Sr. Engineer (aws, Devops & Backup) Resume
Richmond, VirginiA
CAREER OBJECTIVE
I wish to work in an organization that would provide me a wide spectrum of experience and exposure to grow and excel in my career and to make meaningful contributions towards the objectives of the organization. I seek a role, which entrusts me with greater responsibilities and should provide me with continuous learning opportunities so that it can groom me towards my goal.
PROFESSIONAL EXPERIENCE SUMMARY
- Accomplished IT professional with 13+ years of experience with the pursuit of opportunities in AWS Cloud, DevOps and Backup technology (CommVault and VERITAS NetBackup)
- Hands - on experience and good knowledge of AWS services: EC2, S3, VPC, RDS, VPN, Route53, ELB, Auto scaling, SQS, SNS, IAM, DynamoDB, CloudFront, Cloud Formation, CloudWatch, CloudTrail, Storage Gateway, Internet Gateway, Lambda, Elastic File System and Glacier
- Experience in Designing and implementing DevOps pipeline of Continuous Integration, Continuous Delivery/Deployment with efficient branching strategy, code quality, Automated builds, Integration and Performance Testing, Artifact Management, Auto Provisioning Infrastructure using Dockers on Linux/Cloud Platforms
- Expertise in design and developing cloud strategies, roadmaps, architecting new cloud solutions or migrating enterprise applications to the cloud.
- Experience with Configuration Management tools like Chef, Puppet and Ansible in automating Infrastructure.
- Experience in managing and setting up Continuous Integration and Continuous delivery environment using Jenkins
- Good Experience in Agile approach, including large scale Agile environments
- Experienced and proficient in deploying and administering Git
- Experience with Container based Virtualization technologies Dockers and Orchestration tool Kubernetes
- Manage virtual and physical cloud resources as required with an overall objective of improving the Scalability, reliability, performance, and availability of the cloud infrastructure
- Utilized Cloud Watch to monitor resources such as EC2, CPU memory, Amazon RDS services, EBS volumes, to set alarms for notification or automated actions and to monitor logs for a better understanding and operation of the system.
- Created and configured elastic load balancers and Auto Scaling groups to distribute the traffic and to have a cost-efficient, fault tolerant and highly available environment
- Worked on AWS Auto Scaling to provide high availability of the application and EC2 instances based on the load of the application by managing CloudWatch events and alarms
- Configured DNS failover, monitored health checks and performance of web servers using Route53
- Evaluated performance of EC2 instances - CPU, Memory Usage, IOPS, Network Usages and suggest appropriate instance type
- Created snapshots to backup launch configurations of the EC2 instances
- Designed VPC, with the same CIDR block on-premise, which contained public and private subnets, and redirected traffic via Internet gateway from public subnet and via NAT instance from the private subnet
- Created read replica for MySQL RDS to enhance the database performance
- Created IAM policies for delegated administration within AWS and Configure IAM Users/Roles/Policies to grant fine-grained access to AWS resources to users
- Configured S3 versioning and lifecycle policies to backup files and archive files in Glacier
- Worked on AWS Elastic load balancing for deploying applications in high availability and AWS Auto Scaling for providing high availability of applications and EC2 instances based on the load of applications
- Created Cloud Formation template stacks to automate for building new environment including EC2, ELBs and VPCs using JSON files.
- Created Snapshots and Amazon Machine Images (AMI's) of EC2 Instance for snapshots and creating clone’s instances
- Used CloudFront to deliver content from AWS edge locations to users, allowing for further reduction of load on front-end servers.
- Configured Elastic Load balancer (ELB) including high availability of ELB using various subnets in various availability zones, configured security settings and health check for application.
- Good understanding of AWS Elastic Block Storage (EBS), various volume types and utilization of different types of EBS volumes based on requirement.
- Provision of AWS resources using management console and Command Line Interface.
- Plan, build and configure network infrastructure within VPC with public and private subnets, configure routing tables, security group and internet gateway.
- Managing IAM accounts (with MFA) and IAM policies to meet security audit & compliance requirements.
