We provide IT Staff Augmentation Services!

Azure Devops Engineer Resume

0/5 (Submit Your Rating)

BellevuE

SUMMARY

  • Over 7 years of extensive experience in Automating, configuring and deploying instances on cloud environments and experience in the areas of DevOps, CI/CD Pipeline, Build and release management and Linux/Windows Administration.
  • Experience on Backup and restore Azure services and in Design and configure Azure Virtual Networks (VNets), subnets, Azure network settings, DHCP address blocks, DNS settings, security policies and routing. Azure cloud services, Blob storage, Active directory, Azure Service Bus, Cosmos DB, Azure Traffic Manager.
  • Experience in Managing/Deploying the Windows Azure based application.
  • Deployed Azure IaaS virtual machines (VMs) and Cloud services (PaaS role instances) into secure Vnets and subnets.
  • Implemented high availability with Azure Classic and Resource Manager deployment models.
  • Experience in migrating on premise to Windows Azure using Azure Site Recovery and Azure backups and having good knowledge on Azure Fabric, Microservices in Azure.
  • Worked on Terraform for managing the infrastructure through the terminal sessions and executing scripts through the terminal.
  • Major focus on Configuration, SCM, Build/Release Management, Infrastructure as a code (IAC) and as Azure DevOps operations Production and cross platform environments.
  • Set up a GCP Firewall rules to allow or deny traffic to and from the VM's instances based on specified configuration and used GCP cloud CDN (content delivery network) to deliver content from GCP cache locations drastically improving user experience and latency.
  • Worked in an environment of Amazon Web Services (AWS) products gained good knowledge in Elastic Cloud Computing, Simple Storage Services, Cloud Formation, Glacier, Block Storage, Elastic Beanstalk, Amazon Lambda, Virtual Private cloud, Load balancing, Relational Database Service, and Cloud Watch.
  • Build servers using AWS: Importing volumes, launching EC2, creating security groups, auto - scaling, load balancers, Route 53, SES and SNS in the defined virtual private connection.
  • Management and design of integrated build pipelines using continuous integration workflows such as Jira, GIT, Stash, Bamboo, Jenkins, Docker, Kubernetes, Terraform, ELK (Elastic search, Log stash, Kibana).
  • Excellent experience in writing Chef cookbooks and Ansible playbooks for configuration management, server provisioning by following Test Driven Development and Behavior Driven development methods.
  • Played a significant role in adding monitoring checks using Data dog and AWS LAMBDA. Written AWS Lambda functions to trigger the events related to the migration of data from AWS S3 to AWS Redshift.
  • Knowledge on SaaS, PaaS and IaaS concepts of cloud computing architecture and Implementation using AWS, OpenStack, OpenShift, Pivotal Cloud Foundry (PCF) and Azure.
  • Experience on container management tools Docker, Mesos, Marathon and Kubernetes. Also used to manage clusters of nodes using docker swarm, and Kubernetes clusters.
  • Experience in setting up Docker environment including creating images, containers and deploying applications and container orchestration such as EC2 Container service and Kubernetes.
  • Creating fully automated CI build and deployment infrastructure and processes for multiple projects using Docker, Jenkins (Cloud bees), sonar cube, VMWare, RHEL, Satellite, Kubernetes, Arti factory, Ansible & GitLab.
  • Work experience on Docker swarm and Kubernetes to cluster the Containers for high availability.
  • Experience with version control systems (Subversion and GIT) and Source code management applications (SVN, Bitbucket, GIT Bash and GitHub).
  • Experience in JIRA for ticketing and as well as defect tracking system and configure various workflows, customizations and plug-ins for JIRA bug/issue tracker, integrated Jenkins with JIRA, GitHub, Maven.
  • Hands-on experience using MAVEN, ANT, and Gradle as build tools for the building of deployable artifacts (jar, ear & war) from the source and static code analysis using SonarQube.
  • Working with the ELK (Elastic Search, Logstash, Kibana) stack to analyze log data obtained from Confidential Business Intelligence tools and worked on other monitoring tools like Nagios, Splunk, New Relic.
  • Deployed the Java applications into web application servers like Apache Tomcat. Experienced in Querying RDBMS such as Oracle, MY SQL and SQL Server by using SQL for data Integrity.
  • Proficient in writing Python, Ruby, YAML, Shell, Bash, json Scripting to automate the deployments.
  • Excellent Knowledge in Capacity Planning and Performance tuning.

