We provide IT Staff Augmentation Services!

Sr. Azure Cloud Platform Engineer Resume

0/5 (Submit Your Rating)

ChicagO

SUMMARY

  • Sr. Azure Cloud Platform Engineer with 8+ years of IT experience and proficiency in Build, Release, and Deployment Management, with a focus on Continuous Integration (CI), build systems. Implementing effective IT strategies critical deployments in Microsoft Azure, Amazon Web Services, Leveraging Configuration Management, CI/CD, Containerization and Orchestration.
  • Utilized different DevOps fundamental devices like Azure DevOps, GIT, Jenkins, Ansible, Chef, Terraform, Docker, Kubernetes, a variety of scripting languages and monitoring tools.
  • Major focus on Configuration, SCM, Build/Release Management, Infrastructure as a code (IAC) and as Azure DevOps operations Production and cross platform environments.
  • Configured and managed Intune and Azure Services to provide centralized management and control of Windows 10 devices, including Software Deployment, Patching and Compliance.
  • Developed and implemented Disaster Recovery and business continuity plans for the migrated applications, ensuring high availability and Data Integrity in case of any disruptions or failures.
  • Understand the latest features like (Azure DevOps, OMS, NSG Rules introduced by Microsoft Azure and utilized it for existing business applications
  • Experience in Private Cloud and Hybrid cloud configurations, patterns, and practices in Windows Azure and SQL Azure and in Azure web and database deployments.
  • Experience in Azure IaaS - Virtual machines, VM Scale Sets, Load Balancer, Traffic Manager, Virtual Networks, SQL, Resource Groups and Cloud Services.
  • Experienced in Azure Backup, Azure Policies, Azure Key Vault, Salt Stack and Tagging.
  • Expertise in creating an AWS Virtual Private Cloud (VPC) with multiple subnets and deployed application and database servers with different Security Groups, N/W ACLs, NAT Gateways to serve the purpose of security.
  • Knowledge in maintaining Amazon Web Services and Hands-on experience in Architecting Legacy.
  • Demonstrated expertise in Windows Server Architecture, including in-depth knowledge of Windows Server 2012 and 2016. Experience in deploying, managing, and troubleshooting Windows-based servers and services in enterprise environments.
  • Designed an ELK (Elastic Logstash Kibana) system to monitor and search enterprise alerts and configured ELK stack in conjunction with AWS and using Logstash to output data to AWS S3. Terminated SSL on to Nginx to remove overhead on API servers.
  • LaunchedAWS EC2Cloud Instances usingAmazon Web Services (Linux/ Ubuntu/RHEL)and configured the launched instances with respect to specific applications.
  • CreatedSnapshotsandAmazon Machine Images (AMI's)for mission-critical production servers for backup.
  • Expertized in Configuring and maintaining the Terraform Enterprise infrastructure including workspaces, state management, and version control.
  • Experienced in migrating on premise servers and databases to Azure cloud using Terraform templates.
  • Configured AWS cloud IAC using Terraform and continuous deployment through Jenkins and automated the cloud formation using Terraform.
  • Automated provisioning of Hybrid solutions connecting Azure to on-premises resources via IAC, Azure Express Route and Azure Hybrid connections.
  • Extensive experience in building Artifacts using various build tools like Ant, Maven and Gradle and store back to Nexus, JFROG and Artifactory, run environmental jobs by using provisioning tools Docker and Vagrant.
  • Skilled in monitoring servers using Nagios, Splunk, ELK, Dynatrace, Datadog, AppDynamics, New Relic, and CloudWatch for Resource, Network, and Log Trace Monitoring.
  • Created geo-mapping visualizations using Kibana in integration with AWS CloudWatch and Lambda. Evaluated system logs using ELK software stack.
  • Designing, supporting and maintaining Splunk cluster infrastructure in a highly available, geo-redundant configuration.
  • Configured volume groups and logical volumes, extended logical volumes for file system growth needs using Logical Volume Manager (LVM) commands.

TECHNICAL SKILLS

Cloud Technologies: Azure, AWS, Google Cloud, OpenStack

Infrastructure Management Tools: Terraform, ARM Templates, CloudFormation

Containerization: Docker, Docker Swarm, Kubernetes

CI/CD Tools: Jenkins, Azure DevOps

Configuration Management Tools: Ansible, Chef, Puppet

Version Control Tools: GIT, GitLab Bitbucket, SVN, TFS

Scripting Languages: Python, Ruby, JSON, YAML, Bash shell, Power shell

Monitoring Tools: Splunk, Nagios, ELK, App Dynamics, Cloud Watch

Virtualization Technologies: VMware, Windows Hyper-V, Virtual box, Vagrant

Operating Systems: Ubuntu, CentOS, RedHat Linux, Windows.

