Quantcast

Devops Engineer Azure Resume Boca raton,...
Resumes | Register

Candidate Information
Name Available: Register for Free
Title Devops Engineer Azure
Target Location US-FL-Boca Raton
Email Available with paid plan
Phone Available with paid plan
20,000+ Fresh Resumes Monthly
    View Phone Numbers
    Receive Resume E-mail Alerts
    Post Jobs Free
    Link your Free Jobs Page
    ... and much more

Register on Jobvertise Free

Search 2 million Resumes
Keywords:
City or Zip:
Related Resumes

Devops Engineer Cloud Miami, FL

Devops Engineer Cloud Miami, FL

Devops Engineer Test Aventura, FL

Engineering Manager Call Center Fort Lauderdale, FL

Scrum Master Data Engineer Weston, FL

Data Engineer Project Development Lake Worth, FL

.net software engineer Fort Lauderdale, FL

Click here or scroll down to respond to this candidate
Candidate's Name
Mail: EMAIL AVAILABLEContact: PHONE NUMBER AVAILABLELinkedIn: LINKEDIN LINK AVAILABLECertified Azure DevOps Engineer with more than 8 years of IT experience with excellent knowledge in Configuration Management, Continuous Integration and Continuous delivery (CI/CD), Build and Release, Linux, System Administration, and Kubernetes with a major focus on Cloud Platforms Microsoft Azure, Amazon Web services (AWS) and includes great knowledge on the principles and best practices of Software Configuration Management (SCM) in Agile, Scrum and Waterfall Methodologies.PROFESSIONAL SUMMARYExperience in implementing Azure IaaS/PaaS/SaaS and services such as Azure Active Directory (AD), Azure Storage, Azure Functions, Azure Cloud Services, Azure Resource Manager (ARM), Azure App Service, SQL Databases, Azure Virtual Machines, Azure Data Services, Azure VM, Azure functions, Azure service fabric, Azure Data Lake, Data Factory.Hands-on experience in backup and restore Azure services and in designing, configuring Azure Virtual Networks (VNets), subnets, DHCP address blocks, DNS settings, security policies and routing, Blob storage, Service Bus, and Cosmos DB.Managed Azure Infrastructure, Azure Web Roles, Worker Roles, VM Roles, Azure AD Licenses, Virtual Machine Backup, and Recovery from a Recovery Services Vault using Azure PowerShell and Azure Portal.Conducted application dependency mapping, identifying critical interdependencies, and establishing a roadmap for migrating applications with minimal disruption to the overall system and post-migration support.Experienced in migrating on-premises DevOps platform to Azure CI/CD processes by utilizing ARM templates, Azure DevOps services such as Repos, Test Plans, Boards, Pipelines and Artifacts.Worked with version control, build and release management, and deployment of solutions to the DEV, QA, and PROD environments leveraging Azure Devops and processes (CI/CD) and toolsets of Visual Studio, Application Insights, and Log Analytics.Hands on experience in AWS provisioning and wrote Terraform scripts to automate AWS services like EC2, S3, Glacier, ELB, RDS, Redshift, IAM, Route 53, VPC, autoscaling, Cloud Front, SNS, Cloud Watch, Cloud Trail, Cloud Formation, and Security Groups.Designed and implemented hybrid cloud solutions, seamlessly integrating on-premises VMware infrastructure with public cloud platforms such as AWS or Azure. Ensured secure and efficient data migration between on-premises VMware environments and public clouds.Well-versed in keeping up with Amazon Web Services and hands-on involvement in Architecting Legacy Data Migration projects like Teradata to AWS Redshift, Snowflake Migration, and AWS Cloud from on-premises by using Code Commit, Code Pipeline, Code Build, Code Deploy, and Elastic Beanstalk.Integrated Filebeat with AWS kinesis data firehose to stream logs to external systems such as Splunk and Datadog, enabling real-time monitoring and alerting.Designed and implemented security controls in AWS, such as VPCs, security groups, NACLs, and IAM policies. Developed automated security testing pipelines using tools such as SonarQube, Fortify, and Twistlock.Utilized helm charts and Kubernetes operators to manage complex application deployments on Azure and AWS, such as databases, message brokers, and other stateful services.Developed custom Kubernetes controllers and operators using tools such as Operator SDK and Kubebuilder to automate the deployment and management of complex applications on Kubernetes clusters.Evaluated and recommended third-party Kubernetes tools and plugins, such as kustomize, Helmfile, and ArgoCD, to improve the efficiency and effectiveness of Kubernetes-based infrastructure management.Implemented best security practices in Kubernetes, such as using network policies, pod security policies, and RBAC roles, to ensure secure access and usage of the ELK stack clusters across teams and departments.Implemented Kubernetes monitoring and logging solutions using tools like Prometheus, Grafana, and Elasticsearch to gain visibility into the Kubernetes environment and troubleshoot issues.Demonstrated proficiency in leveraging YAML for infrastructure as Code (IaC) across diverse cloud environments, enabling seamless