tickets from mission App Systems needing assistance in the Azure Environment.
  • Created cloud modules for interacting wif Azure services which provides the tools to easily create and orchestrate infrastructure on Azure and automated cloud-native applications in Azure using Azure microservices such as azure functions and Kubernetes on Azure, Ansible.
  • As part of full cycle engineering team, I work on building the best cloud native applications that are reliable and scalable using Azure, terraform (IaaS), deploying software version wif continuous integration and continuous delivery (Git, Bitbucket, CI/CD).
  • Implemented Azure Active Directory for single sign-on access to thousands of cloud SaaS applications like Office 365, Dropbox. Also configuredAzureRole-based Access Control (RBAC) to segregate duties wifin our team and grant only the amount of access to users that they need to perform their jobs.
  • Created CI/CD Pipelines in AZURE DevOps. by using variable groups, deployment groups, tasks, deployment gates. Setup self-hosted agents in Azure virtual machines, Azure container instances and on-premises servers. Configured service connection to integrate wif external applications such as SonarQube, Black duck.
  • Comprehensive noledge and hands-on experience wif service offerings from Amazon Web Services. Actively manage, improve, and monitor cloud infrastructure on AWS, EC2, S3, and RDS, including backups, patches, and scaling. Worked closely wif the marsh digital teams to onboard micro services into AWS Shared infrastructure.
  • Built and deployed Docker containers to break up monolithic app into micro services, improving developer workflow, increasing scalability, and optimizing speed.
  • Worked on Docker to containerize applications and orchestrate deployments using Docker swarm. Setup Docker swarm service cluster to run containers on AWS infrastructure wif zero downtime during deployments.
  • Experience wif working on Kubernetes (OSS - open-source system) for automated deployment and for managing containerized applications.
  • Scripting - Prior experience in developing Cloud Formation Scripts for AWS Orchestration, Chef and/or Puppet, Python
  • Ability to automate the provisioning and configuration of cloud-based environments wif configuration management tools, including Cloud Formation, Puppet, or Chef.
  • Responsible for writing reusable infrastructure automation (IAC) code libraries using Terraform for IaaS, PaaS and SaaS services in AWS cloud and maintained existing mission critical cloud formation scripts through Terraform and transformed Terraform as an enterprise level infrastructure automation tool.
  • Developed infrastructure as code using Terraform combining third-party modules wif client-specific code. Deployed the infrastructure in the Amazon cloud, debugged all issues, and wrote the deployment documentation.
  • Deployed application which is containerized usingDockeronto aKubernetescluster which is managed by Amazon Elastic Container Service for Kubernetes (EKS). Configured ‘Kubectl’ to interact wif Kubernetes infrastructure and usedAWS Cloud Formation Templates (CFT)to launch a cluster of worker nodes on Amazon EC2 instances.
  • Configured the Docker/Kubernetes containers and creating Docker files for all the environments.
  • Developed and deployed Helm charts to Kubernetes using Helm file as a declarative configuration for deploying distributions of Helm charts while adhering to 12-factor application principles. Build Docker files for containerizing the application. Deployed infrastructure containers as an external DNS, used cert-manager and Ingress Controller to automate dynamic DNS name registration, and created auto SSL certificate provisioning and assigned them to external endpoints.
  • Developed shell/python scripts for automation purpose and groovy scripting for CI/CD pipeline.
  • Acted as a subject matter expert in infrastructure automation and owned all technical aspects of platform configuration and its automation.
  • Integrate JIRA wif Jenkins CI/CD pipelines to manage production deployments.
  • Create DSL seed jobs to build multi branch pipelines automatically based on the application configuration.
  • Experience on working wif Bit Bucket for branching, tagging, and merging. Configured application repository to build using Jenkins via web hook configuration in Bit Bucket.
  • Manage Nexus and JFrog artifactory repository manager for sharing the artifacts wifin the organization.
  • Day to day activities include build and deployments in lower environments and troubleshooting applications on dev, stg and prod environments.
  • Used Ansible Playbooks to setup Continuous Delivery Pipeline. Deployed micro services, including provisioning AWS environments using Ansible Playbooks also Used Ansible to document all infrastructures into version control.
  • Involved in generating and installing SSL Certificates for production domains.
  • Owned production alerts and acted as the point of contact for all the infrastructure incidents.
  • Support activities including Incident Tickets management and change order creation for certificate installation in AWS and setting up load balancers.
  • Performed day-to-day administration tasks like User Management, Space Monitoring, Performance Monitoring and Tuning, alert log monitoring and backup monitoring and System Performance of Virtual memory, Managing Swap Space, Disk utilization and CPU utilization.
  • Implemented Release schedules, communicated the Release status, created Roll out Plans, tracked the Project Milestones, prepared the reports and chaired the Release calls and worked for a successful Release ofJIRAApplication.
  • ConvertedDevOpsmethodologies in toDevSecOpsmodel by introducing security/vulnerability scans in different phases of DevOps like clear text password scan during the build and packaging phase of application and on the other hand responsible for implementing pre provisioning scans and post provisioning scans forIaCby adopting tools like terraform enterprise (sentinel) and Inspec framework forAWScloud resource validations.

