We provide IT Staff Augmentation Services!

Senior Aws Engineer Resume

5.00/5 (Submit Your Rating)

SUMMARY

  • 7 years of experience in planning, designing, developing and implementation in the area of Confidential Web Services (AWS) cloud and IT industry..
  • Hands on experience with an in - depth level of understanding in the strategy and practical implementation of Confidential cloud-specific technologies including Elastic Compute Cloud(EC2),Simple Storage Services (S3), Route 53, CloudFormation, Elastic Bean Stalk,Virtual Private Cloud(VPC), RDS,Cloud Watch and many more.
  • Designed highly accessible, fault tolerant and cost effective and fault systems using multiple EC2 instances, Auto Scaling, Elastic Load Balance and AMIs.
  • Good experience of Confidential Elastic Block Storage (EBS), different volume types and use of various types of EBS volumes based on requirement.
  • Constructed S3 lifecycle of Applications & Database logs, which includes deleting old logs, archiving logs based on the retention policy and granting rights to authorized users.
  • Built customized Confidential Machine Images (AMIs) & deployed these customized images based on requirements.
  • Granted security and configured user access and limits using Confidential Identity and Access Management (IAM) by creating new profiles and policies for user management in JSON.
  • Executed application server builds on the EC2 services as per requirement and modifications.
  • Configured Confidential Multi Factor Authentication in IAM to implement 2 step authentication of user’s access using Google Authenticator and Confidential Virtual MFA.
  • Dealt with Datacenter migration to Confidential Web Services (AWS) infrastructure and provided support to Applications and Database teams.
  • Experience in designing and configuring secure VPC through private and public networks in Confidential and created various subnets for servers.
  • Troubleshoot Confidential EC2 Status check through System Status checks and Instance Status checks alerts and rectified if necessary.
  • Configured and managed Elastic Load Balancing (ELB) to implement fault tolerance and avoid single point of failure of applications, thus providing high reliability and efficient usage.
  • Initiating alarms in CloudWatch service for monitoring the server’s performance, CPU Utilization, disk usage etc. to take recommended actions for better performance.
  • Documenting all the processes, issues caused with solutions, resolved errors and user’s activity in timely manner.

TECHNICAL SKILLS

  • Cloud Technologies: Confidential Web Services Elastic Compute Cloud(EC2), Simple Storage Services (S3), Route 53, Cloud Front, Elastic Bean Stalk, Virtual Private Cloud(VPC), RDS, Cloud Watch, Elastic Load Balancer(ELB), Auto - Scaling, IAM Roles, Users, Profile, Elastic IP s, Nagios, GIT, Security Policies, Cloud Formation, Dynamo DB, Redshift.
  • Operating Systems: Red hat Linux 4/5/6/7, Windows servers 2003, 2008, 2008 R2, 2012, Windows 7/8/10.
  • Languages/Technologies: C++, C#, Java, HTML, XML, CSS, ASP.NET, Razor, Ajax, MVC, LINQ, SQL, PL-SQL, PHP, JavaScript, Bootstrap.
  • Databases: Oracle, SQL SERVER, My SQL, Dynamo DB, MS Sql.
  • Software/Tools: Microsoft Office, Visual Studio 2013, Cisco Packet Tracer, Microsoft Visio, QT Creator, Visual Studio BI, Oracle, My SQL, SAPbyDesign, PagerDuty, GitHub, NetBeans, Confidential Web Services, ANT, Jenkins, Chef, Tableau.

PROFESSIONAL EXPERIENCE

Confidential

Sr. AWS Engineer

Responsibilities:

