We provide IT Staff Augmentation Services!

Sr. Aws Devops/secops Engineer Resume

4.00/5 (Submit Your Rating)

SUMMARY

  • Over 4 years of IT experience in infrastructure automation, code migration, configuration management and CI/CD lifecycle.
  • Worked on Continuous Integration (CI) and Continuous Delivery (CD) in Agile, Scrum and Waterfall methodologies with thorough knowledge on each phase of the SDLC (Software Development Life Cycle).
  • Strong experience in setting up enterprise infrastructure on AWS platform and In - depth knowledge in designing highly available, fault tolerant, scalable systems like
  • EC2, S3, EBS, VPC, ELB, AMI, SNS, SQS, RDS, IAM, Lambda, Route 53, Auto scaling, Load Balancing, Cloud Front, Cloud Watch, Cloud Trail, Cloud Formation, OpsWorks, NAT Gateways, Subnets, Security Groups and NACL's.
  • Ensure data integrity and data security on AWS technology by implementing AWS best practices.
  • Experience in Converting existing AWS infrastructure to Server less architecture (AWS Lambda, Kinesis), deploying via Terraform and AWS Cloud Formation.
  • Experience on Cloud Automation using AWS Cloud Formation Templates, Terraform.
  • Proficient level of experience on DevOps essential tools like Ansible, Docker/ECS, Subversion (SVN), GIT, TFS, Hudson, Jenkins, Ant, Maven and AWS Developer services
  • Experienced in System Administration, Installations, Upgrades, Patches, Security, Backup, Migration, Disaster Recovery, System Builds, Server builds and Performance Monitoring in Linux/Unix Systems
  • Extensively worked with source code management tools like SVN (Subversion), TFS, GIT and Bit Bucket.
  • Extensively worked on Jenkins, Hudson and TeamCity for continuous integration and for end to end automation for all builds and deployments.
  • Installed/Configured the WebSphere server, JBoss application server, WebLogic, Tomcat, Nginx server.
  • Experience working on Docker hub, creating Docker/ECS images and handling multiple images primarily for middleware installations and domain configuration.
  • Proficient in writing Python, YAML, Perl, Shell, Bash, scripting to automate the deployments.
  • Hands on experience with monitoring & issue tracking tools like Splunk.
  • Experience working / administering databases both SQL and RDS
  • Expertise in Installation and maintenance of Mail Servers like Send Mail, Postfix. Configured and administered SNS, NFS, DNS, NIS, SSL, DHCP, NIS+, SAMBA, Send Mail, FTP, Remote access and LDAP on Linux server environment.
  • Having strong and progressive experience in the server installation and administration of Red Hat Linux, Debian, Centos, OEL (Oracle Enterprise Linux), SUSE and VMware vSphere ESX & ESXI on various Hardware Platforms.
  • Expertise in troubleshooting the problems generated while building, deploying and in production support.
  • Managed environments DEV, QA, CI, UAT and PROD for various releases and designed instant strategies. Also, Responsible for building and releasing packages for different testing environments.

TECHNICAL SKILLS

Cloud Infrastructure: AWS

Operating Systems: RHEL/CentOS, Ubuntu/Debian/Fedora, Unix, Windows

Virtualization Tools: GIT, GitHub, SVN (Subversion), Bitbucket

Build Tools: Maven, Ant, Gradle

CI tools: Jenkins

Configuration Management Tools: Ansible, SSM

Containerization: Docker, Kubernetes

Monitoring Tools: Dome 9, Evident.io, Cloud health, Qualys, Crowd strike

Bug Tracking tools: JIRA, Rally, Remedy, ServiceNow

Scripting Languages: Shell, Bash, Yaml, Python

Databases: SQL Server, MySQL, DynamoDB, RDS

PROFESSIONAL EXPERIENCE

Confidential

Sr. AWS DevOps/SecOps Engineer

Responsibilities:

  • Expert Knowledge on cloud custodian in order to implement compliance on AWS server environment Expert Knowledge on IAM administration
  • Hands on experience with Docker/ECS and CICD Jenkins
  • Worked on AWS services EC2, IAM, S3, Lambda, Cloud Watch, SNS, SQS, SES,EMR, Elastic Bean stalk, VPC, ELB, RDS, EBS, Route 53 Manage AWS EC2 instances utilizing Auto Scaling, Elastic Load Balancing
  • Had expert knowledge with IAM policies and roles, groups, trusted entities, ststokens
  • Implemented central logging mechanism to collect all the logs in one place and used Athena to query the logging data
  • Expert knowledge on Third party security tools like Dome 9, evident.io, cloud health, Qualys,Crowdstrike
  • Implemented AWS infra automation using Jenkins in order to make users comfortable to spin up the resources by single click Implemented aurora RDS automation using Jenkins
  • Created private cloud using Kubernetes that supports DEV, TEST, and PROD environments.
  • Implemented Guard Duty service in order to tackle the security issues and connected to slack to notify our security team for monitoring
  • Implemented Guardrails using the AWS lambda to manage the compliance and cost management of the resources
  • Implemented cloud watch in connection with Guard Duty rules to identify the security severity levels that ranging from 2 to 8.9
  • Used kinesis streams in order to receive the cloud watch logs from other accounts and store it in s3 buckets
  • Implemented security Patching on the servers and used data dog for monitoring and pager duty for alerts Implemented Disaster recovery mechanisms in-order to reduce business downtime
  • Implemented Fortigate polices in order to restrict the outside users to access our application and database server
  • Have hands on experience in deploying Fortigate appliances, fort iCloud and fort iCloud to store the logs
  • Log Analysis, Maintaining documents of production server error log’s reports.
  • Wrote Ansible Playbooks to install, configure and to automate pairing process of clusters for Disaster Recovery.
  • Deployed micro services, including provisioning AWS environments using Ansible Playbooks.
  • Setup/Managing VPC Subnets; make the connection between different zones; Blocking suspicious ip/subnet via ACL.
  • Container management using Docker by writing Docker files and set up the automated build on Docker HUB and installed and configured Kubernetes.
  • Configured AWS Identity Access Management (IAM) Group and users for improved login authentication
  • Automated the setup of multi-account AWS environment with just a few clicks
  • Used Control Tower to provide mandatory and strongly recommended high-level rules, called guardrails, that help enforce your policies using service control policies (SCPs), or detect policy violations using AWS Config rules
  • Used Control Tower to provide integrated dashboard so you we can see a top-level summary of policies applied to your AWS environment.
  • Configured AWS Single Sign-On (SSO) to centrally manage access to multiple AWS accounts and business applications and provide users with single sign-on access to all their assigned accounts and applications from one place
  • Configured AWS SSO to centrally manage SSO access and user permissions for all of our AWS accounts managed through AWS Organizations.
  • Used AWS SSO to create your user identities and groups in AWS SSO.
  • Managed local deployments in Kubernetes, creating local cluster and deploying application containers.
  • Setup/Managing CDN on Amazon Cloud Front (Origin Path: Server / S3) to improve site Creating/Managing DNS records on Amazon Route 53 and go-daddy panel
  • Implemented WAF and cloud front for our internal confidential websites in order to mitigate the risk of attacks Implemented geographical, IP level blocking on the cloud front and WAF
  • Implemented the Guard duty in all the AWS environments using automation in order to get the severity of external attacks ranging from 1-8.9
  • Implemented and designed the CICD Jenkins to spin up on demand slaves automatically and process the request from using those slaves and delete the slaves on the fly after the work is done in order to save the cost
  • Sample Architecture implemented for security compliance in Verizon:
  • Event Cloud-Watch Event Bus Cloud-Watch of parent account send to SNS forward to lambda parse the event generate sts tokens for child account remediate or leave

Environment: Amazon Web Services (AWS), GIT, TFS, Jenkins, Maven, Nexus, Ansible, Chef, Terraform, Vagrant, Docker, SQL Server, Kubernetes, Java, Node.js, Python, Bash, Nagios, JIRA, Splunk, UNIX/Linux Environments.

Confidential

Devops AWS Engineer

Responsibilities:

