We provide IT Staff Augmentation Services!

Devops /aws Cloud Security Specialist Lead Resume

3.00/5 (Submit Your Rating)

Iselin, NJ

SUMMARY

  • Around 9 years of experience in IT industry in various roles as DevOps, Cloud Engineer, security specialist, Build and Release Engineer with excellent experience in Software Integration, Configuration, Packaging, Building, Automating, managing and releasing code from one environment to other environment and deploy to servers, support and maintenance under Unix/Linux/VM’s Platforms.
  • Written and implemented security policies for AWS: EC2, Elastic Beanstalk, ELB, Route53, S3, CloudFront, SNS, RDS, IAM, CloudWatch and CloudFormation, Aws config, Aws Eks, KMS, Aws Macie, Athena, code deploy, Glue, Redshift, Security hub, and other Aws services also
  • Experience in Implement, Build and Deployment of CI/CD pipelines, managing projects often includes tracking multiple deployments across multiple pipeline stages (Dev, Test/QA staging and production).
  • Experienced with Jenkins as Continuous Integration / Continuous Deployment Tool and strong experience with Ant and Maven Build Frameworks.
  • Experience with SaaS (Software as a Service), PaaS (Platform as a Service), and IaaS (Infrastructure as a Service) solutions.
  • Experienced with SALTSTACK, PUPPET, Ansible as System Configuration Tool and knowledge on Chef.
  • Experience with Configuration Management automation tool Ansible and has worked on integrating Ansible YAML Scripts.
  • Experience working on container platform like Kubernetes and written full security and compliance policies.
  • Experienced on Task Scheduling & Systems backup using Python, Ruby, Perl, Shell scripting for RHEL.
  • Experience in working on creating alerts in prism and twist lock.
  • Experienced in writing shell scripts to automate the deployment.
  • Experience in working with the message queuing services like ActiveMQ.
  • Experienced with Nagios, CloudWatch as IT Infrastructure Monitoring tool and knowledge on Splunk.
  • Experienced in creating Splunk and ELK Dashboards.
  • Experienced with Web/Enterprise Application Deployment Technology specifically including Windows, Linux, Apache, Tomcat, WebLogic, Java, MS SQL and Oracle.
  • Experienced in Configuring Servers to provide Networking Services, including HTTP/HTTPS, FTP, NFS, SMB, SMTP, SSH and LDAP.
  • Experienced in the atmosphere of cross - functional team within the organization’s Agile Project Lifecycle.
  • Demonstrated experience in developing and implementing an operational strategy and processes in a large, complex environment with successful outcomes
  • Ability to work cross-organizationally in international, cross-cultural teams
  • Proven effectiveness to communicate with technical and non-technical people alike

TECHNICAL SKILLS

Platforms: RedHat, Centos, Ubuntu and Windows.

Virtualization: VM Ware, AWS (EC2, Elastic Beanstalk)

Cloud services: ELB, ECS, EFS, Route53, S3, Cloud Front, SNS, SQS, IAM, Cloud Formation, VPC Peering, Direct connect, Codedeploy, Athena, Glue, Quciksight, Aurora, APi Gateway, TrustedAdvisory,Macie,Config,Securityhub, Inspector, Gaurduty, Systems Manager(SSM), EKS, EMR, Aws WAF, ALB, NLB, ELB, Cloudwatch

Scripting: Shell scripting (Bash), Python, JSON, Groovy, Ruby.

Source Code Mgmt.: Git, SVN, CVS.

Continuous Integration/Build Tools: Jenkins, Ant, Maven, Gradle.

Configuration Management: Ansible, Puppet, Chef, saltStack.

Web/App Servers: Apache Tomcat 6.x, 7.x, WebLogic 8.1, 10.x, 11g.

Logging&monitoring: Splunk. Elk, Helix, Cloudwatch.

Ticketing Tools: Jira, ServiceNow.

