Aws Cloud Architect/engineer Resume
CA
SUMMARY
- As a highly dedicated, performance - driven and self-motivated Cloud (AWS ) Engineer, having years of experience in Cloud(AWS)/Linux/Oracle environments
- I am able to work with minimal supervision or as part of a team with proficiency in cloud orchestration, security, identity & access management, monitoring and event management, governance & compliance, application delivery, data protection, image and patch management, and I am always ready and willing to learn new technologies and adapt to new environments and new teams.
TECHNICAL SKILLS
AWS Security: AWS Security Hub, AWS Guard Duty, AWS Shield, WAF
Monitoring & Event Management: AWS CloudWatch (Events & Logs), AWS SNS, AWS S3
Identity & Access Management: AWS Organization, AWS IAM, AWS Secrets Manager, etc.
Governance & Compliance: AWS Config Rules, AWS Organization, AWS Control Tower, AWS Trusted Advisor, AWS Well Architected Tool, AWS Budgets, etc.
Application Delivery: Jenkins, AWS Code Pipeline, AWS Code Commit
Data Protection: AWS KMS, Snapshot Lifecyle Manager.
Self Service: Service Catalog
Network: VPC, VGW, TGW, CGW, IGW, NGW etc.
Image & Patch: AWS SSM Patch Manager, AWS Golden AMI Pipeline
AWS Platform: AWS CloudFormation, Terraform, AWS Lambda, AWS Systems Manager, S3, VPC, EC2, ELB, RDS, SNS, SQS, SES, Route53, CloudFront, Service Catalog, AWS Auto Scaling, Trusted Advisor, CloudWatch etc.
Cloud Orchestration/Automation: AWS CloudFormation, Terraform, AWS Lambda, AWS Systems Manager, AWS SSM Parameter Store, Ansible.
Programming Languages: Bash, JSON, YML, Python
PROFESSIONAL EXPERIENCE
Confidential, CA
AWS Cloud Architect/Engineer
Responsibilities:
- Developed and leveraged baseline and custom guardrails, policies, centralized policy enforcement, tagging policies and a well architected multi account environment.Migrated legacy applications to AWS cloud environment using cloud Endure
- Developed required and optional tagging reference document for automation, compliance, and consolidated billing
- Developed baseline VPC and Network design including leveraging VPN connectivity and Direct Connect
- Leveraged automated DevOps tools deployment and Blue-green deployment patterns and strategies
- Configured CI/CD Pipelines using Jenkins connected to GitHub and build environments (Dev, stage & Prod)
- Implemented IAM best practices and role-based access control
- Implemented AWS Organization to centrally manage multiple AWS accounts including consolidated billing and policy-based restrictions
- Implemented Control Tower Preventive and Detective guardrails and leveraged Account Factory, integrated with Lambda for new AWS account creation and setup.
- Setup Ansible control and slave nodes and developed playbooks to automate configuration of servers across environments.
- Designed secured, cost optimized, highly available and fault tolerant infrastructure in AWS
- Architected and configured Dev/Stage/QA environments in AWS (VPC, subnets, security groups, EC2 instances, load balancer, RDS, route53, etc.)
- Implemented security best practices in AWS including multi factor authentication, access key rotation, role-based permissions, enforced strong password policy, configured security groups and NACLs, S3 bucket policies and ACLs, etc.
- Optimized cost through reserved instances, selection and changing of EC2 instance types based on resource need, S3 storage classes and S3 lifecycle policies, leveraging Autoscaling etc.
- Configured CloudWatch alarm rules for operational and performance metrics for our AWS resources and applications
- Setup and configured logs files for detail monitoring and alerts notification when changes are made.
- Monitoring from end-to-end view of runtime systems CPU, bandwidth, disk space and log files using New Relic
- Deployed and configured infrastructure using Cloud Formation, Terraform and Ansible
- Architected and implemented continuous integration and deployment pipelines using Jenkins and other CI-CD tools.
Confidential, Irving TX
AWS Architect/Engineer
Responsibilities:
- Ability to setup and manage monitoring systems in AWS using CloudWatch and integrated with SNS for notifications for system and performance changes.
- Leverage highly available Applications across availability zones and regions
- Highly implemented fault tolerant, highly available, self-healing and scalable systems in AWS.
- Developed baseline VPC and Network design including leveraging VPN connectivity and Direct Connect
- Built serverless architecture with Lambda integrated with SNS, CloudWatch logs and other AWS services.
- Leveraged automated DevOps tools deployment and Blue - green deployment patterns and strategies
- Configured CI/CD Pipelines using Jenkins connected to GitHub and build environments (Dev, stage & Prod) leverage IAM best practices and role-based access control
- Implemented AWS Organization to centrally manage multiple AWS accounts including consolidated billing and policy-based restrictions
- Implemented Control Tower Preventive and Detective guardrails and leveraged Account Factory, integrated with Lambda for new AWS account creation and setup.
- Setup Ansible control and slave nodes and developed playbooks to automation configuration of servers across environments.
