We provide IT Staff Augmentation Services!

Devops And Cloud Security Engineer Resume

4.00/5 (Submit Your Rating)

SUMMARY

  • Over 7+ years of experience in DevOps and Build and Release Engineering in Automating, Building, Deploying, and Releasing of code from one environment to another environment.
  • Created AWS instances and deployed applications and delivered to QA teams to initiate Performance testing.
  • Experience in using AWS including EC2, Auto - Scaling in launching EC2 instances, Elastic Load Balancer, Elastic Beanstalk, S3, Glacier, Cloud Front, RDS, VPC, Route53, Cloud Watch, Cloud Formation, IAM, SNS.
  • Provisioning EC2 instances and have knowledge on all resource areas of EC2 like Instances, Dedicated hosts, volumes, Key pairs, Elastic IP's, Snapshots, Load Balancers and Security Groups.
  • Experience on Cloud technologies including Infrastructure as a Service, Platform as a Service, and Software as a Service provider (IaaS, PaaS and SaaS).
  • Dockerized applications by creating Docker images from Docker file.
  • Performed automation tasks on various Docker components like Docker Hub, Docker Engine, Docker Machine, Compose and Docker Registry.
  • Experience with build tools Maven for writing pom.xml for scratch for new applications and improvising the existing build scripts on need basis.
  • Experience with web and application servers (Apache http server, Tomcat).
  • Built a web-based application that automatically generates a complex user defined Elasticsearch.
  • Implemented a CD pipeline involving Jenkins, Nexus, and Chef, Ansible to complete the Automation from commit to Deployment.
  • Experience in working with configuration management tools like PUPPET, CHEF and ANSIBLE.
  • Working experience with Kubernetes, Mesos, Docker Swarm.
  • Experience in writing Chef cookbooks and recipes to automate middleware installations, domain creations and deployment activities.
  • Experience in handling Hardware issues, Migration and Data Center Operations.
  • Worked on Performance Monitoring, resolving network issues & Tuning the system using tools.
  • Good knowledge and hands on Experience in some monitoring tools like Splunk, Nagios.
  • Experiences on design and implementation of Hybrid Test Automation Framework build using Selenium RC, Maven, Apache POI technologies under Java platform.
  • Automated setting up server infrastructure for the DevOps services, using Ansible, shell scripts.
  • Worked with Bug tracking tools like JIRA.
  • Maintained and managed cloud & test environments and automation for QA, Product Management and Product Support.
  • Automated the build and release management process, including monitoring changes between releases.
  • Collaborate in daily standups, ensuring that best practices and consistent methodologies are considered while solving high priority enterprise level IT issues.
  • Assist in the integration of the Systems and Development teams into ongoing evolution and improvement, through tighter integration and collaboration.

TECHNICAL SKILLS

Versioning Tools: CVS, GitHub, GitLab, SVN, GIT and Git Stash.

Build Tools: Maven, Nexus, ANT.

Scripting Languages: Python, Ruby, Java Script, Perl, Shell and PHP.

Cloud Environment: AWS, Microsoft Azure.

Containerization Tools: Docker, kubernetes.

Analytics & Monitoring Tools: Nagios, Logstash, Splunk.

Operating Systems: UNIX/LINUX, Mac-OS, Window.

Bug Tracking Tools: JIRA, Bugzilla.

CI/CM Tools: Jenkins, Bamboo, Teamcity, Ansible, Puppet and Chef.

App/Web servers: Apache Tomcat 7.x, JBoss 7.x, WebSphere and WebLogic.

Databases- Oracle 11g, SQL Server, MySQL, DB2, RDBMS, DYNAMODB, NOSQL, Mango DB.:

Operating Systems: Mac OSX, Linux, UNIX, Ubuntu, Windows 2010, HP-UX 10.x, 11.x, Sun Solaris 8, 9, 10, AIX 5.1, 5.2, 5.3, Red Hat Linux RHEL 3.x, 4.x, 5.x, 6.x Unix and Windows 2003/2008.