Databases: Confidential 11g, MongoDB, MS SQL server 2008, Aurora, Dynamo Db, redshift

Project management tools: MS Visio, SharePoint, excel, Confluence

PROFESSIONAL EXPERIENCE

Confidential, Iselin, NJ

Devops /Aws Cloud Security specialist Lead

Responsibilities:

  • Act as the thought leader on cloud security strategy, framework, policy, standards, and requirements for Cyber security team in implementing the security and compliance policies for various AWS Services.
  • Sound security engineering principles as background to understanding the workings of the systems and controls that are in place.
  • Experience designing sophisticated and highly automated infrastructure.
  • Developed AWS security roadmap which includes the Aws services and 3rd party tools to be utilized in Aws for cloud security monitoring.
  • Designed the security pattern template for SAAS PAAS and IAAS in cloud environment and make sure to implement those policies by collaborating the operation teams.
  • Designed and Implemented data Flow architecture for every service in Aws cloud environment according to the industry standards and moved those services for production and use for other teams in low risk and zero risks.
  • Specially focused in written patterns for EC2, S3, Dynamo Db, VPC, Direct connect, Cloud watch CloudTrail, cloud front, aurora, IAM, Athena, Glue, redshift, EKS, EMR,ELB, lambda, Codedeploy, autoscaling, VPC, Aws config, Aws systems manager, S3 glacier, SQS, SNS, KMS, Macie, Security hub.
  • Written and implemented container platform security standards and policies. Once after writing these policies collaborated with Cloud operations teams and service owners to implement these security standards in Prisma cloud and twist lock and Aws Config.
  • Designed the flow for auto remediation for most of the policies using lambda and terra form code which can triggered using cloud watch alerts and prisma alerts.
  • After completing the protection and detection policies need to have architectural review with architectural manager team from cyber and cloud operation once agreed on the workflow lead the team of six people to make sure of implementing the policies.
  • These implementations are done from offshore and onsite team, I am fully responsible for weekly and by weekly updates to Pm and Higher management according to CBO priority.
  • Implemented Aws inspector for vulnerability scanning, Athena for querying logs stored in S3.
  • Completed end-end POC and implementation for Aws Systems Manager(SSM), used Sessions manager, written documents and automated corn jobs using rum command, verified compliance of Ec2 and on premises using SSM
  • Used Ssm as a parameter store for both Securest ring and general methods to make developers to use in code for Development
  • Implement CLI command auto remediation though prisma cloud remediation for services that can be auto remediate upon alerts.
  • Tracking all the policies status in using jira and submitting the report to PM and Higher management.
  • Well versed in Aws Gaurdduty for scanning logs in VPC flow logs, Cloudtrail logs, DNS logs
  • Managing encryption solutions and infrastructure in Cloud environments.
  • Provisioning new customer environments and encryption solutions on our infrastructure.
  • Experience in developing and implementing an operational strategy and processes in a large, complex environment with successful outcomes.
  • Enabled Aws Config to monitor changes in in environment within all the accounts, Developed AWS Config rules to auto remediate the unauthorized changes.
  • End - end implementation of Aws config and monitored those logs in Splunk.
  • Enabled Aws Macie for PII information detection and alerted team to secure the file sin S3 storage which contains PII, completed POC for latest version Macie and its ready to be rolled out.
  • Worked directly with Aws official cloud partner for implement services and organized the meetings with Aws and our management about the new services we want to implement and additional support for current service.
  • Responsible for strategic financial planning within assigned Security Product Portfolio, including budgeting, forecasting, and financial planning of new and existing Security Products & Services
  • Expertise in calculating the budgets and cost optimization by implementing new services accomplished by implementing the Aws Config and Aws Macie classic and Macie both versions.
  • Used Sandbox for UAT testing for validating the policies once after the implementation complete.
  • Worked with senior architect manager and created the Security technologies architecture and maintained detailed inventory for security technologies.
  • Develop, maintain, and communicate the vision of the Cloud Security Product Portfolio
  • Write detailed and Agile product requirements documents and ensure clear communication of those requirements to the business, engineering, security, development, and product teams
  • Define security controls relevant to compliance with legal, best-practice, and regulatory requirements for cloud environments

Environment: Aws Config, Macie, KMS, EKS, Lambda, S3, S3 glacier, Dynamodb, Aurora, redshift, Quicksight, Athena, Glue, Codedeploy, autoscaling, Directconnect, VPC, ELB, EMR, IAM,Directconnect, cloudwatch, Gaurdduty, Inspector, cloudtrail, cloudformation, SNS, SqS, Lex, Systems manager(SSM),Secrets manager,Twistlock, Prisma, Teraform, Ms VISIO, Sharepoint, Jira, Servicenow, python 3.6,Splunk, helix, Visio, SharePoint.