- Designed secured, cost optimized, highly available and fault tolerant infrastructure in AWS
- Architected and configured Dev/Stage/QA environments in AWS (VPC, subnets, security groups, EC2 instances, load balancer, RDS, Redis, route53, etc.)
- Implemented security best practices in AWS including multi factor authentication, access key rotation, role-based permissions, enforced strong password policy, configured security groups and NACLs, S3 bucket policies and ACLs, etc.
- Optimized cost through reserved instances, selection and changing of EC2 instance types based on resource need, S3 storage classes and S3 lifecycle policies, leveraging Autoscaling etc.
- Leveraged EC2 Create Snapshot API call to create snapshots of EBS Volumes on scheduled intervals.
- Configured CloudWatch alarm rules for operational and performance metrics for our AWS resources and applications
- Setup and configured logs files for detail monitoring and alerts notification when changes are made.
- Monitoring from end-to-end view of runtime systems CPU, bandwidth, disk space and log files using New Relic
- Deployed and configured infrastructure using Cloud Formation Terraform and Ansible
- Architected and implemented continuous integration and deployment pipelines using Jenkins and other CICD
Confidential
ORACLE/AWS Architect/Engineer
Responsibilities:
- Supporting day-to-day Database administration activities like creating databases, troubleshooting tablespace issue, mount point space issue, high CPU utilization, locking/blocking sessions.
- Database Refreshing / Replication from production to testing using Exp/Imp.
- Worked on Project to upgrade/migrate over 100+ oracle database from 11g to 12c (Multitenant architecture) on Oracle Enterprise Linux 6 as part of a database consolidation effort.
- Installation and Configuration of new Database from oracle 11g, 12c on different OS (Linux, Windows).
- Supporting multiple oracle database instances with many databases for production, development, test and staging purposes on Linux and Windows environments.
- Handled daily PROD/DEV/UAT problems/change requests with Oracle such adding datafiles to existing tablespaces, creating new tablespaces, schema management, user creations, permission allocations and alert log monitoring
- Thorough experience in database user security, administration and auditing this database users for database compliance (SOC, ISO2900, HIPPA, PCI etc.)
- Automate routine database support tasks using cron-jobs
- Strong experience in Database Optimization and Tuning, Backup/Restore, Troubleshooting, and Data Import/Export
- Managed provisioning of AWS infrastructures using CloudFormation
- Design for high availability and business continuity using self-healing-based architectures, fail-over routing policies, multi-AZ deployment of EC2 instances, ELB health checks, Auto Scaling, and other disaster recovery models.
- Created patch management using Systems Manager automation for multi-region and multi account execution
- Implemented preventive guardrails using Service Control Policies (SCPs)
- Implemented detective guardrails using Cloud Custodian policies and AWS config
- Designed and implemented for elasticity and scalability using Elastic ache, CloudFront - Edge locations, RDS (read replicas, instance sizes) etc.
- Implemented security best practices in AWS including multi factor authentication, access key rotation, encryption using KMS, firewalls- security groups and NACLs, S3 bucket policies and ACLs, mitigating DDOS attacks etc.
- Implemented Jenkins, GitHub and Git for version control, code build, testing and release and CI/CD.
- Monitored end-to-end infrastructure using CloudWatch and SNS for notification
- Used AWS system manager to automate operational tasks across AWS resources
- Project Management -AWS Infra design & application migration
- Used System Manager to automate operational tasks across WK AWS infrastructure.
- Built kinesis dashboards and applications that react to incoming data using AWS provided SDKs; and exported data from kinesis to other AWS services including EMR for analytics, S3 for storage, Redshift for big data and Lambda for event driven actions
- Developed and documented security guardrails for AWS Cloud environments
- Built custom images though docker server, docker compose with multiple local containers and created production grade workflows and a continuous application workflow for multiple images
- Implemented multiple container deployments to AWS and maintained sets of containers with deployments
- Setup, Configure d, and used Ad Hoc ansible Command.
Confidential . DALLAS, TEXAS
ORACLE DBA
Responsibilities:
- Cloned/Migrated databases using RMAN and traditional Datapump export/import utilities in Oracle 10g.
- Created Oracle Wallets and implemented Tablespace level TDE security.
- Implemented recovery strategies whenever required and successfully recovered databases in case database crash, media/disk failures by using RMAN.
- Scheduling the Physical backups (hot & cold) in CRON-tab using RMAN utility and monitoring the scheduled jobs.
- Responsible for Creating Users, Groups, Roles, Profiles and assigning the users to groups and grant necessary privileges to the relevant groups.
- Used SQL TRACE, TKPROF, EXPLAIN PLAN utilities for optimizing and tuning SQL queries.
- Maintained the data integrity and security using integrity constraints and database triggers.
- Provided 24X7 support for all the production and development databases.
- Strong skills in applying security patches (Patch set, Critical Patch Updates (CPU) / Patch Set Updates (PSU), One-off Patch) using “run Installer” and PERL based utility “opatch” from 10g to 11g and 12c.
- Highly experienced in implementing Oracle's Transportable Tablespace (TTS) feature using Datapump Export/Import (Oracle 11g, 10g) allowing users to quickly move a user tablespace across Oracle databases.