Azure Devops Engineer Resume
SUMMARY
- Experience with Single Sign On technologies such as PingFederate, Ping Access, ADFS, Azure AD.
- Experienced in installing Pingfederate on both Linux and Windows Platform.
- Deployed Pingfederate as both Engine and Console servers.
- Expertise in Deployment with Chef, Ansible towards AWS or Azure, and Terraform for building, updating, and versioning infrastructure efficiently, and creating custom in - house solutions with Chef or Ansible configurations.
- Worked with Ansible for Orchestration of various servers and managed Ansible Playbooks while managing existing Tomcat, Webservers and automated the configuration of new servers.
- Expertise in solving manual redundant infrastructure issues by creating Cloud Formation Templates using AWS's Server less application model and deploy RESTFUL API's using API gateway and triggering Lambda Functions.
- Experienced in designing Azure cloud models for establishing secure and cross-premise connectivity with Azure VPN gateway and Content Delivery Network.
- Worked with operations and development teams to plan and initiate the migration of on-premises legacy solutions to Azure.
- Experience in deploying SAML based highly available solutions using Ping Federate and other security products.
- Worked on Ping Access Integration with Ping federate to Protect the applications using Ping Access Tokens. Worked on ping federate both inbound and outbound calls using SAML 2.0.
- In-depth knowledge of DevOps management methodologies and production deployment which include Compiling, Packaging, Deploying and Application Configurations.
- Implementing Build and Release pipelines as a part of (CI/CD) Continuous Integration and Continuous Deployment using Azure DevOps (VSTS).
- Expertise in developing windows applications, web applications, windows services and web services in Azure DevOps (VSTS).
- Worked on Terraform for provisioning and managing the different cloud provider infrastructure by writing reusable modules
- Used Helm packet manager for installing Jenkins, Artifactory tools etc., by running Helm charts.
- Experienced on various components of Chef including chef server, workstations, Nodes, configurations of chef-client and writing cookbooks and recipes for Chef and assigning roles to nodes.
- Experience in writing Ansible playbooks by using YAML script to launch AWS instances and used to manage web applications, configuration files, used mount points and packages.
- Experience with installation and configuration of Docker environment including Docker registry hub for managing different Docker images and deployment of applications inside the software containers.
- Used Kubernetes to orchestrate the deployment, scaling and management of Docker Containers.
- Responsible for User Management, Administration, Group Management, Slave Management, new job setup in Jenkins.
- Used Maven on Java projects for the development of build artifacts on the source code and worked with MAVEN for building java applications, has written shell scripts to automate the build process.
- Experienced in working with various Python Integrated Development Environments like Net Beans, PyCharm, PyScripter, Spyder, PyStudio, PyDev and Sublime Text.
- Deployed several Java/J2EE, .NET applications, IIS, SQL Server, and App Services to the cloud provided servers like AWS and Azure.
- Profusely worked on Installation, Configuration and Management of RDBMS and NoSQL tools such as SQL Server MySQL, DB2, PostgreSQL, and MongoDB, DynamoDB & Cassandra.
- Implemented roles and groups for users and resources using AWS Identity Access Management (IAM) and managed network security using Security Groups.
- Implemented and managed Splunk monitoring and reporting infrastructure.
- Experience in Linux Installation, Administration, Security Maintenance on Local/Remote Servers and 24x7 support to servers.
TECHNICAL SKILLS
Operating system: Windows 2008/2012/2016 , Linux (RedHat 7/6, CENTOS 7/6& SUSE), Ubuntu
Programming/Web Technologies: Java, HTML, CSS, PHP, .Net
Application Servers: Web Logic Application server 9.x, 10.x, Red Hat JBoss 4.22.
Automation Tools: Jenkins, chef, Ansible, Terraform, Jmeter, Cloud Formation, ARM Templates, AzureDevOps (VSTS)
Version control tools: GIT, Subversion, CVS, Bitbucket
Web servers: APACHE Tomcat, JBOSS, Web Logic (9/10), Nginx, Azure, IIS
Networking/protocol: DNS, DHCP, WAN, TCP/IP, NFS, SMTP, LAN, FTP/TFTP, routers/switches
Scripting: Perl, Python, Ruby, Bash shell, Power shell, JSON
Virtualization Technologies: VMWare vSphere, Windows Hyper-V, VirtualBox, Citrix Xen
Cloud Environments: Open stack, AWS, Azure
Containerization & Orchestration: Docker, Kubernetes, Packer, AKS, EKS, ECS, ACS, Apache Mesos
Database: Cassandra, Oracle MySQL, MongoDB, AWS RDS, DynamoDB
Monitoring Tools: Splunk, Prometheus, Grafana, Graylog, Cloud Watch, Nagios, New Relic
PROFESSIONAL EXPERIENCE
Azure Devops Engineer
Confidential
Responsibilities:
- Worked on OAuth Integration using Ping Federate and Ping Access and implementing Federation SAML services to SSO into third-party vendors.