provisioning, configuration, and management of resources using tools such as Ansible, Terraform, Kubernetes, and Helm.Spearheaded the implementation of Spectral API governance framework across multiple projects, ensuring consistency, compliance, and best practices in API design and documentation.Created Docker images from a Docker file, worked on Docker container snapshots, deleted images, handled Docker container and volume directory structures. Implemented Docker-Maven-plugin in Maven Project Object Model (POM).Developed complex automation scripts and pipelines using Java to streamline CI/CD processes and reduce deployment times. Developed custom Kubernetes controllers and operators in Java for advanced orchestration.Proficient in public cloud platforms (Azure, AWS), architecting and deploying Java-based applications, and leveraging cloud-native services for scalability, resilience, and cost optimization.Implemented security best practices through Infrastructure as Code (IaC) and pipeline automation, integrating Java security libraries and tools like OWASP Dependency-Check for vulnerability scanning.Configured and maintained Hashicorp Nomad as a container orchestration platform in Azure, allowing for seamless deployment and scaling of containerized applications across multiple regions.Implemented Infrastructure as code (IaC) principles using terraform, allowing for consistent, repeatable, and automated provisioning of resources across multiple cloud platforms.Successfully integrated Azure Active Directory (Azure AD) as the identity provider for SSO, configuring and managing authentication and authorization protocols such as SAML, OAuth, and OpenID Connect.Designed, implemented, and optimized a global DNS infrastructure across multiple regions, ensuring high availability, low latency, and seamless failover. Reduced DNS query response time by 40% through strategic placement of authoritative and caching DNS servers.Engineered and deployed DNS-based DDoS mitigation solutions using technologies such as Anycast and rate limiting. Successfully defended against large-scale attacks, minimizing service disruptions, maintaining uptime in critical incidents.Established a dependency mapping framework to visualize relationships between services and resources. Leveraged tools like Graphviz and Neo4j to provide clear insights into complex interdependencies, reducing downtime during updates.Familiar with GitOps tooling such as GitLab, GitHub, and Bitbucket, and experienced in using them to manage version control and collaboration in software development projects.Utilized GitLab Runners to automate the provisioning and scaling of infrastructure resources on Cloud Platforms (AWS and Azure). Implemented efficient auto-scaling strategies to optimize resource utilization.Integrated monitoring and alerting tools (Prometheus, Grafana) into GitLab CI principle to ensure real-time visibility into application and infrastructure health. Set up automated alerts for critical issues and performance degradation.Designed and implemented end-to-end CI/CD pipelines for .Net applications using Jenkins, Azure DevOps, GitLab CI/CD, enabling automated building, testing, and deployment processes. Implemented Docker containers for .Net applications, optimizing resource utilization and scalability.Designed and implemented complex VMware vSphere environments for mission-critical applications, ensuring high availability, scalability, and performance. Utilized vSphere Distributed Switches (VDS) and VMware NSX for advanced network virtualization, enabling seamless communication between virtual machines and enhancing overall network security.Developed Ansible playbooks, inventories, and custom playbooks in YAML, encrypted the data using Ansible Vault, maintained role-based access control by using Ansible Tower, and implemented IT orchestration using Ansible to run tasks in a sequence that can work on different servers.Developed custom Ansible roles to automate the installation and configuration of software packages and services in Red Hat Linux instances.Successfully created and maintained automated CI/CD pipelines for code deployment using Jenkins while automating the deployment process, resulting in the elimination of 70% of manual work and an escalation of work efficiency.Extensive experience with Jenkins Pipeline DSL and declarative syntax. Implemented and maintained a scalable Jenkins infrastructure to cater to the needs of a large development team. Developed custom Jenkins plugins in Groovy and Java to extend Jenkins functionality and integrate with third-party tools.Created custom Jenkins plugins and scripts to extend the functionality of the Jenkins ecosystem and integrate with other DevOps tools and systems, such as Git, Jira, and Docker.Created custom policies in Whitesource Bolt to enforce compliance with industry-specific regulations and standards such as HIPAA and PCI-DSS, reducing the risk of costly regulatory violations.Designed and implemented custom stages and plugins in Spinnaker to handle multi-region deployments and blue-green deployments in