We provide IT Staff Augmentation Services!

Aws Kubernetes Engineer Resume

0/5 (Submit Your Rating)

San Diego, CA

SUMMARY

  • Experienced IT professional with over 8 years of experience in IT industry, with 6+ years specializing in Cloud, DevOps, and Automation, and 2 years as a Software developer.
  • Skilled in AWS cloud provisioning and managing services such as EC2, S3, Load Balancers, VPC, AMI, SNS, RDS, IAM, CloudWatch, CloudTrail, and CloudFormation.
  • Proficient in configuring Azure web apps, Azure App services, Azure Application insights, Azure Application gateway, Azure DNS, Azure Traffic Manager, App services, analyzing Azure Networks with Azure Network Watcher, implementing Azure Site Recovery, Azure stack, Azure Backup, and Azure Automation.
  • Expertise in using CloudFormation and Terraform for deploying Cloud Infrastructure.
  • Experienced in container management using Docker, including writing Docker files, setting up automated builds, and installing and configuring Kubernetes.
  • Skilled in setting up and maintaining entire CI/CD pipelines using tools like Jenkins, GitLab CI, CircleCI, and other modern industry - standard tools, including integration with testing, building, and deployment processes.
  • Proficient in provisioning and automation tools such as Puppet, Terraform, and Ansible, in addition to source code management tools like GitHub and Bitbucket.
  • Experienced in installing and configuring Kubernetes, clustering them, and managing local deployments to provide a consistent environment for deployment scaling and load balancing from development through production.

TECHNICAL SKILLS

Deployment Tools: Jenkins, GitLab CI/CD, CircleCI

Provisioning and Automation Tools: Terraform, CloudFormation

Configuration Management Tools: Ansible, Chef, Puppet enterprise

Cloud Platforms: AWS, Azure

Containerization Tools: Docker, Kubernetes

Build Tools: Ant, Maven, Artifactory, Nexus, Gradle

Monitoring and Logging Tools: Nagios, Splunk, CloudWatch, CloudTrail

SDLC Methodologies: Agile, Scrum, Waterfall

PROFESSIONAL EXPERIENCE

Confidential, San Diego, CA

AWS Kubernetes Engineer

Responsibilities:

  • Designed, implemented, and managed Kubernetes clusters on AWS using EKS/ECS services, optimizing them for scalability, availability, security, and achieving cost savings by utilizing spot instances and reserved instances.
  • Containerized applications using Docker and Kubernetes, creating Docker images to run in Kubernetes environments, and utilizing Kubernetes features such as ConfigMaps and Secrets to securely manage configuration data.
  • Successfully conducted containerization and migration efforts, migrating monolithic applications to a microservices architecture using Kubernetes, resulting in significant performance improvements and cost savings.
  • Developed and maintained Helm charts for deploying microservices and applications, implementing best practices for creating and maintaining Helm charts, including versioning, dependency management, and chart testing using tools like Helmfile.
  • Utilized Argo CD to automate the continuous deployment and management of Kubernetes applications, ensuring consistency across environments, managing the lifecycle of applications, and achieving successful deployments in multiple environments.
  • Developed and implemented CI/CD pipelines for Kubernetes applications using GitLab CI/CD, achieving zero downtime deployments using a blue-green deployment strategy, and utilizing Kubernetes plugins to interact with and manage Kubernetes clusters.
  • Managed and secured Kubernetes networking using Kubernetes Services and Ingresses, implemented Kubernetes network policies to restrict traffic between microservices, and utilized AWS load balancers such as Application Load Balancers to manage incoming traffic.
  • Managed AWS IAM roles and policies to grant granular access control to AWS resources, and configured AWS IAM with Kubernetes to manage Kubernetes cluster and application access control.
  • Managed AWS S3 buckets, implementing best practices for data security and encryption, and utilizing AWS S3 for storing and distributing Helm charts, backup data, and other Kubernetes artifacts.
  • Managed AWS SQS/SNS services, utilizing them for message queuing and notification systems within Kubernetes environments, implementing autoscaling policies using AWS SQS/SNS to dynamically scale Kubernetes applications and achieve significant cost savings.
  • Developed and maintained Terraform scripts to manage AWS infrastructure as code, achieving consistency and reproducibility across multiple environments using Terraform workspaces, and implementing Terraform modules to abstract infrastructure complexity and reuse infrastructure code.
  • Conducted disaster recovery drills and implemented backup and restore solutions for Kubernetes applications, utilizing AWS EBS snapshots and S3 to store backup data, and implementing automated backups using Velero to achieve robust disaster recovery.
  • Troubleshot containerization issues, provided guidance to DevOps teams in resolving them, and conducted containerization training sessions and knowledge sharing to improve the team's containerization expertise.