TECHNICAL SKILLS

Operating Systems: Windows (2008,2012,2016), UNIX, LINUX (RHEL, Cent OS, Ubuntu), OS X.

Configuration Management: Chef, Ansible.

CI/CD Tools: Jenkins, Bamboo, VSTS (Azure DevOps).

Infrastructure automation: Cloud Formation, Terraform.

Cloud Environments: AWS, AZURE, OpenStack, IaaS, PaaS, SaaS.

Build tools: Ant, mavenVersion Control Tools Git, Subversion SVN, Bitbucket.

Web servers: Apache, Tomcat, JBoss, Nginx.

Monitoring Tools: Nagios, Splunk, Prometheus, New Relic, ELK, Dynatrace.

Containers Tools: Docker, Kubernetes.

PROFESSIONAL EXPERIENCE

Azure DevOps Engineer

Confidential, Bellevue

Responsibilities:

  • Working as a Azure SRE and working on Customer management tool like ICM.
  • Working on Azure Kubernetes Service to deploy a managed Kubernetes cluster in Azure and created an AKS cluster in the Azure portal.
  • Worked on Azure IAAS services, managed few IAAS services like Virtual machines, Azure storage, Networking, operating systems.
  • Installing Log analytics extensions, Storage Diagnostics extensions, Network Watcher and Custom extensions as required to setup monitoring and logging using Azure Monitor, App Insights, Log Analytics.
  • Writing PowerShell scripts to Deploy .net applications using Custom Extensions.
  • Provide Enhanced operational support and sustained maintenance of deployed systems.
  • Migrated on-premises applications to Azure and configured VNETs and subnets as per the project requirement also performed PowerShell scripting to do Patching, Imaging, and Deployments in Azure.
  • Created multiple Python, Bash, Shell and Ruby Shell Scripts for various application level tasks.
  • Established infrastructure and service monitoring using Prometheus and Grafana.
  • Expertise in configuring Log monitoring tools like ELK (Elasticsearch, LogStash & Kibana), Nagios, Splunk and Grafana to monitor logs of applications in prod and non-prod.
  • Creation of Prometheus-Grafana setup using Terraform/Ansible for various targets like Kafka, Spark, cosmoDB, node exporters etc.
  • Experience with Configuration Management automation tool Ansible and has worked on integrating Ansible YAML Scripts.
  • Automated setting up server infrastructure for the DevOps services, using Ansible, shell and python scripts.
  • Extensively worked with Scheduling, deploying, managing container replicas onto a node using Kubernetes and experienced in creating Kubernetes clusters work with Helm charts running on the same cluster resources.
  • Experience in using helm chart to deploy Kube objects (template) in Continuous Integration and deployment.
  • Wrote Python code embedded with JSON and XML to produce HTTP GET request, parsing HTML data from websites.
  • Installed SQL Server 2012 versions using PowerShell Desired State Configuration (DSC) and post install Server configuration.
  • Created dashboards in VSTS for CI/CD pipelines, Work items and bugs.
  • Automating the configuration setup when moving an application from one environment to other using the PowerShell Desired State Configuration scripts (DSC).
  • Deployed the configuration of Virtual Machines by using PowerShell Desired State Configuration which is a management platform in Windows PowerShell.
  • Worked in container-based technologies like Docker, Kubernetes and OpenShift
  • Managed the OpenShift cluster that includes scaling up and down the Azure app nodes.
  • Worked on OpenShiftfor container management and to enhance container platform multi - tenancy.
  • Utilized Docker for the runtime environment of the CI/CD system to build, test deploy.
  • Created builds and release pipelines in Azure Devops and done deployments using SPN (secure endpoint connection) for implementing CI/CD.
Sr DevOps/Cloud Engineer

