| 20,000+ Fresh Resumes Monthly | |
|
|
| | Click here or scroll down to respond to this candidateCandidate's Name
Cloud DevOps Engineer(Secret Security Clearance)Contact Information:TEL: PHONE NUMBER AVAILABLEEMAIL: EMAIL AVAILABLEPROFESSIONAL SUMMARYDiving into the depths of DevOps mastery, I proudly stand as a seasoned architect of automation with a formidable 10+ years of experience, sculpted by the fusion of passion and precision. My journey is marked by an unwavering dedication to catalyzing the evolution of software delivery, orchestrating symphonies of efficiency that resonate across development and operations realms. With the seasoned hand of a craftsman, I navigate the intricate terrain of technology, leveraging the latest advancements to carve pathways of seamless integration and collaboration. Armed with an arsenal of tools ranging from the stalwarts of tradition to the avant-garde innovations of tomorrow, I orchestrate a ballet of code and infrastructure where each movement is meticulously choreographed for maximum impact. My prowess extends beyond mere technical acumen; I am a maestro of cohesion, weaving together disparate teams into a unified force where silos crumble and communication flows freely. I am the bridge spanning the gap between vision and execution, translating lofty ambitions into tangible realities with finesse and flair.EDUCATION MBA, University of Gloucestershire, UK Bachelor of Science in Computer Sciences, Presbyterian University, Cameroon CERTIFICATIONS Intel Cloud Technical Professional - Certified Pro AWS Certified Solutions Architect Professional AWS Certified Solutions Architect Associate Google Cloud Fundamentals Certification Red Hat Certified System Administrator CompTIA Security+COMPETENCIES 10+ years of IT experience in DevOps, Software Configuration Management, Build, Release, and Deployment Management. Proficiency with AWS services, CI/CD, Cloud Watch, SSH connections, Configuration Management tools (Ansible, Git, Jenkins, Terraform), and Docker. Hands-on experience in orchestration, writing custom Ansible Playbooks and Manifest Files, Jenkins configuration, EC2, S3, VPC services, version control (GIT), and Docker image creation. Extensive experience with monitoring and alerting tools such as Splunk, New Relic, PagerDuty, Grafana and Prometheus Experience in storage model in Cassandra and implemented various optimal configuration to meet storage requirements. Migrated and resettled the applications and server instances from on-premises environment to AWS and GCP cloud. Experience in designing and configuring Azure Virtual network settings, DHCP address blocks, DNS settings, Azure cloud services, blob storage, active directory, azure service bus. Proficient in scripting languages such as Shell, Perl, Python, Ruby, Groovy, and JavaScript, with a strong understanding of Agile and Waterfall methodologies. Specialized in provisioning the GCP Global HTTPS load balancer routes the traffic to GCP GKE cluster via Terraform modules. Experience in implementing Cassandra Clusters in AWS cloud environment. Accomplished in setting up CI/CD pipelines using Jenkins, Chef, Ansible, and Kubernetes, with extensive experience in containerization with Docker and Kubernetes. Experience in administering Amazon Web services (AWS) services like Virtual Private Cloud (VPC), Simple Storage Service (S3), Elastic Cloud Computing (EC2), Elastic Load Balancer (ELB), Relational Database System (RDS, Amazon Machine Image (AMI), IAM, and Cloud Formation services using AWS - Command Line Interface (CLI) and enabling the enterprise environment compatible for continuous monitoring using Cloud Watch. Well knowledge with Terraform templates for building, changing, and versioning infrastructure and managing the existing cloud infrastructure. Experience in managing cloud infrastructure of Amazon Web Services (AWS) including computing services like Amazon Machine Image (AMI) and Elastic Compute Cloud (EC2) Expertise in deploying microservices, application improvement, and upgradation utilizing Azure administrations like Azure DevOps, Kubernetes Service (AKS), Container Services, MySQL DB, and Grafana, Azure pipelines, RBAC, and checking groups. Strong Experience with Host based, and Networks based IDS, IPS and various SIEM solutions such as Axxera Experience in CI/CD using Jenkins and Gitlab Proficiency in AWS cloud services such as EC2, S3, VPC, Elastic Load Balancer(Network/Application), Auto scaling, IAM, EBS, RDS, CloudFront. Experienced in branching, merging, and maintaining the version using SCM tools like Git and GitHub on windows and Linux platform. Extensive Experience with Project management and ticketing system using ServiceNow. Experienced in the creation of containers using Docker and Docker consoles for managing the application lifecycle. Written templates for Azure infrastructure as code