  • Responsible for architecting, designing, implementing and supporting of cloud-based infrastructure and its solutions.
  • Managing Amazon Web Services (AWS) infrastructure with automation and orchestration tools such as Chef.
  • Proficient in AWS services like VPC, EC2, S3, ELB, Autoscaling Groups (ASG), EBS, RDS, IAM, Cloud Formation, Route 53, Cloud Watch, Cloud Front, Cloud Trail.
  • Experienced in creating multiple VPC’s and public, private subnets as per requirement and distributed them as groups into various availability zones of the VPC Created NAT gateways and instances to allow communication from the private instances to the internet through bastion hosts. Involved in writing Java API for Amazon Lambda to manage some of the AWS services.
  • Used security groups, network ACL’s, internet gateways and route tables to ensure a secure zone for organization in AWS public cloud.
  • Created and configured elastic load balancers and auto scaling groups to distribute the traffic and to have a cost efficient, fault tolerant and highly available environment.
  • Created S3 buckets in the AWS environment to store files, sometimes which are required to serve static content for a web application.
  • Used AWS Beanstalk for deploying and scaling web applications and services developed with Java.
  • Configured S3 buckets with various life cycle policies to archive the infrequently accessed data to storage classes based on requirement.
  • Building/Maintaining Docker container clusters managed by Kubernetes, Linux, Bash, GIT, Docker, on AWS. Utilized Kubernetes and Docker for the runtime environment of the CI/CD system to build, test deploy.
  • Possess good knowledge in creating and launching EC2 instances using AMI’s of Linux, Ubuntu, RHEL, and Windows and wrote shell scripts to bootstrap instance.
  • Used IAM for creating roles, users, groups and also implemented MFA to provide additional security to AWS account and its resources.
  • Written cloud formation templates in JSON to create custom VPC, subnets, NAT to ensure successful deployment of web applications.
  • Implemented domain name service (DNS) through route 53 to have highly available and scalable applications.
  • Maintained the monitoring and alerting of production and corporate servers using Cloud Watch service.
  • Created EBS volumes for storing application files for use with EC2 instances whenever they are mounted to them.
  • Experienced in creating RDS instances to serve data through servers for responding to requests.
  • Created snapshots to take backups of the volumes and also images to store launch configurations of the EC2 instances.
  • Written Templates for AWS infrastructure as a code using Terraform to build staging and production environments.
  • Acquired immense knowledge with configuration management tool Ansible.
  • Installed Workstation, Bootstrapped Nodes, wrote Recipes, and Cookbooks and uploaded them to Chef-server and managed AWS for EC2/S3 & ELB with Chef Cookbooks.
  • Manage re-architecture of Jenkins and integration with Confluence for release management and documentation assets. Re architect a Maven based system reducing build times.
  • Manage implementation and installation of server class hardware with migration companies’ assets from desktops around the office.
  • Manage hardware request and support from developers and infrastructure.
  • Manage all CM tools (JIRA, Confluence, Artifactory, SVN, Maven, Jenkins, ANT, GIT, GitHub, Visual Studio) and their usage / process ensuring traceability, repeatability, quality, and support.
  • Re architect a legacy SVN repository from pure script dependency and no representation of releases to clear direction regarding where code resides and the difference between releases.
  • Implemented a Continuous Delivery pipeline with Docker/ECS, Jenkins and GitHub and AWS AMI’s, whenever a new GitHub branch gets started, Jenkins, our Continuous Integration server, automatically attempts to build a new Docker/ECS container from it, The Docker/ECS container leverages Linux containers and has the AMI baked in. Converted our staging and Production environment from a handful AMI’s to a single bare metal host running Docker/ECS.

Environment: AWS (EC2, VPC, ELB, S3, EBS, RDS, Route53, ELB, Cloud Watch, Cloud Formation, AWS Auto Scaling), GIT, SQL, Jira, AWS CLI, Unix/Linux, Ruby, Shell scripting, Jenkins, Ansible, Terraform, Tomcat, Docker/ECS

Confidential

Devops AWS Engineer

Responsibilities:

  • Responsible for CI/CD Automation in all categories of application development like Versioning, Building, Testing and Deployment.
  • Migrating and Maintaining build and test environments into the Cloud Infrastructure.
  • Responsible for implementing AWS solutions and setting up the cloud infrastructure with different services like EC2, S3, VPC, ELB, AMI, EBS, RDS, DynamoDB, Lambda, Auto Scaling, Route53, Subnets, NACL's, CloudFront, CloudFormation, CloudWatch CloudTrail, SQS and SNS.
  • Responsible for writing JSON or YAML format Cloud Formation templates that describes all the AWS resources needed to deploy to run the application.
  • Configuring and Networking of Virtual Private Cloud (VPC). Utilized S3 bucket and Glacier for storage and backup on AWS.
  • Migrating a production infrastructure into an Amazon Web Services utilizing AWS Cloud formation, Code Deploy, Chef, EBS, and OpsWorks.
  • Used Code Deploy to automate code deployments and to run updated scripts for instances on AWS cloud and on-premise instances by eliminating the need for error-prone manual operations.
  • Managed AWS Code Commit source control service for hosting private GIT Repositories using GIT CLI.
  • Responsible for copying data from multiple schemas in an Oracle Source to a single Amazon RDS for Oracle target by using AWS Data Migration Service.
  • Built & uploaded deployable code in Elastic Beanstalk to automate the details of capacity provisioning, load balancing, auto scaling and application development.
  • Administered AWS WAF via APIs and able to create and maintain rules automatically by incorporating them into the development and design process.

Environment: AWS (EC2, VPC, ELB, S3, EBS, RDS, Route53, ELB, Cloud Watch, Cloud Formation, AWS Auto Scaling), GIT, SQL, Jira, AWS CLI, Unix/Linux, Ruby, Shell scripting, Jenkins, Ansible, Terraform, Tomcat, Docker/ECS

We'd love your feedback!