We provide IT Staff Augmentation Services!

Azure/ Devops Engineer Resume

3.00/5 (Submit Your Rating)

SUMMARY

  • Over 9 years of IT Experience in Linux Administration, Release Engineer, Multi Cloud/DevOps EngineerwithConfiguration Management, Continuous Integration& Continuous Deployment on Cloud,and On Premises.
  • Automated the build & deployments for many applications from end - to-end using CICD strategies with various DevOps tools and technologies.
  • Expertise in working as Release Engineer on Multi data center project for successfully migrating150+ active Critical Dependency Production applications into secondary data center and perform theshakeout strategies.
  • Experienced in core Azure and AWS services (Azure- Repo, Pipeline, Artifacts, AWS - Developer Tools,CFT, R53, VPC, S3, EC2, ELB, EBS, lambda, Auto-Scaling), deployment services (Elastic Beanstalk,Cloud Formation, Terraform) and security practices (Azure AD,VNet, Resource Manager, AWS IAM, VPC, CloudWatch and CloudTrail).
  • Expertise in DevOps, Release engineering, Configuration management, Deployment Automation, Cloud Infrastructure, Automation with Agile methodologies which incorporates Microsoft Azure,Amazon Web Services (AWS), ANT, Maven, Ansible, Chef, Jenkins, GitLab, SVN, GitHub, Tomcat, JBOSS, WebLogic, Linux and so forth.
  • Hands on experience with Docker containers and Kubernetes clusters with its configuration based on requirements and maintaining the Docker hub for container images.
  • Engaging with Enterprise Shared Services which are dependent on multiple applications and come up with the strategies to implement it for production environment setup and synchronization with multiple data centers.

TECHNICAL SKILLS

Software Build Tools: Ant v1.9, Maven v3.0.3, Nexus Repository Manager v2.14, Nexus IQ Server v1.38

Version & Release Control Systems: SVN 1.8, GIT 2.12& BitBucket v4.13, Gitlab

Config. Management Tools: Ansible, Chef,Puppet 2016.2.x, Chef 12.4.x

Cloud & Containers: AWS - EC2, S3, Beanstalk, Lambda, ECR,CodeCommit, Code Pipeline, IAM, VPC, CFT, Cloud Watch, Auto Scaling, Route 53, Azure - Storage, DevOps, Migrate, Google - Cloud Code, Cloud Build, Cloud IAM, Cloud Storage, Terraform, Docker & Kubernetes

CICD Tools: Jenkins 2.x/Hudson 3.2, IBM Clear Quest 8.0.1, IBM UCD, Bamboo 5.1x, U-Deploy, Azure Pipelines

Web & Middleware Services: JBOSS AS 7.1/EAP 6.3, Apache 2.2/4, IBM WebSphere 6.x/7, Nginx 1.12/13, Tomcat 8.x/9, WebLogic 11g/12cR1/R2, VMware ESXi 6.x

Backup Management: SolarWinds, VERITAS Netback, EMC Avamar, Solstice Disk Suite

DB Technologies: Oracle 12c, DB2, Sybase, SQL, Postgres, NoSQL, Mango DB, Cassandra

Reporting & Ticketing Tools: JIRA v7.3.1, Bugzilla v4.4, Confluence v5.8, Service Now, HPQC, Azure DevOps

Operating Systems: RHEL v6.x/7.x, Ubuntu v13.x/14.1, Cent OS v5.x/6.x, Windows 2003/XP/8.1/10

Business Management: Tableau, iTIL v3 Foundation, Agile Methodology

SDK & Monitoring Tools: JDK SE v8/9/10, Nagios v4.2.x/3.x, Splunk v6.x/7.x

Languages: Java,Shell Scripting, Python

PROFESSIONAL EXPERIENCE

Confidential

Azure/ DevOps Engineer

Responsibilities:

  • Created Azure Automation Assets, Graphical runbook, PowerShell runbook that will automate specific tasks, deployed Azure AD Connect, configuring Active Directory Federation Service (AD FS) authentication flow, ADFS installation using Azure AD Connect, and involved in administrative tasks that include Build, Design, Deploy of Azure environment.
  • Configure Continuous Integration from source control, setting up build definition within Visual Studio Team Services (VSTS) and configure continuous delivery to automate the deployment of ASP.NET MVC applications to Azure web apps and managed Azure Active Directory, Office 365 and applied upgrades on a regular basis.
  • Managed Azure Infrastructure Azure Web Roles, Worker Roles, VM Role, Azure SQL, Azure Storage, Azure AD Licenses, Virtual Machine Backup and Recover from a Recovery Services Vault using Azure PowerShell and Azure Portal.
  • Written Templates for Azure Infrastructure as code using Terraform to build staging and production environments. Integrated Azure Log Analytics with Azure VMs for monitoring the log files, store them and track metrics and used Terraform as a tool, Managed different infrastructure resources Cloud, VMware, and Docker containers. extensively involved in infrastructure as code, execution plans, resource graph & change automation using Terraform.
  • Automate Datadog Dashboards with the stack through Terraform Scripts.
  • Extensively worked on configuration management tool Ansible.
  • Using Ansible created multiple playbooks for machine creations and SQL server, cluster server and my SQL installations.
  • Used Ansible to Setup/teardown of ELK stack (Elasticsearch, Log stash, Kibana) and troubleshoot the build issues with ELK and work towards the solution.
  • Written Ansible handlers with multiple tasks to trigger multiple handlers and to decouple handlers from their names, making it easier to share handlers among Playbooks and Roles.
  • Building/Maintaining Docker container clusters managed by Kubernetes Linux, Bash, GIT, Docker, on GCP (Google Cloud Platform). Utilized Kubernetes and Docker for the runtime environment of the CI/CD system to build, test deploy.
  • Involved in development of test environment on Docker containers and configuring the Docker containers using Kubernetes.
  • Managed Kubernetes charts using Helm. Created reproducible builds of the Kubernetes applications, managed Kubernetes manifest files and Managed releases of Helm packages
  • Worked on OpenShift for container orchestration with Kubernetes container storage, automation to enhance container platform multi-tenancy also worked on with Kubernetes architecture and design troubleshooting issues and multi-regional deployment models and patterns for large-scale applications.
  • Deploying windows Kubernetes (K8s) cluster with Azure Container Service (ACS) from Azure CLI and Utilized Kubernetes and Docker for the runtime environment of the CI/CD system to build, test and Octopus Deploy.
  • Responsible for managing and supporting Continuous Integration (CI) using Jenkins
  • Responsible for Administering and maintaining Jenkins and Jenkins slaves on windows and Linux (Debian/Ubuntu). Created many Jenkins slaves and setup jobs on master to run on slaves.
  • Used Jenkins pipelines to drive all micro services builds out to the Docker registry and then deployed to Kubernetes, Created Pods and managed using Kubernetes
  • Branching, Tagging, Release Activities on Version Control Tools: SVN, GIT.
  • Developed build and deployment scripts using Maven as build tools in Jenkins to move from one environment to other environments.
  • Create A SPLUNK search processing Language (SPL) queries, reports and dashboards.
  • Monitored and tracked SPLUNK performance problems, administrations and open tickets with SPLUNK.
  • Automate the processes using PowerShell and windows command shell.
  • Installed, configured, and maintained Oracle 10g and 11gR2.
  • Used SonarCube in order to review the code efficiently.
  • Worked with various PCF components like OAuth2 server, login server to provide identity management & Cloud Controller to configure deployment of applications. Worked with Blobstore for storing and managing Application code packages, Build packs.
  • Implemented Micro-services using PCF platform build upon Spring Boot Services. Managed the lifecycle of containers and processes running using Diego cell rep. Worked on PCF Dev to push and scale apps for debugging applications locally on a PCF deployment.

Environment: Azure, PCF,, Terraform, Maven, Jenkins, Ansible, Azure ARM, Azure AD, Azure Site Recovery, Kubernetes, Python, Ruby, XML, Shell Scripting, PowerShell, Nexus,, Jenkins, Git, GitHub, Ansible, Docker, Splunk, Oracle 11g, Windows Server, TFS, VSTS, LDAP.

