Quantcast

Sr Devops Engineer Resume Denver, CO
Resumes | Register

Candidate Information
Name Available: Register for Free
Title Sr.DevOps Engineer
Target Location US-CO-Denver
Email Available with paid plan
Phone Available with paid plan
20,000+ Fresh Resumes Monthly
    View Phone Numbers
    Receive Resume E-mail Alerts
    Post Jobs Free
    Link your Free Jobs Page
    ... and much more

Register on Jobvertise Free

Search 2 million Resumes
Keywords:
City or Zip:
Related Resumes
Click here or scroll down to respond to this candidate
 Candidate's Name
(DevOps AWS/Azure Cloud Engineer)
Phone: PHONE NUMBER AVAILABLEMail: EMAIL AVAILABLE
LinkedIn: LINKEDIN LINK AVAILABLEProfessional Summary:               Over 10+ years of IT industry which includes 6+ years of experience on a Cloud DevOps Engineer comprising of Linux and System Administration with a major focus on Azure, AWS Continuous Integration, Continuous Deployment, Configuration Management, Build/Release Engineer , and Linux Systems Administrator with expertise in Private, Public, and Hybrid Cloud platforms along with using various tools like Docker, Kubernetes, Ansible, Chef, Jenkins, GIT, Maven, 4 years of experience in Linux Administrator.      Expertise in Designing and implementing Continuous Integration (CI) throughout many environments utilizing Azure DevOps tools to provide an agile development process that is automated and repeatable, allowing teams to safely deploy code several times per day while ensuring Azure Kubernetes Services (AKS) are supported.      Hands-on Experience Administrating Microsoft Azure Services like Azure App Services, Azure SQL Database, Azure AD, Azure Blob storage, Azure Functions, Virtual machines, Azure Fabric controller, Azure Data Factory, Azure web applications, Azure Service Bus, and Notification hub.
      Experience in designing Azure Resource Manager (ARM) Template to deploy multiple resources as well as in designing custom build steps using Power Shell and Developed PowerShell scripts and ARM templates to automate the provisioning and deployment process.
      Seasoned in Configuring Azure Automation Desired State Configuration (DSC) configuration management to assign permissions through Role-Based Access Control (RBAC), assign nodes to proper automation accounts and DSC configurations, to get alerted on any changes made to nodes and their configuration.
      Well versed in using Azure Infrastructure as a Service (IaaS), Provisioning VMs, Virtual Networks, Deploying Web Apps, Microsoft SQL Server, using ARM Templates, and Azure DevOps CI/CD pipelines.      Expertise in configuring the Monitoring and Alerting tools according to the requirement like Prometheus and Grafana, setting up alerts, and deploying multiple dashboards for individual applications in Kubernetes.      Experience in Configuring VNET Peering using Terraform Modules and configuring NSGs for two tiers and three-tier applications were set up to filter network traffic, to facilitate connectivity between resources across various Virtual Networks.      Experience in building Docker images using GitLab-ci build automation runner      competent in setting up and managing Spinnaker-based continuous delivery pipelines for effective software deployment across various cloud environments.      Use JavaScript for automating repetitive tasks in deployment, configuration management, and infrastructure provisioning.      knowledge of integrating infrastructure as code (IaC) with Spinnaker, building up and monitoring IaC integration using tools like Terraform and Kubernetes manifests to ensure synchronous      Experience in Setting up the build and deployment automation for Terraform scripts using Jenkins.      Always motivated to learn something new. Reading the state-of-the-art research papers & keeping up to date with works of Deep Learning researchers on LinkedIn, Twitter, Medium, and other professional networking sites.      Good exposure in managing various LINUX servers clustered environments.
      Excellent troubleshooting and time management skills, ability to work independently while coordinating efforts with engineers, vendors, and customer support resources.
      Strong analytical skills coupled with a structured approach to problem-solving and demonstrated ability to deal with high-pressure situations.      Hands-on experience in Provisioning EC2 instances and all resource areas of EC2 like Dedicated hosts, volumes, Key pairs, Elastic IP's, Snapshots, Load Balancers and Security Groups.      Strong understanding of infrastructure automation tools like Cloud Formation Templates and Terraform.      Working expertise on all aspects of Ansible concepts like Control Node, Managed Nodes, Inventory, Modules, Tasks, Playbooks etc.
