| 20,000+ Fresh Resumes Monthly | |
|
|
| | Click here or scroll down to respond to this candidateCandidate's Name
SR. AWS Cloud & DevOps ArchitectEMAIL AVAILABLE PHONE NUMBER AVAILABLELINKEDIN LINK AVAILABLEProfile Summary With 9 years of experience in Information Technology, including 7+ years dedicated to cloud technologies, I bring a wealth of expertise as a Senior Cloud Architect. My background encompasses AWS and Microsoft Azure, where I have led successful transformations from monolithic systems to microservices, enhancing scalability and performance for numerous organizations. Extensive experience in architecting solutions using AWS and Azure, with a deep understanding of key services like Azure Virtual Machines, EC2, Azure Kubernetes Service (AKS), EKS, Azure Virtual Network (VNet), RDS, Azure Data Lake Storage, ELB, IAM, Azure Active Directory (AD), Route 53, Direct Connect, and Azure ExpressRoute. Skilled in the deployment and management of containerized applications at scale using Docker, Kubernetes, Azure Kubernetes Service (AKS), and EKS, ensuring efficient and reliable operations. Expertise in automating cloud environments with Bash, Python, and Groovy scripting, coupled with a strong command of Terraform and CloudFormation for CI/CD pipeline automation, particularly in Azure DevOps and GitHub Actions. Proven capabilities in securing cloud infrastructures using Azure AD, IAM, CloudWatch, and Splunk, with a focus on proactive monitoring and maintaining system uptime. Proficient in implementing advanced services such as EKS, Azure App Services, and CloudFront, including deploying web applications on Azure Blob Storage and AWS S3 with integration through CloudFront, Azure CDN, and Route 53, using CloudFormation and Terraform templates. Thorough knowledge of the Software Development Life Cycle (SDLC) with a strong emphasis on DevOps and Agile practices, ensuring seamless integration and continuous delivery through tools like Azure Pipelines. Competent in administering both Linux (Ubuntu, RedHat) and Windows servers, ensuring smooth and efficient operations across diverse environments. Adept at analyzing business processes, defining requirements, and crafting use cases that drive innovation and align technology solutions with business goals. Proven ability to engineer end-to-end cloud systems that prioritize security, resilience, performance, availability, and scalability. Hands-on experience with monitoring tools like Azure Monitor, CloudWatch, Prometheus, Datadog, Grafana, and Nagios, optimizing cloud environments for peak performance. Provided mentorship and leadership, contributing to high-performing teams through exceptional communication, analytical skills, and interpersonal dynamics.Technical SkillsDevOps: Docker, Ansible, Kubernetes, Chef, Puppet, Jenkins, Maven, Gradle, Subversion, GitCLOUD: AWS, AzureSCRIPTING: Python, Bash Shell, and Groovy scriptingMARKUP: JSON, HCL, YAML, XMLOPERATING SYSTEMS: Unix/Linux, Ubuntu, Amazon Linux 2, CentOS, Windows, Windows ServerMONITORING AND SECURITY: CloudWatch, Azure Monitor, CloudTrail, Splunk, ELK, Prometheus, Shield, Guard RailsNETWORK PROTOCOLS: TCP/IP, UDP/IP, DNS, DHCP, SMTP, SNMP, ICMPDATABASE: DynamoDB, SQL Server, MySQL, Postgres DB, MariaDB, Amazon AuroraSECURITY SERVICES: Familiarity with cloud-specific security tools and services (AWS IAM, AWS KMS, Azure Security Center, Google Cloud IAM), (Software as a Service) and PaaS (Platform as a Service)Professional ExperienceSr. Secure DevOps ArchitectSep 2023 - Present, Target Corporation, Minneapolis, MinnesotaProject Summary: As a Secure DevOps Architect at Target Corporation, I led the design and deployment of a secure microservices architecture on AWS and Azure, implementing robust encryption protocols and automating infrastructure provisioning using AWS CloudFormation, Terraform, and Azure Resource Manager (ARM) templates. I also integrated advanced security controls within Kubernetes (AKS/EKS) clusters, conducted comprehensive security assessments, and established centralized logging with the ELK Stack and Azure Monitor, ensuring the confidentiality, integrity, and availability of critical systems while enhancing operational efficiency. Spearheaded the design and deployment of microservices architecture on AWS and Azure, utilizing ECS (Elastic Container Service), Azure Kubernetes Service (AKS), and Kubernetes for efficient container orchestration. Leveraged AWS CloudFormation, Terraform, and Azure ARM templates to automate infrastructure provisioning and management, integrating these processes seamlessly into CI/CD pipelines like Azure Pipelines. Conducted routine security assessments and vulnerability scans with top-tier tools like Azure Security Center, AWS Inspector, and Nessus, identifying and addressing infrastructure