Confidential, Santa Clara, CA

DevOps Automation Lead

Responsibilities:

  • Worked for Automation Platform team responsible Network Automation Using Salt Stack Configuration Management Tool.
  • Lead the team of 5 people and played Scrum master role and assigned work to team on daily basis and reviewed the code on daily basis
  • Worked with Project Managers directly to understand the code/configuration release scope and to confirm that a release was successful
  • Worked with networking team to set up Palo Alto Next Generation Firewalls for securing infrastructure and automated whole SNMP configurations
  • Implemented the use cases given by Networking team for automation.
  • Profusely worked on Version control tools like GIT to track changes in source code.
  • Successfully completed the asset management for all Network Devices, used NETBOX as CMDB using saltstack
  • Developed python Scripts to onboard devices to NPM
  • Change Management Dashboard setup - Splunk and Kafka integrations
  • Dashboard of various Network device changes encompassing who/when/what are monitored on splunk
  • Created Data models in Splunk for easy reporting in future for understand handover to department admins.
  • Developed solutions for SNMP and ACL management use cases
  • Integrated vault as a password management tool and integrated with salt
  • Developed and reviewed scripts of the team for build, deployment, maintenance and related tasks using Python and Bash.
  • Integrated Infoblox as a IPAM for all Network devices.
  • Heavily Worked and PyNetbox and NAPALM modules
  • Created a Kafka Cluster and managed to send Salt logs and Netbox logs to Splunk using Kafka Topics.
  • Developed python Scripts to autogenerate pillars for Network devices and it will push to GIT, using GIT as a source implemented external pillars concepts in SALTSTACK
  • Developed python scripts for integrating data elements to Netbox via Saltstack
  • Setup Saltstack environment and executed configuration management on Network devices with External pillars concepts
  • Written python script to integrate with Netbox using python Pynetbox Library.
  • Used python Libraries like logger, excel and salt libraries to integrate python scripts to Netbox and Infoblox
  • Created kafka Topics and integrated in salt master configuration, that transfers the logs from salt master to kafka cluster
  • Using Docker created Splunk connector to Kafka to push messages from Kafka to Splunk forwarders
  • Created change board management Dashboards using ELK (Elastic search Logstash Kibana)
  • Developed python scripts for automate onboarding and decommissioned process
  • Coordinate release activities with Project Management, and Network teams to ensure a smooth and trouble-free rollout of releases
  • Involved in Setting up Continuous Integration Environment using Jenkins supported other projects.
  • Worked on cisco-IOS, cisco-NXO, Arista -EOS, juniper junos devices and managed to onboard all of them to salt production.
  • Made changes to NAPALM modules on according to our environment.
  • Implemented & Maintained the Branching and Build/Release strategies utilizing GITHUB source code management.
  • Implemented the whole project with Agile Methodologies.

Environment: Salt Stack, GIT, NPM, SolarWinds, NETBOX, INFOBLOX, Vault, Kafka, Linux, Unix, Splunk, ELK (Elastic search Logstash Kibana), Python, Agile, Palo Alto, Arista, Cisco, Fire eye, JIRA, ServiceNow, PyNetbox, NAPALM.