      Designed and implemented a scalable DevOps infrastructure on the OpenShift platform, using technologies such as Kubernetes, Docker, and Azure pipelines.      Managed continuous integration and deployment (CI/CD) pipelines for multiple OpenShift projects, ensuring high availability and reliability of the applications and services.      Automated repetitive tasks such as application deployment, scaling, and monitoring using Ansible, Helm, or other configuration management tools on OpenShift.      experienced in Implemented Role-Based Access Control (RBAC) policies to enforce fine-grained authorization within the cluster, enhancing security by limiting user access to resources.      worked on the Management of sensitive information such as API tokens, certificates, and passwords using Kubernetes Secrets, ensuring secure storage and access control.      Successfully performed Kubernetes version upgrades, including control plane components and worker nodes, ensuring clusters are running the latest stable releases.      Integrated monitoring and logging solutions (Prometheus, Grafana, ELK stack) to capture cluster metrics, health status, and application logs for troubleshooting and optimization.      competent in setting up and managing Spinnaker-based continuous delivery pipelines for effective software deployment across various cloud environments.      experienced in designing the architecture for a Kubernetes cluster from the ground up, considering factors such as node distribution, networking, and high availability.      experienced in Leveraged Infrastructure as Code (IaC) tools like Terraform to provision the underlying infrastructure for the Kubernetes cluster, including EC2, VPC, Route table, Internet gateways, Transit gateways, EKS, ECR, Subnets, Load Balancers, Route53,  ..etc.      experienced in the Installation and configuration of the Kubernetes control plane components (API server, etcd, controller manager, and scheduler) on designated master nodes, establishing a functional cluster on-premises data center.      experienced in Set up worker nodes with container runtime (e.g., Docker, containers), configuring kubelet to communicate with the control plane, and joined nodes to the cluster.      experienced in Implementing networking solutions like Calico and Flannel to provide pod-to-pod communication and external connectivity within the cluster.      Written Ansible playbooks and roles to Provision several pre-prod environments consisting of Cassandra DB installations, WebLogic domain creations and several proprietary middleware installations.      Experience with containerization and clustering technologies like Docker, Docker Swarm and Kubernetes.      Setup and build AWS infrastructure using various resources, VPC EC2, RDB, S3, IAM, EBS, Security Group, Auto Scaling, SES, SNS and RDS in Cloud Formation JSON templates, Route53, Lambda.CERTIFICATIONS:      Microsoft Certified Azure Administrator.      Certified Kubernetes Administrator.      AWS Solutions Architect   Associate.EDUCATION:      Bachelor s in computer science from Jawaharlal Nehru technological University, India.TECHNICAL SKILLS:AWS ServicesRDS, EC2, VPC, IAM, Lambda Functions, Cloud Formation, EBS, S3, ELB, Auto Scaling, Cloud Trial, SQS, SNS, SWF, Cloud Watch, WAF, ECR, EKS.Cloud PlatformsMicrosoft Azure, AWS Cloud.Azure ServicesApp Services, Key vault, Function App, Blob storage, Azure Active Directory (Azure AD), Service Bus, Azure Container Registry (ACR) and Azure Kubernetes Service (AKS), Azure SQL, Azure Cosmos DB.Version Control ToolsGIT, Bitbucket, GitHub, GitLabCI/CDJenkins, Azure DevOps Pipelines, GitLab Pipeline, CircleCI, GitHub ActionsConfiguration Management ToolsAnsible, Ansible Tower, Puppet, ChefContainer PlatformsDocker, Kubernetes, OpenShift, Helm, Docker SwarmMonitoring ToolsNagios, Splunk, Prometheus, Grafana, DatadogLanguagesPython, Shell scripting.ArtifactoryJfrog and NexusWeb ServersNginx, Tomcat, IISDocumentationConfluenceOperating SystemsMicrosoft Windows, Linux, UNIX.Tracking ToolsJira, ServiceNow, Azure Boards.Code ScanningSonarQube, Jfrog, X ray, ECR InspectorDatabasesRDS, Cosmos DB, MySQL, Cassandra, MongoDB.LoggingCloudWatch, CloudTrail, Azure App Insights, Azure MonitorAutomationTerraform, Cloud Formation Templates, ARMProfessional Experience:
Client: 	Comcast, Denver, Colorado                                                                                                             Nov 2022   Till nowRole: Sr. Cloud DevOps EngineerResponsibilities:      Configured Azure cloud services, Azure Firewalls, Azure IAM (SSO/MFA/RBAC), Azure Active Directory (AD), Azure Resource Manager (ARM), Azure Storage, Blob Storage, Azure VMs, IIS, SQL Database, Azure Functions, Azure Service Fabric, Azure Monitor, and Azure Service Bus et.,      Configured Azure Infrastructure Automation using   Terraform scripts and launched various services like AKS, ACR, VM, VN...etc      Designed Network Security Groups (NSGs) & Load Balancer to control inbound and outbound access to network interfaces (NICs), VMs and subnets.      Worked on creating, configuring, and managing AKS clusters in Azure, including managing node pools, configuring networking, and setting up load balancing.      a background in creating and coordinating whole deployment pipelines in Spinnaker, including build, test, deploy, and monitoring phases.      