and application vulnerabilities. Implemented stringent security controls and configurations, including network policies, Azure Network Security Groups (NSGs), and RBAC within Kubernetes (AKS/EKS) clusters to safeguard data confidentiality and integrity against unauthorized access. Engineered robust encryption protocols (Azure Key Vault, AWS KMS, SSL/TLS) to secure data both at rest and in transit, ensuring confidentiality and data integrity. Deployed and managed the ELK Stack and Azure Monitor for centralized logging, enabling real-time log aggregation and analysis for system and application monitoring. Developed and maintained custom Prometheus exporters for comprehensive application and service performance monitoring through metrics collection. Integrated security testing tools like OWASP ZAP, Azure DevTest Labs, and SonarQube into CI/CD pipelines, automating security scans and code analysis to detect issues early in the development lifecycle. Implemented GitLab CI/CD pipelines and Azure Pipelines to automate the build, testing, and deployment processes, ensuring efficient and reliable model deployment within the e-commerce order tracking system. Leveraged AWS CodePipeline, AWS CodeBuild, AWS CodeDeploy, and Azure DevOps to create robust, scalable continuous integration and delivery workflows for machine learning models and other critical components of the digital fulfillment infrastructure. Integrated Azure Cosmos DB and DynamoDB to manage and store real-time data, optimizing data access and performance for high-demand fulfillment processes while ensuring seamless scalability.Configured and managed AWS and Azure resources to support the end-to-end deployment of machine learning models, improving operational efficiency and streamlining the entire deployment lifecycle. Automated security incident responses and enforced DevSecOps compliance using AWS Lambda functions, Azure Functions, and Azure Logic Apps, with monitoring via CloudWatch and Azure Monitor. Developed and integrated automated security compliance checks within CI/CD pipelines using tools like AWS Config, Azure Policy, and Security Hub, enabling continuous monitoring and enforcement of security standards and regulatory requirements. Managed and optimized server environments using Amazon Linux 2 and Azure VMs, improving system performance and security while reducing costs. Architected and managed scalable, resilient, and secure AWS and Azure infrastructure using CloudFormation and Azure ARM templates, ensuring adherence to best practices and organizational standards. Authored and maintained CloudFormation templates and ARM templates to provision critical resources such as EC2 instances, VMs, VPCs, S3 buckets, Blob Storage, RDS instances, Azure SQL, and Lambda functions. Streamlined log collection, parsing, and analysis through automated Bash scripts, enhancing the efficiency of troubleshooting and incident response processes across AWS and Azure environments. Implemented AWS Shield Advanced and Azure DDoS Protection for DDoS protection, ensuring the high availability and resilience of critical applications and services. Deployed logging and monitoring solutions like AWS CloudTrail, Amazon GuardDuty, Azure Monitor, and Azure Security Center to track security events, identify suspicious activities, and enable real-time threat response. Conducted thorough security audits and compliance assessments to maintain adherence to industry standards like PCI DSS, HIPAA, and regulatory requirements. Delivered security awareness training to development teams, promoting a security-first mindset throughout the organization. Applied security best practices by implementing least privilege and defense-in-depth strategies to mitigate threats effectively across AWS and Azure infrastructures. Efficiently containerized applications using Kubernetes (AKS/EKS) with Azure Container Registry (ACR), ECR, and Docker Hub, adhering to security best practices aligned with DevSecOps principles. Collaborated with security teams to implement controls and measures consistent with organizational security policies and standards on AWS and Azure. Established and enforced rigorous security policies across AWS and Azure infrastructures, including the implementation of multi-factor authentication (MFA) and IAM policies to enforce strict access controls and ensure compliance with security best practices. Developed Python scripts to automate routine tasks, including instance provisioning, backups, and resource tagging across AWS and Azure, thereby improving operational efficiency. Utilized Boto3 and Azure SDK for Python to programmatically create and manage AWS and Azure resources, such as EC2 instances, VMs, S3 buckets, Blob Storage, and Lambda functions. Integrated Nagios, Datadog, and Azure Monitor for comprehensive