Confidential

DevOps Engineer

Responsibilities:

  • Configured Azure cloud services, Azure storage, Azure active directory, Azure Service Bus. Created and managed Azure AD tenants and configured application integration wif Azure AD.
  • Configured and deployed Azure Automation Scripts for a multitude of applications utilizing the Azure stack services including Compute, Web & Mobile, Blobs, ADF, Resource Groups, Azure Data Lake, HDInsight Clusters, Azure SQL and ARM focusing on automation, created quality gates in SonarQube dashboard and enforced in the pipelines to fail the builds when conditions not met.
  • Provisioned Azure recourses like SQL Database, Web App, Storage Account, Redis Cache, Virtual Machine, IoT Hub, and HDInsight using Azure Resource Manager (ARM).
  • Experience wif Azure Cloud Services (PaaS & IaaS), Azure Virtual Machines Azure Storage, SQL, Azure, Azure Active Directory, application insights, and logic apps.
  • Defined AWS Security Groups which acted as virtual firewalls that controlled the traffic allowed to reach one or more AWS EC2 instances.
  • Automated CI/CD pipelines, deployments of web application based on .NET, Node.js, Python, Java, using AWS Code Deploy, Code Pipeline, EC2, and secured by creating IAM roles and policies for services and users.
  • Experience in setting up the infrastructure using AWS services includingELB, EC2, Elastic container services (ECS), Auto-scaling, S3, IAM, VPC, Red Shift, DynamoDB, Cloud Trail, Cloud Watch, Elastic Cache, Lambda, SNS, Glacier, Cloud Formation, SQS, EFS, and Storage Gateway.
  • Handling migration of on-premises applications to cloud, and created resources in cloud to enable dis, using all critical AWS tools, used ELB and Auto-Scaling policies for scalability, elasticity, and availability.
  • Application deployment and data migration on AWS. Design applications on AWS taking advantage of disaster recovery design guidelines.
  • Worked in building servers using AWS, launching EC2, auto-scaling, load balancing for specific virtual private connection. Worked on major applications migration from internal datacenter to AWS. Successfully migrated complex applications wif no major issues or customer impact.
  • Implemented & maintained the branching and build/release strategies using SCM tools GIT, GitLab, Subversion, Bitbucket and experienced in migrating Bitbucket repositories to GitHub.
  • Experience in using Jenkins pipelines to drive all microservices builds out to the Docker images and stores in Docker registry then deployed to Kubernetes, Created Pods and managed using Kubernetes and performed Jenkins jobs for deploying using Ansible playbooks and Bitbucket.
  • Used Kubernetes for creating new Projects, Services for Load balancing and adding them to Routes by accessing from outside, created Pods through new application and controlling, scaling, and troubleshooting pods through SSH.
  • Managing major architecture changes from single server large software system to a distributed system wif Docker and Kubernetes orchestration. Executed Kubernetes locally wif Minikube, Created local clusters and deployable application containers.
  • Extensively worked on Kubernetes for scheduling, deploying, and managing pods, replication controllers, deployments, labels, health checks and ingress by writing YAML Files and Helm Charts to deploy and maintain the Deployed Services.
  • Installed Docker Registry for local upload and download of Docker images and even from Docker hub. Worked closely wif developers to pinpoint and provide early warnings of common build failures.
  • Used to writeYAMLfiles in which I define multiple services ofdockerapplications and useddocker composeto launch those services in different Environments.
  • Expertise Terraform to reliably version and create infrastructure on Azure/AWS. Created resources, using Azure/AWS Terraform modules, and automated infrastructure management and experienced wif Terraform key features such as Infrastructure as code, Execution plans, Resource Graphs, Change Automation.
  • Extensively used Auto Scaling for launching cloud instances while deploying Microservices and used Terraform to map more complex dependencies and identify network issue. Provisioned largescale environments as infrastructure as a code using terraform Involved in writing various. custom Ansible playbooks for deployment orchestration and developed Ansible Playbooks to simplify and automate day-to-day server administration tasks and used Ansible Tower for deployment.
  • Configured JIRA as defect tracking system and configured various workflows, customizations, and plugins for the JIRA bug/issue tracker.
  • Involved in Linux system administration and performance tuning. Wrote Shell Scripts (bash) to automate the package installation, web server and instance configuration.
  • Performed WebLogic Server administration tasks such as installing, configuring, monitoring and performance tuning on Linux environment.