Managing the Azure Kubernetes Services (AKS) policies, providing access to different Azure resources and developing and improving the workflows that govern access.      worked on Databricks for data extraction, transformation, and aggregation from multiple file formats for analyzing & transforming the data to uncover insights into the customer usage patterns.      Worked on Azure DevOps services such as Azure Repos, Azure Boards, and Azure Test Plans to plan work and collaborate on code development, built and deployed applications.      Experienced in leveraging Databricks and Spark for big data processing, ETL (Extract, Transform, Load), and building analytical pipelines.      practical knowledge of the Spinnaker framework's sophisticated deployment techniques, such as blue-green deployments, canary releases, and rolling updates.      worked on integrating Databricks with other Azure services such as Azure Data Lake Storage, Azure SQL Database, and Azure Blob Storage.      worked on implementing security measures within Databricks and Azure, including role-based access controls (RBAC), encryption, and compliance with data governance standards.      Experienced in scripting with Python or Scala to automate tasks and streamline workflows within Databricks.      Managed servers on the Microsoft Azure Platform Azure Virtual Machines instances using Ansible Configuration Management and created Ansible Playbooks, tasks, and roles to automate system operations.      Worked with Terraform for automating VNET, NSG, AKS, ACR, VMs, and Storage accounts to replace the rest of our infrastrure.      Integrated Azure Storage Accounts with Azure Functions, Azure Databricks, and AKS cluster.      Designed and implemented CI/CD pipeline for Azure app services and was responsible for monitoring the performance and availability of Azure App Services and troubleshooting any issues that arise.      Created Ansible roles in YAML and defined tasks, variables, files, handlers, and templates.
      Experience with administration and administration of Azure Active Directory (Azure AD).      Skills in configuring and managing user accounts, groups, and roles in Azure AD.      Proven expertise in implementing single sign-on (SSO) solutions for seamless authentication across multiple applications using Azure AD.      knowledge of integrating infrastructure as code (IaC) with Spinnaker, building up and monitoring IaC integration using tools like Terraform and Kubernetes manifests to ensure synchronous.      Able to successfully integrate Spinnaker with CI/CD systems like Travis CI, CircleCI, and Jenkins to automate the start of deployment pipelines in response to new code contributions.      Experience designing and implementing access control policies to enforce security measures based on user and device attributes using Azure AD Conditional Access.      Worked with Terraform scripts to automate the Azure Iaas virtual machines using Terraform modules and deployed virtual machine scale sets in a production environment.      Developed and maintained CI/CD in Azure DevOps pipeline for multiple environments, enabling teams to safely deploy code in Azure Kubernetes Services (AKS) using YAML scripts and HELM charts.
      Worked on creating, configuring, and managing AKS clusters in Azure, including managing node pools, configuring networking, and setting up load balancing.      Configured and installed Prometheus and Grafana using HELM charts within an AKS cluster for monitoring and visualization of Kubernetes workloads.      Created reproducible builds of the Kubernetes applications, managed Kubernetes manifest files, and managed releases of Helm packages.      Monitoring and troubleshooting Azure resources using Azure Monitor and Azure Log Analytics.      Extensive involvement in Azure Backup, Azure Policies, and Azure Key Vault.      Strong knowledge of Microsoft cloud services, such as Office 365 and Azure, and their integration with Azure AD.Client:  Blue Cross Blue Shield, Omaha, Nebraska.                               		              	Oct 2020 to Oct 2022Role: DevOps EngineerResponsibilities:      Worked with Jenkins for continuous integration and for End-to-End automation for all builds and deployment.      Setting up full CI/CD pipelines so that each commit a developer makes will go through a standard process of the software lifecycle and get tested well enough before it can make it to production.      Managed cloud computing AWS using the AWS console and AWS CLI.      Configured and maintained an AWS Virtual Private Cloud (VPC), Public and Private Subnets, NACLs, Route Tables, Elastic Load Balancer, Security Groups, and EC2 instances.      Built S3 buckets and managed its policies using IAM and used Glacier along with S3 for storage and backup on the AWS cloud environment.      Monitored and optimized the performance of OpenShift clusters, using metrics such as CPU usage, memory usage, and network traffic, and fine-tuned the configuration settings to meet the workload requirements.      Worked in container-based technologies like Docker, Kubernetes and OpenShift. Point team player on OpenShift for creating new Projects, Services for load balancing and adding them to Routes to be accessible from outside, troubleshooting pods through ssh and logs, modification of Build configs, templates, Image streams, etc.      Worked with IAM to create new accounts, roles, and groups. Wrote Python scripts for pushing data from DynamoDB to MySQL Database.
