| 20,000+ Fresh Resumes Monthly | |
|
|
| | Click here or scroll down to respond to this candidateCandidate's Name
PHONE NUMBER AVAILABLEEMAIL AVAILABLE6+ years of leading the implementation of operational effectiveness and accomplishing technical solutions. SKILLS Cloud Orchestration/Automation: AWS CloudFormation, Terraform, AWS Lambda, AWS Systems Manager, AWS SSM Parameter Store, Ansible, Docker Implemented container management and deployment with Kubernetes clusters. Monitoring & Event Management: AWS CloudWatch (Events & Logs), AWS SNS, AWS S3 Identity & Access Management: AWS Organization, AWS IAM, AWS AD Connector, Active Directory, AWS Workspaces, AWS Secrets Manager, etc Governance & Compliance: AWS Config Rules, AWS Organization, AWS Control Tower, AWS Trusted Advisor, AWS Well Architected Tool, AWS Budgets, AWS License Manager, etc Programming Language: Bash, YML, Python Application Delivery: Jenkins, AWS Code Pipeline, AWS Code Commit, Network: VPC, VGW, TGW, CGW, IGW, NGW etc AWS Platform: AWS CloudFormation, AWS Lambda, AWS Systems Manager, S3, VPC, EC2, ELB, RDS, SNS, SQS, SES, Route53, CloudFront, Service Catalog, AWS Auto Scaling, Trusted Advisor, CloudWatch etc EXPERIENCEHarman connected services (Samsung), CA Cloud /DevOPS Engineer May 2022 - PRESENTAccomplishments/Main Duties: Created and maintained Docker images for each version of installer, Docker repositories, while implementing CI/CD pipeline with Docker and Jenkins. Worked with SCM tools like GIT for branching, merging, tagging, and version control. Used Jenkins for continuous integration (CI) and code deployment. Implemented Kubernetes to orchestrate and manage containerized applications. Worked on AWS services such as EC2, S3, Direct Connect, VPC, Route 53, CloudWatch and IAM, built infrastructure and maintained IAM policies for organizations in AWS. Experience working with RHEL in production environment and for configuration management. Worked as an administrator on AWS and part of DevOps Team for internal projects automation and build configuration management. Enforced strong password policy, configured security groups and NACLs, S3 bucket policies and ACLs, etc. Use Terraform as infrastructure as code (IAC) to provision the environment for the various projects. Designed secured, cost optimized, highly available and fault tolerant infrastructure in AWS. Use Ansible for configuration management with the use of playbooks. Perform Deployment to Preprod and Production With collaboration of the Dev Team Conduct quarterly maintenance on all the project servers during scheduled maintenance windows. Prepare quarterly server hardening report by running server hardening scripts in terraform through all the project servers. Setup monitoring tools as well as upgraded the old ones like Elasticsearch, Kibana and Logstash (ELK) to the latest versions. Upgraded Jenkins to the latest versions with the use of downloaded latest war file. Implemented security best practices in AWS including multi factor authentication, access key rotation, role-based permissions, Optimized cost through reserved instances selection and changing of EC2 instance types based on resource need, S3 storage classes and S3 lifecycle policies, leveraging Auto Scaling etc. Configured CloudWatch alarm rules for operational and performance metrics for our AWS resources and applications. Setup and configured logs files for detail monitoring and alerts notification when changes are made. Setup ITIL support in my current environment for incident management(communicating with users about incidents progress, Incident resolution and restoration of service, logging), Configuration management(Assemble and track configuration management tools), Service Desk management(managing user request, routing request to support teams etc.) Participate in on-call rotation and handled emergency incidents with professionalism and urgency Identify and resolve incidents promptly to minimize business impact Monitor system performance regularly via monitoring tools such as ELK, CloudWatch, etc. Document standard operating procedures to enhance team efficiency DELOITTE (Cloud Adoption Accelerator), CA - AWS Cloud Engineer Dec 2018 April 2022Accomplishments/Main Duties: Managed provisioning of AWS infrastructures using CloudFormation and Terraform Design for high availability and business continuity using self-healing-based architectures, fail-over routing policies, multi-AZ deployment of EC2 instances, ELB health checks, Auto Scaling and other disaster recovery models. Created patch management using Systems Manager automation for multi-region and multi account execution. Implemented preventive guardrails using Service Control Policies (SCPs) Implemented detective guardrails using Cloud Custodian policies and AWS config. Implemented security best practices in AWS including multi factor authentication, access key rotation, encryption using KMS, firewalls- security groups and NACLs, S3 bucket policies and ACLs, mitigating DDOS attacks etc. Implemented Jenkins, GitHub and Git for version control, code build, testing