AWS, resulting in improved application availability and zero downtime deployments.Configuring Istio traffic management policies for fine-grained control of traffic routing and load balancing. Utilized Istio telemetry features for monitoring and tracing of traffic flows, request rates, error rates, and latencies.Developed custom dashboards and alerts in New Relic using Terraform to track application performance metrics and proactively identify and resolve issues before they impact end-users.Developed and customized Nagios plugins and extensions to monitor a wide range of devices, services, and protocols, ensuring comprehensive coverage of the IT environment.Successfully migrated on-premises Splunk deployments to Azure and AWS DevOps environments, leveraging infrastructure-as-code principles, automation tools, and cloud-native services. Designed and implemented complex Splunk architectures, queries, dashboards, including distributed deployments and high availability setups, to meet the scalability and performance requirements of large-scale environments.Implemented JIRA Service Management (formerly JIRA Service Desk) to establish IT service management processes, including incident management, change management, and request fulfillment, ensuring timely resolution of issues and effective service delivery.Certifications:Kubernetes AdministratorCERTIFIED KUBERNETES ADMINISTRATOR (CKA)Azure DevOps Engineer ExpertMICROSOFT CERTIFIED: DEVOPS ENGINEER EXPERTAzure Administrator AssociateMICROSOFT CERTIFIED: AZURE ADMINISTRATOR ASSOCIATEMicrosoft DevOps SolutionsAZ-400 DESIGNING AND IMPLEMENTING MICROSOFT DEVOPS SOLUTIONSTechnical SkillsCloud: Microsoft Azure, AWSIaC Tools: ARM, Terraform, Cloud FormationConfiguration Management Tools: Ansible, ChefMethodologies: Agile, Scrum, WaterfallCI/CD tools: Azure DevOps, Jenkins, SpinnakerDatabases: Oracle, MS SQL Server, My SQL, MS Access, DB2, NoSQL (MongoDB, DynamoDB)Build Tools: Maven, Ant, GradleLanguages: Java, Shell Scripting, Python, YAML, JSONVersion Control Tools: GIT lab, Git Hub, BitbucketScripting: Python, YAML, PHP, Shell, PowerShellContainerization Tools: Docker, Kubernetes, EC2 Container Services, Azure Container Services.Virtualization Tech: VMware vSphere ESXi 5.x/4.x, ESX /3.x, VMware Workstation, Oracle Virtual boxMonitoring Tools: Nagios, Splunk, CloudWatch, New Relic, Elasticsearch, Logstash & Kibana (ELK), Graylog, Datadog, JiraNetworking/Protocol: TCP/IP, NIS, CIFS, NFS, DNS, DHCP, WAN, SMTP, SOAP, LAN, FTP/TFTPApplication Servers: Tomcat, Apache 2, 3, JBoss 4, 5, Web Logic Application Server 9.x, 10.x, Apache Tomcat 5.x/7.x, Red Hat JBOSS 4.22.GA, WebSphere 6.x/7.x/8.xOperating Systems: Linux (RedHat 4/5/6/7, CENTOS), Unix, Solaris 11/10/9/8, Ubuntu 12/13/14, Windows NT, Windows 8, 12, 12R2, MacOS.WORK EXPERIENCESr. Cloud/DevOps Engineer Genesis Financial Solutions - Beaverton, OROCT 2021  PresentExperience with provisioning Highly available (HA) infrastructure in Azure using ARM templates and Terraform, utilizing the command-line interface (CLI) to automate the deployment process. Provisioned Azure RBAC roles for various resources such as virtual machines, storage accounts, databases, using built-in roles and custom roles based on the specific requirements.Implemented DNS Security Extensions for Azure DNS zones, providing an additional layer of security and integrity for DNS resolution to automate the creation and management of azure DNS zones and records, reducing risk of manual error, and improving efficiency using PowerShell scripts.Designed and implemented Azure DevOps pipelines and automation workflows to streamline the migration process, ensuring efficient deployment, configuration, and monitoring of resources.Configured Azure Virtual Network (VNet) peering to connect multiple VNets together for seamless communication and resource sharing across different regions.Implemented Single Sign-On for a wide range of DevOps tools and services, including Azure Devops, Jenkins, Docker, Kubernetes, and other cloud-based platforms, streamlining authentication and authorization processes across the development and deployment pipeline.Implemented Azure VPN gateway to connect your on-premises network to Azure securely, and configured Point-to-Site (P2S) or Site-to-Site (S2S) VPN connections depending on your requirements.Optimized Azure function app performance and cost efficiency by monitoring and analyzing resource utilization and implementing appropriate scaling and pricing models.Designed and implemented secure cloud architectures using Azure services, including Azure Key Vault, Azure Virtual Networks, and Azure Active Directory, in conjunction with Azure Confidential Computing to create secure solutions.Designed and implemented a dynamic peer routing solution using BGP within a multi-region Kubernetes cluster environment, enabling seamless communication between microservices deployed across different geographic locations. Reduced latency by 30% and improved application reliability by implementing intelligent traffic routing based on real-time network conditions.Established