We provide IT Staff Augmentation Services!

Aws Cloud Engineer Resume

0/5 (Submit Your Rating)

New, JerseY

SUMMARY

  • Over 9 years of professional experience as AWS cloud Engineer and Systems administrator.
  • Experience in configuring, deployment and support of cloud services including Amazon Web Services (AWS)
  • Strong knowledge and experience on Amazon Web Services (AWS) Cloud services like EC2, S3, EBS, RDS, VPC, Lambda, Kinesis, Elastic IP's and IAM.
  • Support current migration of Data center to Amazon cloud.
  • Configured, designed and deployed Amazon Web Services (AWS) for a multitude of applications utilizing the AWS stack (Including EC2, Route53, S3, RDS, Cloud Formation, Cloud Watch, SQS, IAM), focusing on high - availability, fault tolerance, and auto-scaling.
  • Designed, configured and managed public/private cloud infrastructures using Amazon Web Services(AWS) which include EC2, S3,Cloud Front, Elastic file System, RDS, VPC, Direct Connect, Route53, Cloud Watch, Cloud Trail, Cloud Formation, and IAM which allowed automated operations.
  • Performed application server builds in EC2 environment.
  • Experienced with AWS cloud computing models like IaaS, PaaS and SaaS.
  • Designed and managed public/private cloud infrastructures using Amazon Web Services (AWS) which include EC2, S3, Cloud Front, Elastic File System, RDS, VPC, Direct Connect, Route53, Cloud Watch, Cloud Trail, Cloud Formation, and IAM which allowed automated operations.
  • Deployed Cloud Front to deliver content further allowing reduction of load on the servers.
  • Configured AWS Cloud Watch to monitor AWS resources, including creating AWS customized Scripts to monitor various application and system & Instance metrics.
  • Good Knowledge on different volume types of AWS Elastic Block Storage (EBS) and utilizing these volumes based on requirement.
  • Troubleshooting AWS EC2 status checks including Status checks and Instance status check alerts.
  • Configured AWS Multi Factor Authentication to enable two step authentication of user’s access using Google Authenticator and AWS Virtual MFA apps.
  • Created IAM policies for delegated administration within AWS.
  • Improved infrastructure design and approaches of different projects in the cloud platform Amazon Web Services (AWS) by configuring the Security Groups, Elastic IP's and storage on S3 Buckets.
  • Configured IAM Users/Roles/Policies to grant fine-grained access to AWS resources to users including creating new Policies for user management in JSON.
  • Experience in implementing CI/CD with Chef, Jenkins, GIT, and Docker.
  • Experience with API Gateway and Amazon Web Services using CLI and SDK’s.
  • Customized Amazon Machine Images (AMIs) & deployed these customized images based on requirements.
  • Configured and managed Elastic Load Balancing (ELB), to avoid single point of failure of applications, thus providing high availability and network load balancing.
  • Monitoring resources and Applications using AWS Cloud Watch, including creating alarms to monitor metrics such as EBS, EC2, ELB, RDS, S3, SNS and configured notifications for the alarms generated based on events defined.
  • Well experienced in Installation, administration, patches, up-gradation, configuration, security issues, and performance tuning and troubleshooting of CentOS and Red Hat Linux
  • Have strong skills in installing, administering, maintaining and troubleshooting NFS, DNS, DHCP, LDAP, SAMBA, POSTFIX, Mail Server Remote Access, Security Management & Security trouble shooting skills. Expertise to handle tasks in Red Hat Linux including upgrading RPMS using YUM, HBA driver; configure SAN Disks, and LVM file system.
  • Experience in Managing User accounts, Swap memory, security, disk space, and process monitoring in Red hat Linux.
  • Good Experience in Support and Maintenance Linux Platform.
  • Knowledge of Virtualization with Red hat Virtualization.
  • Knowledge of Security Implementation with Firewalld, Selinux.
  • Significant experience with Amazon Web Services (AWS) and with the configuration of various Amazon products (Amazon EC2, Elastic Load Balancing, Auto Scaling, Amazon S3, Amazon VPC, Amazon Route 53, Amazon SES, Amazon SNS, Amazon IAM, Amazon Cloud Watch, Amazon Elastic Beanstalk, Amazon Cloud Formation, Amazon Ops Works and Amazon RDS).
  • Experience with Amazon Web Services (AWS) using CLI and API Gateway.
  • Launched Amazon EC2 Cloud Instances using Amazon Machine Images (Linux/windows) and configured launched instances with respect to specific applications.
  • Based on requirement obtained high available AWS Infrastructure using Scalability and Elasticity.
  • Configured AWS S3 for log storage on daily basis and archived off to AWS Glacier based on retention policy of applications.
  • Security groups are configured to control the traffic allowed to one or more instances.
  • Deployment of RDS in Multiple Availability zones and configured and tested DB Failover scenarios by creating Read Replicas of primary DB, including testing of Read replicas to promote to Primary DB and configured backups of DB.
  • Experience in creating IAM roles, polices and groups.
  • Performed auto scaling groups based on memory and CPU to adapt to unforeseen spikes without having an outage or needing manual intervention.
  • Configuration of Health checks for AWS Elastic Load Balancer and used sticky sessions to divert users, also based on traffic spikes, pre-warm ELB to avoid ELB down time.
  • Experienced in implementing CI/CD with Chef, Jenkins, GIT, and DevOps.
  • Worked on Cloud automation using AWS Cloud Formation templates.
  • Migrated existing applications to the AWS cloud.
  • Monitored AWS environment using Cloud Watch.
  • Proficiency in Operating System like Red hat 5, 6, Ubuntu, and Centos.
  • Deployment of operating system on network with kick start.
  • Knowledge of Implementing Centralized Storage Area Network with ISCSI Target.