infrastructure monitoring, enabling real-time threat identification and response in alignment with DevSecOps principles. Integrated Grafana for performance metric monitoring and visualization, providing actionable insights into system behavior and resource utilization across AWS and Azure environments.Sr. Security ArchitectMay21-Aug23, Hess Corporation, New York, NYProject Summary: As a DevSecOps Architect at Hess Corporation, I led the secure migration of Linux environments to AWS, implementing AWS CloudFormation and Ansible for precise configuration management. I enhanced security posture by integrating Splunk for centralized logging and SIEM, automating microservices deployment with AWS ECS and Kubernetes, and developing secure server provisioning workflows with Ansible and Puppet. My role also included conducting proactive security assessments, automating backup processes, and designing custom monitoring solutions using Python and CloudWatch, ensuring both high availability and robust security across our cloud infrastructure. Led the secure migration of Linux environments to AWS, utilizing AWS CloudFormation and Ansible for meticulous configuration management. Managed AWS Network Access Control Lists (NACLs) to enforce network security policies by controlling traffic and resource access. Integrated Splunk for centralized logging and SIEM, enabling real-time threat detection and effective incident response. Developed secure server and application provisioning workflows using Ansible Playbooks and Puppet Manifests, automating deployments with Jenkins. Scripted Python-based ETL processes, leveraging AWS services like S3, RDS, and Redshift for efficient data management. Established and optimized GitLab CI/CD workflows to streamline code integration, testing, and deployment processes, enhancing development efficiency for cloud-native applications. Enhanced cloud infrastructure automation by integrating AWS services with custom scripts, optimizing performance, and ensuring compliance with industry best practices. Spearheaded the development and implementation of security incident response (SIR) procedures, ensuring rapid and coordinated action during security breaches. Automated microservices deployment and scaling using AWS ECS and Kubernetes, guaranteeing high availability and scalability for distributed applications. Conducted regular penetration testing and threat hunting to proactively detect and mitigate security vulnerabilities within the cloud infrastructure. Enhanced security monitoring by integrating the ELK Stack with SIEM tools for improved threat detection. Automated backup and restore processes for critical AWS data using Bash scripts, ensuring data integrity and availability. Developed and managed comprehensive AWS CodePipeline solutions to automate the delivery process, from code commit to production, ensuring consistent and error-free releases. Led Puppet configurations across systems, enforcing secure installation, upgrade, and configuration processes in line with strict security protocols. Managed Kubernetes clusters and Docker containers with robust security measures, utilizing Ansible playbooks tailored for Kubernetes. Leveraged AWS CloudTrail for auditing and monitoring account activities, ensuring compliance and enhancing cloud security posture. Implemented DynamoDB as a key component for real-time data processing and storage, enabling efficient and scalable database management for mission-critical applications. Monitored system performance and resource utilization with Bash scripts, integrating with CloudWatch for comprehensive infrastructure insights. Engineered custom monitoring solutions with Python and CloudWatch, generating alerts based on specific metrics and thresholds. Configured Prometheus Alert manager for automated alert notifications, streamlining incident response processes. Collaborated closely with development teams to design secure database capacity plans and assess instance classes. Developed custom Grafana dashboards to monitor Kubernetes clusters, Docker containers, and application performance for proactive issue resolution. Utilized Docker, Jenkins, and Maven for secure builds, maintaining script and artifact integrity with Nexus and JFrog Artifactory. Automated continuous deployment with secure YAML-based Ansible playbooks, orchestrated via Ansible Tower for efficient scheduling. Integrated AWS IAM roles, policies, and compliance standards into CI/CD pipelines to ensure secure software delivery. Worked with development, testing, and operations teams to optimize CI/CD workflows, troubleshoot issues, and maintain detailed documentation. Continuously improved CI/CD pipelines for efficiency and scalability, leveraging AWS services and best practices. Conducted performance testing and failover evaluations