Cloud Devops Engineer Resume
SUMMARY
- 9 years of experience as a Linux Administrator and DevOps Engineer with reputed companies working on tools like AWS, Jenkins, Puppet, Chef, Ansible, Ansible Tower on Linux distributions.
- Solid experience working with Amazon Web Services (AWS) products like EC2, Amazon Elastic Beanstalk, AWS Lambda, Route 53, VPC, Elastic Cache, ELB, S3, Glacier, Elastic Block Store, Redis, DynamoDB, Amazon RDS, Cloud Formation, CodeDeploy, CloudWatch, Amazon IAM, SES, SQS, Security GroupsandSNS.
- Hands on experience with Jenkins - CI/CD concepts, jobs, builds, pipelines, triggering, KPIs/ metrics, SCM, testing, notifiers, distributed builds, plugins, Rest API, artifacts, configuration management tools like Ansible, Chef, Puppet,etc. CD best practices like distributed builds, containerization, traceability, high availability and auto repository builds.
- Experience with installation, configuration and maintenance in CI technologies like Jenkins/Hudson performing end to end automation for builds and deployments.
- Chef experience with workflow, infrastructure automation, cookbooks, installation, DK tools, test kitchen, troubleshooting, cookbook development and deployment, extending Ohia, knife plugins and Chef API.
- VMware installation and operations of P2Vand VMware Virtual Center on Dell PowerEdge 320 ensuring uptime for critical systems and applications, manage components of DevOps Configuration Management by Jenkins, Nexus, GitLab etc.
- Hands on experience on source control tools like IBM Clear Case, Perforce, Tortoise SVN, CVS and GIThaving worked on branching, merging and tagging strategies.
- Manage development and test infrastructure evolving Jenkins on branch management based on version control and build retention.
- Experience in working over Apache Spark, Kafka, Hadoop, Cassandra under the environment of Apache Mesos. Also used Apache Oozie and Airflow.
- Contributed to a method with Confidential Packer to test new AWS AMIs before promoting it into production .
- Artifact deployment by use of MAVEN and ANT as build tools.
- Experience with Virtualization and Open Source technologies like VMware, OpenStack, CloudStack, Microsoft Hyper-V.
- Experience designing, integrating, and managing complex infrastructure solutions (e.g. VMware, Citrix, Multi-Cloud, Hybrid Computing, etc.).
- Worked on performance monitoring tools like New Relic .
- Experience in designing and implementing Cloud Automation and orchestration framework in private/public cloud environments involving AWS APIs, OpenStack, VMWare, Chef, Puppet, Python, Ruby, Azure APIs and Workflow Engine.
- DesignedAnsible Playbooks for zero-downtime installation, upgrade, downgrade, and uninstall processes with MySql and Redis.
- Experienced with Ansible, and used to deploy the applications and systems.
- Container based architecture and deployments (Docker, Ansible, etc.).
- Experience with Nagios, Cloud Watch and Splunk as IT Infrastructure Monitoring tool.
- Proven abilities in System Administrationwith Linux (RHEL 5x/6x/7x, CentOS 6/7 and Ubuntu) environment responsible for Operations, Infrastructure Support and Maintenance through provisioning backups, archives, security monitoring, integrity and availability of hardware and server resources, monitoring and creating scheduled jobs, troubleshooting, server builds and installations, migration, patches, backup, continuity process and monitoring performance.
- Setup test environment for patches and hotfixes and implement the patch for application testing and staged deployment.