      Worked on functions in Lambda that aggregates the data from incoming events, and then stored result data in Amazon DynamoDB.
      Worked on AWS Elastic Beanstalk for fast deploying various applications developed with Java, Node.js, and Python.      Designing and implementing data models within Snowflake, including working with various data types, defining primary and foreign key relationships, and optimizing performance through clustering and partitioning.      Implemented and maintained monitoring and alerting of production and corporate servers using cloud watch.      Created inventory in Ansible for automating the continuous deployment and wrote playbooks using YAML scripting.      Worked on Ansible and Ansible Tower to automate repetitive tasks, deploy critical applications quickly and proactively manage the changes.      Installed and configured SSL certificates according to application compliance and worked on scheduling server backups for multiple applications.      Written Templates for AWS infrastructure as a code using Terraform to build staging and production environments.      Used Terraform for creating stacks of VPCs, ELBs, Security groups, SQS queues, and S3 buckets in AWS and updated the Terraform Scripts based on the requirement on a regular basis.      Managed Kubernetes charts using Helm. Created reproducible builds of the Kubernetes applications, managed Kubernetes manifest files, and managed releases of Helm packages.
      JavaScript for writing custom scripts to handle various DevOps processes like monitoring, logging, and backup automation.      Integrate JavaScript scripts into CI/CD pipelines for automating build, test, and deployment processes.      Created Clusters using EKS clusters using terraform modules and worked on creating many pods, replication controllers, replica sets, services, deployments, labels, health checks, and ingress by writing Yaml files.      Configured Logstash agents to collect logs from EKS clusters and various Kubernetes components.      Installed Kibana to create custom dashboards, visualizations, and alerts for monitoring EKS cluster logs. Developed queries and filters to analyze log data, identify patterns, and troubleshoot issues.Client: National Life Group, TN, USA.                                                                                                     June 2018 to Sep 2020
Role: Site Reliability EngineerResponsibilities:
      Coordinated with different teams such as development, network, software, and QA engineers to continuously improve efficiency and reliability of build and deployment processes to support all phases of development, planning, deploying, monitoring, and maintaining AWS and VMware environments.      Leveraged AWS security features such as security groups, network ACLs, Internet Gateways, Elastic IPs, NAT instances, and Route tables to establish secure zones within the AWS public cloud, ensuring robust organizational security.      Onboarded and migrated test and staging use cases to AWS cloud, both with public and private IP ranges, resulting in reduced test-run times and increased development productivity.      Implemented and maintained Chef Configuration management spanning several environments in VMware and AWS cloud.      Managed multiple AWS instances, configuring security groups, Elastic Load Balancers, and AMIs. Implemented Auto Scaling to design cost-effective, fault-tolerant, and highly available systems.      Created S3 buckets and managed policies for S3 buckets, utilizing S3 bucket and Glacier for archival storage and backup within AWS.      Set up databases in AWS using RDS with Datadog, managed storage with S3 buckets, and configured instance backups to S3 bucket through snapshots.      Developed CI/CD system with Jenkins on Kubernetes container environment, leveraging K8s and Docker for building, testing, deploying, and configuring K8s to manage Docker containers with multiple namespaces.      Wrote Ansible playbooks with Python SSH as a wrapper to manage configurations and test playbooks on AWS instances. Created Jenkins pipelines for Nodes, Maven, and Spring Boot applications.      Utilized Bash and Python, including Boto3, to supplement automation provided by Ansible and Terraform for various tasks, including encrypting EBS volumes and scheduling Lambda functions for routine AWS tasks.      Created IAM policies to grant granular permissions to specific AWS Users, Groups, and Roles.      Created pipelines for deploying code from GitHub to Kubernetes (K8s) clusters, Linux in the form of Docker containers using the Spinnaker platform. Maintained DNS services.      Automated EC2 instance provisioning with Terraform scripts and set up highly available EC2 instances using Terraform, Helm Charts and CloudFormation with custom plugins.      Deployed and configured Elastic search, Log Stash and Kibana for log analytics, full text search, application monitoring in integration with AWS Lambda and CloudWatch.      Created Jenkins jobs to generate Ansible templates and developed Ansible playbooks specifically tailored for microservices deployment and configuration.      Installed, configured, and administered Jenkins CI tool using Ansible on AWS EC2 instances and written shell scripts to pull Docker images from Artifactory and deploy to production using Ansible.      