Cloud Engineer Resume
4.00/5 (Submit Your Rating)
SUMMARY
- Having 7.8+ years of experience as a Cloud Engineer to build & maintain infrastructure in AWS, Azure, and GCP.
- Provide support to AWS global Managed Services customers in daily operation.
- Participate on schedule daily/weekly/monthly maintenance automation using cloud SSM
- Hands - on Experience in configuration of Network architecture on AWS with VPC, Subnets, Internet & Nat gateways, Route table.
- Worked on JIRA for defect/issues logging & tracking and documented all my work using CONFLUENCE.
- Amazon IAM service enabled to grant permissions and resources to users. Managed roles and permissions of users with the help of AWS IAM.
- Configured AWS Multi Factor Authentication in IAM to implement 2 step authentication of user's access using DUO.
- Automated server start/stop script using AWS lambda, SNS & Cloud Watch with customized email notification.
- Hands-on experience in Microsoft Azure & Google Cloud native patching.
- Integrated the patching process of Azure, GCP using the AWS Hybrid Activation.
- Provide daily monitoring, management, troubleshooting and issue resolution to systems and services hosted on cloud resources.
- Work as part of a team, to design and develop cloud data solutions.
- Worked closely with SDLC team for deploying/troubleshooting jira application.
- Created/Documented the process of adding the Linux/Unix servers to domain using PBIS.
- Deploying AWS Workspaces, RDS, Elastic search/Cache,EC2 & EFS on need basis to the clients.
- Configuring VPN using palalto for the newly on-boarded clients.
- Maintaining the systems security up to date using Trend Micro Deep security.
- Performed Workspace & Volume Cleanup activity as a cost saving solution.
- Configuring templates in solawinds for custom monitoring
- Automating the infrastructure using the terraform.
- Experience in Kubernetes to deploy Scale, Load balance and manage docker containers with multiple namespaced versions
- Deploy and managing EKS cluster on AWS
TECHNICAL SKILLS
Operating Systems: RHEL, SuSe, Ubuntu, Windows
Application Servers: Apache (2.2x,), Tomcat (7x), Ngnix (1.13x)
Containers: Docker (18x), Kubernets (1.11, 1.13x)
Scripting Languages: Shell, Bash scripting
Cloud Computing: AWS, Azure & GCP
Monitoring Tools: SolarWinds, PingDom, TrendMicro, DUO
Ticketing Tool: Jira & Snow
PROFESSIONAL EXPERIENCE
Confidential
Cloud Engineer
Responsibilities:
- Experienced in creating IAM policies, Roles and user Management for delegated access within aws
- Patched of Linux and windows instances within a maintenance window using AWS SSM and perform security updates of the same instances for the remediation of system vulnerabilities
- Created and managed s3 buckets Configure Virtual Private Cloud (VPC) with both public and private subnets, NAT instances, and Elastic Load Balancers.
- Deploying & Managing AWS workspaces with MFA enabled.
- Delegating On-prem AD with aws directory services to provide role base access to users
- Automating the infrastructure using the terraform
Confidential
CloudOps Engineer
Responsibilities:
- Designed and deployed enterprise-wide scalable operations on AWS and implementing the cost control strategies.
- Implemented roles and groups for users and resources using AWS Identity Access Management (IAM) and also managed network security using Security Groups, and IAM.
- Provided highly durable and available data by using S3 data store, versioning, lifecycle policies, and create AMIs for mission-critical production servers for backup
- Documented system configurations, Instance, OS, and AMI build practices, backup procedures, troubleshooting guides, and keep infrastructure and architecture drawings current with changes.
- Patched of Linux and windows instances within a maintenance window using AWS SSM and perform security updates of the same instances for the remediation of system vulnerabilities.
- Created Route 53 DNS entry for domain name resolution.
- Worked at optimizing volumes, EC2 instances, and created multiple VPC instances
- Experienced in designing and deploying AWS solutions using EC2, S3, EBS, ELB, Auto Scaling groups.
Environment: AWS, Azure & GCP, S3, Identity Access Management (IAM), EC2.
Confidential
Cloud Engineer
Responsibilities:
- Worked in virtualized environment (Xen & VMware)
- Commissioning and decommissioning of VMs and Physical machines as per requirement.
- Managing storage space and VM space through TIC Tool.
- Troubleshooting port related issues using nmap utility
- Patching of VMs and Physical servers
- Os and kernel parameter change
- Creating File system and configure to available network through NFS, SFTP, SAMBA.
- Managing Disk File Systems, Server Performance, Users Creation and Granting file access Permissions.
- Installation of patches and packages RPM and YUM/ Zypper
- Working on network migration and domain migration.
- McAfee antivirus installation/upgrade
- DNS Forwarding and zone transfer configuration
Environment: HANA Enterprise Cloud, AWS, Azure, VMware
Confidential
Linux Administrator
Responsibilities:
- Installing Red Hat Enterprise Linux OS.
- User and Group Administration.
- File Permissions & Special Permissions (Setuid, Setgid, Stickybit) and ACL’s.
- Creating new partition and mounting.
- Creating, Extend and Reducing the LVM.
- Monitoring and troubleshooting of the File System issues, CPU and Memory utilization of servers.
- Configuring LVMs and adding the additional disk space as and when required.
- Communicating with the application and DB teams and performing monthly server reboots/patching activities as per the client’s requirement.
- Installing and updating the packages through YUM & RPM.
- Backup and Restore the data.
- Monitoring the network services.
- Configure the scheduling the tasks using CRON.
- Installing/Configuring/Maintaining the SAMBA, SFTP,FTP&APACHE Servers.
- Remote administration using SSH.
- Basic level shell scripting to automate the Tasks.
- Providing L1 & L2 support for Unix Servers.
- Troubleshooting of day-to-day issues such as logging in, network, disk space and permission issues.
- Maintaining and deploying the changes to keep the servers/Applications up with latest versions.
- Package and patch administration.
- Monitoring the performance of the servers and networks using Mwatch tool.
- Working on the Mwatch tool to monitor Alerts & resolving Tickets.
- Configuring and maintaining Confidential cloud applications.