Confidential, Virginia

Responsibilities:

  • Experienced in AZURE Cloud Services. Such as V-Net, Subnets, Active Directory, Storage Accounts, Data Lake, Service Bus, Data Bricks, Function App, Cosmos DB and Web-App.
  • Created dashboards in VSTS for CI/CD pipelines, Work items and bugs.
  • Configured Azure Multi-Factor Authentication (MFA) as a part of Azure AD Premium to securely authenticate users and worked on creating custom Azure templates for quick deployments.
  • Responsible for implementing containerized based applications on Azure Kubernetes by using Azure Kubernetes service (AKS), Kubernetes Cluster, which are responsible for cluster management, Virtual Network to deploy agent nodes
  • Experience in the deployment of Azure SQL Database, Azure Cosmos DB.
  • Expertise on Azure Data Factory to orchestrate the intake of data from different sources like Azure Storage Blobs, Azure SQL Database, Azure SQL Data Warehouse, and on-premises databases to Azure Data Lake Store.
  • Worked on Google Cloud Platform (GCP) services like compute engine, cloud load balancing, cloud storage, cloud SQL, stack driver monitoring and cloud deployment manager.
  • CI/CD system with GitLab on GKE utilizing Kubernetes and Docker for the runtime environment for the CI/CD systems to build and test and deploy.
  • Experienced with Automating and improving infrastructure, using Open-Source tool Ansible, Chef for configuration management, infrastructure deployment and orchestration.
  • Wrote platform specific scripts and used Ansible to execute these scripts on the environment in which discovery must be performed.
  • Automate Datadog Dashboards with the stack through Terraform Scripts.
  • Expertise in using Terraform key features such as Infrastructure as a code (IAC), Execution plans, Resource Graphs, Change Automation. Experience in writing new plugins to support new functionality in Terraform.
  • Experience writing Terraform templates to deploy infrastructure on a cloud with EC2, ELB, and SG’s in JSON. Building/Maintaining Docker container clusters managed by Kubernetes Linux, Bash, GIT, Docker, on GCP (Google Cloud Platform). Utilized Kubernetes and Docker for the runtime environment of the CI/CD system to build, test deploy.
  • Orchestrated Kubernetes cluster with Highly Available Master controllers and multi host worker nodes.
  • Performed troubleshooting in Kubernetes and Docker containers and Docker compose.
  • Responsible for managing the Docker private registry.
  • Experience in implementing and managing Docker-based infrastructure using Kubernetes.
  • Container management using Docker by writing Docker files and set up the automated build on Docker HUB and installed and configured Kubernetes.
  • Design CI/CD processes in the context of a Jenkins orchestration, including the usage of automated build, and deployment tool.
  • Extensively worked with automation tools like Jenkins, to implement the End-to-End Automation to build, test and deliver artifacts and troubleshoot the build issue during the Jenkins build process.
  • Experience using groovy scripts for setting up Jenkins pipeline jobs for build configurations.
  • Creating Groovy Scripts to create Jenkins Jobs which saves a lot of time creating Jenkins Job Manually.
  • Written Jenkins Pipeline template Scripts in Groovy for Automation of build and deployment process for different environment.
  • Experience on Controller maintenance activities as well as auto configuration using Python and PowerShell.
  • Manual Task Automation has been accomplished using scripting language -bash and PowerShell.
  • Worked on deployment of Java and .Net based Applications.
  • Managed Kubernetes charts using Helm, and Created reproducible builds of the Kubernetes applications, managed Kubernetes deployment and service files and managed releases of Helm packages.
  • Used Hashi corp Packer to create and manage the AMI's and automated whole AMI creation process using Jenkins jobs.
  • Implement best practices and maintain Source Code repository infrastructure (Using GIT).
  • Installed and configured GIT and communicating with the repositories in GITHUB.
  • Used the version control system GIT to access the repositories and used in coordinating with CI tools.
  • Analysed application analytics, New Relic, Datadog alerts, reports.
  • Used ELK Log monitoring tool to analyze the logs for applications related issues.
  • Installed, configured, and maintained Monitoring Tool and another respective tool on LINUX as well as WINDOW platform.