TECHNICAL SKILLS
Hardware / Platforms: HP-UX, AIX, SunOS, Ubuntu, RedHat EL and Windows
Version Control Tools: GIT-STASH,Subversion, UCM ClearCase, Harvest Release 12, and TFS 2010
Programming /Scripting Languages: Shell Scripting, PERL Scripting, Python, Groovy, PHP, and SQL
Change Management & Defect Tracking Tools: HP ALM, IBM Rational ClearQuest, BMC Remedy 7, Jira
Monitoring Tools: Grafana, Splunk, Kibana
Build Management Tools: Maven, Ant and MS Build
CI/CD Tools: Jenkins, Hudson, TeamCityand Bamboo
DevOps Tools: Ansible, Artifactory, Jenkins, Docker, Docker Swarm, Chef, Nagios, Git, GitHub, Splunk, Gradle, Vagrant, Puppet, Kubernetes, Open Source Tripwire & Bamboo
Application Server: Apache Tomcat, Apache Geronimo, JBoss Enterprise & IBM WebSphere
Cloud Platforms: Amazon Web Services (AWS), Azure and PCF
PROFESSIONAL EXPERIENCE
Confidential
Cloud DevOps Engineer
Responsibilities:
- Involved in Implementation of various AWS cloud Applications & deployment using Amazon EC2, S3, RDS(MySQL), Elasticload balancing, Autoscaling, Cloud Front, Elastic Cache, ElasticBlockStorage, Elastic Beanstalk, Cloud Watch, Identity Access Management, Implementing Virtual cloud platforms using Amazon Virtual Private Cloud.
- Setup and build AWS infrastructure withvarious resources: VPCEC2, S3, IAM, EBS, Security Group, Auto Scaling, and RDS in Cloud FormationJSON templates.
- Involved in developing different environments like Dev, Test, Staging and Production on AWS byprovisioning Kubernetes clusters on EC2 instances using Jenkins, Docker, CloudFormation and Terraformfor CI/CD.
- Wrote Terraform scripts to automate AWS services which include ELB, ECR, ECS, Cloud Watch alarms, Lambdas, Database, Auto scaling, EC2, Cognito, Security groups, S3 bucket, API, VPC, SNS, SQS, Kinesis Firehose streams, System manger and IAM roles and policies .
- Developed Docker images to support Development and Testing Teams and their pipelines using Jenkins .
- Coordinate/assist developers with establishing and applying appropriate branching, labeling/naming conventions using GIT source control and analyzed and resolved conflicts related to merging of source code for GIT .
- Maintained Artifacts in binary repositories using JFrogArifactory and pushed new Artifacts by configuring the Jenkins Artifactory plugin .
- Configuration and Integration with Vault (HashiCorp) to store Database username/password, Azure secret keys etc.
- Used Microservice architecture with .NET based services interacting through a combination of RESTand leveraging AWS to build, test and deploy identity Microservices .
- Hands-on experience in networking, storage and database AWS services . Worked on Redshift/ Aurora for Database, Lambda functions for Querying Database, API Gateway to publish and Deploy application , S3 for file Storage and AWS Cognito for Authentication Services.
- Generated workflows through Apache Airflow, then Apache Oozie for scheduling the hadoop jobs which controls large data transformations.
- Monitoring AWS instances regularly using Cloudwatch and New Relic tools.
- Developed shell script for Vagrant (HashiCorp) to create and configure lightweight, reproducible, and portable development.
- Managing security groups on AWS and custom monitoring using cloud watch .
- Collaborate with cross-functional teams to implement Agile process workflow in Jira and documenting using Confluence.
- Developed Templates for AWS Infrastructure as a Code (IaC) using Terraform to build develop, testing, staging and production environments .
- Develop dashboards in Datadog, Splunk, Kibana,and Grafana that trigger alerts based on pre-defined thresholds.
- Extensively involved in IaC, execution plans, resource graph and change automation using Terraform.
- Automated backup of data in EBS and instance store to S3 buckets and created backup of AMI formission critical production servers from AWS CLI and used AWS Data pipeline to configure data loadsfrom S3 into Redshift .
- Setting up of resources which invokes/triggers Lambda function to run background tasks withresponse to the events created from Amazon S3 bucket resource .
- Experience in creating AWS AMI, have used Confidential corp Packer to create and manage the AMI's.