- Worked on various Azure services like Compute (Web Roles, Worker Roles), Azure Websites, Caching, SQL Azure, NoSQL, Storage, Network services, Azure Active Directory, API Management, Scheduling, Auto Scaling, and PowerShell Automation.
- Used Azure Kubernetes Service (AKS) to deploy a managed Kubernetes cluster in Azure and created an AKS cluster in the Azure portal used template driven deployment options such as Azure Resource Manager templates and Terraform.
- Used Docker for setting Azure Container Registry with Docker and Docker-compose and actively involved in deployments on Docker using Kubernetes.
- Set up AzureDevOps (VSTS) CI/CD pipelines for Micro-services on an AZURE cloud using App services.
- Created WebApps on an Azure portal for deploying web applications using AzureDevOps (VSTS) pipelines.
- Deployed Azure Cloud services (PaaS role instances) into secure VNets, subnets and designed Network Security Groups (NSGs) to control Inbound & Outbound access to Network Interfaces (NICs), VMs & subnets.
- Configured Azure Virtual Networks (VNets), subnets, Azure network settings, DHCP address blocks, DNS settings, security policies and routing.
- Implemented Terraform templates to deploy the resources in Azure.
- Expertise in working with Terraform key features such as Infrastructure as a code, execution plans, resource graphs, change automation and created infrastructure in a coded manner using Terraform.
- Create AMIs by using Packer for production usage as part of a continuous delivery pipeline.
- Used Ansible for configuring, managing multi-node configuration management over SSH, and PowerShell.
- Involved in writing various custom Ansible playbooks for deployment, orchestration and developed Ansible Playbooks to simplify and automate day-to-day server administration tasks.
- Maintained Ansible playbooks using Ansible roles, Ansible Galaxy, utilized a combination of different module in Ansible playbook with YAML scripting to configure the files on remote servers.
- Performed CentOS and custom Linux deployments with Packer with scalability in AWS.
- Used Ansible to manage the systems configuration to facilitate interoperability between existing infrastructure and new infrastructure in alternate physical data centers.
- Created inventory in Ansible for automating continuous deployment and wrote playbooks using YAML scripting.
- Used Docker to containerize Micro services in cloud and managed clusters using Kubernetes.
- Used Kubernetes to manage containerized applications using its nodes, Config Maps, selector, Services and deployed application containers as Pods.
- Hand on exposure of setting up and maintaining private Docker repository and production ready Kubernetes clusters.
- Good experience with container orchestration using Kubernetes.
- Managed Kubernetes charts using Helm, and Created reproducible builds of the Kubernetes applications, managed Kubernetes manifest files and managed releases of Helm packages.
- Managed the security and compliance of all the users of Ansible and taken care of the application deployment.
- Implemented continuous integration using Jenkins. Configured security to Jenkins and added multiple nodes for continuous deployments.
- Developed build and Deployment Scripts using ANT and MAVEN as build tools in Jenkins to move from one environment to other environments.
- Implemented script to test Prometheus monitoring/alerting system on daily basis.
- Setup Grafana to visualize the data from Prometheus and GrayLog2.
- Performed troubleshooting and configuration changes to the resolve Splunk configuration issue.
- Implemented PowerShell Remoting. Generated many PowerShell scripts to aid the Security Team's management of AD
- Performed all aspects of server management, including installation, updates, AV protection, upgrades, storage management, Event log checking, optimization, and automation scripting using PowerShell.
Environment: Azure, VSTS, Helm Charts, Kubernetes, Terraform, Ansible, Linux (RedHat), Continuous Integration and Continuous Delivery (CI/CD), Jenkins, ANT, Maven, Prometheus, Grafana, PowerShell, MongoDB.