  • Good experience in Confidential Web Services (AWS) environment and good knowledge of Confidential services like Elastic Compute Cloud(EC2), Elastic Load-balancers, Elastic Container Service (Docker Containers), S3, Elastic Beanstalk, CloudFront, Elastic Filesystem, RDS, DMS, VPC, Route53, CloudWatch, CloudTrail, CloudFormation, IAM.
  • Initiating Confidential EC2 Cloud Instances using Confidential Web Services (Linux/ Ubuntu) and managing and configuring launched instances with respect to specific applications.
  • Created detailed Confidential Security Groups which behaved as virtual firewalls that controlled the traffic allowed to reach one or more Confidential EC2 instances.
  • Managing Multiple Confidential instances, assigning the security groups, Elastic Load Balancer and AMIs.
  • Auto scaling the instances to design cost effective, fault tolerant and highly reliable systems.
  • Configuring of Virtual Private Cloud (VPC) with networking of subnets containing servers.
  • Develop CloudFormation scripts to automate EC2 instances.
  • Built S3 buckets and managed policies for S3 buckets and used S3 bucket and Glacier for storage and backup on AWS.
  • Setting CloudWatch alerts for instances and utilizing in Auto-scaling launch configurations for better performance.
  • Used Chef to manage configuration of connected server.
  • Implemented and maintained the monitoring and alerting of production, corporate servers and storage using Confidential Cloud Watch for efficiency.
  • Work with product development to resolve build-related issues in all projects.
  • Troubleshooting various production errors and fix them.
  • Common Wealth Of Kentucky - KY April 2014 - July 2015
Confidential

Operations Engineer

Responsibilities:

  • Good Experience in architecting and configuring secure cloud VPC using private and public networks though subnets in AWS.
  • Developed and managed cloud VMs with Confidential EC2 command line clients and management console.
  • Included security groups, network ACLs, Internet Gateways, and Elastic IP’s to ensure a safe area for organization in Confidential public cloud.
  • Created elastic load-balancers(ELB) for different applications to provide high performance of applications.
  • Utilized Confidential Route53 to manage DNS zones and also assign public DNS names to elastic load balancers IP's.
  • Used Confidential RDS which includes automatic failover and high availability at the database layer for MySQL workloads.
  • Good experience with Dynamo DB and RedShift.
  • Migrated test and use cases for applications to Confidential cloud with public and private IP ranges to accelerate development productivity by decreasing test-run times.
  • Used Confidential IAM service to grant permission to assigned users and manage their roles
  • Utilized Cloud Front to transfer data from edge locations to users, thus enabling more decrement of load on front-end servers.
  • Created auto-scaling groups based on memory and CPU usage to handle excessive or underuse workload without needing manual interference.
  • Used Confidential S3 for database backup regularly and save snapshots of data.
  • Used Cloudwatch to migrate application logs to S3 and setup alarms based on a few exceptions raised by applications.
  • Actively involved in architecting and planning the puppet infrastructure to manage more than 2000 servers.
  • Deployed and managed a private puppet infrastructure in Confidential to deploy applications.
  • Developed and maintained puppet modules required for deploying different applications on EC2 instances.
  • Worked in Agile methodology with bi-weekly fast goals to be achieved.
  • Experience involved in the DevOps support team to debug architectural failures and ensuring high availability applications with desired performance.
  • Used Github as source code version control and repository system.
  • Worked on call with PagerDuty support to communicate to site and service outage alerts 24/7.
  • Conducted trainings for a group of employees about infrastructure management using Confidential services.

Confidential

Cloud Engineer/ Devops Engineer

Responsibilities:

  • Experience on Confidential services like EC2, S3, RDS, ELB, EBS, VPC, Route53, Auto scaling groups, Cloud watch, Cloud Front and IAM for instantiating, configuring and managing various Confidential images for server migration from physical servers into cloud.
  • Build servers using Confidential which includes importing necessary volumes, launching the EC2 instance, creating security groups, auto-scaling, load balancers, Route 53 and SNS as per the architecture.
  • Used Confidential Identity and Access Management (IAM) to manage users and roles.
  • Captured Confidential Machine Images (AMI's) of EC2 Instance for snapshots and creating clone’s instances for their application elsewhere.
  • Maintaining the user accounts (IAM), RDS, Route 53, SES and SNS services in the Confidential cloud.
  • Migrated the server using the Confidential services to cloud environment.
  • Developed Cloud Formation template stacks to automate building new VPCs using JSON files.
  • Experienced with Confidential services to smoothly manage application in the cloud and creating or modifying the instances..
  • Created Virtual Private Cloud (VPC) with subnets and groups for servers and created security groups to associate with the networks.
  • Capturing regular snapshots for EBS volumes using CPM (Cloud Protection manager).
  • Configured and verified Confidential workstations as per application requirement.
  • Constructed Confidential Security Groups which behaved as virtual firewalls controlling the traffic allowed to reach one or greater Confidential EC2 instances.
  • Utilized Confidential Route53 to manage DNS zones and also assign public DNS names to elastic load balancers IP's.
  • IAM service enabled to grant permissions and resources to users. Managed roles and permissions of users with the help of Confidential IAM.
  • National Instruments - Austin, TX