using Terraform to build the environments staging and production. Integrated Azure log analytics with Azure virtual machines for monitoring the logs, storing them, and tracking metrics using terraform managed multiple infrastructure resources like cloud, VMware, and Docker containers. Experience in Chef Automation including writing cookbooks, customized recipes for test driven development environments. Manage and maintain server infrastructure, including installation, configuration, and maintenance of operating systems and server software such as Windows Server, Linux, or Unix. Administer network infrastructure, including routers, switches, firewalls, and VPNs. Monitor network performance, troubleshoot connectivity issues, and implement network security measures. Worked with Engineers, QA and other teams to ensure automated test efforts are tightly integrated with build pipelines and fixing the errors while deploying and building. Extensive Experience in installing, configuring, and administering Command Line tools on Linux machines. Used Jenkins pipelines to drive all Microservices builds to Docker registry and then deployed to Kubernetes. Excellent communication, interpersonal, and analytical skills to work efficiently in both independent and teamwork environments. Strong problem solving and adaptability skills. Experienced in working on Agile Automated operations and tools area (code review, unit test automation, Service, Incident and change management.) Maintained and managed Active Directory services, including user and group management, group policy administration, and domain controller configuration. Administered storage systems such as SAN or NAS devices. Allocate storage space, optimize storage performance, and implement data protection measures such as RAID configurations. Implemented security measures to protect systems and data from unauthorized access, malware, and other security threats. Monitor security logs, conduct security audits, and apply security patches and updates.PROFESSIONAL EXPERIENCEDevOps Engineer Lion Share Digital MarketingAUG 2021 CURRENT Software Configuration Management (Automate CI & CD pipeline using Ansible, Nexus, SonarQube, Maven, Jenkins, Terraform & GIT). Conducted regular audits of IAM policies and roles, identifying and resolving potential security risks and compliance issues. Created custom IAM roles and policies to manage access to AWS resources based on specific business requirements and compliance needs. Collaborated with cross-functional teams, including developers and operations staff, to ensure IAM policies were aligned with business and technical requirements. Configured and maintained AWS Organizations, Identity Providers, and Single Sign-On (SSO) solutions to simplify and centralize access management across multiple AWS accounts and services. Creating and Managing Virtual Machines in Windows Azure and setting up communication with the help of Endpoints. Configured Shared Access Signature (SAS) tokens and Storage Access Policies in Azure Cloud Infrastructure. Designed and integrated capabilities for establishing a DevSecOps pipeline, utilizing lab and cloud resources for building, testing, securing, and deploying functional components and technologies. Deployed GKE on GCP with the help of Gitlab-Jenkins-Terraform integration. Automated Compliance Policy Framework for multiple projects in GCP. Experience in building EC2 instances, AWS Volumes, Snapshots, Amazon Machine Images, Network Interfaces, tagging of resources and Implemented Elastic Load Balancing and AWS Auto Scaling. Utilized security scanning tools such as Twist lock, Encore, and SonarQube for container image scanning. Configured STIGs and SRG and selected appropriate security controls for Information Systems, ensuring compliance with System Security Plans, FISMA, NIST, and Incident Reports. Worked closely with development teams to design and optimize CI/CD pipelines for efficient software delivery. Developed and implemented AWS IAM automation scripts using Python and the AWS CLI, streamlining user provisioning and access management processes. Participated in security incident response activities, including investigating and resolving security incidents related to IAM, and providing recommendations for improving security posture. Stayed up to date with the latest AWS IAM features, security best practices, and compliance requirements, ensuring that IAM policies and procedures remained current and effective. Writing inventory and manifest files, ansible playbooks, terraform manifest files and k8s manifest files. Created Ansible playbooks for installation, patching, the configuration of servers, user management, with different levels of access, file management, deployment and full automation. Wrote terraform configuration files to provision our infrastructure such as EKS clusters, ec2 instances, IAM