PROFESSIONAL EXPERIENCE

Confidential

DevOps and Cloud Security Engineer

Responsibilities:

  • Supporting engineering plans and schedules by providing CM/Release Engineering services to build, deploy, develop scripts, oversee branch and merge strategies, and build automated tools as necessary to offer services to engineering team.
  • Converted and automated builds using Maven and Ant. Scheduled automated nightly builds using Jenkins.
  • Helped developers and other project teams to set views and environments.
  • Created and applied Baselines and Labels for each Build Artifacts.
  • Worked on Multiple AWS instances, set the security groups, Elastic Load Balancer and AMIs, Auto scaling to design cost effective, fault tolerant and highly available systems.
  • Launched and configured The Amazon EC2 (AWS) Cloud Servers using AMI's (Linux/Ubuntu) and configuring the servers for specified applications.
  • Configured RDS instances using Cloud formations and Terraform.
  • Automated AWS components like EC2 instances, Security groups, ELB, RDS, Lambda and IAM through AWS cloud Formation templates.
  • Worked with Cloud Watch to setup Alarms and notify them using SNS.
  • Migrated workloads from Jenkins, bitbucket to Gitlab enterprise.
  • Implemented the architecture for container security solution, worked with multiple solutions (Twistlock, Aqua and Sysdig) and sorted the best opt for Confidential at the organization level.
  • Created and maintained container image scanning templates (Clair and Aqua Trivy) in GitLab.
  • Packaged multiple applications into docker images to work seamlessly with application teams.

Environment: Java/J2ee, Eclipse, Azure, Terraform, Chef, Puppet, AWS (Amazon Web Services) Ant, Maven, PowerShell Scripting, Groovy, Linux, SVN, Gitlab, Python, Ruby, Nexus, Sonar, Docker, Check style, Jenkins, bitbucket, CentOS, PERL, BASH, Solaris, UNIX.

Confidential, McLean, Virginia

Linux / DevOps Engineer

Responsibilities:

  • Supporting engineering plans and schedules by providing CM/Release Engineering services to build, deploy, develop scripts, oversee branch and merge strategies, and build automated tools as necessary to offer services to engineering team.
  • Converted and automated builds using Maven and Ant. Scheduled automated nightly builds using Jenkins.
  • Helped developers and other project teams to set views and environments.
  • Created and applied Baselines and Labels for each Build Artifacts.
  • Used Terraform to map more complex dependencies and identify network issue.
  • Hands on experience on Terraform a tool for building, changing, and versioning infrastructure safely and efficiently.
  • Worked with Terraform key features such as Infrastructure as code, Execution plans, Resource Graphs, Change Automation
  • Created UCM Projects, Development and Integration views for Development and Integration Streams.
  • Worked with Terraform to create AWS components like EC2, IAM, VPC, ELB, Security groups.
  • Involved in AWS EC2/VPC/S3/SQS/SNS based on automation Terraform, Ansible, Python, Bash Scripts.
  • Managed different infrastructure resources, like physical machines, VMs and even Docker containers using Terraform It supports different Cloud service providers like AWS and Digital Ocean
  • Worked on Multiple AWS instances, set the security groups, Elastic Load Balancer and AMIs, Auto scaling to design cost effective, fault tolerant and highly available systems.
  • Launched and configured The Amazon EC2 (AWS) Cloud Servers using AMI's (Linux/Ubuntu) and configuring the servers for specified applications.
  • Configured RDS instances using Cloud formations and Terraform.
  • Automated AWS components like EC2 instances, Security groups, ELB, RDS, Lambda and IAM through AWS cloud Formation templates.
  • Worked with Cloud Watch to setup Alarms and notify them using SNS.
  • Chef to aid with our deployment process and migrating in house systems to Amazon Cloud Services.
  • Using Chef and AWS allowed me to reduce costs for the department and eliminate unwarranted resources. Automated provisioning of cloud infrastructure with Chef.
  • Worked on installation, configuration and maintenance Debian/Redhat, CentOS and SUSE Servers at multiple Data Centers.
  • Replaced existing manual deployment and management processes with Chef and AWS Ops Works stacks across 4 product platforms
  • Also, Extensively Involved in the Installation, Configuration &Upgradation of Linux Operating Systems such as RHEL 6/ RHEL 7/Solaris 9/10.
  • Managed Docker orchestration using Kubernetes
  • Used Kubernetes to make it easier to organize and schedule our applications across a fleet of machines
  • Used PowerShell for DevOps in Windows-based system
  • Enabled AWS, Microsoft Azure deployments for UAT environments
  • Managed GIT and SVN as Source Control Systems
  • Created Pre-operation and Post-operation triggers in UCM.
  • Developed scripts using PERL, BASH and BATCH files for Automation of Activities and builds.
  • Provided level one support for build troubleshooting and production issues.
  • Administration of RHEL 4, 5, 6 and Solaris 9, 10 which includes installation, testing, tuning, upgrading and loading patches, troubleshooting server issues.
  • Responsible for the EBFs (Emergency Bug Fixes) to push them to different environments and monitor their status.
  • Performed merges for each build from Development Branch to Integration Branch.
  • Created the Release Management plan with the implementation schedule.
  • Worked with the automated scripts for the Build and Deployment of the applications.
  • Responsible for Build and Install Schedules using Unix Cron jobs.
  • Maintained configuration files for each application for build and install on different environments.
  • Built Puppet manifests and bootstrap scripts to allow us to bootstrap instances to various roles without having to maintain AMIs.
  • Used Puppet for Continuous Delivery. Managed CI and CD process and delivered all application in rpms.
  • Created the build instructions docs and install (deploy) instructions docs for each application for different environments.