- Utilized CloudWatch to monitor resources such as EC2, CPU memory, Amazon to design highavailability applications on AWS across availability zones.
- Involved in building Docker images using Jenkins pipelines for microservice specific to the JFROG antifactory and implemented Spinnaker pipeline to deploy it to Azure Kubernetes cluster .
- Involved in implementing Amazon RDS multi-AZ for automatic failover and high availability at the database tierand optimized the configuration of Amazon Redshift clusters, data distribution, and data processing .
- Implemented a production ready, load balanced, highly available, fault tolerant, auto scaling Kubernetes AWS infrastructure and microservice container orchestration .
- Involved in developing and maintaining Docker images for a tech stack including Cassandra, KAFKA and several inhouse written Java services running on Azure HD insights cluster .
- Created reproducible builds of the Kubernetes applications andmanaged Kubernetes manifest files .Scheduled, deployed and managed Container replicas onto a node cluster using Kubernetes .
- Worked on Serverless services, created and configured HTTP Triggers in the Azure Functions with application insights for monitoring and performing load testing on the applications using the Visual Studio Team Services (VSTS) also called as Azure DevOps Services.
- Created Azure Automation Assets, Graphical runbook, PowerShell runbook that will automate specific tasks, deployed Azure AD Connect, configuring Active Directory Federation Service (AD FS) authentication flow, ADFS installation using Azure AD Connect, and involved in administrative tasks that include Build, Design, Deploy of Azure environment.
- Configure Continuous Integration from source control, setting up build definition within Visual Studio Team Services (VSTS) and configure continuous delivery to automate the deployment of ASP.NET MVC applications to Azure web apps and managed Azure Active Directory, Office 365 and applied upgrades on a regular basis.
- Worked with Terraform Templates to automate the Azure Iaas virtual machines using terraform modules and deployed virtual machine scale sets in production environment.
- Managed Azure Infrastructure Azure Web Roles, Worker Roles, VM Role, Azure SQL, Azure Storage, Azure AD Licenses, Virtual Machine Backup and Recover from a Recovery Services Vault using Azure PowerShell and Azure Portal.
- Written Templates for Azure Infrastructure as code using Terraform to build staging and production environments. Integrated Azure Log Analytics with Azure VMs for monitoring the log files, store them and track metrics and used Terraform as a tool, Managed different infrastructure resources Cloud, VMware, and Docker containers.
Environment: GIT, Jenkins,Docker, JIRA, AWS, IAM, S3, cloud watch, Splunk, Apache, Confidential Corp Vault, Ansible, Chef, Groovy, Terraform, Windows, MYSQL, New Relic, Cloudwatch, Redis, Azure, Kubernetes, Bash, Confluence.
Confidential, Eagan, MN
Sr. DevOps Engineer
Responsibilities:
- Involved in Creating Ansible playbooks for various automation purpose, file copy, permission changes, configuration changes, path specific folder creation.
- Build files using Ansible and combine them to form clean, reusable abstractions.
- Migrated over 80% of VMWAREVMs to AWS and Managed Services like EC2, S3 Bucket, Route53, ELB, EBS etc. with Ansible Playbooks.
- Accomplished high Availability and disaster recovery work with PostgreSQL and worked with VM, Docker, container solutions, PaaS solutions like Cloud Foundry .
- Maintained the user accounts (IAM), RDS, Route 53, VPC, RDB, DynamoDB, SES, SQS and SNS services in AWS cloud.
- Automated deployment templates for relational and NoSQL databases in AWS. Deployed web applications and services developed in Java, PHP, Node.js, on web servers like Apache using AWS Beanstalk.
- Created Micro services applications with integrations to AWS services by using Amazon EKS, while providing access to the full suite of Kubernetes functionality.
