Aws Iam Engineer Resume
SUMMARY
- 6 years of good experience in DevOps Engineer in automating, building, deploying, and releasing of code from one environment to another environment.
- Proven understanding of the principles and best practices of software configuration management in Agile and Waterfall methodologies.
- Implemented high level security best practices on services and application on the aws platform.
- Proficiency in working with configuration management tools such as Ansible, and Docker.
- Comfortable working with aws services such as Amazon cloud creating EC2 instances, security groups, ECS container services and Amazon elastic block store.
- Ability to creating Docker images using Docker File, working on Docker container snapshots, removing images, managing Docker volumes, and implementing Docker automation solution for CI/CD model.
- Knowledge of capacity planning, continuous integration and application deployment using Jenkins and Git for version control.
- Good Interpersonal Skills, team - working attitude, takes initiative, and very proactive in solving problems and providing the best solutions.
TECHNICAL SKILLS
Methodology: SDLC, Agile
Configuration Management Tools: Chef, Ansible
Containers and Orchestration Tools: Kubernetes, Docker, ECS, Fagate
AWS Services: VPC, S3, RDS, Elastic Search, Route 53, IAM, AWS Migration, SNS, AWS CLI, AWS ECS, EKS, Code Commit, Code Pipeline, Lambda, ELB, EC2, IAM, S3, Cloud Watch, CloudTrail log, Autoscaling
CI-CD/Build Tools: Maven, Sonarqube, Jenkins, GitLab, Nexus
Programming Languages: Json, Yaml, Bash Scripting
Scripting Languages: Python, Bash Scripting, yaml
Databases: SQL Server, MySQL
Web Servers: Apache Tomcat
Version Control / Other Tools: Git, GitHub, Jira, Junit
Cloud Containerization skill: Docker, ECS, Fagate, Kubernates.
IAC: Terraform, CloudFormation
Operating Systems: Windows, Linux
PROFESSIONAL EXPERIENCE
Confidential
AWS IAM Engineer
Responsibilities:
- Developing and implementing Software Release Management strategies for various applications according to the agile process.
- Ability to build deployments, build scripts and automated solutions using scripting languages such as Bash Scripting and Yaml.
- Designing and Developing solutions for CI/CD and Release Management using GIT, Jenkins, Maven, Sonarqube, Ansible, Kubernetes which propagates microservices from dev to production.
- Setup an Ansible pipeline from scratch to run a druid database application on aws.
- Used Ansible to create multiple playbooks to automate manual processes on components of the druid database application.
- Set up Jenkins and configured webhook and installed maven plugins into Jenkins to automatically trigger build process when there is a commit.
- Using Sonarqube for Code quality where I set up quality gates and Quality profiles to define rules in a code (Code coverage, vulnerabilities, and Code smell).
- Used terraform template to set-up an Autoscaling Group (ASG), aws Load Balancer (LB) and specify the launch configuration on the aws console.
- Improve security on my pipeline by making used of the Jenkins UI to assign group permissions to users
- Used terraform to provision multiple resources like EC2, VPC, S3, dynamo db in aws.
- Setup ECS Fargate & ECR, create task definitions and roles to run containers on aws.
- Designed Terraform templates to create multi region web applications and databases.
Confidential
DevOps Engineer/Cloud Security Engineer
Responsibilities:
- Set up data security by making use of KMS encryption and aws certificate manager CMS
- Make use of aws Lambda, Cloud watch and cloud trail log for security event monitoring
- Providing security recommendations on service design and application development and coding. (coding best practices)
- Used aws GuardDuty for threat detection and to continuously monitor my aws accounts and my workload for malicious activities.
- Implemented security best practices in aws by granting permission to users at the group level and also making use of the least privilege.
- Delegated access across AWS accounts using IAM cross account roles.
- Created AWS Multi-Factor Authentication (MFA) for instance logon, worked with teams to lock down security groups.
- Managed AWS single sign on (SSO) for multiple accounts.
- Set up security automation by making use of aws Lambda, sns notification and CloudWatch to automate security on S3 bucket.
- Set up a GitLab CI from scratch and configure the GitLab runner with a docker executor for a GitLab CI pipeline.
- Deploying and operating AWS, specifically VPC, EC2, S3, EBS, IAM, ALB, terraform and Cloud Watch using AWS Console and AWS Command Line Interface.
- Automated Jenkins job with webhook to trigger build process each time a commit is made
- Leverage cross account role access for users with multiple AWS accounts.
- Create users and groups and grant them permissions as per their job function.
- Managed multiple AWS accounts by creating an organization to consolidate and manage multiple accounts with the use of AWS Organization.
- Developed and documented security guardrails for AWS Cloud environments.
Confidential, MD
DevOps Engineer
Responsibilities:
- Creating cloud-based programs including implementing identity and access management and securely configuring cloud environments.
- Involved in the complete Software Development life cycle (SDLC) to develop application.
- Communicating with Dev, QA, and Delivery team related Build and deployment status and concern issues
- Performing threat simulations and penetration tests to identify and detect possible risks.
- Managing cryptography and encryption of data at rest using KMS in aws cloud.
- Logging, monitoring, and responding to detected incidents in the cloud environment
- Developed business process models of Waterfall to document existing and future business processes.
- Created and maintained user accounts, roles on MySQL and SQL servers.
- Worked on Docker and Ansible in build automation pipeline and Continuous Deployment of code using Jenkins andwrote Playbooks to automate Ansible servers using YAML scripting language.
- Managed cost optimizations on AWS account by using Ansible to automatically start servers during runtime, and stop them when idle.
- Used Ansible to manage Web applications, Environment configuration Files, Users, Mount points and Packages.
- Created and managed multiple Instances of Apache Tomcat and deployed several tests.
Confidential, MD
AWS Cloud Engineer/IAM Administration
Responsibilities:
- Used terraform to build a 3-tier architecture from scratch which comprises of vpc, subnet, rout table, Nat gateway, security group, ALB, route 53, mysql DB, elastic ip, internet gateway, aws EC2 and certificate manager
- Create AWS multi account and cross account rules and permissions for client.
- Create groups for users and grant them permission per their job function
- Implemented security best practices by granting permission to users at the group level and also making use of the least privilege
- Created AWS Multi-Factor Authentication (MFA) using DUO authenticator for instance and SSH logon, and also worked with teams to lock down security groups
- Delegated access across AWS accounts using IAM cross account roles
- Security groups configured and locked down to the various authorized subnet and ip addresses in AWS.
- Developed and documented security guardrails for AWS Cloud environments.
- Managed AWS single sign on (SSO) for multiple accounts.
- Create users and groups and grant them permissions as per their job function.
- Managed multiple AWS accounts by creating an organization to consolidate and manage multiple accounts with the help of AWS Organization.