- Planned and deployed a complete CommVault Simpana/VERITAS NetBackup solution for data backup/recovery and disaster recovery
- Proactively looked to improve and add efficiency to current processes and exercised judgment in the decision-making process in order to provide consistent customer service
- Ability to handle multiple tasks and work independently as well as a team member
- Excellent Communication Skills and self-motivated with a high degree of attention
TECHNICAL SKILLS:
SCM/Version Control Tools: Git
Automation container: Docker and Kubernetes
Continuous Integration Tools: Jenkins
Continuous Deployment tools: Puppet, Ansible and Chef
Cloud services: AWS EC2, S3, VPC, RDS, Route53, ELB, Auto scaling, SQS, SNSIAM, DynamoDB, CloudFront, Cloud Formation, CloudWatch, CloudTrail, Storage Gateway, Internet Gateway, Lambda, Elastic File System and Glacier
Scripting Languages: Python
Operating System: Windows 2008/2012/2016 , Linux, Solaris, IBM AIX and HP-UX
Database: Oracle and SQL
Backup: CommVault Simpana 9.0, 10 & 11 VERITAS NetBackup 6.0, 6.5, 7.0, 7.1, 7.5, 7.6, 7.7 and 8.0
Storage: Hitachi, EMC Isilon and NetApp
EMPLOYMENT HISTORY:
Confidential, Richmond, Virginia
Sr. Engineer (AWS, DevOps & Backup)
Responsibilities:
- Responsible for migrating and managing the customer specific applications and databases in the AWS cloud for multiple customers
- Involved in designing and deploying multitude applications utilizing almost all the AWS stack (Including EC2, Route53, S3, RDS, Dynamo DB, SNS, SQS, IAM) focusing on high-availability, fault tolerance, and auto-scaling in AWS Cloud Formation.
- Configured AWS IAM and Security Group in Public and Private Subnets in VPC.
- Created AWS Route53 to route traffic between different regions.
- Designed AWS Cloud Formation templates to create custom sized VPC, subnets, NAT to ensure successful deployment of Web applications and database templates.
- Created Puppet manifests, classes and modules to automate system operations
- Hands on experience in setup & Configuration of Puppet Configuration Management with specific client requirement such as create user/remove user, install/remove packages, update & configure multi nodes.
- Maintain GIT, Bitbucket repository, handling branching, Merging, tagging and release activities.
- Extensively worked on Jenkins by installing, configuring and maintaining for continuous integration (CI) and for End to End automation for all build and deployments.
- Defined branching, labeling, and merge strategies for all applications in Git.
- Experience in Writing Chef Recipes to automate our build/deployment process and do an overall process development to any manual processes.
- Developed Chef Cookbooks and Recipes to manage systems configuration.
- Collaborated with development & support teams to service a continuous delivery environment with the use of build platform tool Docker
- Good Knowledge on container management using Docker in creating images. Worked on Docker container snapshots, attaching to a running container removing, image managing, directory structures
- Configured plugins for the integration tools to the version control tools.
- Designed Architectural Diagrams for different applications before migrating into Amazon cloud for flexible, cost- effective, reliable, scalable, high-performance and secured.
- Build servers using AWS, importing volumes, launching EC2, RDS, creating security groups, auto-scaling, load balancers (ELBs) in the defined virtual private connection
- Creating alarms in Cloud Watch service for monitoring the server performance, CPU Utilization, disk usage etc.
- Designing and configuring the AWS Simple Notification Service (SNS) and Secure Email Service (SES) architecture of the solution and working with a client.
- Managing IAM accounts (with MFA) and IAM policies to meet security audit & compliance requirements.
- Created Snapshots and Amazon Machine Images (AMI's) of EC2 Instance for snapshots and creating clones’ instances.
- Managed multiple AWS accounts with multiple VPC's for both production and non-prod where primary objectives included automation, build out, integration and cost control.
- Designed AWS Security Groups which acted as virtual firewalls that controlled the traffic allowed to reach one or more AWS EC2 instances.
- Used CloudFront to deliver content from AWS edge locations to users, allowing for further reduction of load on front-end servers.