robust security practices for OCP-based environments, including network security, access controls, and encryption mechanisms. Developed and implemented cost optimization strategies for OCP-based cloud solutions.Implemented advanced optimization techniques in build pipelines to significantly reduce build times, enhancing developer productivity. Utilized caching mechanisms, parallel builds, and dependency management strategies to achieve optimal build performance.Developed custom Spectral rulesets tailored to organizational requirements, optimizing API linting processes and enhancing the accuracy of automated checks for API specifications.Integrated Spectral into CI/CD pipelines using industry-standard tools such as Jenkins, GitLab CI/CD, or GitHub Actions, enabling automated API linting and validation as part of the software delivery process.Designed and implemented Ingress API gateway for microservices architecture in Azure Kubernetes Service (AKS) using Nginx ingress controller and Azure Application Gateway for load balancing and SSL termination.Deployed windows Kubernetes (K8s) cluster with Azure Container Service (ACS) from the Azure CLI and utilized Kubernetes CaaS and Docker for the runtime environment of the CI/CD system to build, test, and Octopus deploy.Extensive experience in creating Kubernetes manifests (YAML) to define Application Resources, Deployments, Services, and Persistent Volume Claims (PVCs). Implemented and managed Helm charts to streamline the deployment process and enhance application maintainability.Utilized advanced YAML templating techniques and parameterization strategies to modularize and scale infrastructure codebases effectively, facilitating dynamic configuration management and reducing duplication manifests and configuration files.Designed and implemented custom YAML schemas and validation rules to enforce strict configuration standards and ensure consistency, reliability, and security across complex cloud-native architectures and distributed systems.Implemented IaC principles using tools like Terraform and Ansible to automate the deployment and configuration of VMWare infrastructure and vSphere resources, ensuring consistency and efficiency in infrastructure management.Leveraged VMWare vRealize Suite to design and implement comprehensive cloud management solutions, and automated resource allocation, scaling, improving infrastructure agility and responsiveness to changing workloads.Implemented and maintained artifact repositories (e.g., Artifactory, Nexus) for efficient versioning, storage, and retrieval of build artifacts, enhancing traceability and reproducibility.Implemented automated testing of infrastructure changes using HashiCorp Sentinel policies, ensuring compliance, and preventing unauthorized changes to critical Azure resources.Orchestrated a CI/CD pipeline using Azure DevOps, incorporating Bicep templates to automatically deploy and update Azure infrastructure components for a globally distributed web application, resulting in a 40% reduction in deployment errors.Created a comprehensive Bicep template for deploying a microservices architecture on Azure Kubernetes Service (AKS), facilitating rapid scaling and consistent infrastructure provisioning for multiple development teams.Worked on Docker Hub, building Docker images, and managing many images, particularly for middleware deployments and domain settings for all microservices and later used Docker file to build the Docker images.Worked with Service Mesh Istios Mixer component to implement policy enforcement and quota management, enforcing compliance with organizational policies and preventing abuse of resources.Implemented Tetrate Service Bridge (TSB) to extend Istio to a multi-cluster environment, resulting in improved service mesh connectivity and easier management of microservices across multiple clusters.Integrated PING Identity solutions to establish single sign-on (SSO) and multi-factor authentication (MFA) across diverse applications and environments.Led security initiatives by implementing PING Federate for secure identity federation and single sign-on (SSO), enhancing overall system security and compliance.Implemented Envoy proxy as a sidecar deployment using HELM to capture application-networking metrics like requests per second, number of failures, circuit-breaking events, and improved networking capabilities like retries, timeouts, circuit breaking, client-side load balancing, service discovery, security.Troubleshot issues with Envoy Proxy configuration and communication in a complex microservices architecture, using a combination of logging, monitoring, and diagnostic tools.Configured Istio Gateway/Ingress as a load balancer to control incoming/outgoing HTTP/TCP connections, improving scalability and reliability of microservices architecture in a multi-cloud environment.Used Ansible tower to automate the deployment and configuration of multi-tier web applications, distributed data processing clusters, and other complex Azure infrastructure environments.Leveraged Azure DevOps service connection types, such