Cloud Security/aws Admin Resume
3.00/5 (Submit Your Rating)
SUMMARY
- Databases: Oracle and MySQLExcellent problem - solving, critical-thinking and analytical skills
- Over 8 years of experience in IT wif an emphasis on Cloud Security, Devops and IAM
- AWS Certified - Certified Solutions Architect (Associate)
- AWS Tools: EC2 (Security Groups, Load Balancers), S3, IAM, VPC, CloudTrail, RDS, Route53, CloudFront, Cognito, CloudWatch, AWS Backups, Cloud Endure, AMI’s, Workspaces, ClientVPN, EC2 Image Builder, SNS, KMS, AWS Inspector, Certificate Manager.
- Other Devops Tools: Docker (ECS), Kubernetes (EKS), Terraform, Ansible, Jenkins (CI/CD) and GitHub/Gitlab, Bitbucket
- Extensive experience in Shell Scripting: Bash and Python
- Excellent knowledge of Unix - Red Hat, CentOS, Ubuntu, Oracle Enterprise Linux
- Strong communication skills; verbal and written
- Ability to work well both on teams and independently wif minimal supervision
- US Work Status: TN Visa valid until Aug. 2022 (Canadian Citizen)
PROFESSIONAL EXPERIENCE
Confidential
Cloud Security/AWS Admin
Responsibilities:
- Extensive use of AWS Services: EC2, IAM, CloudWatch, S3, EFS, RDS, Route53, VPC, CloudFormation, Backups, Inspector, Guard Duty, Secrets Manager, Certificate Manager and Organization.
- Migrated on-prem data center to OCI/AWS through Infrastructure as Code (Terraform).
- Extensively used Docker and Kubernetes; created CI/CD pipelines using Jenkins.
- Worked extensively on AWS services for an external client.
- Provided new application and web server environments on containers using Docker Swarm.
- Implemented a production ready, load balanced, highly-available, and fault tolerant Docker infrastructure.
- Facilitated issues wif Development and Support; worked to automate manual tasks such as user creation, patching, backups, deploying apps and configuring servers.
- Setup networking - VPC, NAT instances, site to site VPN, Transit Gateway.
- Created AWS organizations - setup a security account which assumed roles from other accounts (Dev, UAT and Prod).
- Used Bitbucket/Gitlab for version control; reviewed team member’s code.
- Managed continuous integration and continuous deployment in Jenkins, created build jobs and end to end pipelines (build, test and deploy).
- Investigated and resolved highly complex and critical issues; performed root cause analysis.
- Established resolution action plans (patch application, configuration changes, and workarounds).
- Setup application log backups to S3.
Confidential, Stamford, CT
AWS Engineer
Responsibilities:
- Worked on an AWS infrastructure; migrated various application and servers, migrating from Data Center to AWS.
- Created and configured ELB and auto scaling groups to distribute traffic and to have a cost efficient, fault tolerant and highly available environment.
- Extensive experience on IAM, VPC (Creating subnets and IP's), EC2/AMI, CloudWatch, Backups, AMI’s, Backups,
- Extensive experience wif Python scripting.
- Installed Systems Manager, CloudWatch agents, decommissioned servers.
- Encrypted/Versioned S3 Buckets, RDS instances, updated nginx/TLS,
- Created IAM users, roles, groups through both the console and Terraform.
- Created S3 buckets for Storage and granted requested permissions through IAM; configured Security group for EC2.
- Server Migration from one AWS account to another.
- Lead triage activities along wif customer and internal stakeholders (engineering, product support, product management).
- AWS resource upgrade/downgrade according to usage/performance, taking AWS AMI every month as a part of disaster recovery.
- Integrated CloudWatch alerts wif Slack.
Confidential, San Antonio, TX
IAM/AWS Admin
Responsibilities:
- Worked on two projects: State of Ohio and California.
- Committed to 99.99% uptime of infrastructure/services.
- Administered systems wif appropriate scripting, coordinated administrative tasks & maintained development, testing & production environments.
- Deployed and maintained Linux systems & application in multiple clusters across data centers.
- Assisted wif implementation of system patches & updates managing upgrades.
- Used Ansible for automation and configuration management.
- Application logs backup to AWS S3 & fetched them on developer’s requirement.
- User management/permission, Infrastructure Security through security groups (AWS) & Firewalls, Infrastructure monitoring, cronjobs scheduling, Managing GitLab server.
- AWS resource upgrade/downgrade according to usage/performance, taking AWS AMI every month as a part of disaster recovery.
- Built an array of servers using customized kickstart and puppet scripts for deployment
- Analyzed software design and provided technical input, as well as, application demonstration, interface control documentation, and personnel training.
- Deployed RHEL 6.5 application templates to aid in quick rollouts of new servers.
Confidential, Austin, TX
AM Analyst
Responsibilities:
- Worked on Remedy to process requests and met SLA targets.
- Managed an Active Directory clean-up effort to remove disabled users/service accounts, mailboxes and distribution lists; investigated which accounts were not in use.
- Analyzed over 280 existing roles to determine role philosophy (through role mining) and structured entitlements based on a top down approach; implemented RBAC for onboarding and off boarding.
- Ensured processes adhered to NERC standards; met wif Audit and Compliance teams on a regular basis.
- Granted access to file shares, shared mailboxes and created distributions lists in Exchange.
- Mapped out processes in Visio to ensure efficiency of requests submitted.
- Assisted in the planning of choosing an IAM software, met wif vendors to determine which product would best suit our environment.
- Identified and diagnosed technical problems and performed restorative and maintenance actions to deliver services and maintain continuity of access at expected levels.
Confidential, Toronto, ON
Information Security Analyst
Responsibilities:
- Supported over 40 applications including Unitrax, CitiDirect, JP Morgan, BMO Harris, HSBC, etc.
- Streamlined On-boarding/off-boarding, RBAC.
- Ensured proper approval processes were in place for compliance and audit purposes.
- Tested system functionality, resolved problems for end-users and implemented corrective solutions.
- Analyzed user access, security roles/levels and generated revocation reports for terminated employees, revoked user entitlements.
- Performed Entitlement Reviews; generated employee access reports for managers to sign off on.
- Created and deleted user ID’s for employees and external users; performed password resets, issued security tokens;
- Created users, added users to roles, revoked access, and reset passwords.
- Managed a token inventory system through MS Access
- Used Resolve IT to process requests in a timely manner (SLA’s); performed quality checks.