- Configured Elastic Load balancer (ELB) including high availability of ELB using various subnets in various availability zones, configured security settings and health check for application
- Provision AWS resources using management console as well as Command Line Interface.
- Provisioned AWS S3 buckets for backup of the applications
- Managed and supported CommVault Simpana backup/recovery tasks in Windows & UNIX platforms using CommVault Simpana 9.0, 10 and 11 version
- Responsible for clients backup and recovery in multi-tenant CommVault environments
- Providing 24x7 on-call support as part of a larger team on rotational basis
- Worked extensively for customer specific Disaster Recovery Exercises (DR)
Confidential, Richmond, Virginia
M - Infra Ops Specialist (AWS, DevOps & Backup)
Responsibilities:
- Hands-on experience and good knowledge of AWS services: EC2, S3, VPC, RDS, VPN, Route53, ELB, Auto scaling, SQS, SNS, IAM, DynamoDB, CloudFront, Cloud Formation, CloudWatch, CloudTrail, Storage Gateway, Internet Gateway, Lambda, Elastic File System, Glacier and Kinesis
- Designed and implemented DevOps pipeline of Continuous Integration, Continuous Delivery/Deployment with efficient branching strategy, code quality, Automated builds, Integration and Performance Testing, Artifact Management, Auto Provisioning Infrastructure using Dockers on Linux/ Cloud Platforms
- Expertise in designing & developing cloud strategies, roadmaps, architecting new cloud solutions or migrating enterprise applications to the cloud.
- Experience with Configuration Management tools like Chef, Puppet and Ansible in automating Infrastructure.
- Used Configuration Management tool: Chef, created Chef Cookbooks using recipes to automate system operations. Converting production support scripts to Chef recipes.
- Configuring Chef to build up services and applications on the instances once they have been configured using cloud formation.
- Hands on experience in setup & Configuration of Puppet Configuration Management with specific client requirement such as create user/remove user, install/remove packages, update & configure multi nodes.
- Responsible for managing and setting up Continuous Integration & Continuous delivery environment using Jenkins
- Good Experience in Agile approach, including large scale Agile environments
- Maintain GIT, Bitbucket repository, handling branching, Merging, tagging and release activities
- Experience with Container based Virtualization technologies Dockers and Orchestration tool Kubernetes
- Created Docker images using a Docker file, Docker container snapshots, removing images and managing Docker volumes
- Manage virtual and physical cloud resources as required with an overall objective of improving the Scalability, reliability, performance, and availability of the cloud infrastructure
- Configured security groups at an instance level and Network ACLs at subnet level in VPC.
- Utilized Amazon Glacier for archiving data and S3 for data backup.
- Utilized Cloud Watch to monitor resources such as EC2, CPU memory, Amazon RDS services, EBS volumes, to set alarms for notification or automated actions and to monitor logs for a better understanding and operation of the system.
- Created and configured elastic load balancers and Auto Scaling groups to distribute the traffic and to have a cost-efficient, fault tolerant and highly available environment
- Worked on AWS Auto Scaling to provide high availability of the application and EC2 instances based on the load of the application by managing CloudWatch events and alarms
- Created IAM roles for EC2 instances and attached roles to instances
- Configured DNS failover, monitored health checks and performance of web servers using Route53
- Evaluated performance of EC2 instances - CPU, Memory Usage, IOPS, Network Usages and suggest appropriate instance type
- Created snapshots to backup launch configurations of the EC2 instances
- Designed VPC, with the same CIDR block on-premise, which contained public and private subnets, and redirected traffic via Internet gateway from public subnet and via NAT instance from the private subnet
- Created read replica for MySQL RDS to enhance the database performance
- Created IAM policies for delegated administration within AWS and Configure IAM Users/Roles/Policies to grant fine-grained access to AWS resources to users
- Responsible for taking day to day backup of RDS instances
- Configured S3 versioning and lifecycle policies to backup files and archive files in Glacier
- Worked on AWS Elastic load balancing for deploying applications in high availability and AWS Auto Scaling for providing high availability of applications and EC2 instances based on the load of applications
- Created Cloud Formation template stacks to automate for building new environment including EC2, ELBs and VPCs using JSON files.