roles, VPCs, S3 bucket, and other resources on AWS. Automating AWS cloud deployments using Shell script, Jenkins, and Ansible. Implement and manage the continuous integration and continuous Deployment. Perform Build activities using Maven and Jenkins tools. Coordinate/assist developers with establishing and applying appropriate branching, labeling/naming conventions using GIT source control. Setup for Apache and Nginx webservers couple with AWS ELB SSL for all HTTP to HTTPS thereby maximizing security. Configured Security groups and locked them down to the various authorized subnet and IP addresses in AWS. Analyze and resolve conflicts related to merging of source code for GIT. Resolved merging issues during rebasing and re-integrating branches by conducting meetings with Development Team Leads. Responsible for designing and deploying best SCM processes and procedures. Working very closely with Developers and Build & Release team. We setup Jenkins server & slave nodes for build and release team as per request. We recently started deploying our applications into an EKS cluster rather than self-managed k8s clusters using Kubeadm or KOPS. Supported and developed tools for integration, automated testing and release management. Experience with container-based deployments using Docker, working with Docker images, Docker hub, and Docker registries, and configuring EKS clusters using Terraform. Used Helm to simplify code writing to handle complex application deployment integrated with Jenkins. Created custom mode VPCs in AWS with multi-regional private and public subnets along with firewall rules to allow SSH, ICMP, and RDP ingress traffic. Configured bastion hosts to securely connect to instances running in our private subnet on AWS. Architected and implemented continuous integration and deployment pipelines using Jenkins. Performed package management, upgrades/patches, troubleshooting, maintenance, and monitoring of applications using Prometheus and Grafana. Created, managed, and administered user accounts security and SSH password-less login. Network configuration & troubleshoot issues with respect to network and configuration files. Set up maintenance scripts using metadata for graceful startup and shutdown of servers. Used Jira to track vulnerabilities, requests, and incidents, and confluence for documentation. Set quality gate policies on SonarQube for code coverages, to track bugs, and vulnerabilities and failed the Jenkins pipeline when the threshold was not met. Use Helm charts to deploy Prometheus and Grafana for monitoring. DevOps Engineer, Project MedtronicMay 2018 - May 2021 Interacted with different development teams to provide support in deployment activities. Experience in applying best practices in Cloud Security, auditing, and implementing security controls. Implemented security best practices in AWS including multi-factor authentication, access key rotation, encryption using KMS, firewalls- security groups, RBAC and NACLs, S3 bucket policies and mitigating DDOS attacks, etc. Worked with multiple project managers from different vendors to understand the release plans and provided support according to their requirements. For new applications, worked with development teams to get the requirements of application release process. Analyze cloud infrastructures and recommend improvements for performance gains and cost- efficiency. VPC peering with other accounts allowing access and routing to service and users of a separate accounts. Performed applications installation, upgrades/patches, troubleshooting, maintenance and monitoring of Linux servers. Created AWS Lunch Templates based on customized AMI and used this lunch templates to configure auto-scaling groups. Made use of Terraform for configuration, provision, and managing Infrastructure. Provisioned multi-regional VPCs with Private and Public Subnet on AWS. Responsible for building, managing, and optimizing Kubernetes deployments, volumes, and replicas in the entire software development lifecycle. DevOps EngineerGlobal Autonomous Commerce of ExchangeFeb 2013 - April 2018 Masterminded efforts to establish business continuity plans utilizing self-healing-based architectures, fail-over routing policies, multi-AZ deployment of EC2 instances, ELB health checks, Auto Scaling, and other disaster recovery models. Exceeded expectations in automatically obtaining software inventory, applying OS patches, as well as automating administration tasks and complex workflows across corporate environments through implementing the management service capabilities of the AWS Systems Manager. Demonstrated expertise in optimizing security posture for Authentication, Authorization, Monitoring, Auditing, Encryption, and Data path security by integrating multiple AWS services and initiating various design principles for improving cloud security. Excelled in deploying docker