as Azure Resource Manager (ARM), Service Principal, and SSH, to establish secure and authenticated connections between Azure DevOps and target resources.Created YAML scripts for CI/CD by integrating Maven, SonarQube using Service connections in Azure DevOps pipelines and created multistage release pipelines for different environments such as dev and production.Developed custom Ansible modules and plugins to extend functionality and integrate with third-party tools and APIs.Expertise in setting up and configuring Azure DevOps agents, pipelines, and tasks to support diverse deployment scenarios, including virtual machines, containers, and serverless architectures.Created custom dashboards in Azure DevOps to track key performance indicators (KPIs) such as build success rates, deployment frequency, and mean time to resolution (MTTR).Knowledgeable in using WhiteSource Bolt to enforce open-source license compliance in software applications by identifying and reporting license conflicts and providing guidance on license requirements.Built custom Jira reports and dashboards to track resource usage and cost, ensuring optimal resource utilization and cost optimization in Azure.Engineered automated release strategies, incorporating canary releases, blue-green deployments, or feature toggles to minimize downtime and enhance the reliability of software releases.Leveraged packers builders, provisioners, and post-processors to customize and optimize the image creation process, including installing software packages, applying security patches, and optimizing performance.Azure DevOps Engineer Grant Thornton  Chicago, ILJAN 2020  SEP 2021Managed the Windows Azure infrastructure for our customers, depending on their requirements. Worked on Microsoft Azure Storage accounts, configured Filebeat to use Azure blob storage as a source for log files, providing a scalable and cost-effective way to collect logs from multiple sources.Deployed Azure SQL DB with GEO Replication, Azure SQL DB Sync to a standby database in another region, and failover configuration.Configured Azure Multi-Factor Authentication (MFA) as a part of Azure AD Premium to securely authenticate users and worked on creating custom Azure templates for quick deployments and advanced PowerShell scripting.Used Network Security Group (NSG) to allow network traffic to subnets and linked NSG to a Network Interface Card (NIC) so that the Access Control List (ACL) rules are applied to all virtual machines.Proficient in Tanzu tools and services, including Tanzu Application Service, Tanzu Mission Control, and Tanzu Build Service. Demonstrated expertise in deploying and managing Kubernetes clusters using VMware Tanzu Kubernetes Grid (TKG).Developed automated CI/CD pipelines using tools like Jenkins, GitLab CI, integrating Tanzu Build Service to automate container image creation and updates.Worked on application containerization using a Kubernetes cluster and created a Platform-as-a-Service (PaaS) environment for web servers and an automated Kubernetes cluster.Used Helm, managed Kubernetes charts and built repeatable builds of Kubernetes applications, as well as handled Kubernetes manifest files and Helm package releases. Worked with Kubernetes to deploy scale, load balance, and manage Docker containers with multiple names spaced versions using Helm charts.Spearheaded implementation of Open Compute Project (OCP) and achieved a significant reduction in hardware costs by leveraging OCP-compliant hardware and promoting resource-efficient practices.Designed and implemented VDI architectures that improved user experience, increased scalability, and reduced costs by leveraging virtualization technologies, storage systems, and networking protocols.Engineered a highly available DNS infrastructure using Anycast and redundant DNS servers across multiple data centers. Achieved 99.99% uptime for DNS resolution services, reducing service disruptions during network failures.Engineered robust CI/CD pipelines using YAML-based configuration files using GitLab CI/CD, GitHub Actions, Jenkins Pipeline DSL, to automate software delivery workflows, including code compilation, testing, deployment, and monitoring in Azure Cloud Platform.Developed automated processes utilizing YAML-based configuration drift detection mechanisms to identify and remediate inconsistencies between desired and actual infrastructure states, enhancing system reliability, compliance, and auditability.Designed and implemented service discovery mechanisms using tools like Consul and etcd, enabling dynamic configuration updates and improved load balancing across microservices. Reduced manual intervention for DNS record updates by 40%.Developed and maintained HashiCorp packer templates for building custom Azure images, which reduced deployment times by 50% and ensured consistent infrastructure across multiple environments.Leveraged HashiCorp Consul for service discovery and configuration management in a microservices architecture deployed on a Kubernetes CaaS cluster in Azure, resulting in improved scalability and reliability of the