Devsecops Engineer Resume
Libertyville, IL
SUMMARY
- Around 7 years of experience in Software Configuration and Release Management as Software Configuration Management, DevSECOps and Cloud deployments Specialist.
- Hands on experience withAWScloud - specific technologies including Elastic Compute Cloud (EC2), Simple Storage Services (S3), Route 53, Cloud Formation, IAM, elastic beanstalk, ELB, Lambda, SNS, SQS, Virtual Private Cloud (VPC), RDS, Cloud Watch, ECS, EKS and DynamoDB.
- Hands on experience on Azure Virtual network, Certificate manger, serverless, VM’S, VM images, MySQL DB’s, and AKS.
- Experience with spring boot and NodeJS Application to Elastic Beanstalk using Jenkins and terraform.
- Extensively worked on building Pre-Baked AMIs and VM images using Packer.
- Expertise in Ansible and Ansible playbooks and also Ansible deployment environment based deployments.
- Experience in Chef Automation including writing Cookbooks, wrappers, customized recipes for test driven development environments.
- Experience in Installing, configuring, and maintaining Ansible and Chef.
- Wrote custom Chef Cookbooks for managing the full application stack (Tomcat/httpd/My SQL/Java).
- Wrote ansible playbooks for automating shell scripts.
- Experience in Chef for configuration management and infrastructure automation.
- Experience with CI/CD tools such as Thought Works Go CD, Circle CI and Jenkins (BMX).
- Utilized Kubernetes and Docker for the runtime environment of theCI/CDsystem to build, test deploy.
- Experience in upgrading and maintaining Git Enterprise, Jenkins, Chef.
- Experienced in Akamai and Venafi certificates and uploading certs to AWS ACM, IAM, load balancer and Azure certificates.
- Container management using Docker by writingDocker filesand set up the automated build on Docker HUB and installed and configured Kubernetes.
- Experience in creating and maintaining AWS RDS instances like Aurora, MySQL, Postgres.
- Kafka is used to implementation of log files from Mango DB.
- Experience in NOSQL Services like DynamoDB, Azure Cosmos DB and MongoDB.
- Experience in creating Jenkins Blue green deployment.
- Experience in automatic shutdown of RDS (in dev/ QA) non office hours using AWS Lambda and python for cutting down costs.
- Experience in automating AWS cloud infrastructure using Terraform, CloudFormation, Troposphere and SAM Templates.
- Experience in security vulnerability patching and version upgrades (apache OpenSSL, java, Tomcat, Nodejs, system OpenSSL, SUDO).
- Experience in building docker base and run time images and deployed it to Artifactory Registry, Amazon ECR and Azure container registries using Jenkins pipelines.
- Worked on Sense monitoring tool for getting alerts for all AWS Resources.
- Worked on developingSplunkqueries and dashboards targeted Confidential understanding application performance and capacity analysis.
- Experienced in UNIX/Linux Environment, shell scripting, Ruby.
- Worked on Disaster Recovery (DR’s) for launching applications stacks in another AWS region.
- Extensive experience on Cloud security and cost optimization.
- Worked on New Relic APM, Infrastructure, Insight, and server module configurations and automated it using terraform.
- Extensively worked on Jfrog Artifactory migration from data center to AWS cloud.
TECHNICAL SKILLS
Programming: Shell Scripting, Ruby, Terraform, Json File, Docker files, YML
Back-End: Elasticsearch, MySQL, Postgres SQL, MongoDB, Aurora DB, Cosmos DB
Source Control/Versioning: SVN, GIT, Bitbucket
Configuration Management: Chef, Ansible and Puppet
Project Management / Monitoring Tools: JIRA, confluence, version one, Splunk
CI / CD: Jenkins, GOCD
Applications Servers: Web logic, Tomcat, Apache, NodeJS, Java
Cloud Technologies: Amazon web services, Microsoft Azure, Google Cloud
Operating System: Linux, Debian, Ubuntu, Cent OS 6.x, 7.x RedHat 6.x, 7.x, Mac OS X, Windows 10/8/7, Alpine Linux
Container Services: Docker, EKS, AKS
PROFESSIONAL EXPERIENCE
Confidential, Libertyville, IL
DevSECOps Engineer
Responsibilities:
- Support Application teams to create and manage their apps and resolve issues by working along with them.
- Automating the infrastructure as much as possible using terraform and shell.
- Build custom templates for Java spring boot and Node Js applications deployment in ECS and Elastic beanstalk using terraform and Jenkins.
- Deploy and monitor infrastructure tools like AWS, Ansible, BMX(Jenkins), Sense, New relic, and Rundeck, SignalFX.