Confidential, Santa Clara, CA

AWS/DevOps Engineer

Responsibilities:

  • Worked for AWS DevOps Platform team responsible for Cloud Infrastructure and maintaining the Public and Internal applications.
  • Provide day-to-day support/Admin activities of AWS/Build and Release/Configuration Management.
  • Designed and managed public/private cloud infrastructures using Amazon Web Services (AWS) which include VPC, EC2, S3, Elastic File System, RDS, Direct Connect, VPC Peering, Route53, Cloud Watch, Cloud Trail, Cloud Formation, and IAM which allowed automated operations.
  • Configuring AWS IAM and Security Group in Public and Private Subnets in VPC. Monitoring Resources and Applications using AWS Cloud Watch, including creating alarms to monitor metrics such as EBS, EC2, ELB, RDS, S3, and configured notifications for the alarms generated based on events defined.
  • Worked on Cloud automation using AWS Cloud Formation templates.
  • Built S3 buckets and managed policies for S3 buckets and used S3 bucket and Glacier for storage and backup and artifacts on AWS.
  • Experience setting up instances behind a Elastic Load Balancer in AWS for high availability.
  • Implemented a Continuous Delivery pipeline with Docker, Jenkins and Bitbucket and AWS AMI's,
  • Worked with the Encrypted EFS using the KMS service.
  • Created customized docker images and push them to Amazon ECR and deploy them to ECS.
  • Creating snapshots and Amazon machine images (AMIs) of the instances for backup and creating clone instances.
  • Used Ansible and Ansible Tower as Configuration management tool, to automate repetitive tasks, quickly deploys critical applications, and proactively manages change.
  • Wrote Python Code using Ansible Python API to Automate Cloud Deployment Process.
  • Developed Python Modules for Ansible Customizations.
  • Used Ansible Playbooks to setup Continuous Delivery Pipeline. Deployed micro services, including provisioning AWS environments using Ansible Playbooks.
  • Used Ansible to document all infrastructures into version control
  • Worked with networking team to set up Palo Alto Next Generation Firewalls for securing infrastructure.
  • Profusely worked on Version control tools like GIT to track changes in source code.
  • Coordinate developers with establishing and applying appropriate branching, merging conventions using GIT source control.
  • Responsible for code build, release and configuration on Amazon EC2.
  • Installed, Configured and Administered Jenkins Continuous Integration Tool.
  • Configured Jenkins Jobs to build and promote applications to different to Linux environments, writing shell scripts to automate the deployment.
  • Used Maven and Gradle as build tool on Java projects for the development of build artifacts on the source code.
  • Developing scripts for build, deployment, maintenance and related tasks using Jenkins, Docker, Maven, Python and Bash.
  • Used configuration management tool like Ansible to automate tasks and to deploy applications.
  • Built S3 buckets and managed policies for S3 buckets and used S3 bucket and Glacier for storage and backup and artifacts on
  • Proficient in Writing scripts to automate simple tasks Python, Groovy, Ruby, bash, Shell.
  • Ensured Backups were taken periodically.
  • Implemented Ansible to manage existing servers and automate the build/configuration of new servers.
  • Developed Ansible Playbooks to simplify and automate day-to-day server administration tasks.
  • Managed local deployments in Kubernetes, creating local cluster and deploying application containers.
  • Using File beat configured ELK (Elastic search Logstash Kibana) environment and gave access to team for creating dashboards for logs
  • Installed, configured and maintained the Apache ActiveMQ message broker service.
  • Installed, Configured, Managed Monitoring Tools such as Dynatrace for Resource Monitoring, Network Monitoring.
  • Directed the Release Management Calls to with the Developers, Testers and DBA teams for successful Release.
  • Used terraform to build IAAS in cloud environments AWS
  • Provided production support in an on-call rotation in a 24x7 environment.

Environment: EC2, S3, ELK (Elastic search Logstash Kibana) auto-scaling, AMI, ELB, EBS, ECS, IAM, EFS, KMS, VPC Peering, RDS, DNS, cloud watch, Route53, VPC, BASH, Kubernetes, Terraform, APACHE/TOMCAT, ActiveMQ, Dynatrace, Python, Ansible, Docker, Jira, Palo Alto Firewalls.