containers on AWS utilizing ECS and complementary services, including Amazon Elastic Container Registry (ECR). Acknowledged for stellar success in completing complex deployments and scaling automation by coordinating the Ansible Tower. Designated to design and launch secure, cost-optimized, highly available, and fault-tolerant infrastructure in AWS. Recognized for expertise in architecting and setting up development, stage, and QA environments in AWS including VPC, subnets, security groups, EC2 instances, load balancer, RDS, Redis, route53, etc. Piloted the process of integrating AWS security best practices which includes multifactor authentication, access key rotation, role-based permissions, enforced strong password policy, configured security groups and NACLs, S3 bucket policies and ACLs, etc. Masterminded efforts to configure CloudWatch alarm rules in alignment with operational and performance metrics for AWS resources and applications. Accomplished in setting up automated communication between S3 and other AWS services through configuring S3 events as well as utilized New Relic for tracking end-to-end view of runtime systems CPU, bandwidth, disk space, and log files. Achieved benchmark results in generating cost savings through reserved instances, selection and changing of EC2 instance types based on resource need, S3 storage classes, and S3 lifecycle policies, leveraging Autoscaling, etc. Install, configure, test and maintain operating systems, application software and system management tools. Develop and maintain custom scripts to increase system efficiency and reduce manual interventions. Technical hands-on experience in virtual server operations/ data center operations/server builds/backups/restore to include Windows OS, Linux, Red Hat, VMWare, and active directory management. Migrating servers from on-premises to cloud and infrastructure, from on-premises to cloud and cloud to cloud.TECHNICAL CAPABILITIES Operating Systems: Rhel5/6/7, CentOS5/6/7, Ubuntu14/16/18, SuSe Linux10, Windows Servers 2008/2012. Software: VMware ESXi, Vcenter, Nessus, BoKS FoxT, Splunk, Puppet 4/5, GitLab, Venafi, GitHub, Jenkins, Ansible, Nexus, AWS Public, GovCloud, Azure, and Microsoft Suite. Networking: AWS (VPC, VGW, TGW, IGW, NGW), NACLs, Security Groups, Route tables and Routes, HTTP/HTTPS, SSH, TELNET, SFTP/FTP, SSL/TLS, TCP/IP. IAM Solutions: AWS Organization, AWS IAM, BoKS FoxT (PowerTech), SAML SSO, ISAMs Monitoring tools: Splunk, APM, AppDynamics AWS CloudWatch, Zabbix, Grafana Ticketing Tools: Remedy PAC2000 JIRA Service Now Programming Languages: Terraform, Yaml, Bash, JSON, SQL, Python Cloud Orchestration / Automation: AWS CloudFormation, AWS Lambda, AWS Systems Manager, AWS SSM Parameter Store, Ansible, Docker, Jenkins, ECS, EKS, Terraform. Cloud Migration: DMS/SCT, Cloud Endure, AWS Migration Hub. Governance and Compliance: AWS Config Rules, AWS Organization, AWS Control Tower, AWS Trusted Advisor, AWS Well Architected Tool. Data Protection: VENAFI, AWS Certificate Manager, AWS KMS, Snapshot Lifecyle Manager. AWS Platform: AWS CloudFormation, AWS Lambda, AWS Systems Manager, S3, VPC, EC2, ELB, RDS, SNS, SQS, SES, Route53, CloudFront, Service Catalog, AWS Auto Scaling, Trusted Advisor, CloudWatch.Additional QualificationsExperience with Regulated Computing Environments: Experience or interest in working with regulated computing environments such as FISMA and/or FedRAMP. Kubernetes: Owned and operated Kubernetes Clusters and their associated ecosystems. Certifications or interest in obtaining certifications such as CKA, CKAD, or CKS. Azure Cloud Platform: Experience deploying and operating services on the Azure cloud platform. Distributed Systems: Experience in building and running distributed systems at scale in production. Linux Systems and Networking: Deep understanding of Linux systems (network stack, file system, OS services) and networking (L2 vs. L3, network architecture, VLANs, etc). Programming Languages: Experience with at least one programming language, preferably Golang (Go) or Python. Knowledge of automating Linux systems tasks, working with configuration files and system services, and understanding of common data structures and algorithms. Security, Performance, and Disaster Recovery: Knowledge of standard methodologies related to security, performance, and disaster recovery.Performance Bottlenecks and System Behavior: Highly skilled in identifying performance bottlenecks, identifying anomalous system behavior, and resolving root cause of service issues. Open Source Components: Experience assembling Open Source components into cohesive services. Cross-Functional Collaboration: Skills to effectively work across teams and functions to influence design, operations, and deployment of highly available software. User-Centric Focus: Interest in making the users of Splunk's products happier every day. |