| 20,000+ Fresh Resumes Monthly | |
|
|
| | Click here or scroll down to respond to this candidateCandidate's Name
Tel: +Street Address EMAIL AVAILABLE Plainfield, Indiana USA http://LINKEDIN LINK AVAILABLE MULTI-CLOUD/DEVOPS ENGINEERBringing over 8+ years of experience in multi-cloud, security, and DevOps engineering, I specialize in providing comprehensive coverage across AWS and Azure. My focus lies in delivering tailored infrastructure solutions, prioritizing scalability, and security for optimized performance. Leveraging a deep understanding of cloud engineering principles, deployment processes are streamlined, and efficient CI/CD pipelines are established to accelerate time to market. Efficiency is paramount in my approach. From automating workflows to fortifying security measures across multi-cloud environments, expertise ensures operational systems that thrive. Collaboration is key to maximizing infrastructure potential and empowering organizations to confidently navigate the complexities of modern cloud ecosystem. TECHNICAL SKILLS Cloud Automation and Orchestration: AWS Cloud Formation, Terraform, AWS Lambda, Ansible, ECS, EKS, Kubernetes, Dockers. Governance & Compliance: AWS Organizations, Systems Manager, Patch Manager, Fleet Manager, AWS Config rules, AWS Control Tower, AWS Trusted Advisor, AWS Budgets, AWS Licence Manager, AWS Landing Zone, AWS Organisation, AWS Control Tower. Cloud Storage Services: S3, Glacier, EFS, EBS, Storage gateway, Azure Blob storage, Azure file storage, Azure Database storage, Azure Data Factory (ETL). Identity and Access Management: User Authentication & Authorization, MFA, Role, Resource and Policies. AWS Security & Compliance: Ability to implement strong Security tools across the different services in AWS enterprise environment using NACLs, SG, KMS encryption, SSL/TLS certificates, CloudTrail, VPC flow logs, AWS config. Security Hub, Trusted Advisor, AWS Guard Duty, AWS Shield, AWS WAF, Amazon Macie, AWS Artifact, Amazon Cognito, Amazon Inspector, Single Sign ON, Okta, OAuth,IAM. Azure Cloud: Subscription, Management Group, Resource Group, Access Control (IAM), RBAC, Azure ARM, Virtual Network, Virtual Machine, Storage Account, Microsoft Entra ID, Logic App, Azure Migrate, Automation Account, Azure Data Factory. Container Orchestration and Open-Source CI/CD: Docker, Docker Hub, EKS, ECS, ECR, Git, GitHub, Jenkins, Maven, SonarQube, Nexus, Prometheus, Splunk, Grafana. Networking: VPC, Subnets, Route Tables, Security Groups, Network ACLs, VPN, Direct Connect, VPC Peering, Azure Virtual Network, Azure Subnets, Network Security Groups, VPN Gateway, Web App Firewall, Defender for Servers, Defender for MySQL. AWS Migration: Phases (Assess, Mobilize, Migrate, and Modernize) Tools (CART, MRA, Application Discovery Service, Data Migration, Migration Hub, DMS) Migration Strategies: Rehost, Retire, Replatform, Relocate, Repurchase, Refactor, and Retain. Programming Languages: Bash scripting, Python, Terraform, Docker Scripting. Template Standard: JSON, YAML. Diagramming: Lucid chart, Visio, Draw.io, PowerPoint. Project Methodologies: Software Development Life Cycle (SDLC), Agile (Scrum and Kanban), Change Management. CERTIFICATIONS AWS Certified: Solutions Architect AssociatePROFESSIONAL EXPERIENCEMulti-Cloud Engineer Security Engineer DevOps Engineer. January 2021 - Present Sysco Corporations (Managed Service Provider) Contract Remote, Texas. Ensured optimal performance by maintaining a 99% uptime and continuous availability on all services utilizing several monitoring tools like CloudWatch, CloudTrail, Prometheus, etc. Successfully deployed and managed containerized workloads on Amazon ECS, optimizing resource allocation and facilitating seamless scaling based on demand. Coordinated seamless organization of multiple AWS accounts using AWS organizations, established a robust AWS Landing Zone for top-tier security, compliance, and automated secure multi-account AWS environment creation with AWS Control Tower, ensuring standardized setups aligned with organizational policies. Lead successful cost optimization, migration, and renovation projects, which reduced costs by 30% and boosted performance by 20%. Overhauling security by re-engineering access control policies, Role Base Access Control (RBAC), and Active Directory achieving 100% compliance. Spearhead data cleansing, mapping, and transformation activities, ensuring optimal data quality and integrity in alignment with business and technical requirements. Developed and optimized ETL pipelines from various data sources such as S3, DynamoDB, RDS, CosmoDB, MySQL etc., using Databricks on Cloud Design, develop, and maintain innovative Azure data solutions, leveraging services such as Azure Data Lake for robust data storage using Azure Synapse Analytics to optimize data accessibility and processing and DataBricks to enhance data processing capabilities. Load transformed data into storage and reporting structures, including data warehouses, high-speed indexes, real-time reporting systems, and analytics applications. Build end-to-end data pipelines to bring together disparate data sources, facilitating seamless data flow across the organization. Extract, troubleshoot, and maintain the data warehouse to ensure optimal performance and reliability. Launch successful projects of optimizing costs by automating sandbox resource creation using ARM or Terraform and creating Azure Logic App scripts to clean up the sandbox every 24 hours, resulting in 15% cost reduction and 20% sandbox readiness. Apply cloud security design principles by leveraging the power of Azure Active Directory (Entra ID) and other Azure services to fortify Authentication, Authorization, Monitoring, Auditing, Encryption, and Data Path security, resulting secure cloud. Use Azure Data Factory to create an ETL pipeline which resulted in the extraction, transformation, and loading of data from the Azure SQL dataset to Azure Storage Account. Implemented security best practices in AWS including enforced strong password policy, access rotation, multi-factor authentication, security groups configuration, S3 Bucket policy and NACLS. Elevated security standards through access control policy re-engineering, achieving 100% compliance with the Principle of Least Privilege (PoLP). Launched a successful project to create a script to automate the creation of resources using Terraform