Azure DevOps Engineer

Confidential, Newark-CA

Responsibilities:

  • Experienced in utilizing Azure Stack (Compute, Web & Mobile, Blobs, ADF, Resource Groups, Azure Data Lake, HDInsight Clusters, Azure Data Factory, Azure SQL, Cloud Services, and ARM) and services for configuring and deploying Azure Automation Scripts for multiple applications.
  • Design roles and groups using Azure Identity and Access Management (IAM).
  • Developed Power Shell scripts to automate the project creation, setting permissions for users, groups in sys.
  • Deployed Web app, Web jobs, Azure DevOps/VSTS - Azure Pipeline, Azure AD, Build, Release, Storage strategy -Blobs, Create and manage VM, ARM templates.
  • Performed cloud migration, managing both classic & ARM portal, effectively use Power Shell to manage Azure services, troubleshooting access related issues.
  • Working knowledge on Azure cloud IaaS and PaaS Services, Azure SQL, Azure storage and Azure Services.
  • Developed Templates for Azure infrastructure as a code using Terraform to build staging and production environments.
  • Experience in Implementing elastic search clusters on Confidential Azure using Terraform scripts.
  • Used Azure Kubernetes Service to deploy a managed Kubernetes cluster in Azure and created an AKS cluster in the Azure portal, with the Azure CLI, also used template driven deployment options such as Resource Manager templates and terraform.
  • Participated in design and implementation of 21 accounts AWS landing zone-using AWS account vending machine and automated infrastructure deployment tools.
  • Experienced at launching Amazon EC2 instances and setting up security groups.
  • Configured Elastic Load Balancers (ELB) with EC2 Auto scaling groups.
  • Designed, Installed, and Implemented Ansible configuration management system. Used Ansible to manage Web applications, Environment’s configuration Files, Users, Mount points and Packages.
  • Supported API development team in creating Ansible playbooks for deploying, integrating and monitoring their continuous integration environment.
  • Responsible for managing the Docker private registry.
  • Maintained Docker-registry, images, tagging and writing Docker files for creating new images.
  • Creating microservices with Docker and Kubernetes. Utilizing Kubernetes and Docker for the runtime environment for the CI/CD system to build, test, and deploy.
  • Deployed CoreOS Kubernetes Clusters to manage Docker containers in the production environment with light weight Docker Images as base files.
  • Deployed application which is containerized using Docker onto a Kubernetes cluster which is managed by Amazon Elastic Container Service for Kubernetes (EKS).
  • Creating and upgrading custom Ansible, Terraform and Bash scripts for installation and configuration of Kubernetes clusters and its packages.
  • Installation and administering application services on Kubernetes clusters including ELK Stack, MongoDB, Cassandra, and spark.
  • Deployed a highly available Hashi Corp vault to secure the application sensitive data and Service Discovery. Migrated all the Jenkins pipeline and ansible playbook to use Hashi Corp vault to pull the sensitive data and fed it into application.
  • Implemented Secrets Managements solution utilizing Hashi Corp vault with on-premises server.
  • Installation, configuration, and administration of all servers and application monitoring using Nagios, Splunk, Kibana.
  • Created dashboard in new relic console for the monitoring purpose.
  • Used Ansible to manage Web applications, Environment’s configuration Files, Users, Mount points and Packages.
  • Wrote Python, Bash and Shell scripts to monitor installed enterprise applications and to get the configurations of multiple servers using Ansible.
  • Developed Python and shell scripts for automation of the build and release process.
  • Installed and configured various Atlassian Tools (JIRA, JIRA Software, Confluence, Fisheye & Crucible, Bit Bucket, Bamboo, Crowd)
  • Used Jenkins with CI/CD pipeline to drive all microservices builds out to the Internal Docker registry.
  • Responsible for installation & configuration of Jenkins plugins to automate continuous builds and publishing Docker images to the Nexus repository.
  • Maintained branches/forks in GitHub version control for the changes made in cookbooks as per release.
  • Source Control Management with GitHub and GitLab for Git repositories. Experience writing various Pre/Post Commit Hooks.
  • A Worked with Nagios for Azure Active Directory & LDAP and Data consolidation forLDAP users. Monitored system performance using Nagios, maintained Nagios servers and added new services & servers.
  • Configuring, automation and maintaining build and deployment CI/CD tools Git/GitLab, Jenkins, Docker Registry/Daemon, Nexus, and JIRA for Multi-Environment.