Databases: MySQL, MS Access, NoSQL (MongoDB, DynamoDB)

Web Servers: Apache HTTP 3.x, Apache Tomcat, Nginx

Build Tools: Maven, Ant, Gradle

Bug Tracking Tools: JIRA, Service Now

Repository Management: JFrog, Nexus, Artifactory

PROFESSIONAL EXPERIENCE

Sr. Azure Cloud Platform Engineer

Confidential, Chicago

Responsibilities:

  • Experienced in designing Azure cloud models for establishing secure and cross-premise connectivity with Azure VPN Gateway and Content Delivery Network.
  • Creating and Managing Virtual Machines in Windows Azure and setting up communication with the help of Endpoints. Configured Shared Access Signature (SAS) tokens and Storage Access Policies in Azure Cloud Infrastructure.
  • Conducted security audits and assessments to evaluate compliance with regulatory requirements, such as GDPR, HIPAA, or PCI DSS, and implemented necessary controls to ensure adherence to these standards.
  • In-depth knowledge of storage area networks (SAN) and network-attached storage (NAS) solutions, including configuring and managing LUNs, RAID arrays, and iSCSI Storage.
  • Experienced in Azure RM Provider version upgrade from and fixed deprecated resources to take advantage of the latest features and improvements ensuring minimal impact on existing services and applications.
  • Contributed to the consolidation of all release pipelines into a single release pipeline in AZURE DevOps, by integrating Key Vault, managing keys by generating them, and associating them to libraries and Variable Groups.
  • Led incident response efforts during security incidents, including investigating and containing security breaches, coordinating with cross-functional teams, and implementing corrective actions to prevent similar incidents in the future.
  • Led incident response efforts during security incidents, including investigating and containing security breaches, coordinating with cross-functional teams, and implementing corrective actions to prevent similar incidents in the future.
  • Acted as Build and Release engineer, deployed the services by VSTS (Azure DevOps) pipeline. Created and Maintained pipelines to manage the IAC for all the applications.
  • Used Azure Migrate Service for discovery and assessment of on-prime Infrastructure and to replicate it in Azure Cloud.
  • Experience in Private Cloud and Hybrid cloud configurations, patterns, and practices in Windows Azure and SQL Azure and in Azure web and database deployments.
  • Implementedgreenfield project leveragingDockerandAzure Kubernetes Service (AKS)for use, including configuration standards, implementing infrastructure with secure networking, andCI/CDpipelines.
  • UsedAzure KubernetesServiceto deploy a managedKubernetescluster inAzure.
  • Implemented HTTPS Ingress controller and use TLS certificate on AKS to provide reverse proxy, configurable traffic routing for individual Kubernetes services.
  • Experienced in OpenShift platform in managing Docker Containers, Kubernetes Clusters, and Mesos and implemented a production ready, load balanced, highly available, fault tolerant Kubernetes infrastructure and created AZDO jobs to deploy applications to Kubernetes Cluster.
  • Designed strategies for optimizing all aspect of the continuous Integration, Release and Deployment processes using Container and Virtualization techniques like Docker and Kubernetes.
  • Evaluated Kubernetes for Docker container orchestration and managed Kubernetes charts using Helm and created reproducible builds of the Kubernetes applications, templatize Kubernetes manifests, provide a set of configuration parameters to customize the deployment and Managed releases of Helm packages.
  • Used Terraform to Setup infrastructure in PCF and Azure Environments. Converted existing Terraform modules that had version conflicts to utilize cloud formation during Terraform deployments to enable more control or missing capabilities.
  • Implemented Terraform modules for deployment of applications across multiple cloud providers.
  • Experienced in converting the existing Terraform modules with version conflicts to utilize cloud formation during Terraform deployments and integrate various Terraform templates to create infrastructure for various applications.
  • Developed and troubleshooted Terraform Enterprise modules and templates for Azure services including VMs, storage accounts, networks, and security groups.
  • Implemented automated infrastructure provisioning and management using Terraform, integrating with version control, testing frameworks, and CI/CD pipelines, resulting in increased efficiency and reliability in the infrastructure deployment process.
  • Worked on Azure Monitoring tools like Azure Log Analytics, Azure Network watcher, Azure Service Health to diagnose issues and minimize service degradation.
  • Demonstrated strong collaborative skills, working effectively with cross-functional teams, following DevOps practices, and utilizing version control systems like Git to manage Terraform configurations, ensuring smooth collaboration and efficient infrastructure management.
  • Used Prometheus as a monitoring and visualization tool to monitor Kubernetes nodes with node-exporter and monitor Kubernetes API and resources with Kube-state-metrics.
  • Configured Azure Monitor services, such as Log Analytics dashboards, for evaluating log performance metrics by querying logs and storing the results for later use.