Confidential

AWS Cloud Engineer

Responsibilities:

  • Configured AWS Identity and Access Management (IAM) Groups and Users for improved login authentication. Provided policies to groups using policy generator and set different permissions based on the requirement along wif providing Amazon Resource Name (ARN).
  • Configured AWS IAM and Security Groups in Public and Private Subnets in VPC, managed IAM accounts (wif MFA) and IAM policies to meet security audit & compliance requirements.
  • Launched AWS EC2 cloud instances using Amazon Web Services (Linux/ Ubuntu/RHEL) and configured launched instances wif respect to specific applications. Created Snapshots and Amazon Machine Images (AMI's) of EC2 instance. Worked on dynamically adding and removing servers from AWS production environment, automating backups by shell for Linux/Unix to transferring data into AWS S3 buckets.
  • Configured the Server less architecture using AWS Lambda and worked on Application Migration and Data Migration from On-Premises to AWS Cloud. Configured and maintained the AWS Lambda function to trigger when their is a Jenkins build kicked off, which internally gets stored on AWS S3 bucket for everybody to access.
  • Used AWS Route53 for Domain Registration, DNS routing and health checking of the resources by sending automated requests over the internet to a resource.
  • Configured Elastic Load Balancing (ELB) for routing traffic between servers. Involved in the Consulting, Analysis, Design, Development and Implementation of automated Continuous Integration/Continuous Deployment (CI/CD) pipelines and test automation solutions.
  • Executed HTTPS/HTTP requests through the running AWS EC2 instances, theirby enhancing connection requests to the systems. Thus, enabling a faster data transaction between the Target groups which are attached to AWS Security groups and Autoscaling groups.
  • Designed an ELK system to monitor and search enterprise alerts and configured ELK stack in conjunction wif AWS and using Logstash to output data to AWS S3. Terminated SSL on to Nginx to remove overhead on API servers.
  • Authored Terraform modules for infrastructure management and published a module to the Terraform registry for enterprise customers to deploy our product inside their AWS environment. And Set up build and deployment automation for Terraform scripts using Jenkins.
  • Worked on Secrets manager to store the encrypted data keys wif the protected secret data. And used it for managing digital authentication credentials(secrets), including passwords, keys, APIs and tokens for the applications, services and sensitive data,
  • Implemented Puppet for Deployment on build on internal Data Centre Servers. Also re-used and modified same Chef Recipes to create a Deployment directly into Amazon EC2 instances.
  • Provided installation & maintenance of Puppet infrastructure and developed Puppet manifests & modules for configuration management.
  • Experience in creating Puppet Manifests & modules to automate system operations. Installed configurations of Puppet Agent, Puppet Master and deployed Puppet Dashboard and Puppet DB for configuration management to existing infrastructure.
  • Automated the front-ended platform into highly scalable, consistent, repeatable infrastructure using a high degree of automation using Puppet, Jenkins, and Cloud Formation.
  • Automated operational tasks such as software configuration, server scaling and deployments, and database setups in multiple AWS cloud environments wif the use of modern application and configuration management tools like Jenkins, Chef, Puppet.
  • Built Jenkins jobs to create AWS infrastructure from GitHub repos containing terraform code. Generating artifacts by integrating Jenkins wif Git and Maven and storing artifacts into Nexusand deploying into application server.
  • Set up Nginx, Apache, Tomcat web servers in the clusters in various operating systems such as Linux/Ubuntu and Windows systems. Troubleshooting Linux/Ubuntu servers and network related issues using log Configured NIC bonding/NIC Teaming configuration in Linux/UNIX/Windows systems to increase the performance based on the requirement by the application.
  • Automated and updated the security groups to allow only the specific CIDRs. In addition to that, automated Iptables wif puppet config.
  • Worked onJIRAagile projects like configured columns, filters and reports for sprints. UsedJIRAas a change management/ work management/ SCRUM Agile Tool.
  • Updating kernel & security patches in Amazon Linux environment, handling out of memory issues in Linux kernels during rebalance inKafkacluster.
  • Involved in developing custom scripts using Python, Shell to automate the deployment process and for Task scheduling, Systems backups for RHEL.
  • Involved in scrum meetings, product backlog and other scrum activities and artifacts in collaboration wif the team.
  • As member of Release Engineering Team, redefined processes and implemented tools for software builds, patch creation, source control, and release tracking and reporting, on UNIX platform.
  • Built Puppet enterprise modules using puppet DSL to automate infrastructure provisioning and configuration management to existing infrastructure by deploying Puppet, Puppet Dashboard, and Puppet.
  • Developed Puppet modules wif Jenkins for Continues integration and Continues deployment of managed products, and related services.
  • Responsible for User Management, Plugin Management and End-to-End automation of Build and Deployment process using Jenkins.
  • Good exposure on all areas of Jenkins like Plugin Management, Securing Jenkins, Performance issues, Analytics, Scaling Jenkins, integrating Code Analysis and Test Phases to complete the CD pipelines wifin Jenkins.
  • Created a continuous integration system using Ant, Maven, Jenkins, Puppet full automation, Continuous Integration, faster and flawless deployments and worked wif ANT tool to do the builds, integrated ANT to Eclipse and did local builds.
  • Created GIT configuration record forbuilds, using derived objects generated duringbuildaudit process implemented and maintained the branching andbuild/releasestrategies utilizing GIT.