SR. AWS Cloud Engineer

Confidential, PA

Responsibilities:

  • Created AWS cloud formation templates to create custom-sized VPC, subnets, EC2 instances, ELB, security groups. Managed other AWS Services like S3, Cloud Front, Cloud Watch, Landing Zone, DMS, EKS, ECS, ECR, Kinesis, Redshift Cluster, Route53, SNS, SQS, Cloud Trail.
  • Created S3 buckets and managed policies for S3 buckets and utilized S3 Buckets and Glacier for storage, backup and archived in AWS and worked on setting up and maintenance of Auto-Scaling AWS stacks.
  • Developed CloudFormation script to automate the EC2 instances with JSON templates.
  • Experience in writing Cloud Formation Templates in YAML and JSON format to build the AWS services with the paradigm of Infrastructure as a Code.
  • Automate operations processes using Lambda, CloudWatch Events, and Schedules.
  • Migrated applications from data center to AWS cloud.
  • Migrated on premise Database Servers to AWS Cloud using AWS DMS.
  • Used IAM to create new accounts, roles, and groups. Implemented life-cycle management for RedHat Linux using Amazon EC2, Chef, and custom Ruby/Bash scripts.
  • Developed Templates for AWS Infrastructure as a code using CloudFormation.
  • Written automation scripts for creating resources in OpenStack Cloud using Python and terraform modules.
  • Experience with Automation of Production cloud deployments using Docker, Packer and Terraform.
  • Used Terraform scripts to Automate instances for Manual instances that were launched before.
  • Experience of writing and managing Chef Scripts and using Linux automated deployments using Chef.
  • Written Chef Cookbooks for various packages. Implemented environments, roles, data bags in Chef for better environment management.
  • Implemented and maintained Ansible Configuration management spanning several environments in VMware and the AWS cloud.
  • Experience in writing chef cookbooks and recipes to automate middleware installations, domain creations and deployment activities.
  • Worked on DevOps group running Jenkins in a Docker container with EC2 slaves in Amazon AWS cloud configuration.
  • Installation and configuration of bamboo, Installation, and configuration of Jira/Confluence.
  • Worked on Jenkins to build and test the applications and implemented Jenkins as a full cycle continuous delivery tool involving package creation, distribution, and deployment onto tomcat application servers via shell scripts embedded into Jenkins jobs.
  • Used to Automated deployment of builds to different environments using TeamCity, Jenkins.
  • Used Jenkins and pipelines to drive all microservices builds out to the Docker registry and then deployed to Kubernetes, Created Pods and managed using Kubernetes.
  • Integrated Kubernetes with Hashi corp Vault to inject configurations at runtime for each service using init, config sidecars and persistent volume sharing between app and config containers.
  • Worked on several Docker components like Docker Engine, Docker-Hub, Docker-Compose, Docker Registry and Docker Swarm.
  • Developed proof of concept implementations of distributed frameworks using Docker.
  • Installed and configured a private Docker Registry for internal teams to push and pull containers.
  • Created a local development environment using Docker Compose.
  • Created backup scripts in shell and python for MySQL, MongoDB for automatic dump storage in S3.
  • Installation and administering application services on Kubernetes clusters including ELK Stack, MongoDB, Cassandra, and spark.
  • Tuning weekly basis to meet Nagios and CloudWatch performance requirements.

