We provide IT Staff Augmentation Services!

Aws Cloud Architect/engineer Resume

2.00/5 (Submit Your Rating)

CA

SUMMARY

  • As a highly dedicated, performance - driven and self-motivated Cloud (AWS ) Engineer, having years of experience in Cloud(AWS)/Linux/Oracle environments
  • I am able to work with minimal supervision or as part of a team with proficiency in cloud orchestration, security, identity & access management, monitoring and event management, governance & compliance, application delivery, data protection, image and patch management, and I am always ready and willing to learn new technologies and adapt to new environments and new teams.

TECHNICAL SKILLS

AWS Security: AWS Security Hub, AWS Guard Duty, AWS Shield, WAF

Monitoring & Event Management: AWS CloudWatch (Events & Logs), AWS SNS, AWS S3

Identity & Access Management: AWS Organization, AWS IAM, AWS Secrets Manager, etc.

Governance & Compliance: AWS Config Rules, AWS Organization, AWS Control Tower, AWS Trusted Advisor, AWS Well Architected Tool, AWS Budgets, etc.

Application Delivery: Jenkins, AWS Code Pipeline, AWS Code Commit

Data Protection: AWS KMS, Snapshot Lifecyle Manager.

Self Service: Service Catalog

Network: VPC, VGW, TGW, CGW, IGW, NGW etc.

Image & Patch: AWS SSM Patch Manager, AWS Golden AMI Pipeline

AWS Platform: AWS CloudFormation, Terraform, AWS Lambda, AWS Systems Manager, S3, VPC, EC2, ELB, RDS, SNS, SQS, SES, Route53, CloudFront, Service Catalog, AWS Auto Scaling, Trusted Advisor, CloudWatch etc.

Cloud Orchestration/Automation: AWS CloudFormation, Terraform, AWS Lambda, AWS Systems Manager, AWS SSM Parameter Store, Ansible.

Programming Languages: Bash, JSON, YML, Python

PROFESSIONAL EXPERIENCE

Confidential, CA

AWS Cloud Architect/Engineer

Responsibilities:

  • Developed and leveraged baseline and custom guardrails, policies, centralized policy enforcement, tagging policies and a well architected multi account environment.Migrated legacy applications to AWS cloud environment using cloud Endure
  • Developed required and optional tagging reference document for automation, compliance, and consolidated billing
  • Developed baseline VPC and Network design including leveraging VPN connectivity and Direct Connect
  • Leveraged automated DevOps tools deployment and Blue-green deployment patterns and strategies
  • Configured CI/CD Pipelines using Jenkins connected to GitHub and build environments (Dev, stage & Prod)
  • Implemented IAM best practices and role-based access control
  • Implemented AWS Organization to centrally manage multiple AWS accounts including consolidated billing and policy-based restrictions
  • Implemented Control Tower Preventive and Detective guardrails and leveraged Account Factory, integrated with Lambda for new AWS account creation and setup.
  • Setup Ansible control and slave nodes and developed playbooks to automate configuration of servers across environments.
  • Designed secured, cost optimized, highly available and fault tolerant infrastructure in AWS
  • Architected and configured Dev/Stage/QA environments in AWS (VPC, subnets, security groups, EC2 instances, load balancer, RDS, route53, etc.)
  • Implemented security best practices in AWS including multi factor authentication, access key rotation, role-based permissions, enforced strong password policy, configured security groups and NACLs, S3 bucket policies and ACLs, etc.
  • Optimized cost through reserved instances, selection and changing of EC2 instance types based on resource need, S3 storage classes and S3 lifecycle policies, leveraging Autoscaling etc.
  • Configured CloudWatch alarm rules for operational and performance metrics for our AWS resources and applications
  • Setup and configured logs files for detail monitoring and alerts notification when changes are made.
  • Monitoring from end-to-end view of runtime systems CPU, bandwidth, disk space and log files using New Relic
  • Deployed and configured infrastructure using Cloud Formation, Terraform and Ansible
  • Architected and implemented continuous integration and deployment pipelines using Jenkins and other CI-CD tools.

Confidential, Irving TX

AWS Architect/Engineer

Responsibilities:

  • Ability to setup and manage monitoring systems in AWS using CloudWatch and integrated with SNS for notifications for system and performance changes.
  • Leverage highly available Applications across availability zones and regions
  • Highly implemented fault tolerant, highly available, self-healing and scalable systems in AWS.
  • Developed baseline VPC and Network design including leveraging VPN connectivity and Direct Connect
  • Built serverless architecture with Lambda integrated with SNS, CloudWatch logs and other AWS services.
  • Leveraged automated DevOps tools deployment and Blue - green deployment patterns and strategies
  • Configured CI/CD Pipelines using Jenkins connected to GitHub and build environments (Dev, stage & Prod) leverage IAM best practices and role-based access control
  • Implemented AWS Organization to centrally manage multiple AWS accounts including consolidated billing and policy-based restrictions
  • Implemented Control Tower Preventive and Detective guardrails and leveraged Account Factory, integrated with Lambda for new AWS account creation and setup.
  • Setup Ansible control and slave nodes and developed playbooks to automation configuration of servers across environments.
  • Designed secured, cost optimized, highly available and fault tolerant infrastructure in AWS
  • Architected and configured Dev/Stage/QA environments in AWS (VPC, subnets, security groups, EC2 instances, load balancer, RDS, Redis, route53, etc.)
  • Implemented security best practices in AWS including multi factor authentication, access key rotation, role-based permissions, enforced strong password policy, configured security groups and NACLs, S3 bucket policies and ACLs, etc.
  • Optimized cost through reserved instances, selection and changing of EC2 instance types based on resource need, S3 storage classes and S3 lifecycle policies, leveraging Autoscaling etc.
  • Leveraged EC2 Create Snapshot API call to create snapshots of EBS Volumes on scheduled intervals.
  • Configured CloudWatch alarm rules for operational and performance metrics for our AWS resources and applications
  • Setup and configured logs files for detail monitoring and alerts notification when changes are made.
  • Monitoring from end-to-end view of runtime systems CPU, bandwidth, disk space and log files using New Relic
  • Deployed and configured infrastructure using Cloud Formation Terraform and Ansible
  • Architected and implemented continuous integration and deployment pipelines using Jenkins and other CICD