for PCF applications connected to RDS Multi-AZ instances to ensure resilience. Led security awareness training initiatives to cultivate a security-focused culture across the organization. Engineered and optimized Elastic Load Balancers and EC2 Auto Scaling groups, fine-tuning configurations based on CloudWatch alerts for performance and security. Designed and implemented Lambda services with a focus on secure development, conducting code analysis for vulnerabilities throughout the lifecycle. Implemented log monitoring for performance and database troubleshooting, utilizing secure CI systems like Jenkins and Bamboo for builds and change management. Automated software development processes using Ansible Tower and crafted Terraform templates for secure virtual network provisioning. Utilized AWS CodeBuild to automate build processes and AWS CodeDeploy for seamless application deployment, reducing manual intervention and accelerating the release cycle. Managed Kubernetes and Docker environments with a focus on secure handling of containerized applications. Automated AWS server administration tasks using Ansible roles, ensuring both security and operational efficiency. Secured Jenkins and Bamboo environments with specialized plugins and tools, integrating Maven for continuous integration with a focus on security.Lead Cloud Data EngineerMar19-Apr21, State Farm, Bloomington, IllinoisProject Summary: As a Lead Cloud Data Engineer at State Farm, I spearheaded the seamless operation of RDS and EC2-based databases, ensuring robust security and data integrity. I leveraged AWS Glue for effective ETL processes and utilized Amazon Kinesis for real-time data analysis. Additionally, I optimized infrastructure performance through CloudFormation and CI/CD automation, while enhancing system monitoring and scalability with Prometheus, Elasticsearch, and Kubernetes. Utilized AWS Glue for maintaining data consistency, quality, and compliance through effective cataloging, ETL processing, and preparation. Created Bash scripts for system administration tasks on EC2 instances, including user management, updates, and log rotation. Employed Prometheus for real-time monitoring of Kubernetes clusters and microservices, ensuring high availability and performance. Configured Elasticsearch and Grafana for efficient log management, search performance, and performance monitoring. Streamlined CI/CD pipelines with automated Bash scripts and collaborated with cross-functional teams to enhance DevOps processes. Managed microservices communications with API gateways and service meshes like Istio to enhance both security and performance. Optimized network performance by tuning settings and configurations such as Route53, DNS, ELB, and IP Addressing. Ensured seamless operation and data integrity by leveraging RDS and EC2-based databases in the cloud, implementing robust security measures to protect sensitive information. Designed resilient applications using AWS services such as multi-AZ deployments and ECS, ensuring scalability and high availability. Implemented Infrastructure as Code (IaC) with AWS CloudFormation, creating reusable and version-controlled templates for complex environments. Automated provisioning and management of AWS resources using CloudFormation templates. Leveraged Amazon Kinesis for real-time data processing, ingestion, and analysis. Managed GitHub repository configurations for efficient version control and collaboration. Developed serverless applications using AWS Lambda in Python for tasks like data processing and third-party API integration. Conducted regular reviews and updates of IaC templates to align with best practices and security requirements. Migrated containerized environments from ECS to Kubernetes for better resource utilization and scalability. Enhanced application performance with Web Services, API Gateways, and integration development principles. Automated routine tasks with event-driven and scheduled AWS Lambda functions to improve operational efficiency. Offered diverse storage solutions including S3, EBS, EFS, and Glacier, meeting varied data storage needs. Streamlined deployment processes using Elastic Beanstalk for consistent and effortless application deployments. Troubleshot issues within Kubernetes clusters to maintain a healthy and efficient containerized infrastructure. Automated AWS infrastructure management with Python-based tools and scripts. Designed, deployed, and managed AWS cloud infrastructure using services like EC2, S3, RDS, VPC, Lambda, and IAM. Implemented configuration management with AWS Systems Manager, Puppet, or Chef to automate resource management. Utilized CloudWatch and CloudTrail for comprehensive performance and security alert monitoring. Migrated petabytes of data to AWS Cloud using AWS DataSync, ensuring efficient