Environment: Java/J2ee, Eclipse, Azure, Terraform, Chef, Puppet, AWS (Amazon Web Services) Ant, Maven, Subversion, PowerShell Scripting, Linux, SVN, GIT, Python, Ruby, Nexus, Sonar, Docker, Check style, Jenkins, bitbucket, CentOS, PERL, BASH, Solaris, UNIX.

Confidential

Sr. AWS DevOps Engineer.

Responsibilities:

  • Used Cloud Front to deliver content from AWS edge locations to users, allowing for further reduction of load on front-end servers.
  • Utilized AWS CLI to automate backups of ephemeral data-stores to S3 buckets, EBS and create nightly AMIs for mission critical production servers as backups.
  • Responsible for maintaining 4-5 Different Testing/QA Environments and erection of the PROD Environment in AWS.
  • Rehydration of AWS servers are performed periodically to upgrade the application's infrastructure to have latest OS and configuration.
  • Experienced in Amazon EC2 setting up instances, virtual private cloud (VPCs), and security groups.
  • Configured AWS IAM and Security Group in Public and Private Subnets in VPC.
  • Deploy and monitor scalable infrastructure on Amazon web services( AWS )
  • Created AWS Route53 to route traffic between different regions.
  • Designing and implementing CI (Continuous Integration) system: configuring Jenkins servers, Jenkins nodes, creating required scripts (Perl & Python), and creating/configuring VMs (Windows/Linux).
  • Coordinate/assist developers with establishing and applying appropriate branching, labeling/naming conventions using Subversion ( SVN ) and Git source control.
  • Migrating and maintaining build and test environments into the Cloud Infrastructure.
  • Managed Git repository, code merging, and production deployments.
  • Analyzed and resolved conflicts related to merging of source code for SVN and Git.
  • Implemented, maintained, and supported reliable, timely and reproducible builds for project teams.
  • Maintained build related scripts developed in shell for Maven builds. Created and modified build configuration files including POM.xml.
  • Used ANT and MAVEN as a build tools on java projects for the development of build artifacts on the source code.
  • Implemented a production ready, load balanced, highly available, fault tolerant Kubernetes infrastructure.
  • Worked with development/testing, deployment, systems/infrastructure, and project teams to ensure continuous operation of build and test systems.
  • Created Docker images using a Docker file, worked on Docker container snapshots, removing images, and managing Docker volumes.
  • Created private cloud using Kubernetes that supports DEV, TEST, and PROD environments.
  • Created private cloud using Kubernetes that supports DEV, TEST, and PROD environments.
  • Used BOTO and Fabric for launching and deploying instances in AWS.
  • Used Cloud watch logs to move application logs to S3 and create alarms based on a few exceptions raised by applications.
  • Managed Kubernetes charts using Helm. Created reproducible builds of the Kubernetes applications, managed Kubernetes manifest files and Managed releases of Helm packages.
  • Managed network security using Load balancer, Auto scaling, Security groups and NACLS.
  • Built Cloud infrastructure for Multi-Tier Applications with Failover and High Availability Mode.
  • Supported current migration of Data Center to Amazon Cloud.
  • Documented system configurations, Instance, OS, and AMI build practices, backup procedures, troubleshooting guides, and keep infrastructure and architecture drawings current with changes.
  • Provided oversight and guidance for the architecture, development best practices for application hosting, and infrastructure deployment for each application.
  • Developed Cloud Formation scripts to automate EC2 instances
  • Utilized Configuration Management Tool Chef & created Chef Cookbooks using recipes to automate system operations.
  • Experience with analysis of logs and performing root cause analysis for various issues coming up on daily basis
  • Monitoring Live Traffic, logs, Memory utilization, Disk utilization and various other factors which are important for deployment.
  • Utilized Puppet for configuration management of hosted Instances within AWS. Configuring and Networking of Virtual Private Cloud (VPC). Utilized S3 bucket and Glacier for storage and backup on AWS.
  • Automated local dev environment using Vagrant/chef-solo, Ansible.
  • Solid ability to create automation with Chef , Puppet , Ansible or a shell and Node JS , Angular JS.