PROFESSIONAL EXPERIENCE

Confidential, New Jersey

AWS Cloud Engineer

Responsibilities:

  • Designing and deploying scalable, highly available, and fault tolerant systems on AWS.
  • Building servers using AWS, Importing volumes, launching EC2, creating security groups, auto-scaling, load balancers, Route 53, SES and SNS in the defined virtual private connection.
  • Used IAM to create new accounts, roles and groups.
  • Managing IAM accounts (with MFA) and IAM policies to meet security audit & compliance requirements.
  • Used Auto-scaling and Elastic Load Balancer features on EC2 instances to serve the end users using applications during unexpected traffic/demand.
  • Configuring IAM roles for EC2 instances and assigns them policies granting specific level access to S3 buckets.
  • Creating S3 buckets and also managing policies for S3 buckets and Utilized S3 bucket and Glacier for storage and backup on AWS
  • Configured S3 Buckets for EBS backed Snapshots, versioning for data backups and setting up lifecycle management policies
  • Using Cloud Watch service, created alarms for monitoring the EC2 server’s performance like CPU Utilization, disk usage etc.
  • Using Amazon RDS Multi-AZ for automatic failover and high availability at the database tier for MySQL workloads
  • Configuring and managing AWS Simple Notification Service (SNS) and Simple Queue Service (SQS).
  • Managed Encryption.
  • Designing and configuring Simple Email Service (SES) and working with client.
  • Experience in AWS, which included managing application in the cloud and creating instances.
  • Created Snapshots and Amazon Machine Images (AMI's) of EC2 Instance for snapshots and creating clone instances.
  • Created Cloud Formation template stacks for automation.
  • Created and worked on Elastic Block Store and Instance Store Volumes.
  • Built a highly available and fault tolerant VPC from scratch.
  • Configured NAT instance for internal servers within the private subnets thereby not exposing to the public internet.
  • Applying company security policies using Security groups and Network ACLs for instance and subnet level security as per project requirements.
  • Setting up private networks and sub-networks using Virtual Private Cloud (VPC) and creating security groups to associate with the networks.
  • Used Elastic Load balancer, Auto scaling, Security groups and NACL’s to manage network security.
  • Managed complex administrative tasks like scaling, failure-handling and monitoring services.
  • Responsible for designing and developing new back-end services, maintaining and expanding AWS infrastructure and providing mentorship to others in my team.
  • Implemented Auto Scaling for high application availability.
  • Configured Elastic load balancers for incoming loads.
  • Implementing CI/CD with Chef, Jenkins, GIT, and DevOps.