Confidential

ORACLE/AWS Architect/Engineer

Responsibilities:

  • Supporting day-to-day Database administration activities like creating databases, troubleshooting tablespace issue, mount point space issue, high CPU utilization, locking/blocking sessions.
  • Database Refreshing / Replication from production to testing using Exp/Imp.
  • Worked on Project to upgrade/migrate over 100+ oracle database from 11g to 12c (Multitenant architecture) on Oracle Enterprise Linux 6 as part of a database consolidation effort.
  • Installation and Configuration of new Database from oracle 11g, 12c on different OS (Linux, Windows).
  • Supporting multiple oracle database instances with many databases for production, development, test and staging purposes on Linux and Windows environments.
  • Handled daily PROD/DEV/UAT problems/change requests with Oracle such adding datafiles to existing tablespaces, creating new tablespaces, schema management, user creations, permission allocations and alert log monitoring
  • Thorough experience in database user security, administration and auditing this database users for database compliance (SOC, ISO2900, HIPPA, PCI etc.)
  • Automate routine database support tasks using cron-jobs
  • Strong experience in Database Optimization and Tuning, Backup/Restore, Troubleshooting, and Data Import/Export
  • Managed provisioning of AWS infrastructures using CloudFormation
  • Design for high availability and business continuity using self-healing-based architectures, fail-over routing policies, multi-AZ deployment of EC2 instances, ELB health checks, Auto Scaling, and other disaster recovery models.
  • Created patch management using Systems Manager automation for multi-region and multi account execution
  • Implemented preventive guardrails using Service Control Policies (SCPs)
  • Implemented detective guardrails using Cloud Custodian policies and AWS config
  • Designed and implemented for elasticity and scalability using Elastic ache, CloudFront - Edge locations, RDS (read replicas, instance sizes) etc.
  • Implemented security best practices in AWS including multi factor authentication, access key rotation, encryption using KMS, firewalls- security groups and NACLs, S3 bucket policies and ACLs, mitigating DDOS attacks etc.
  • Implemented Jenkins, GitHub and Git for version control, code build, testing and release and CI/CD.
  • Monitored end-to-end infrastructure using CloudWatch and SNS for notification
  • Used AWS system manager to automate operational tasks across AWS resources
  • Project Management -AWS Infra design & application migration
  • Used System Manager to automate operational tasks across WK AWS infrastructure.
  • Built kinesis dashboards and applications that react to incoming data using AWS provided SDKs; and exported data from kinesis to other AWS services including EMR for analytics, S3 for storage, Redshift for big data and Lambda for event driven actions
  • Developed and documented security guardrails for AWS Cloud environments
  • Built custom images though docker server, docker compose with multiple local containers and created production grade workflows and a continuous application workflow for multiple images
  • Implemented multiple container deployments to AWS and maintained sets of containers with deployments
  • Setup, Configure d, and used Ad Hoc ansible Command.

Confidential . DALLAS, TEXAS

ORACLE DBA

Responsibilities:

  • Cloned/Migrated databases using RMAN and traditional Datapump export/import utilities in Oracle 10g.
  • Created Oracle Wallets and implemented Tablespace level TDE security.
  • Implemented recovery strategies whenever required and successfully recovered databases in case database crash, media/disk failures by using RMAN.
  • Scheduling the Physical backups (hot & cold) in CRON-tab using RMAN utility and monitoring the scheduled jobs.
  • Responsible for Creating Users, Groups, Roles, Profiles and assigning the users to groups and grant necessary privileges to the relevant groups.
  • Used SQL TRACE, TKPROF, EXPLAIN PLAN utilities for optimizing and tuning SQL queries.
  • Maintained the data integrity and security using integrity constraints and database triggers.
  • Provided 24X7 support for all the production and development databases.
  • Strong skills in applying security patches (Patch set, Critical Patch Updates (CPU) / Patch Set Updates (PSU), One-off Patch) using “run Installer” and PERL based utility “opatch” from 10g to 11g and 12c.
  • Highly experienced in implementing Oracle's Transportable Tablespace (TTS) feature using Datapump Export/Import (Oracle 11g, 10g) allowing users to quickly move a user tablespace across Oracle databases.

We'd love your feedback!