Participated in tools migration and integrated AWS DynamoDB using AWS Lambda for storing item values and backup.      Implemented AWS cloud IAC using Terraform, Helm and continuous deployment through Jenkins, automating cloudformation using Terraform.      Automated EC2 instance creation with Ansible playbooks and installed Docker on multiple instances using Ansible scripts.      Utilized AWS Elastic Beanstalk for streamlined deployment of web applications, simplifying the management of application environments.      Involved in AWS EC2, VPC, S3, SQS, SNS based automation through Terraform, Ansible, Linux, Python, Bash Scripts.      Configured and maintained Splunk clusters for availability and scalability, ensuring uninterrupted log analysis.      Integrated Prometheus with Grafana and Datadog to monitor and visualize performance metrics of Kubernetes clusters and applications running on AWS.      Utilized AWS CloudTrail and AWS Config with Grafana to track changes in AWS resources and ensure compliance and security across the infrastructure.      Developed Ansible playbooks for deploying services on remote servers and installing Dynatrace one agent in multiple environments.      Integrated Docker container-based test infrastructure to Jenkins CI test flow and set up build environment integrating with Git, Prometheus, and Jira to trigger builds using Slave Machines.Client: Hilton Hotels, TN, USA                                                                                                                    Sept 2016 -- May 2018Role: DevOps Engineer| SRE
Responsibilities:      Involved in designing and deploying a multitude of applications utilizing AWS stacks including EC2, Route53, S3, RDS, Dynamo DB, SNS, SQS, LAMBDA, and Redshift, focusing on high-availability, fault tolerance, and auto-scaling in AWS cloud formation.      Migrating an infrastructure into Amazon Web Services utilizing AWS Cloud formation, Code Deploy, EBS, and launching the environment in VPC.      AWS CloudFormation templates were created to establish custom-sized VPCs, subnets, and NAT instances to ensure the successful deployment of Web applications and database templates.
      Employed automation, utilizing Terraform scripting practices and CloudFormation templates, to ensure repeatable deployments and for automating the AMI image deployment.      Familiarity with Redshift security best practices, including IAM policies, VPCs, encryption, and audit logging.      Creating and designing the Terraform templates to create customized VPC and NAT subnets for the deployment of Web application and database templates.      Used Terraform modules to deploy EC2 instances from AWS SMS-produced AMIs into the client's infrastructure, as well as to automate the entire process by connecting Terraform with Jenkins.
      Implemented AWS Code Pipeline and created cloud formation (JSON) templates in Terraform for infrastructure as code.
      Worked with Lambdas integrated with Elastic Search and Kibana to store certain log metrics and monitor cluster health in UI.      Employed Apache Kafka on EC2 to provide a scalable solution for ingesting streaming data.      Implemented a Docker delivery pipeline allowing for CI/CD of Java Tomcat web service containers.      Deployed application which is containerized using Docker onto a Kubernetes cluster which is managed by Amazon Elastic Container Service for Kubernetes (EKS).      Utilize JavaScript for managing containers and orchestrating containerized applications using Docker and Kubernetes.      Worked on Deployment Automation of all micro-services to pull images from the Private Docker registry and deploy to Kubernetes Cluster.      Created Clusters using Kubernetes kubectl utility and worked on creating many pods, replication controllers, services, deployments, labels, health checks, and ingress by writing YAML files.      Worked on rolling updates using the deployments feature in Kubernetes and implemented BLUE GREEN deployment to maintain zero downtime to deploy processes in Tomcat, and Nginx using Python and Shell Scripts to automate log rotation of logs from web servers and automate administration tasks.      Used Ingress Resources in Kubernetes to support a high-level abstraction that allows simple host or URL or HTTP-based routing and used it to expose the applications.      Authored Ansible Playbooks with YAML scripting and Puppet Manifests with DSL to provision Nginx, Apache Spark, Apache Web servers, and Tomcat servers.      Develop custom monitoring solutions using JavaScript frameworks to track infrastructure and application performance.      Build pipelines using Jenkins and configured Jenkins with the Amazon EC2 plugin that allows Jenkins to start slaves on EC2 on-demand and kill them as soon as they become idle.      Write JavaScript-based tests to validate infrastructure configurations and ensure the reliability of deployments.      Worked on using GIT webhooks in Jenkins to trigger code and automate the CI/CD build process.      Worked on setting up Splunk to capture and analyze data from various layers of Load balancers, Web servers, and application servers.Client: BTS Software Solutions.			                                          Oct 2013 -- Aug 2016Role: Build/Release EngineerResponsibilities:
      Defined and Implemented CI and Release Management Processes, Policies, and Procedures.