Environment: AWS- EC2, S3, RDS, EBS, ELB, VPC, Cloud Watch, IAM, SQS, SNS, SES, Chef, Jenkins, GIT, Apache servers, Linux servers.

Confidential, MA

AWS Administrator

Responsibilities:

  • Designed, built, and deployed a multitude applications utilizing almost all of the AWS stack (Including EC2, R53, S3, RDS, Dynamo DB, SNS, IAM), focusing on high-availability, fault tolerance, and auto-scaling.
  • Performed Backup and Recovery in AWS (S3, EBS).
  • Used Cloud Watch for monitoring the AWS cloud resources and the applications deployed on AWS (used SNS for notifications).
  • Used Glacier for data archival.
  • Handled Encryption for data security.
  • Assisted business and financial analysts in conducting an assessment of the cloud and analyzing all licensed products.
  • Migrated existing applications to AWS Cloud.
  • Assigned Roles, managed Users and groups and assigned policies to them usingIdentity and Access Management (IAM).
  • In order to perform basic database administration, used RDS and Dynamo DB.
  • Configured S3 Buckets for EBS backed Snapshots and versioning for data backups
  • Good understanding of ELB, Security groups, NACL, NAT, firewall and Route 53.
  • Used different Routing policies for efficient routing techniques.
  • Assisted business and financial analysts in conducting an assessment of the cloud and analyzing all licensed products.

Environment: AWS- EC2, S3, RDS, EBS, ELB, NACL,NAT, Cloud Watch, IAM, Route 53,Dynamo DB, Linux servers.

Confidential, NJ

Linux System Administrator

Responsibilities:

  • Performed Implementing and Managing Network Server’s like DNS, DHCP.
  • Performed Implementing and Managing File Server’s on production.
  • Build and configured Network file System NFS on Network.
  • Build and configured File Transfer Protocol FTP for File Sharing on Internet.
  • Build and configured Samba Server for cross platform sharing.
  • Performed Configuring and Maintaining Web Server with Apache.
  • Performed implementing Security for Server by TCP Wrappers and Firewall.
  • Performed implementing security with Se-Linux.
  • Performed of Managing User and Group Accounts in Linux Servers
  • Performed Configuring Files level security with File Access Permission and ACL’s.
  • Performed of Implementing Job automation.
  • Performed of Backup & recovery with tar and dump.
  • Performed Logical Volume Management LVM

Environment: Red Hat Linux, TCP/IP, DHCP(v4,v6), DNS, NFS, SSH, CIFS, SAMBA, SeLinux, LVM.

Confidential

Linux System Engineer

Responsibilities:

  • Responsible for creating users, managing user permissions, maintaining User and File System quota and Vulnerabities.
  • Responsible for setting up permissions and implementing security policy.
  • Installation of Linux different flavors OS through Kick start Server.
  • Taking Daily, Weekly and Monthly Server data and File backups using Veritas Net Backup.
  • Creating and managing virtual machines in VMware.
  • Configuring and customizing various devices and parameters in Nagios Monitoring tool.
  • Monitoring Servers through Nagios tool.
  • Facing customer and guiding them to install and configure Red Hat Linux machines.
  • Configuration of NFS, Nagios & Web Servers.
  • Troubleshooting and support on RHEL.

Environment: Dell Hardware, RHEL 3.x, VM ware, NFS, Nagios monitoring tool.

Confidential

Windows system administrator

Responsibilities:

  • Provide system administration support for Windows.
  • Performed regular and system backups.
  • Administrated users accounts in Active Directory
  • Resolved various technical problems ranging from PC's, hardware, software, network printers, LAN/WAN
  • Provided phone and remote desktop support to end-users.
  • Imaged, configured and updated desktops and laptops to customer standards.
  • Resolved related software and hardware issues.
  • Provided server account management and client connectivity support.
  • Resolved various technical problems ranging from PC's, hardware, software, network printers, LAN/WAN.
  • Managed Active Directory, Installing software, Upgrade with latest software.

Environment: Windows 2003, Windows 2008 operating systems.

We'd love your feedback!