Site Reliability Engineer

Confidential, CA

Responsibilities:

  • Worked on Confidential Azure (Public) Cloud to provide IaaS support to client. Create Virtual Machines through Power Shell Script and Azure Portal.
  • Manage and Create Storage Account and Affinity Group in Azure Portal.
  • Capture an image of a Virtual Machine. Attaching a Disk to a Virtual Machine. Manage and create Virtual Network and End Points in Azure Portal.
  • Deploying VM's, Storage, Network and Affinity Group through PowerShell Script.
  • Creating Storage Pool and Stripping of Disk for Azure Virtual Machines. Backup Configure and Restore Azure Virtual Machine using Azure Backup.
  • To deploy the application and manage the session used Windows Azure.
  • Implemented Azure Automation, Log Analytics and provisioned Azure SQL.
  • Written Ansible Playbooks with YAML to automate infrastructure administration (infrastructure as code) and deployment automation. Created Playbooks to install and configure required packages to setup the environments.
  • Extensively worked on Ansible Playbooks with Ansible roles. Created inventory in Ansible for automating the continuous deployment. Configure the servers, deploy software, and orchestrate continuous deployments or zero downtime rolling updates.
  • Experience with container-based deployments using Docker, working with Docker images, Docker Hub and Docker registries and Kubernetes.
  • Deploy and run applications using Docker containers.
  • Created a Continuous Delivery process to include support building of Docker Images and publish into a private repository.
  • Developed and implemented automated CI/CD pipeline utilizing Docker for a micro service-based application.
  • Developed CI/CD system with Jenkins on Kubernetes container environment, utilizing Kubernetes and Docker for the runtime environment for the CI/CD system to build, test and deploy.
  • Implemented and managed Splunk,beacon monitoring and reporting infrastructure.
  • Installed, Configured, Managed Monitoring Tools such as Splunk, Nagios for Resource Monitoring, Network Monitoring, Log Trace Monitoring.
  • Kubernetes is being used to orchestrate the deployment, scaling and management of Docker Containers.
  • Maintained ELK (Elastic Search, Log stash, Kibana) Stack for Searching, routing, and visualizing Logged Data.

Build & Release Engineer

Confidential

Responsibilities:

  • Implemented AWS solutions using EC2, S3, RDS, IAM, Redshift, Lambda, Security Groups, EBS, Elastic Load Balancer, Auto scaling groups, SNS, Optimized volumes and Cloud Formation templates.
  • Configured and deployed AWS Lambda service to run the code in response to events and automatically manage resources.
  • Configured AWS IAM and Security Groups in Public and Private Subnets in VPC, managed IAM accounts (with MFA) and IAM policies to meet security audit & compliance requirements.
  • Developed CloudFormation script to automate the EC2 instances with JSON templates.
  • Utilized Cloud Watch to monitor resources such as EC2, Amazon RDS DB services, Dynamo DB tables, EBS volumes, to set alarms for notification or automated actions, and to monitor logs for a better understanding and operation of the system.
  • Involved in EC2 Backup methods, ELB (application) security and application logging using CloudTrail integration with Kibana and elastic search, kinesis, firehose.
  • Implemented a Continuous Delivery pipeline with Docker, Jenkins, GitHub and AWS AMI’s. Whenever a new GitHub branch gets started, Jenkins server automatically attempts to build a new Docker container from it, the Docker container leverages Linux containers from the AMI baked in.
  • Configuring, automating and maintaining build and deployment CI/CD tool (Jenkins), git/ git-Lab, Docker registry/daemon, Nexus and JIRA for Multi-Environment (TEST/PRE-PROD) with high degrees of standardization for both infrastructure and application stack automation in AWS cloud platform.
  • Implemented and maintained the branching and build/release strategies utilizing Git. And implemented (CI/CD) pipeline with Jenkins and GitHub.
  • Worked on setting up the new repos, managing the permissions for various Git branches.
  • Worked on Monitoring tools like Nagios, Installation and configuration on Ubuntu Linux server.

We'd love your feedback!