Sr. Azure DevOps Cloud Engineer

Confidential, Atlanta

Responsibilities:

  • Experience inanalyzingthe Data from different sourcing using Big Data Solution by implementing Azure Data Factory, Azure Data Lake, Azure Data Lake Analytics (U-SQL), HD Insights, PIG, Hive, Sqoop, Azure Machine Learning.
  • Successfully led the migration of a large-scale enterprise application to AWS, resulting in improved Scalability, Reliability and Cost-Effectiveness.
  • Collaborated with AWS Solution Architects to identify and implement new Cloud Services and features to enhance Windows 10 Performance and Management.
  • Led implementation of DevSecOps practices, integrating security into the development and operations lifecycle to ensure secure and compliant software delivery.
  • Designed and implemented a comprehensive AWS migration strategy, including a detailed inventory analysis, application mapping, and risk assessment.
  • Creating Storage Pool and Stripping of Disk for Azure Virtual Machines, Backup Configure and Restore Azure Virtual Machine using Azure Backup.
  • Seasoned in Configuring Azure Automation Desired State Configuration (DSC) configuration management to assign permissions through Role-Based Access Control (RBAC), assign nodes to proper automation accounts and DSC configurations, to get alerted on any changes made to nodes and their configuration.
  • Experienced in upgrading terraform version from 1.2.9 to 1.3.6 as a part of this version upgrade fixed the deprecated fields like Microsoft Graph.
  • Expert in writing Azure Resource Manager (ARM) Template to deploy multiple resources and extensive experience in designing custom build steps using PowerShell scripts and ARM templates to automate the provisioning and deployment process.
  • Used Azure Migrate Service for discovery and assessment of on-prime Infrastructure and to replicate it in Azure Cloud.
  • Designed, implemented, and maintained the infrastructure as code (IAC) using Terraform Enterprise to automate the deployment and management of cloud resources in Azure.
  • Implemented Azure DevOps services for Continuous Integration, Continuous Delivery, Deployment, and Monitoring Activities include Build Issues, Deployment Issues for multiple releases like Maintenance Release, Enhancement Release, Bug Fixes, Emergency Releases.
  • Experienced in Azure Backup, Azure Policies, Azure Key Vault, Salt Stack and Tagging.
  • Experienced in MS Azure Cloud Architecture (MS Azure Pack (Private Cloud), Pas andlaaS) assessments.
  • Worked on Serverless Services, created and configured HTTP Triggers in the Azure Functions with application insights for Monitoring and performing load testing on the applications using the Visual Studio Team Services (VSTS) also called as Azure DevOps Services.
  • Configured applications that run multi-container Docker applications by utilizing the Docker-Compose tool which uses a file configured in YAML format and used Kubernetes to manage containerized applications using its nodes, Config-Maps, selector, Services and deployed application containers as Pods.
  • Proficient in performing Continuous Delivery in a Microservice infrastructure with Amazon cloud, Docker and Kubernetes. Container management using Docker by writing Docker files and set up the automated build on Docker HUB.
  • Deployment of Cloud Service including AZDO and Nexus on Docker using Terraform.
  • Implemented a Continuous Delivery pipeline with Docker, AZDO and GitHub. Whenever there is a change in GITHUB, our Continuous Integration server automatically attempts to build a new Docker container from it.
  • Leveraged Terraform Enterprise workspaces to manage multiple environments (e.g., development, staging, production), applied policy checks, and automated workflows for infrastructure provisioning, deployment, and management.
  • Worked extensively on Terraform Modules to automate the Azure IaaS virtual machines using Terraform modules and deployed virtual machine scale sets in the production environment.
  • Implemented security best practices in Terraform, including managing sensitive data using secure variables, implementing appropriate authentication and authorization mechanisms, and following least privilege principles to ensure secure infrastructure provisioning.
  • Using Terraform, I deployed the infrastructure that was necessary to formulate the Development Environment, Test Environment, and Production Environment.Kubernetes.
  • Built a complete custom Azure Cloud infrastructure by using Terraform modules, which resulted in increased efficiency in our projects.
  • Worked in Implementing Ansible and Ansible Tower as Configuration management tool, to automate repetitive tasks, quickly deploys critical applications, and proactively manage change by writing Python code by using Ansible Python API to automate Cloud Deployment Process.
  • Worked with Ansible versions 1.8 & 2.0, Tower version 2.1 and in writing Python modules for Ansible customizations.
  • Configured Azure Monitor services, such as Log Analytics dashboards, for evaluating log performance metrics by querying logs and storing the results for later use.

