We provide IT Staff Augmentation Services!

Aws Iam Engineer Resume

5.00/5 (Submit Your Rating)

SUMMARY

  • 6 years of good experience in DevOps Engineer in automating, building, deploying, and releasing of code from one environment to another environment.
  • Proven understanding of the principles and best practices of software configuration management in Agile and Waterfall methodologies.
  • Implemented high level security best practices on services and application on the aws platform.
  • Proficiency in working with configuration management tools such as Ansible, and Docker.
  • Comfortable working with aws services such as Amazon cloud creating EC2 instances, security groups, ECS container services and Amazon elastic block store.
  • Ability to creating Docker images using Docker File, working on Docker container snapshots, removing images, managing Docker volumes, and implementing Docker automation solution for CI/CD model.
  • Knowledge of capacity planning, continuous integration and application deployment using Jenkins and Git for version control.
  • Good Interpersonal Skills, team - working attitude, takes initiative, and very proactive in solving problems and providing the best solutions.

TECHNICAL SKILLS

Methodology: SDLC, Agile

Configuration Management Tools: Chef, Ansible

Containers and Orchestration Tools: Kubernetes, Docker, ECS, Fagate

AWS Services: VPC, S3, RDS, Elastic Search, Route 53, IAM, AWS Migration, SNS, AWS CLI, AWS ECS, EKS, Code Commit, Code Pipeline, Lambda, ELB, EC2, IAM, S3, Cloud Watch, CloudTrail log, Autoscaling

CI-CD/Build Tools: Maven, Sonarqube, Jenkins, GitLab, Nexus

Programming Languages: Json, Yaml, Bash Scripting

Scripting Languages: Python, Bash Scripting, yaml

Databases: SQL Server, MySQL

Web Servers: Apache Tomcat

Version Control / Other Tools: Git, GitHub, Jira, Junit

Cloud Containerization skill: Docker, ECS, Fagate, Kubernates.

IAC: Terraform, CloudFormation

Operating Systems: Windows, Linux

PROFESSIONAL EXPERIENCE

Confidential

AWS IAM Engineer

Responsibilities:

  • Developing and implementing Software Release Management strategies for various applications according to the agile process.
  • Ability to build deployments, build scripts and automated solutions using scripting languages such as Bash Scripting and Yaml.
  • Designing and Developing solutions for CI/CD and Release Management using GIT, Jenkins, Maven, Sonarqube, Ansible, Kubernetes which propagates microservices from dev to production.
  • Setup an Ansible pipeline from scratch to run a druid database application on aws.
  • Used Ansible to create multiple playbooks to automate manual processes on components of the druid database application.
  • Set up Jenkins and configured webhook and installed maven plugins into Jenkins to automatically trigger build process when there is a commit.
  • Using Sonarqube for Code quality where I set up quality gates and Quality profiles to define rules in a code (Code coverage, vulnerabilities, and Code smell).
  • Used terraform template to set-up an Autoscaling Group (ASG), aws Load Balancer (LB) and specify the launch configuration on the aws console.
  • Improve security on my pipeline by making used of the Jenkins UI to assign group permissions to users
  • Used terraform to provision multiple resources like EC2, VPC, S3, dynamo db in aws.
  • Setup ECS Fargate & ECR, create task definitions and roles to run containers on aws.
  • Designed Terraform templates to create multi region web applications and databases.

Confidential

DevOps Engineer/Cloud Security Engineer

Responsibilities:

  • Set up data security by making use of KMS encryption and aws certificate manager CMS
  • Make use of aws Lambda, Cloud watch and cloud trail log for security event monitoring
  • Providing security recommendations on service design and application development and coding. (coding best practices)
  • Used aws GuardDuty for threat detection and to continuously monitor my aws accounts and my workload for malicious activities.
  • Implemented security best practices in aws by granting permission to users at the group level and also making use of the least privilege.
  • Delegated access across AWS accounts using IAM cross account roles.
  • Created AWS Multi-Factor Authentication (MFA) for instance logon, worked with teams to lock down security groups.
  • Managed AWS single sign on (SSO) for multiple accounts.
  • Set up security automation by making use of aws Lambda, sns notification and CloudWatch to automate security on S3 bucket.
  • Set up a GitLab CI from scratch and configure the GitLab runner with a docker executor for a GitLab CI pipeline.
  • Deploying and operating AWS, specifically VPC, EC2, S3, EBS, IAM, ALB, terraform and Cloud Watch using AWS Console and AWS Command Line Interface.
  • Automated Jenkins job with webhook to trigger build process each time a commit is made
  • Leverage cross account role access for users with multiple AWS accounts.
  • Create users and groups and grant them permissions as per their job function.
  • Managed multiple AWS accounts by creating an organization to consolidate and manage multiple accounts with the use of AWS Organization.
  • Developed and documented security guardrails for AWS Cloud environments.

Confidential, MD

DevOps Engineer

Responsibilities:

  • Creating cloud-based programs including implementing identity and access management and securely configuring cloud environments.
  • Involved in the complete Software Development life cycle (SDLC) to develop application.
  • Communicating with Dev, QA, and Delivery team related Build and deployment status and concern issues
  • Performing threat simulations and penetration tests to identify and detect possible risks.
  • Managing cryptography and encryption of data at rest using KMS in aws cloud.
  • Logging, monitoring, and responding to detected incidents in the cloud environment
  • Developed business process models of Waterfall to document existing and future business processes.
  • Created and maintained user accounts, roles on MySQL and SQL servers.
  • Worked on Docker and Ansible in build automation pipeline and Continuous Deployment of code using Jenkins andwrote Playbooks to automate Ansible servers using YAML scripting language.
  • Managed cost optimizations on AWS account by using Ansible to automatically start servers during runtime, and stop them when idle.
  • Used Ansible to manage Web applications, Environment configuration Files, Users, Mount points and Packages.
  • Created and managed multiple Instances of Apache Tomcat and deployed several tests.

Confidential, MD

AWS Cloud Engineer/IAM Administration

Responsibilities:

  • Used terraform to build a 3-tier architecture from scratch which comprises of vpc, subnet, rout table, Nat gateway, security group, ALB, route 53, mysql DB, elastic ip, internet gateway, aws EC2 and certificate manager
  • Create AWS multi account and cross account rules and permissions for client.
  • Create groups for users and grant them permission per their job function
  • Implemented security best practices by granting permission to users at the group level and also making use of the least privilege
  • Created AWS Multi-Factor Authentication (MFA) using DUO authenticator for instance and SSH logon, and also worked with teams to lock down security groups
  • Delegated access across AWS accounts using IAM cross account roles
  • Security groups configured and locked down to the various authorized subnet and ip addresses in AWS.
  • Developed and documented security guardrails for AWS Cloud environments.
  • Managed AWS single sign on (SSO) for multiple accounts.
  • Create users and groups and grant them permissions as per their job function.
  • Managed multiple AWS accounts by creating an organization to consolidate and manage multiple accounts with the help of AWS Organization.

We'd love your feedback!