and clean-up of resources using AWS Nuke from sandbox environments every 24 hours, which created a cost savings of 10% for the business. Applied design principles for cloud security, implementing AWS IAM, Single Sign-on (IAM Identity Center) using Okta, SAML 2.0, and OAuth to enhance Authentication, Authorization, Monitoring, Auditing, Encryption, and Data Path security. Securely deploy MySQL Primary DB and its read replica in a private subnet with multi-AZ for disaster recovery and best practice. Built and maintained automated CI/CD processes for applications with Jenkins, eliminating up to 70% of manual work which reduced human error and sped up production. Utilized Docker to containerize applications, simplifying deployment and ensuring consistency across development, testing, and production environments. Also implemented Kubernetes for orchestration, automating the scaling and management of containerized applications, resulting in improved resource utilization and application availability. Utilized Jenkins, Docker, GitHub and Git for version control, code build, testing and release including CI/CD to develop CI pipeline in collaboration with automation testing team.AWS Cloud Engineer. June 2018 December 2020TERASKY, New York, USA Overhauling security by re-engineering access control policies, Role Base Access Control (RBAC), and Active Directory achieving 100% compliance. Spearhead data cleansing, mapping, and transformation activities, ensuring optimal data quality and integrity in alignment with business and technical requirements. Monitored AWS resources, swiftly responding to incidents and enforcing policies through Services Control policy and prepackaged guardrails which resulted in 100% security compliance. Enabled CloudTrail across accounts and regions, preventing activity monitoring gaps and ensuring comprehensive operational visibility and traceability, thereby enhancing policy compliance by 100%. Implemented robust security policies, utilizing NACLs, AWS WAF, AWS Shield, Security Groups, private subnets, and encryption for enhanced data protection, thereby preventing data leaks and compromise. Configured CloudWatch alarm rules for effective monitoring and operational performance across AWS resources and applications. Automated deployment of detective controls including AWS CloudTrail, AWS Config, Amazon GuardDuty, and AWS Security Hub Created & implemented an AWS Budget for EC2 actual cost which will notify us if/when the actual costs of EC2 instances exceeds the specified budgeted amount. Implemented automated snapshot and snapshot deletion policies using Lifecycle Manager. Used AWS DMS to migrate data to Amazon RDS instances and deployed Amazon RDS multi-AZ and Read replicas in AWS. Implemented IAC thereby allowing us to have reusable, maintainable, extensible and testable infrastructure with the ability to easily add our companys security best practices. Application management and custom development, ensuring solutions address unique business needs, continuously improve testing and deployment via pipeline automation and scaling, increasing efficiency by 80%. Ensured Access and Permissions are given to people who deserve access both internally and externally using IAM following the principles of least privilege access. Designed and implemented automation infrastructure for configuration management and orchestration deployment using Automation tools such as Jenkins, Terraform, and Ansible. (AWS), while integrating AWS services like SQS, SNS, AWS Athena, AWS Quicksight, resulting in use of data for business continuity. Implemented various disaster recovery strategies, including Backup and Restore, pilot light, warm standby, and active-active, based on RTO/RPO and tested in 7+ different scenarios with a 99% RTO fall-overs ratio and 99.9% RPO data loss. Provided solutions to optimize edge services to eliminate latency to reduce inefficiencies by 30% and mitigate security risks data inceptions by 20%.AWS Cloud Administrator, December 2016 June 2018. FLEXTON INC, California,USA Instrumental in reducing production servers by 10% via workload consolidation, resource optimization, enhancement and cutting cost, automating deployments, and shaping efficient AWS environments. Ensure Access and Permissions are given to people who deserve access both internally and externally using IAM following the principles of least privilege access. Monitored AWS resources, swiftly responding to incidents and enforcing policies through Services Control policy and prepackaged guardrails which resulted in 100% security compliance. Enabled CloudTrail across accounts and regions, preventing activity monitoring gaps and ensuring comprehensive operational visibility and traceability, thereby enhancing policy compliance by 100%. Implemented robust security policies, utilizing NACLs, AWS WAF, AWS Shield, Security Groups, private subnets, and encryption for enhanced data protection, thereby preventing data leaks and compromise. Configured CloudWatch alarm rules for effective monitoring and operational performance across AWS resources and applications. Played a key role in the design and development of migration journeys, leveraging tools like CART, ADS, Migration Evaluator, DMS, and Cloud Endure.System Administrator. January 2014 June 2015ACCESS BANK PLC, Oyo State, Nigeria System administration expertise: Extensive experience in managing and maintaining various operating systems, such as Linux and Windows, including installation, configuration, patching, and troubleshooting. Network administration: Proficient in managing network infrastructure, including DNS, DHCP, firewalls, and routing, ensuring seamless connectivity and optimal performance. Server virtualization: Skilled in working with virtualization technologies like VMware or Hyper-V, deploying and managing virtual machines, and optimizing resource allocation. Backup and recovery: Proficient in implementing backup and recovery strategies, including regular data backups, disaster recovery planning, and testing to ensure business continuity. Security and access control: Strong understanding of security best practices, implementing access controls, user management, and maintaining system integrity through regular vulnerability assessments and patch management. EDUCATION Master of Art and Education University of Ibadan Bachelor of Art and Education University of Ibadan |