- Secured Data is stored in MySQL. Vault (by HashiCorp) secures, stores and tightly controls access tokens and passwords used by the overall platform, started in the AWS cloud and currently integrates with several services like: AWS AIM, Amazon DynamoDB, Amazon SNS, Amazon RDS.
- Managing Pivotal Cloud Foundry (PCF), applying patches, upgrading PCF 1.6 to next versions
- Managed Kubernetes charts using Helm. Created reproducible builds of the Kubernetes applications, managed Kubernetes manifest files and managed releases of Helm packages.
- Worked with Pivotal Cloud Foundry (PCF) Architecture (Diego Architecture), PCF components and their functionalities. Experienced in using Pivotal Cloud Foundry (PCF) CLI for deploying applications and other Cloud Foundry (CF) management activities.
- Develop dashboards in Datadog, Splunk, Kibana,and Grafana that trigger alerts based on pre-defined thresholds.
- Built internal secret store with Confidential Corp Vault, integrated with chef cookbook and other code, automated the application secret management process also worked on Confidential Corp Vault secret management tool to provide security for credentials, tokens, and API Keys.
- Support for all other AWS products such as RDS, Route53 (DNS), Cloud Trail, Elastic cache, Lambda and AmazonKinesis.
- Created monitors, alarms and notifications for EC2 hosts using Cloud Watch. Deploy and monitor scalable infrastructure on Amazon web services (AWS)& configuration management using Chef and Ansible.
- Managed AWS infrastructure as code using Terraform , Expertise in writing new plugins to support new functionality in Terraform .
- Collaborate in the automation of AWS infrastructure via terraform and Jenkins - software and services configuration via Chef and Ansible.
- Implanted a continuous Delivery pipeline with Docker, Jenkins and GitHub. Whenever a new GitHub branch gets started, Jenkins our continuous Integration server, automatically attempts to build a new Docker container from it.
- Built a new CI pipeline, Testing and deployment automation with Docker, Jenkins and Ansible. Integrating Sonarqube in the CI pipeline for code coverage reports and sonar metrics. Integrating Sonarqube in the CI pipeline to analyze code quality and obtain combined code coverage reports after performing static and dynamic analysis.
- Build and Maintained Docker container clusters managed by Kubernetes on GCP. Utilized Kubernetes and Docker for the runtime environment of the CI/CD system to build, test deploy.
- Planning, deploying, monitoring, and maintaining Amazon AWS cloud infrastructure consisting of multiple EC2 nodes and VMWareVM's as required in the environment.
- Worked on AWS Cloud platform and its features which includes EC2, VPC, EBS, AMI, SNS, RDS, EBS, Cloud Watch, Cloud Trail, Cloud Formation AWS Config, Auto scaling, Cloud Front, IAM.
- Utilize AWSCLI to automate backups of ephemeral data-stores to S3 buckets, EBS and create nightly AMIs for mission critical production servers as backups.
- Maintained the user accounts (IAM), RDS, Route 53, VPC, RDB, DynamoDB, SES, SQS and SNS services in AWS cloud.
- Installed and Administrated CI/CD tools like Jenkins for managing weekly Build, Test and Deploy chain, GIT with Dev/Test/Prod Branching Model for weekly releases.
- Experience in container technologies Docker, Vagrant, Kubernetes, and Virtualization Technologies Virtual Box, VMWare, Cloud Foundry .
- Developed build and deployment scripts using apache Maven as build tool in Jenkins to move from one environment to other environments and automated builds using Maven and Ant for creation of build artifacts like war or ear files.
- Defined AWS SecurityGroups which acted as virtual firewalls that controlled the traffic allowed to reach one or more AWS EC2 instances.
- Implemented and designed AWS virtual servers by Ansible roles to ensure deployment of web applications.
Environment: Subversion, GIT, Jenkins, ANT, MAVEN, JIRA, AWS, Apache, New Relic, Cloudwatch, Ansible, Confidential Corp Vault, Chef, Tomcat, Red hat, Linux, Perl Scripts, Shell scripts, SonarQube, MYSQL, Redis, Docker, Kubernetes, Bash.