Confidential

Build and Release Engineer

Responsibilities:

  • Developed and implemented Software Release Management strategies for various applications according to the Agile process.
  • Developed build usingANTandMAVENas build tools and used CI tools to kick off the builds move from one environment to other environments.
  • Used ANT as a build tool in java projects for the development of build artifacts on the source code. Involved in editing the existing ANT files in case of errors or changes in the project requirements.
  • Installed and configuredGITand communicating wif the repositories inGITHUB.
  • Build and Release software baselines, code merges, branch and label creation inSubversion and GIT, worked on migration from Subversion to Git.
  • Created the naming strategy for branches and labels and involved continuous integration system wif GIT version control repository and continually build as the check-in's come from the developer.
  • Implemented continuous integration using Jenkins master and slave configuration. Configured security to Jenkins and added multiple nodes for continuous deployments.
  • Developed, monitored and maintained the release and build pipelines. Created packages, builds, releases and patches as well as the software deliverables for customers.
  • Administered and Engineered Jenkins for managing weekly Build, Test and Deploy chain, SVN/GIT wif Dev/Test/Prod Branching Model for weekly releases.
  • Troubleshoot build issues inJenkins, performance and generating metrics on master's performance along wif jobs usage.
  • Used Jenkins and Maven to automate the build and deployments for Java based projects and stored the binaries of the projects in Nexus or Artifactory. Responsible for creating and deploying builds on various environments, testing in development and release to other team on scheduled time or given deadlines.
  • Worked on integrating GIT into the continuous Integration (CI) environment along wifJenkins.
  • Managed Nexus, Maven repositories to download artifacts during builds in Jenkins and integrated ANT and GIT to deploy project related tags.
  • Worked as JIRA Systems Administrator for the international JIRA/Confluence infrastructure, including all associated programs, plugins and systems.
  • Worked in Agile Project management Process, JIRA for Issue Tracking and monitoring and wif the Architects on SDLC process being the owner of post-development environments.
  • Monitoring SPLUNK authentication and permission for supporting large scale SPLUNK deployments and Used JIRA for bug tracking, issue tracking and project management.

Confidential

Java Developer

Responsibilities:

  • Involved in all phases of the development and maintenance lifecycle, typically for the assigned business unit and the enterprise Department.
  • Work on design and development of enterprise-level multi-tier web applications using various J2EE technologies including Technologies Servlets2.x, JDBC, Apache Ant1.5, HTML, XHTML, DHTML, CSS, Java Script3.x, JSP and XML.
  • Experience wif Spring framework (Core).
  • Experience implementing/using REST and SOAP based APIs Experience in web service development and noledge of Service Oriented Architecture (SOA).
  • Use JSP as display technology to develop front-end controller.
  • Using MVC architecture wif Spring.
  • Participate in the design and development of client-side forms using HTML, JavaScript, and AJAX.
  • Participate in the design of tables in MS SQL Server.
  • Responsible for developing JSPs and servlets.

We'd love your feedback!