and durable data management. Orchestrated CI/CD processes to accelerate software updates and maintain peak application performance. Optimized RDS and EC2 database performance through data partitioning and indexing strategies. Integrated GitHub and Jenkins to streamline development and deployment processes, improving software delivery efficiency.AWS Cloud EngineerJan17-Feb19, Amgen, Thousand Oaks, CAProject Summary: As an AWS Cloud Engineer at Amgen, I configured and maintained essential Linux applications, ensuring seamless operation and reliability while implementing Nagios for continuous monitoring. I streamlined build and deployment processes through Jenkins pipelines, reengineered software build systems, and played a key role in managing Linux servers, Oracle RAC, and SAN-based network configurations. Administered Linux servers, handling critical tasks like Apache/Tomcat management, mail server operations, MySQL database management, and firewall configurations in both development and production environments. Revamped processes and implemented tools for efficient software builds, patch creation, source control, and release tracking/reporting on UNIX platforms. Expertly configured Linux servers for Oracle Real Application Clusters and managed SAN-based network setups, including switch configurations and 3PAR OS virtualization. Enhanced scalability by establishing strong Jenkins pipelines and seamlessly integrating multiple nodes. Configured SSH to support continuous deployments smoothly. Played a pivotal role in User Management, Plugin Management, and automating the Build and Deployment process using Jenkins, ensuring efficient workflows. Configured and managed key Linux applications, including Apache, Active Directory, BIND, SSH, NFS, DHCP, and SNMP, to ensure consistent and reliable system performance. Set up and fine-tuned Nagios for continuous application monitoring, proactively identifying and resolving potential issues. Set up NIS and DNS naming services and managed public DNS servers for reliable name resolution. Monitored system resources, including CPU, memory, disk, and swap space usage, to preemptively address potential performance issues. Managed source code repositories, build, and release configurations, carefully guiding daily development, testing, and production builds, as well as software deployment operations. Utilized JIRA for thorough issue tracking and monitoring, improving project transparency and team collaboration. Strategically managed Jenkins Pipelines, optimizing weekly and nightly builds while developing a more efficient test environment, reducing integration issues and improving code quality. Contributed to the network infrastructure by configuring switches (Brocade and Cisco) and successfully implementing vCenter and VMware ESXi Hypervisor installations.Software Test EngineerJan16-jan17, Thoughtworks, Chicago, Illinois Mentored three junior team members in testing methodologies and best practices, supporting their professional development. Developed and executed over 200 automated Python test cases and scenarios, leading to a 30% reduction in manual testing efforts and a 20% faster release cycle. Analyzed performance metrics and resolved more than 140 issues (related to performance, network, GUI, etc.) via JIRA, resulting in a 15% boost in system performance, as reflected in customer feedback and internal benchmarks. Conducted monthly regression, longevity, and upgrade tests, achieving an 89% system stability rate and proactively addressing performance issues to minimize downtime. Documented and organized critical information in Confluence, contributing to the creation of approximately 15 knowledge base articles, fostering continuous improvement within the testing team. Configured and optimized 30 virtual machines for various test scenarios, enhancing test coverage and efficiency by 25%. Led root cause analysis for 20+ complex performance issues, identifying key bottlenecks and implementing effective solutions. Evaluated storage features such as snapshots, data compression, and encryption, ensuring they met industry standards and customer requirements. Utilized monitoring and logging tools (e.g., ELK stack, Telemetry) to analyze test results and provide actionable insights, contributing to a 10% reduction in system downtime and improved system behavior. Proficient in leveraging Amazon Web Services (AWS) for cloud computing, including deploying applications, managing infrastructure, and utilizing services such as EC2, S3, RDS, and Lambda for scalable, reliable solutions.EducationM.S. in Information SystemsVirginia Commonwealth University Richmond, VABE in Computer Science EngineeringVirginia Commonwealth University Richmond, VACertifications Amazon Web Services Cloud Foundations Lean Six Sigma Green Belt |