Site Reliability Engineer

Confidential, St Louis

Responsibilities:

  • Setup and build AWS infrastructure various resources, VPC EC2, S3, IAM, EBS, Security Group, Auto Scaling, and RDS in Cloud Formation JSON templates.
  • Developed strategy to migrate Dev/Test/Production from an enterprise VMware infrastructure to the IaaS Amazon Web Services (AWS) Cloud environment including runbook processes and procedures.
  • Expertise in creating an AWS Virtual Private Cloud (VPC) with multiple subnets and deployed application and database servers with different Security Groups, N/W ACLs, NAT Gateways to serve the purpose of security.
  • Containerized legacy Java and Nodejs application and run it in AWS Elastic Kubernetes Service. Auto-scaled the application in both pods level and instance level.
  • Leveraged AWS cloud services such as EC2, Auto-scaling and VPC to build secure, highly scalable and flexible systems that handled expected and unexpected load bursts.
  • Administered various AWS services using AWS console, AWS CLI and using Amazon API (Boto SDK) using python.
  • Worked on Custom Domain, Record Sets, DNS health checks to route the traffic byAmazon Route53for applications hosted inAWSEnvironment and managing users and groups usingAWS IAM.
  • Worked on Auto scaling, AWS Elastic Beanstalk (app deployments), Amazon S3 (storage) and Amazon EBS (persistent disk storage).
  • Created several Terraform scripts to build the infrastructure in cloud environment and configured it using Chef Cookbooks.
  • Provisioned the highly available EC2 Instances using Terraform and cloud formation and wrote new plugins to support new functionality in Terraform.
  • Used Terraform for building, changing, and versioning Microsoft Azure infrastructure safely and efficiently.
  • Involved in setting up Terraform continuous build integration system.
  • Configured and administered Jenkins for automated builds Responsible for installing Jenkins master and slave nodes.
  • Developed and maintained automated CI/CD pipeline for code deployment using Jenkins.
  • Used Jenkins as Continuous Integration tool: creating new jobs, managing required plug-ins, build trigger, build system and post build actions, scheduled automation builds.
  • Extensively worked on Jenkins and Hudson for CI (Continuous Integration) and CD (Continuous Deployment) methodologies and for End-to-End automation for all build and deployments.

DevOps Engineer

Confidential, Texas

Responsibilities:

  • Integrated Docker container-based test infrastructure to Jenkins CI/CD test flow and executed build environment by integrating with GitLab and Jira to trigger builds using Webhooks and Slave Machines.
  • Set up Jenkins server and built jobs to provide continuous automated builds based on polling the GIT SCM during the day and periodically scheduled the builds overnight to support development.
  • Carried automated Deployments and builds on various environments using continuous integration (CI) tool Jenkins. Used Git for source code version control and integrated with Jenkins for CI/CD pipeline, code quality tracking and user management with build tools Maven and Ant.
  • Extensively worked on Jenkins CI/CD pipeline jobs for end-to-end automation to build, test and deliver artifacts and troubleshoot the build issue during the Jenkins build process.
  • Implemented security controls aligned with industry standards such as OWASP Top Ten Project, NIST Cybersecurity Framework, or CIS Critical Security Controls, to ensure compliance with regulatory requirements and industry best practices.
  • Implemented the automated Nagios in Ops environment for alerts & email notifications using Python script & executed them through Ansible.
  • Experience in writing Ansible playbooks for installing WebLogic/tomcat application, deployment of WAR, JAR, and EAR files across all the environments.

Build & Release Engineer

Confidential

Responsibilities:

  • Implemented continuous integration using Jenkins and configured various plugins GIT, Maven, SonarQube, and Nexus. Installed and administered Artifactory repository to deploy the artifacts generated by Maven and to store the dependent jars which are used during the build.
  • Created Jenkins pipelines involving several Downstream/Upstream job configurations based on dependencies from other applications & based on Release methodologies. Version control system and project management on Git and JIRA.
  • Installing RedHat Linux using kickstart and applying security policies for hardening the server based on the company policies.
  • Used RPMs to install, update, verify, query and erase packages from Linux Servers.
  • Installed and configured Linux servers, as well as support for a variety of applications, followed by performance optimization, patching, and maintenance on Linux.

System Administrator

Confidential

Responsibilities:

  • Having strong and progressive experience in the server installation and administration of Red Hat Linux, Kali Linux, Debian, Centos, OEL (Oracle Enterprise Linux), SUSE and VMware vSphere ESX & ESXI, Microsoft Hyper-V, Windows Server on various Hardware Platforms.
  • Installation, Configuration of NFS, DNS, SAMBA, and deservers in RedHat, Debian, and Ubuntu Linux Servers. Configured and managedSELinux(Linux Firewalls) and allowed appropriate ports with help of ip tables.
  • Experience in System Administration working on Red Hat Linux, Ubuntu, Solaris, Unix, CentOS, Fedora, OEL, Windows environments, VMwareVSphere.
  • Worked on setting up Linux servers for Oracle Real Application Clusters and configuring SAN based mount points and Perform day to day Linux administration such as user accounts, logon scripts, directory services, file system shares, permissions.

We'd love your feedback!