Confidential

AWS/ DevOps Engineer

Responsibilities:

  • Worked in AWS environment, instrumental in utilizing Compute Services (EC2, ELB), Storage Services (S3, Glacier, Block Storage, Lifecycle Management policies), Cloud Formation (JSON Templates)
  • Migrated Linux environment to AWS by creating and executing a migration plan, deployed EC2 instances in VPC, configured security groups &NACL's, attached profiles and roles using AWS Cloud Formation templates and Ansible modules.
  • Used AWS Beanstalk for deploying and scaling web applications and services developed with Java, PHP, Node.js, Python & to perform application health checks. Integrated AWS Lambda with AWS DynamoDB to automatically respond to events in DynamoDB streams.
  • Used IAM to assign roles, to create and manage AWS users, groups, and permissions to use AWS resources.
  • Worked on implementing new OpenStack related functionality, creating and contributing patches to the OpenStack development tree
  • Scripting infrastructure and (Linux) machine provisioning using bash and the Python AWS- SDK.
  • Written Terraform scripts to automate AWS services which include ELB, CloudFront distribution, RDS, EC2, database security groups, Route 53, VPC, Subnets, Security Groups, and S3 Bucket and converted existing AWS infrastructure to AWS Lambda deployed via Terraform and AWS CloudFormation.
  • Implemented AWS Code Pipeline and Created Cloud formation JSON templates in Terraform for infrastructure as code
  • Utilized Ansible as configuration management tools to deploy consistent infrastructure across multiple environments.
  • Managed Ansible Playbooks with Ansible modules, implemented CD automation using Ansible, managing existing servers and automation of build/configuration of new servers.
  • Deploying and maintaining production environment using AWS EC2 instances and ECS with Docker.
  • Worked on creation of custom Docker container images, tagging and pushing the images. worked on the customized docker networks.
  • Created a Continuous Delivery process to include support building of Docker Images and publish into a private repository- Nexus v3
  • Managed local deployments in Kubernetes, creating local cluster and deploying application containers.
  • Utilized Kubernetes for the runtime environment of the CI/CD system to build, test deploy.
  • Used Jenkins pipelines to drive all micro services builds out to the Docker registry and then deployed to Kubernetes, Created Pods and managed using Kubernetes
  • Created Master-Slave configuration using existing Linux machines and EC2 instances to implement multiple parallel builds through a build farm, expertise in troubleshooting build and release job failures
  • Integrated Selenium automation regression test suite in Jenkins build pipeline.
  • Implemented continuous integration web hooks and workflows around Jenkins to automate the dev test deploy workflow
  • . Responsible for CI and CD using Jenkins, Maven and Ansible
  • Integrated SonarQube with Jenkins for continuous inspection of code quality and analysis with SonarQube scanner for Maven.
  • Worked on Amazon AWS EC2 cloud services for installing, configuring and troubleshooting on various Amazon images like Amazon Linux AMI, Redhat 4.x, 5. x.6.x,7.x, Ubuntu 12.x, 13.x, 14.x, 15.x. Created and managed multiple Instances of Apache Tomcat and deployed several test applications in those instances in QA environment.
  • Updating kernel & security patches in Amazon Linux environment, handling out of memory issues in Linux kernels during rebalance in Kafka cluster.
  • Installed and configured MySQL on Linux and Windows environments.

Environment: AWS, CloudFormation, OpenStack, Terraform, GIT, Maven, Ansible, Jenkins, Kubernetes, MYSQL, Docker, AWSAuto Scaling, Linux, Bash Shell Script, Python, Apache Tomcat

Confidential

AWS/DevOps Engineer

Responsibilities:

  • Handled the configuration of servers for specified applications on Amazon EC2 Cloud Servers using Linux Amazon Machine Images (AMI).
  • Wrote custom cookbooks for automating components that are not available in marketplace.
  • Delivered solutions to improve the CI/CD pipeline process, cloud architecture, deployment for AWS Private and Public Cloud and automate the agile methodologies.
  • Delivered support for many AWS Services like EC2, EBS, S3, Cloud Watch, Cloud Front, IAM, Security Groups, Auto-Scaling AWS CLI and Cloud Watch monitoring, creation and updating.
  • Operated on configuration management tool Chef for Continuous Delivery and rewritten recipes for new environments.
  • Automated weekly releases with ANT/Maven scripting to compile, debug Java code and placing builds into Nexus repository.
  • Integrated Chef cookbooks into Jenkins jobs for continuous delivery framework by writing Chef cookbooks and recipes to automate the deployment process.
  • Installed, configured and automated the Jenkins build jobs with AWS deployment pipelines using various plugins like Jenkins-EC2 plugin and Jenkins-Cloud Formation plugin.

Environment: AWS - EC2, S3, EBS, VPC, IAM, AWS CLI, Cloud Formation, CloudWatch, SVN,GIT, Jenkins, Chef, Ant, Maven, Nexus, Linux, Ruby, Perl, Shell Scripting, Python, JBOSS, WebLogic, Apache.

We'd love your feedback!