- Used Ansible Playbooks to setup Continuous Delivery Pipeline. Deployed micro services, including provisioning AWS environments using Ansible Playbooks.
- Used Ansible and Ansible Tower as Configuration management tool, to automate repetitive tasks, quickly deploys critical applications, and proactively manages change.
- Automate infrastructure as code for building AWS, new relic resources using terraform. working on Venafi certificates and upload to AWS certificate managers, load balancer and Akamai
- Installed Hashi Corp vault on to the local machine and used it as a tool to store all the data.
- Collaborate in the automation of AWS infrastructure via terraform, troposphere, and Jenkins - software and services configuration via Ansible playbooks.
- Wrote Python Code using Ansible Python API to Automate Cloud Deployment Process.
- Working on Ansible playbooks for deploying code changes, plugin changes in all environments.
- Configuring Ansible to build up services and applications on the instances once they have been configured using cloud formation.
- Developed Python Modules for Ansible Customizations.
- Experience in Akamai user management and configurations.
- Experience in verify certificate management and renewal and upload to AWS IAM, AWS certs manager and Akamai flush.
- Extensive experience in Maintaining infrastructure as secure and upgrading versions using Ansible, also experience in vulnerability Patching, Kernel upgrades.
- Worked on System/Apache OpenSSL minor/major version Upgrades using Cookbooks.
- Worked on multiple Web Application services major/minor version upgrades like Java, Nodejs, Python, Apache.
- Created private cloud using Kubernetes that supports DEV, TEST, and PROD environments.
- Provided security and managed user access and quota using AWS Identity and Access Management (IAM), including creating new Policies for user/role management. Automated this process using Terraform.
- Writing Ansible modules, playbooks, roles and Ansible vault and uploading them on to the Ansible server for the instances that are configured with the changes pick up the latest code.
- Created reproducible builds of theKubernetesapplications, managed Kubernetes manifest files and Managed releases of Helm packages.
- Worked on creating SES mail and testing with local clients for application teams.
- Worked on inspecting test cases for testing AMI’s.
- Worked on Splunk for logging application log files of an instance to the Splunk.
- Worked on Kinesis firehose and Kafka POC for forwarding CloudWatch logs to Splunk server using serverless and implemented it to all the application teams.
- Responsible for quarterly AMI patches, security, and releases.
- Proficient with Jenkins for continuous integration and continuous deployment and for End-to-End.
- Monitored server alerts using Sense and new Relic and setting up alerts for all servers for CPU monitoring, disk usage, memory usage.
- Managed local deployments in Kubernetes, creating local cluster and deploying application containers.
- Experience on automating infrastructure using Jenkins and Terraform.
- Experienced in enabling the authentications as per the project requirements and disable them when the task is done.
- Involved in review, status meeting and coordinated with team members.
- Communicating with different application team members and coming up with solutions for problems.
- Experience in maintaining in-house system administration.
- Training various application teams with the concepts of DevOps used Confidential our Infrastructure.
- Worked in a team which is responsible for disaster recovery by launching all the application stacks in different regions.
Environment: AWS, Terraform/Hashi Corp Vault, Nodejs, Artifactory, new relic, Kubernetes, Terraform, GitHub, Ansible, Docker, Sense, Lambda, Circle CI, Signa FX, Jenkins, Rundeck, Divvy cloud.
Confidential, Richardson, Texas
DevOps Engineer
Responsibilities:
- Hands on experience in AWS provisioning and good knowledge ofAWS serviceslikeEC2, S3, Glacier, ELB, RDS, Redshift, IAM, Route 53, VPC, Auto scaling, Cloud Front, Cloud Watch, Cloud Trail, Cloud Formation, Security Groups.
- Responsible for building and maintaining infrastructure VM Images.
- Automated Vm images build process using ansible roles and playbooks.
- Install and configure ansible towers to build servers and deploy the configuration.
- Created playbooks for tomcat to deploy static and dynamic content.
- Created playbooks for start/stop/restart operations and to manage data.
- Experience inAWSStorage, Application Services, Deployment and Management and managed servers on AWS platform instances using Chef Configuration management.
- Automated Termination of Vm images and snapshots in periodically.
- Worked on SSH keypair mechanism for securely maintaining and storing secrets.
- Developed and maintained HashiCorpVault for VM’s SSH authentication and secret store.
- Involved in development of Grafana and Global Prometheus.
- WorkedwithIAMservice creating newIAMusers & groups, defining roles and policies and Identity providers.
- Created tagging standards for proper identification and ownership ofEC2 instancesand other AWS resources.
- Deploy and monitor scalable infrastructure on Amazon web services (AWS) & configuration management.
- Worked on updating Jenkins’s master server and slaves.
