Devops Cloud Engineer Resume
0/5 (Submit Your Rating)
Largo, MD
TECHNICAL SKILLS
Platform: RedHat Enterprise Linux (RHEL) and Ubuntu
Cloud Computing: Amazon Web Services (AWS)
Webservers: Apache Tomcat, Nginx
Databases: AWS RDS (MySQL, PostgreSQL and Aurora) and NoSQL (DynamoDB)
PROFESSIONAL EXPERIENCE
DevOps Cloud Engineer
Confidential, Largo MD
Responsibilities:
- Installing, configuring and maintaining various CI/CD tools on the application architecture
- Automate deployment and updating of applications using Ansible playbooks and roles
- Automate application and infrastructure builds using Jenkins
- Managed and provision various EC2 instances families based on the required characteristics of the application with regards to resource utilization (CPU, Memory and storage capacity)
- Managing git/GitHub for distributed version control source (DVCS) code repository and track code changes (branched and merged).
- Automating Linux builds/configuration using terraform, CloudFormation, ansible, AWS CLI
- Providing users with authenticated access to AWS resources using Multi - Factor Authentication
- Managing user access to AWS resources by implementing IAM policies and roles.
- Supported migration project from an Enterprise on-premise server to the AWS cloud.
- Worked with AWS developers’ tools (Elastic beanstalk, Codedeploy, Codepipeline, Codecommit, Code-build for traditional deployment) for supporting AWS CI/CD pipeline
- Configuring and patching, updating applications as needed for development on AWS EC2 instances
- Used Terraform and CloudFormation as Infrastructure as code for automation of Infrastructure.
- Manage Jenkins Master Nodes, build servers and providing support to developers on tools to resolve issues configured Ansible servers as needed for automation and configuration management
- Install and Configure Docker environment as a container service needed for building micro-service architecture and orchestration using ECS.
- Managed storage in the cloud at various capacity using EBS voulme, S3 lifecycle policy and EFS for file sharing
- Managed hybrid storage integration using Storage Gateway (File Gateway, Volume gateway (Cache and store) and Tape Gateway (VTL)
- Managed the Elastic Load Balancer (ELB, NLB and ALB) and Route 53 especially the Application Load Balancer and certificate Manager for TLS termination for application web tier end to end encryptions
- Managed the VPC at various level with NAT Gateway
- Implementing AWS S3 backup solution to backup database files
- Configuring launch configuration and auto scaling group/policy as needed for cloud environment scalability
- Using S3 to provision Static webpage content delivery that is being viewed using distribution
- Monitored AWS services using Amazon CloudWatch logs, creating Alarms for threshold monitoring and Events.
- Establishing VPC peering to create connection between multiple environments that exists in separate VPCs
- Created multiple Bash and Shell Scripts for various application level tasks configurations.
- Used Key management services (KMS) and SSL/TLS for encryption of Aws resources both in transit and at rest
- Managed AWS VPC IPV4 IPs address range (CIDRs) by scaling it up on-demand to reduce over and under allocation of IPV4 address space by adding secondary CIDRS addresses ranges as required on the fly
- Created MySQL and Postgres databases and connect them to MySQL workbench clients and PgAdmin respectively
- Installed and managed various Linux distributions such as RHEL and CENTOS 6&7, Ubuntu and Fedora
- Collaborated with developers in creating an automated deployment pipelines of applications using GitHub, artifactory, Apache Tomcat/Nginx and Jenkins
- Manage Elasticsearch and Kibana to provide visualized insight of analyzed logfiles stream through CloudWatch agents installed in Ec2 instances.
- Managed getting data into Aws using various tools like Data Migration Services (DMS) for Heterogenous migrations for migrating existing data and replicate ongoing data and migration existing data and, S3 sync and S3 Lifecycle Management policy (AWSCLI and console), Storage Gateways (File Gateway).
- Installed and managed various Linux distributions such as RHEL and CENTOS 6&7, Ubuntu and Fedora
- Validates Amazon Machine Image (AMI) for vulnerability assessment using AWS Vulnerabilities and exposure packages such as Tags, CloudFormation, System Manager Parameter Store, Aws inspector agent, SNS to notification, lambda function and CloudWatch event rules to trigger continuous vulnerability assessments. And make recommendations based on the severity report by Aws inspector
- Manage Aws Elastic Block Storage (EBS) volume snapshots using Data Lifecycle Manager (DLM)and CloudWatch event rule.
- Manage Backup and Disaster Recovery based on RTO and RPO using different DR Architectural Approaches (Cold DR, Pilot Light DR, Warm Standby or Active/passive DR and Multisite or Active/Active DR) together with Cloud Protection Manager (CPM) a third party application that manages Backup and Disaster Recovery
AWS CLOUD Engineer
Confidential, Columbus, OH
Responsibilities:
- Created AWS cloud environments and resources as needed for data migration using Aws server Migration services (SMS)
- Migrated virtual servers from on-premise to AWS cloud using the AWS migration Strategies Re-host (lift/shift:Vmimport/export approach),Re-platform(Re-optimization) and re-factor/re-architect.
- Created and configured virtual servers as needed for virtualization and storage utilization
- Managed Security and Permission with Identity Access Management (IAM) implementing the Least privilege strategy
- Set up CloudTrail to monitor API calls on all AWS cloud resources
- Managed EBS Volume at various capacity such as creating new volume, modifying (extending), resizing existing volumes for the optimization of my environment
- Integrated of s3 into ec2 to enhance log monitoring, storage integrations and archiving of codes.
- Maintained DNS records using Route53 routing policies to Improve Fault Tolerant Connections and reduce latency and using Load balancer for traffic distribution, Security groups and NACLS.
- Create and Manage AMI/Snapshots/Volumes for disaster recovery purpose.
- Tracked run time on all databases on the Amazon EC2 cloud instances for efficiency
- Granted least privileges to new and existing database users using IAM credential and Roles
- Set up cron jobs for scheduled on-premise database backups
Linux Systems Administrator
Confidential
Responsibilities:
- Performed RPM, YUM and APT package installations, patches for Linux operating system and other server management services
- Manage user access to files and directories in Linux environment using Linux permission tools
- Installed and managed various Linux distributions such as RHEL and CENTOS 5&6, Ubuntu and Fedora
- Managed systems routine backup, scheduling jobs, enabling CRON jobs, enabling system logging and network logging of servers for maintenance.
- Monitored system capacity and performance using tools like Vmstat, Iostat, top, htop&lsof.
- Identify, troubleshoot, and resolve problems with the OS build failures.