      Automated the release pipeline to achieve zero-touch deployments using Jenkins, SVN, and Nexus.      Worked with SVN and GIT version controlling.
      Creation and management of branches, merging branches, and deletion of obsolete branches after every release.      Writing the post-commit and pre-push hooks in Python for code checks.      Coordinate/assist developers with establishing and applying appropriate branching, labelling/naming conventions using Subversion (SVN) source control.
      Analyze and resolve conflicts related to the merging of source code for SVN.      Developed Scripts for AWS Orchestration using EC2, EBS, S3, Cloud Formation and IAM.      Develop/capture/document architectural best practices for building systems on AWS.      Goal is to build a HA proxy Infrastructure so that two Docker containers are running behind Application load balancer.
      Installed Ansible Registry for local upload and download of Docker images and even from Docker hub.      Utilized Perl and Python for GIT for creating repository hooks      Used Maven dependency management system to deploy snapshot and release artefacts to Nexus to share artefacts across projects and environments.
      Configured and maintained Jenkins to implement the CI process and integrated the tool with ANT and Maven to schedule the builds. Took the sole responsibility to maintain the CI Hudson server.
      Used Ansible for configuration management and deployed all the services on to the cloud using Ansible.      Used Ansible playbooks to setup Continuous Delivery pipeline. This primarily consists of a Jenkins and Sonar server, the infrastructure to run these packages and various supporting software components such as Maven, etc.
      Provided Tier 1 (Help Desk) problem identification and Tier 3 (Watch Desk) support during normal to semi-critical situations.Environment: SVN, Jenkins, Nexus, GIT, ANT, MAVEN, Perl, Puppet, Ansible, Python Scripts, Shell Scripts, Sonar, Red Hat Kickstart server, Splunk
Client: Portware LLC, Hyderabad, India.					                         Aug 2012 -- Sep 2013Role: Linux AdministratorResponsibilities:
      Configuration of NIS, DNS, NFS, SAMBA, SENDMAIL, LDAP, TCP/IP, Send Mail, FTP, Remote access Apache Services on Linux &Unix Environment.
      Migrated different projects from Perforce to SVN      Performing NIC bonding on Linux Systems for redundancy.      Diagnosed and resolved problems associated with DNS, DHCP, VPN, NFS, and Apache.      Created Bash/shell scripts to monitor system resources and system maintenance.      Create and Update Documentation for the current Patching process. Coordinate with Lines of Business to schedule patching. Create a Change request for Patching in a Production environment.      Created and maintained user accounts in RedHat Enterprise Linux (RHEL)and other operating systems
      Troubleshooting and maintaining of TCP/IP, Apache HTTP/HTTPS, SMTP and DNS applications.
      Created Linux Virtual Machines using VMware Virtual Center, creating VM Templates, and troubleshooting all Virtualization related issues.      Expertise in remote access and application virtualization technologies such as XEN, VMware, ESX, ESXi, etc on Linux.
      Installed, tested, and deployed monitoring solutions with Splunk services.      Resolved configuration-based issues in coordination with infrastructure support teams.      Maintained and managed assigned systems, Splunk related issues and administrators.      Skilled in deploying, configuring and administering Splunk clusters.
      Responsible for the basic administration tasks related to LDAP and WebSphere Portal.      Installed and configured servers using RedHat Linux KickStart method.      Coordinating with 24 x 7 on-call support personnel in debugging.Environment: RHEL, Windows, Shell Script, VMware servers, XEN, ESX, ESXi, WebSphere, Perforce, Splunk Enterprise Server 5.x, SVN, Windows 2003 server, Kick Start, Solaris.

Respond to this candidate
Your Email «
Your Message
Please type the code shown in the image:
Register for Free on Jobvertise