and release and CI/CD. Monitored end-to-end infrastructure using CloudWatch and SNS for notification. Used AWS system manager to automate operational tasks across AWS resources. Project Management -AWS Infra design & application migration. Used System Manager to automate operational tasks across AWS infrastructure. Setup AWS Single Sign On (SSO) for on premise Active Directory (AD) Developed and documented security guardrails for AWS Cloud environments Built custom images though docker server, docker compose with multiple local containers and created production grade workflows and a continuous application workflow for multiple images. Implemented multiple container deployments to AWS and maintained sets of containers with deployments. Setup, Configured, and used Ad Hoc ansible Command. Develop multi-tier web-based applications using J2EE. Experience in JavaScript and Java based application. Experience on provisioning and configuring Nginx and Apache HTTPD servers Bank of America, CA - DevOps EngineerJune 2017 - Dec 2018Accomplishments/Main Duties: Developed CI / CD to standardize the infrastructure and automate the DevOps processes, allowing customers to rapidly build, test, and release code while minimizing errors. Developed and implemented code pipeline in the environment from scratch. Implemented container management and deployment with Kubernetes clusters. Designed secured, cost optimized, highly available and fault tolerant infrastructure in AWS. Architected and configured Dev/Stage/QA environments in AWS (VPC, subnets, security groups, EC2 instances, load balancer, RDS, Redis, route53, etc) Implemented security best practices in AWS including multi factor authentication, access key rotation, role-based permissions, enforced strong password policy, configured security groups and NACLs, S3 bucket policies and ACLs, etc. Optimized cost through reserved instances, selection and changing of EC2 instance types based on resource need, S3 storage classes and S3 lifecycle policies, leveraging Auto Scaling etc. Leveraged EC2 Create Snapshot API call to create snapshots of EBS Volumes on scheduled intervals. Configured CloudWatch alarm rules for operational and performance metrics for our AWS resources and applications. Setup and configured logs files for detail monitoring and alerts notification when changes are made. Monitoring from end-to-end view of runtime systems CPU, bandwidth, disk space and log files using New Relic Deployed and configured infrastructure using Terraform and Ansible Architected and implemented continuous integration and deployment pipelines using Jenkins and Aws code pipeline. Implemented identity federation using FreeIPA to enable users to seamlessly connect to multiple services.Kaiser permanente, CA - AWS/Linux AdministrativeJan 2017 - June 2017Accomplishments/Main Duties: Created, managed, and administered user accounts security and ssh password less login. Create users, groups or roles and grand permissions as per job functions. Designed, deployed, and clustered Highly Available servers. Performed applications installation, upgrades/patches, troubleshooting, maintenance, and monitoring Linux servers. Installation, configuration, and administration of Enterprise Linux Network configuration & troubleshoot issues with respect to network and configuration files. Task automation, service management and application deployment using Ansible and Jenkins Build and configured Linux servers from scratch with type one hypervisors for virtualization and network components. Perform security setup, networking, system backup and patching for both AWS, and on-premises environments. Architect high availability environment with auto scaling & Elastic Load Balancer Securely deploy MySQL Primary DB and its read replica in private subnet with multi-AZ for disaster recovery and best practice Migration of high availability web servers and databases to AWS EC2 and RDS with minimum or no downtime VPC built with Private and Public Subnet coupled with VPNs setup back to on premise datacenter and corporate offices. VPC peering with other Accounts allowing access and routing to service and users of separate accounts to communicate. SSL setup for Apache and Nginx application couple with AWS ELB SSL for all http to https thereby maximizing security. Network, CPU, Disk and connectivity monitoring with CloudWatch and setup to trigger alarm and notify system administrators. Aide setup for and configured for logs files detail monitoring and alerts notification when changes are made. Performed root-cause analysis of recurring issues, system backup, and security setup. Security groups configured and locked down to the various authorized subnet and ip addresses in AWS. Automated deployment, configuration and security settings using Ansible. Experienced in GitHub (cloning a Git repository, creating a branch, pushing to Git from local etc.) Architected and implemented continuous integration and deployment pipelines using Jenkins and other CI Experienced in GitHubEDUCATIONIIMT, INDIA - MS HSE EngineeringJune 2017 - October 2019 |