Confidential

Developer

Responsibilities:

  • Experience in designing and implementing Confidential Solutions using EC2, S3, EBS, Elastic Load balancer (ELB), VPC and CloudFormation.
  • Directed at enhancing volumes and EC2 instances and use these to create VPC instances.
  • Worked with IAM to generate new accounts, assign roles and groups.
  • Created alarms and notifications for EC2 instances using Cloud Watch in case of extreme situations.
  • Experience configuring Confidential S3 and their lifecycle policies and to backup files and archive files inl Glacier.
  • Utilized EBS to store repeated data and overcome failure by using Snapshots.
  • Administered and maintained GIT Source Code Tool.
  • Responsible for design and maintenance of the GIT repositories.
  • Checking the health and utilization of Confidential resources using AWS CloudWatch .
  • Experience working on user admin groups and maintaining account using Nagios.
  • Participated in configuring and monitoring distributed and multiple platform servers using Puppet.
  • Used Puppet server and workstation to manage and configure nodes.
  • Experience in managing virtual instances and disks using Puppet.
  • Involved in hosting applications as well as building and testing the applications using Jenkins.

Responsibilities:

  • Smoothly monitored and managed hardware, software, and networking for a large scale cluster on Confidential EC2 instances for the organization.
  • Arranged new users, roles and groups using Confidential Identity and Access Management (IAM).
  • Utilized special security group, IAM roles, scaling groups, load balancers and Monitored EC2 instances with Cloudwatch.
  • Developed CloudFormation scripts to automate EC2 instances. Also stored database instances in the form of snapshots in Confidential S3.
  • Created, deleted and managed user accounts and their roles to interact with Confidential and setup their ACLs with Confidential IAM.
  • Decent knowledge on Dynamo DB and Confidential Redshift databases.
  • Automated Confidential server deployment for users using Puppet.
  • Managed network security through Load balancer, Auto-scaling, Security groups and NACLs.
  • Used DNS management in Route53, Confidential S3 to save database instances by capturing snapshots of data.
  • Constructed regular EBS snapshots and rebuilt new EBS volumes from these existing snapshots to migrate and move applications.
  • Managed Network allocation in VPC to create new public networks and subnets.

Confidential

Linux Administrator

Responsibilities:

  • Installed and administration of windows and Linux (Centos, Ubuntu and Red hat) servers.
  • Provided installation & maintenance of Puppet infrastructure and developed Puppet recipe &modules for configuration management
  • Created Bash, shell & python scripts for various Systems Administration tasks to automate repeated processes
  • Creating and maintaining users, profiles, security, rights, disk space and process monitoring
  • User account management, worked with Python, Perl, shell scripting (ksh, bash) to automate administration tasks.
  • Experience in Networking, DNS, NFS and TCP/IP.
  • RPM package installation & upgrade released by RedHat from repository.
  • Administration of client computer using SSH and FTP.
  • Troubleshoot the network and firewall issues.
  • Migrated windows and Linux servers in data center.
  • Configured and troubleshoot the IP Address and LAN.
  • Support for application upgrade & rollback, services start/stop on Linux Servers.
  • Handled hardware issues like Memory, hard disk, Motherboard and Processor..etc.
  • Solving server problem with rescue mode recover file system corrupt form console. Solaris 8/9/10, RHEL 3, Volume Manager (VxVm), VMware.
  • Environment: LINUX, Solaris, RHEL, Web Server.

We'd love your feedback!