- Deployed and configuredChef Serverincludingbootstrappingof chef-client nodes for provisioning.
- Createdroles, recipes, cookbooks, and data bagsfor server configuration.
- Spent some time on Key vault Role setup and user authentication.
Environment: AWS, Vault, Docker, Jenkins, Chef, Centos, Amazon Linux, Alpine Linux, ubuntu, Terraform, AMI, Hashi corp Vault, Grafana, Gray logs, Ansible.
Confidential
DevOps Engineer
Responsibilities:
- DevOps Engineer for a team that involved different development teams and multiple simultaneous software releases and implemented Continuous Integration Process.
- Experience in Amazon AWS Cloud Administration services. Creation of S3 buckets.
- Creating tenants, users, roles, and endpoints.
- Creating bridge networks for internal and external access.
- Implemented a Continuous Delivery framework using Jenkins, Chef, Maven & Nexus in Linux CLI environment.
- Created a table in postgres which can be appended with new tasks and consumed by the consumer program like celery by Rabbit MQ.
- Setup, Implementation, Configuration of SFTP/FTP servers
- Creation and maintenance of content for the Ansible community, and implementation of Ansible modules based on customer and community requirements.
- Imported and managed multiple corporate applications into Subversion (SVN) and GIT.
- Define/setup network protocols, Network File Services (NFS), and Network Information Services (NIS) in Red Hat Linux and IBM AIX systems.
- Performed Ftp/Sftp Administration.
- Launch stacks from templates and manage stacks using Cloud Formation templates.
- Involved in the Branching Strategy, thereby creating different branches in the existing workflow process.
- Worked with Apache Tomcat for deploying and starting application.
- Good understanding of build and deployment of java/j2ee applications in Tomcat servers.
- Installed and administrate JIRA and Confluence in Integration environment and QA environment.
- Automated deployment of builds to different environments using Jenkins.
- Installation of certificates on Tomcat servers. Strong in building scalable web applications on AWS.
- Involved in JIRA as defect tracking system and configure various workflows, customizations, and plug-ins for JIRA bug/issue tracker. Integration of Jenkins with Jira, GIT hub.
- Installed and configured Confluence as the enterprise Wiki to document development and change management procedures.
Environment: AWS, Tomcat, Jira, GIT, Ubuntu, Java, DataDog, Red hat, Jenkins, Chef Postgres and Oracle Database.
Confidential
Intern/Jr. DevOps Engineer/ Linux Administrator.
Responsibilities:
- Involved to design and build multiple RHEL6.x servers to include OS hardening RHEL5.x/6.x mission critical Oracle RAC Cluster, and VSF and make ready for App/DB Team.
- Used Maven release Plugin to support the release of various application snapshots.
- Install-configure-maintain the Linux servers, DNS, DHCP, SMTP, SSHD.
- Performed TCP/IP, DNS, DHCP administration.
- Uses LVM creating Volume Groups, Logical volumes and disk mirroring in Linux.
- Setting up and troubleshooting user workstations based on RedHat Linux.
- Account,user and group administration, Permissions policy management and quota implementation, User and Group Administration.
- Worked on User management and group management.
- Systemperformance monitoring, tuning andlog management, TCP/IP Networking troubleshooting and Linux Network Administration.
- Assign Roles, manage Users and groups and assign policies using AWS Identity and Access Management (IAM).
- Host file entries, mount point creation, user account unlock and other issue resolution.
- Job scheduling for users using Crontab.
- Worked on Jenkins to build and test the applications
- Worked on Jenkins pipeline issues.
- Used SVN for branching, tagging, and merging.
- Imported and managed multiple corporate applications into Subversion (SVN) and GIT.
- Monitoring, creation, acknowledgment and categorization of tickets.
- Disk Space and Logical Volume manager (LVM) Management in Linux.
- Installing configuring and troubleshooting mail servers Postfix.
- DHCP Server configuration automating the setting up of IP, Name Server and Gateway.
- Using LVM (Logical Volume Manager) tools extend Linux Security Services: IP tables, SELinux, Firewall. (Accept &Reject different services like FTP, SSH etc.)
- Configure kernel parameter on Linux servers.
- YUM package repository configuration on Linux servers Backup and restoration using arching tools (tar)
- Configuring and administration of FTP, NFS, SAMBA, APACHE servers.
- Configuring DNS, DHCP and MAIL server.
- Patching: using yum and rpm.
- Troubleshooting the Booting issue. Aware of most of the booting issues and know how to fix it.
- Preparing shell scripts for automation of generalized repeated processes.
- Performing all Linux Administration tasks independently.
- Installing physical server and OS (RHEL6, RHEL7)
Environment: RHEL, Server configurations, AWS, GitHub, Cronjob, LVM.