Confidential, Boston,MA
DevOps Engineer/Build Release Engineer
Responsibilities:
- Launching Amazon EC2 Cloud Instances using Amazon Web Services (Linux/ Ubuntu/RHEL) and Configuring launched instances with respect to specific applications.
- Worked and Used Pivotal Cloud Foundry (PCF) for application deployment be developing Jenkins build jobs.
- Responsible for managing infrastructure provisioning (S3, ELB, EC2, RDS, Route 53, IAM, security groups - CIDR’s, VCP, NAT) and deployment via SCALR and EC2 Installs with CentOS, Ubuntu and RHEL 6 and Scientific Linux.
- Involved in maintaining the user accounts (IAM), RDS, Route 53, VPC, RDB, Dynamo DB, SES, SQS and SNS services template.
- Worked on Auto scaling, Cloud watch(monitoring), AWS Elastic Beanstalk (app deployments), AWS Elastic Cache, Amazon S3(storage) and Amazon EBS (persistent disk storage).
- Implemented and maintained the monitoring and alerting of production and corporate servers/storage using AWS Cloud watch .
- Created the AWS VPC network for the Installed Instances and configured the Security Groups and Elastic IP's accordingly. Installing the Load Balancers and VPC with Public and private subnets.
- Designing out and implementation of Terraform and Pivotal Cloud Foundry within Amazon Web Services.
- Deploy and configure Git repositories with branching, forks, tagging, and notifications. Experience and proficient in deploying and administering GitHub.
- Created cookbooks to automate the configuration setups. Established Chef best practices approaches to system deployment and managing Chef Cookbook as a unit of software deployment and independently version controlled.
- Implementing a CI/CD (Continuous Integration /Continuous Delivery) framework using Jenkins, Maven& Artifactory in Linux environment and Integration of Maven/Nexus, Jenkins, Git, Confluence, Jira and Cloud Foundry.
- Experience in building new application and deployment through ANSIBLE and managing them in production environment.
- Developed Python career path through professional development while working on Python projects.
- Analyzed frequently occurring system breaks and automated fixes in Python/UNIX.
- Wrote Ansible playbooks to launch AWS instances and used Ansible to manage web applications, configuration files, used mount points and packages and Worked on playbooks for Ansible in YAML scripting.
- Completely responsible for automated infrastructure provisioning (Windows and Linux) using Ansible Scripts. Responsible for automated deployment of Java application in Tomcat Server using Ansible scripts.
- Responsible for automated identification of application server and database server using Ansible scripts.
- Virtualized the servers using the Docker for the test environments and dev-environments needs. And also, configuration automation using Docker containers .
- Hands on experience in using tools like Docker Compose, Kubernetes, etc. for orchestrating, linking and deploying the services related to the containers.
- Experience with container-based deployments using Docker , working with Docker images, Docker hub .
- Created additional Docker, Slave Nodes for Jenkins using custom Docker, Images and pulled them to ECR . Worked on all major components of Docker , like, Docker, Daemon, Hub, Images, Registry and Swarm etc.
- Worked with Kubernetes as It usually works with the Docker container tool and coordinates between a wide cluster of hosts running Docker.
- Container clustering with Docker Mesos/Kubernetes. implementing and Managing Docker and Kubernetes infrastructure.
- Created, maintained and customized complex JIRA project configurations including workflows, custom fields, permissions and notifications.
- Worked with various scripting languages like Bash, Perl, Shell, Ruby, PHP and Python .
Environment: Amazon Web Services, IAM, S3, cloud watch, ANT, Maven, GitHub, Ansible, Chef,Bigdata, Hadoop, Hive, Docker, Java, Agile, Apache HTTPD, Apache Tomcat, Bash, Shell, Perl, Python, PHP, Ruby.