- Created Snapshots and Amazon Machine Images (AMI's) of EC2 Instance for snapshots and creating clone’s instances
- Used CloudFront to deliver content from AWS edge locations to users, allowing for further reduction of load on front-end servers.
- Configured Elastic Load balancer (ELB) including high availability of ELB using various subnets in various availability zones, configured security settings and health check for application.
- Good understanding of AWS Elastic Block Storage (EBS), various volume types and utilization of different types of EBS volumes based on requirement.
- Provision AWS resources using management console as well as Command Line Interface.
- Plan, build and configure network infrastructure within VPC with public and private subnets, configure routing tables, security group and internet gateway.
- Leverage AWS cloud services such as EC2, auto-scaling and VPC to build secure, highly scalable and flexible systems that handled expected and unexpected load bursts.
- Create low latency website using S3, CloudFront, and Route53.
- Design, develop and implement high availability; backup and recovery strategy for applications and database.
- Managing IAM accounts (with MFA) and IAM policies to meet security audit & compliance requirements.
- Design/Implement/Manage the backups of 11,000 + servers across 6 CommCell Backup servers
- Worked closely with Client AWS Engineering team for successfully testing/migration of the CommVault infrastructure by creating CommCell/Media Agent/Client server in the AWS cloud.
- Installed and configured CommVault iDataAgent agents for File systems, SQL, Exchange, Oracle RAC, PostgreSQL and EXADATA databases
- Perform daily management activities of Storage Provisioning, performance monitoring and reporting of NetApp storage
- Maintained a healthy NetApp storage by configuring Qtrees, Volumes, Aggregates in NetApp storage
- Troubleshooting NFS, SAN and CIFS issues and fine-tuned the filers for optimal performance.
- Worked extensively in Disaster Recovery Exercises (DR).
- In-depth troubleshooting of file system, Oracle, SQL, VADP, Oracle RAC, PostgreSQL, DB2, EXADATA backup and recovery
- Provided on call support and remote support for 24/7
- Design/Implement/Manage the backup of 5000+ servers in VERITAS NetBackup 6.0, 6.5, 7.0, 7.1 & 7.5
- Installed and configured the VERITAS NetBackup agents for file system, Oracle, SQL, DB2, Exchange databases, NDMP Backups, SAN Media server backups, SAN Client and Disk Staging Backups and NetBackup Vault
- Specialized in troubleshooting the backup/restore issues for File system, Oracle, SQL, DB2, Exchange database, NDMP, SAN media server and SAN clients
Confidential
Backup Administrator
Responsibilities:
- Administrated & Managed the backup of 1000+ servers across 2 NetBackup Masters using the VERITAS NetBackup 5.1, 6.0 and 6.5 in UNIX/Windows platform
- Installed and configured the VERITAS NetBackup agents for media agents, file system Oracle, SQL, DB2 and Exchange databases
- Installed and configured Sun StorEdge SL100 & SL500 tape library for the backup & recovery
- Creating, modifying the backup policies and scheduling the client backup’s as per the data owner requirements
- Troubleshooting of all Backup and Restore related error codes in VERITAS NETBACKUP
- Resolved Sun StorEdge SL100 & SL500 tape library issues for backup/restore
- Analyzed the reports, logs and taking corrective and preventive actions
- Successfully upgraded the NetBackup environment from version 5.1 to 6.5 and implemented of MSEO (Media Server Encryption Option)
- Monitored DB Catalog and backup product supporting File System Disk Levels for Free Space & utilization
- Good working knowledge in off-site tape vaulting process with Iron Mountain (IM)
- Worked extensively in Disaster Recovery Exercises (DR)
- Responsible for installing patches for system upgrade as required
Confidential
Associate Technical Engineer
Responsibilities:
- Administrated & Managed the VERITAS NetBackup 4.5 & 5.1 including backup and recovery activities in Windows, Linux, IBM-AIX and HP-UX servers
- Responsible for troubleshooting different types of NetBackup error codes for backup/recovery and proficient in HP MSL 5000 Tape Library