Confidential, Coasta Mesa CA

DevOps Engineer

Responsibilities:

  • Developed and supported the software Release Management and procedures.
  • Responsible for design and maintenance of the GIT Repositories and the access control strategies.
  • Performed all necessary day-to-day GIT support for different projects.
  • Implemented & Maintained the Branching and Build/Release strategies utilizing GITHUB source code management.
  • Used Ant and Maven as build tools on java projects for the development of build Artifacts on the source code and automated process using shell scripting
  • Versioned the playbooks on the source code management tool GitHub.
  • Manage deployment automation using Puppet, MCollective, Custom Puppet Modules.
  • Automated the build and release management process including monitoring changes between releases.
  • Delivered architecture designs and solutions for public, private and hybrid clouds covering the cloud architecture tiers and portfolios of cloud services.
  • Implemented & maintained branching & build/release strategies utilizing SVN/GIT and given project support
  • Built end to end CI/CD Pipelines in Jenkins to retrieve code, compile applications, perform tests and push build artifacts to Nexus Antifactory.
  • Scheduled the Linux Cron jobs and Jenkins jobs for build automation.
  • Spinning up AWS resources by using terraform.
  • Integration of Automated Build with Deployment Pipeline. Currently installed Chef Server and clients to pick up the Build from Jenkins repository and deploy in target environments (Integration, QA, and Production).
  • Deployed the java applications into Apache Tomcat Application Servers.
  • Experience in writing Maven pom.xml and Ant build.xml for build scripts.
  • Executed user administration and maintenance tasks including creating users and groups.
  • Utilized WAR and JAR files for deployment of enterprise apps.
  • Prepared Junit test cases and executed server configurations.
  • Experience on monitoring tools like Nagios and Splunk.
  • Debugging Puppet manifests and their execution trying to pull logs into Splunk and monitor deployments.
  • Documented all the touch points to user-facing system (Automation, Puppet, Jenkins, Git, AWS) and defined testing and release processes for each.
  • Worked in ELK environment for monitoring purposes and created quires for Dashboards

Environment: Red Hat Enterprise Linux, Kubernetes, GIT, GITHUB, Terraform ANT, Jenkins, Maven, Apache Tomcat, Shell, ELK (Elastic search Logstash Kibana), Puppet, shell scripting, Nexus, AWS, EC2, Jira, Python, Nagios, Splunk.

Confidential

Build and Release Engineer

Responsibilities:

  • Coordinate release activities with Project Management, QA, Release Management and Web Development teams to ensure a smooth and trouble-free rollout of releases.
  • Designing a process for pro-automation using Jenkins in all the application environments, and making sure it follows all the standard procedures of the Application SECDM or SDLC.
  • Integrated Maven with Jenkins for the builds as the Continuous Integration process.
  • Responsible for installing and configuring Jenkins master and slave nodes for windows and Linux.
  • Involved in Setting up Continuous Integration Environment using Jenkins.
  • Used various plug-ins to extend the base functionality of Jenkins to deploy, integrate tests and display reports.
  • Saving artifacts in storage
  • Configured SVN and Git with Jenkins and schedule jobs using POLL SCM option
  • Worked on version control system Subversion (SVN) by using source code management client tools such as Tortoise SVN and other command line applications
  • Involved in editing the existing ANT/MAVEN files in case of errors or changes in the project requirements.
  • Worked closely with Project Managers to understand the code/configuration release scope and to confirm that a release was successful.
  • Experienced in Writing Chef Recipes to automate our build/deployment process and do an overall process improvement to any manual processes.
  • Analyzed and resolved conflicts related to merging of source code for SVN and GIT.
  • Deployed Chef Dashboard for configuration management to existing infrastructure.
  • Extensive experience using MAVEN and ANT as a Build Tool for the building of deployable artifacts (war & ear) from source code.
  • Implemented rapid-provisioning and life-cycle management for Ubuntu Linux using Chef and custom Ruby/Bash scripts.
  • Excellent experience in documenting and automating the build and release process.
  • Working on Deployment procedures using middleware like Web sphere, creating deploy scripts and setting for the Production Release.
  • Coordinate with Confidential DBA to tune the performance of DB instances.
  • Monitoring applications health through the dashboard. Maintained Nexus administration tasks.
  • Monitored System performance using Nagios.
  • Deployed the applications to WebLogic Application Server and static content to Apache Web servers

Environment: Jenkins, Maven, Ant, SCM, SVN, GIT, Linux, Apache web server, Chef, Ruby, Centos, Nagios, Shell Script.

We'd love your feedback!