Environment: Java, Linux, Maven, Nexus, Chef, Puppet, Jenkins, Docker, Kubernetes, Nagios, GIT, AWS EC-2, Route 53, S3, VPC, EMR, SQS, Auto scaling, ELB, Shell Scripts, Unix/ Linux environment.

Confidential

Linux Administrator

Responsibilities:

  • Installing Red Hat Enterprise Linux 5.x/6.x, CentOS and installing packages, patches for Red Hat Linux servers, administrator of Red Hat Satellite Servers to avoid outage and developed strategies for enhanced system resource utilization.
  • Responsible for Red Hat Linux Designing, Installing, Configure, Security, Backup, and upgrade.
  • Configured Elastic Load Balancer to safeguard that the traffic is distributed uniformly across all the EC2 Instances.
  • Used Simple Storage Services, Glacier, and Elastic Book Store to manage the storage in cloud.
  • Deploy and manage servers through Puppet and scripts, use cloud providers as uninterrupted substrate for implementation.
  • Managed Web Applications, Configuration files, User Mount Points, Database, and Packages through Puppet.
  • Managed, configured servers to automate tasks and deploy apps on Virtual Machines, Bare-Metal and Cloud Instances using a tool Foreman along with Puppet.
  • Experienced in installing, configuring, administrating Jenkins on Linux machines alongside updating plugins like GIT, Maven, SVN and Puppet.
  • Involved in migrating subversion SVN to GIT.
  • Experienced in SCM tools GIT/GIT Hub.
  • Ensured the reliability of applications by creating release branches and development branches using GIT Branching.
  • Troubleshoot server issues and registered events since Forced Crash Dumps.
  • Proficient in installing and configuring Nagios, monitoring tool to monitor bandwidth of server network and hard drive status.
  • Improved monitoring in Nagios and custom plugins.
  • Worked on Installation/Configuration/Administrated VMware ESXi 5.1/5.5 & 6.0 and migrated existing servers into VMware Infrastructure.
  • Ensured the continuous operation of build and test systems by efficiently working with development, testing, deployment, infrastructure, and project teams.
  • Efficiently worked with development team, planned future requirements, and held meetings to analyze the usage and create report for the future requirements.
  • Experience with in working in an Agile / Scrum environment and daily standup meetings.

Environment: Linux (RHEL 5.x/6.x), RedHat Satellite Server, AWS, Puppet 3.x, Jenkins 1.x, WebLogic 11, WebSphere 7.0/8.0, Shell Scripting, VMware ESXI 4.x & 5.x, Apache 2.x, Apache Tomcat 6.x/7.x, GIT, Nagios 4.x/5. x.

Confidential

Solaris/Linux Administrator.

Responsibilities:

  • Involved in Planning, building and Administration of various High Availability clusters and heart beat checking on Sun Solaris using VCS in heterogeneous SAN environment.
  • Involved in development, user acceptance, and performance testing, production & disaster recovery server.
  • Administering Network File System using Auto mounter and administering user and OS data files in NIS, and NFS environment on RedhatLinux.
  • Worked with other IT teams including Database and Network Teams, customers (users), and other managers in helping build and implement systems and standards.
  • System performance tuning, User maintenance and security.
  • Interaction with vendors for Hardware and software supports.
  • Regular disk management like adding / replacing hot swappable drives on existing servers/workstations, partitioning according to requirements, creating new file systems or growing existing one over the hard drives and managing file systems.
  • Maintaining updated documentation of all the Servers and the installed applications and patches.
  • Performed day-to-day administration tasks like User Management, Space Monitoring, Performance Monitoring and Tuning, alert log monitoring and backup monitoring.
  • Experienced in dealing with LVM.
  • Deploy, maintain configure, troubleshooting logs and providing application support for the in-house applications such as Intelliconnect and SAAS on Red Hat Linux boxes.
  • Worked with VERITAS Volume Manager, VERITAS Cluster Server in all environments. As a member of the team, monitored the VERITAS Cluster Server 4.1 in SAN Environment.
  • Responsible for User and Group account management including their permissions.
  • Responsible on handling Cacti and Nagios tools for monitoring.

Environment: Red Hat Enterprise Linux (RHEL) 4.x, 5.x, IBM X 3650, X3850, Netra T1, HP Proliant DL 380, LDOMS 1.2, ISS system Scanner, Teamquest, VMWare, Veritas Volume Manager, Veritas Cluster Server 4.0, LVM.

We'd love your feedback!