application.Automated Azure DevOps service connection provisioning and management using tools such as Azure DevOps REST API, PowerShell, and Azure CLI, enabling efficient and consistent connections across different environments and use cases.Implemented Azure DevOps dashboards and reports to provide visibility into the status and progress of software delivery, enabling data-driven decision making.Designed and implemented complex infrastructure topologies using Terraform (IaC), including high-availability architectures, disaster recovery solutions, and multi-cloud deployments.Created and managed Terraform modules to promote code reuse and standardization across projects, resulting in improved efficiency and consistency.Troubleshot and resolved issues related to ARM templates deployment and resource management, using tools such as Azure Resource Explorer, Azure Monitor, and Azure Log Analytics.Implemented Azure Container Instances with advanced security features, such as Azure Private Link and Azure Key Vault integration. Developed Azure Functions that interact with Azure Container Instances to perform advanced operations and automate processes.Developed and maintained Spectral plugins or extensions to enhance its functionality and address specific organizational requirements, demonstrating a deep understanding of API governance principles and best practices.Acted as a subject matter expert on Spectral API governance within the organization, advising senior leadership on strategic initiatives related to API design, governance, and quality assurance in alignment with business objectives.Created and maintained custom playbooks and roles in Ansible Tower for Azure provisioning, integrating with other Azure services and APIs as needed.Worked on Azure costs by writing the Ansible Playbooks for auto Start/Stop of Azure resources at the time of the day by triggering it from Jenkins and knowledge on RHEL on Ansible Playbooks, Modules, and Roles.Developed and maintained Jenkins Pipeline scripts in Groovy to define and orchestrate complex deployment workflows across multiple Azure regions and environments.Implemented Jenkins master-slave architecture on Azure Virtual Machines to scale build capacity and improve job reliability and availability.Automated blue/green canary deployments using Jenkins, Helm, and Terraform to ensure high availability and zero-downtime updates.Proficiency in setting up observability solutions for Tanzu applications, including log aggregation, metrics collection, and distributed tracing using tools like Prometheus, Grafana, and Jaeger. Designed and Implemented disaster recovery and high availability solutions for Tanzu and Kubernetes clusters, ensuring minimal downtime and data integrity.Architected and optimized network configurations for high-availability and low-latency using PING products, ensuring seamless communication between on-premises data centers and cloud environments.Extensive experience as a Splunk Engineer, proficient in deploying, configuring, and optimizing Splunk Enterprise andSplunk Cloud Platforms in Azure Environment. Developed and implemented Splunk dashboards and alerts to monitor system and application health, security, and performance metrics.Extensive experience as a Splunk Engineer, proficient in deploying, configuring, and optimizing Splunk Enterprise andSplunk Cloud Platforms in Azure Environment. Developed and implemented Splunk dashboards and alerts to monitor system and application health, security, and performance metrics.Implemented advanced threat detection and incident response strategies using Splunks security information and event management (SIEM) capabilities within Azure DevOps environment.Actively participated in capacity planning exercises for Splunk and Azure DevOps environments, accurately forecasting infrastructure requirements and scaling solutions to meet growing business needs.Provisioned Azure instances with new relic integration using terraform and Azure Resource Manager (ARM) templates, enabling easy deployment and configuration of monitoring agents across the infrastructure.Worked closely with ServiceNow team and Infrastructure team to facilitate LDAP integration and prepared data feeds and imported them into system accordingly.Designed and implemented shared image gallery in Azure to manage and distribute custom images across multiple regions, resulting in a more efficient and streamlined image management process.Cloud/DevOps Engineer Infor  Hyderabad, IndiaNOV 2018  DEC 2019Architected and configured a Virtual Data Center in the AWS Cloud to support Enterprise Data Warehouse hosting including Virtual private Clouds (VPC), Public and Private Subnets, Security Groups, and Route Tables.Configured AWS Identity and Access Management (IAM) users, Roles, and Groups to manage access to pipeline actions and deploy serverless applications in development and production

Respond to this candidate
Your Message
Please type the code shown in the image:

Note: Responding to this resume will create an account on our partner site postjobfree.com
Register for Free on Jobvertise