Environment: s: EKS/ECS, Kubernetes, Helm, Docker, ConfigMaps, GitLab CI/CD, AWS load balancers, AWS IAM, S3, AWS SQS/SNS

Confidential, Southfield, MI

Sr. Cloud/ DevOps Engineer

Responsibilities:

  • Worked with various AWS resources such as EC2, Lambda, VPC, Route53, IAM, AMI, EBS, Snapshots, S3 Glacier, Security groups, Elastic Load Balancer, Autoscaling, CloudFormation, CloudWatch, CloudTrail, and SNS.
  • Configured Ansible playbooks to provision EC2 instances, update and manage tags, create images, take backups through snapshots, store them in S3, and clean up EBS volumes.
  • Designed and developed custom Ansible roles for infrastructure automation and application deployments.
  • Provisioned a VPC with private subnets, public subnets, route tables, shared security groups, and added virtual interfaces after provisioning was done.
  • Designed a CloudFormation stack to automate the provisioning of EC2 instances using an Auto Scaling group and an Application Load Balancer with the help of a Launch Configuration and a Target Group.
  • Configured IAM roles for EC2 instances and assigned policies to grant specific level access to S3 buckets by customizing JSON templates for the designed stacks using Amazon CloudFormation.
  • Configured a CloudFormation stack to shut down and start EC2 applications by triggering Lambda functions using CloudWatch event rules with the help of a cron job and an IAM role was created to provide specific level access to EC2 instances for this Lambda function.
  • Implemented a CI/CD workflow by integrating Jenkins pipeline stages with GitHub via a webhook.
  • Created Pipeline stages included Maven build tool, SonarQube for automation testing, Nexus for storing artifacts, and sending them to lower environments for further testing and based on the environment.
  • Created Jenkins triggeres for Ansible playbooks to deploying artifacts.
  • Written a Dockerfile to build image artifacts and stored them in ECR using the CI/CD pipeline and used Ansible to kick off the application in Kubernetes.
  • Created an EKS cluster to manage the containers and deploy the applications and used Helm to manage Kubernetes charts, implemented Kubernetes manifests, and deployed microservices into Kubernetes clusters and also created reproducible builds of Kubernetes applications and managed Kubernetes deployments and services.
  • Troubleshot and monitored various third-party applications using Prometheus, Grafana, and CloudWatch in AWS.
  • Using Packer, created Golden images and integrated them with Ansible to configure the application before creating a machine image.

Environment: s: EC2, Lambda, VPC, Route53, IAM, AMI, EBS, S3 Glacier, ELB, CloudFormation, CloudWatch, CloudTrail, SNS, EBS, CI/CD, Jenkins, Ansible, GitHub, Maven, SonarQube, Docker, ECR, Kubernetes, EKS, Prometheus, Grafana

Confidential

DevOps Engineer

Responsibilities:

  • Transitioned stack from VSTS to Azure DevOps, configuring CI/CD for automated deployment of ASP.NET MVC applications to Azure web apps.
  • Configured continuous integration (CI) from source control, set up build definitions within Visual Studio Team Services (VSTS), and enabled continuous delivery (CD) for automated deployment of ASP.NET MVC applications to Azure web apps.
  • Worked with Azure Serverless services, creating and configuring HTTP Triggers in Azure Functions with application insights for monitoring, and conducting load testing on applications using Visual Studio Team Services (VSTS).
  • Managed Kubernetes charts using Helm within the Azure environment, ensuring reproducible builds of Kubernetes applications, effectively handling Kubernetes manifest files, and managing releases of Helm packages. Established a local dev workflow centered around minikube to validate deployments in Kubernetes on Azure.
  • Configured multi-container Docker applications by utilizing the Docker-Compose tool with YAML configuration files, running on Azure infrastructure.
  • Utilized Azure Kubernetes Service (AKS) to manage containerized applications, including tasks such as managing AKS nodes, Config-Maps, selectors, Services, and deploying application containers as Pods.

Environment: s: Azure DevOps, Visual Studio Team Services (VSTS), CI/CD, Azure web apps, Azure Functions, Azure Kubernetes Service, Minikube, Docker

Confidential

Cloud Engineer

Responsibilities:

  • Created an AWS RDS MySQL DB cluster and connected to the database through an Amazon RDS MySQL DB Instance using the Amazon RDS Console.
  • Utilized AWS CloudFront, a content delivery network, to improve user experience and reduce latency by delivering content from AWS edge locations.
  • Created Snapshots and AMIs of EC2 instances and moved the AMIs to different regions to enable cross-region failover. Additionally, created S3 buckets, managed policies for S3 buckets and Glacier, and used these services for storage and backup on AWS.
  • Configured Route 53 in the AWS environment for DNS management and routing traffic to AWS resources, including Amazon EC2 instances, Elastic Load Balancers (ELB), and CloudFront CDN.
  • Installed and configured Jenkins master and slave nodes, built a CI/CD pipeline, and managed the infrastructure as code using Chef.

Environment: s: AWS RDS, AWS CloudFront, AMI, EC2, ELB, CI/CD, Chef

Confidential

Jr. Software Developer

Responsibilities:

  • Developed authentication services using Node.js with JWT and ForgeRock (IBM).
  • Developed data and business layers using Node.js for multiple REST-based applications.
  • Designed and implemented Email and SMS services using Node.js with SendGrid and proprietary servers.
  • Created an Enterprise-level API gateway using Node.js to connect 10+ microservices.
  • Designed and developed UI/UX interfaces using XML (Native Android), HTML5, and CSS3 (Web).
  • Utilized Spring and Java EE to develop REST services that were deployed on AWS.
  • Employed React Navigation and Redux state management for custom navigation based on data.

Environment: s: Node.js, ForgeRock, API, UI/UX, XML, HTML5, CSS3 Java Spring, Java EE, AWS

We'd love your feedback!