DevSecOps Engineer
Confidential
Responsibilities:
- Hands-on experience supporting, automating, and optimizing mission critical deployments in Azure, leveraging configuration management, CI/CD, and DevOps processes.
- Windows Azure Administration knowledge and managing applications hosted in Windows Azure platform.
- Played a significant role as a part of an engineering team designated to design a new platform to host applications on AWS and set up VPN tunnels from corporate network to VPC, also designed the Subnets, Routing and IAM policies in AWS.
- Worked on User admin groups, maintaining account and monitoring system performance using AWS Cloud Watch and Nagios. Migrated applications from VM ware to AWS using snowball and VM import/export.
- Used security groups, network ACLs, Internet Gateways, NAT instances and Route tables to ensure a secure zone for organizations in AWS public cloud.
- Managed storage in AWS using Elastic Block Storage, S3, created Volumes and configured Snapshots.
- Used AWS Lambda to run servers without managing them and to trigger to run code by S3 and SNS.
- Experienced in writing Bash and Python scripts, Included Boto3 to supplement automation provided by Chef and Terraform for tasks such as encrypting EBS volumes backing AMI's and Scheduling Lambda functions for routine AWS tasks.
- Scripted whole AWS resources using CloudFormation and Integrated with Chef playbooks for Configuration Automation
- Built Infrastructure as Code and Config management pipelines using Terraform for AWS, Azure Cloud.
- Configured routing, firewalls, load balancers, DNS settings in AWS cloud platform using Security groups, ELB and Route 53 in AWS
- Implemented CI/CD processes using CloudFormation templates and Terraform modules and Containerized the entire infrastructure using Docker setup in AWS Cloud based environment.
- Created a Dockerfile that used the official Jenkins Docker image as the base and also configured the steps to install the Jenkins Amazon ECS plugin allowing Jenkins master to auto scale worker nodes.
- Used docker-compose to bootstrap the dependencies and running tests in Cloud Build for improving reproducibility.
- Written/Developed Ruby recipes in Chef Cookbook to automate the entire deployment process as well as infrastructure admin tasks.
- Used Chef for Continuous Delivery, managed CI and CD process and delivered all the application in rpms.
- Experience with setting up Chef Infra, bootstrapping nodes, creating and uploading recipes, node convergence in Chef SCM.
- Created Chef Cookbooks manifests and modules to automate system operations for managing complex infrastructure in a transparent way.
- Written Chef Cookbooks for various DB configurations to modularize and optimize end product configuration.
- Integrated Mesos with Docker to provide highly available and fault-tolerant frameworks as well as distributed applications.
- Deploying a single Jenkins master to Amazon EC2 and designing it to be self-healing and highly available and fault tolerant by spreading instances across multiple Availability Zones.
- Developing Maven scripts to automate compilation, build, and testing of Web and J2EE applications.
- Development and maintenance of New Relic Synthetic traffic generator used to provide application performance monitoring from disparate locations thought out the globe.
- Created deployment markers in Application Monitoring using New Relic.
- Installed, Configured, Managed Monitoring Tools such as Splunk, for Resource Monitoring, Network Monitoring/Log Trace Monitoring.
- Expertise Splunk query language and Monitored Database Connection Health by using SPLUNKDB connect health dashboards.
- Managed a Python-based application and created an architecture using the BOTO3 framework integrating it with Amazon Aurora for HA and DR.
- Designed and developed Message driven architectures that consumed the JMS messages from the Java message queue and process the database updating and conversion.
- Implemented ETL process to ingest analytical data stored in S3 into a Redshift data warehouse cluster using AWS Lambda Microservices. Configured and forwarded the data of the ELB Access logs & VPC flow logs to S3 buckets.
- Data migration from Amazon S3 buckets and to Google Cloud Storage by using Storage Transfer Service
- Configured and maintained Linux virtualization in a test and prod environment using VMware, vSphere, Client and HPSA for the Red Hat Linux OS installation.
Environment: AWS (EC2, Lambda, Cloud Watch, Nagios, Elastic Block Storage, S3 buckets, Redshift, ECS, EBS Volumes, Snapshots, Aurora, ELB), Cloud Formation, Chef, Terraform, ANT, Maven, Google Cloud Storage, Mesos, Docker, GIT, Jenkins, New Relic, Python, Red Hat Linux, JMS.