Vijay - SR AWS Devops Engineer.
Vijay - SR AWS Devops Engineer.
Sr AWS Cloud Developer & SREE: devops1848@gmail.com Ph: 346 998 8442
SUMMARY
    13+ years of IT industry experience with hands on experience in
     AWS Cloud DevOps CI/CD, Installation, Configuration and
     Administration and Middleware Administration.
    Hands on experience with CI/CD environment with solid emphasis on
     merging development work with a Master/Trunk branch constantly (CI) and
     code is ready to ship to next level (CD)
    Hands on experience in writing Terraform API modules to manage
     infrastructure, for automatic creation of RDS instances, VPCs, Autoscaling
     groups, Load balancers, S3 buckets
    Proficient with AWS components such as Cloud platform and its components
     EC2, EKS, ECR, S3, Elastic IPs, EBS, Security Groups, Route 53, VPC, Elastic
     Cache, and Cloud Formation & Docker
    Written HashiCorp Terraform scripts to automate AWS services which
     include ELB, CloudFront distribution, EC2, database security groups, Route
     53, VPC, Subnets and S3 Bucket. Converted existing AWS infrastructure to
     AWS Lambda deployed via Terraform and AWS Cloud Formation
    Experience in working on cluster management on Kubernetes to create
     Pods, Nodes, and deploying microservices pulled from the Docker Registry
     and managed by Kubernetes ELK
    Experience in creating CloudFormation JSON templates to create custom
     sized VPC & migrate a production infrastructure into AWS.
    Orchestrated and migrated CI/CD processes using Cloud Formation and
     Terraform and Puppet templates and containerized the infrastructure using
     Docker, which was setup in AWS CLI and VPCs
    Solid hands-on experience in LINUX and using SHELL scripting to automate
     processes
    Experience with Jenkins/Groovy//Maven, deployment and build management
     system
    Experience as a Build and Release Engineering in automating, building,
     deploying, and releasing of code from one environment to another
     environment
    Introducing Continuous Integration and containerization principles and best
     practice to product teams, introducing and on boarding them to Kubernetes,
     Docker, and Jenkins pipelines
    Setting up Kubernetes or OpenShift clusters on on-premises infrastructure.
     It includes tasks such as selecting appropriate hardware, configuring
     networking, provisioning storage, and installing the necessary software
     components.
    Configuring Kubernetes or OpenShift involves setting up various
     components such as pods, services, deployments, and namespaces. This
    also includes configuring security policies, networking, and storage options
    according to the specific requirements of the organization.
   Managing Kubernetes or OpenShift clusters involves tasks such as scaling
    resources up or down, updating software components, monitoring cluster
    health and performance, configuring backups, and implementing disaster
    recovery plans.
   Automating routine tasks using tools like Ansible, Terraform, or custom
    scripts can greatly streamline the management of Kubernetes or OpenShift
    clusters. This includes automating cluster provisioning, application
    deployment, and configuration management.
   Integrating Kubernetes or OpenShift with continuous integration and
    continuous deployment (CI/CD) pipelines enables automated testing and
    deployment of applications. This often involves using tools like Jenkins,
    GitLab CI/CD, or Tekton to build, test, and deploy containerized applications
    onto Kubernetes or OpenShift clusters.
   Implementing security best practices is crucial for protecting Kubernetes or
    OpenShift clusters and the applications running on them. This includes
    securing access to the cluster, implementing network policies, encrypting
    communication between cluster components, and regularly patching and
    updating software components to address security vulnerabilities.
   Setting up monitoring and logging solutions such as Prometheus, Grafana,
    and Elasticsearch enables administrators to monitor the health and
    performance of Kubernetes or OpenShift clusters, as well as troubleshoot
    issues by analyzing logs and metrics.
   Experience      with    and    thorough     understanding     of   automated
    implementation/deployment of a cloud-based infrastructure (Web apps,
    Application Service Environments, firewalls, load balancers, storage,
    monitoring, security, DNS etc.)
   Architecting and deploying AWS infrastructure using services like EC2, ELB,
    Autoscaling, EBS, VPC, S3, CloudFront, RDS, IAM, CloudFormation, EFS,
    Lambda, Certificate Manager, Trusted Advisor and Route53 & providing the
    solutions with best practices.
   Experience in installing and administrating CI tools like Jenkins, Bamboo,
    and other Tools like SonarQube, Nexus, GitHub like systems, JIRA, Atlassian
    stack of tools like, Confluence
   Migration of On-premises Application into AWS cloud with minimal cost in
    highly available and secure environment
   Participate in creating RFP documents & network architecture which needs
    to be deployed on AWS.
   Responsible for infrastructure analysis, designing & implementing the
    architecture setup which are highly available, fault tolerant and self-healing
    on AWS for several customers.
   Working on Deployment, Monitoring, Patching and incident management,
    DR planning and execution.
   Working on AWS infrastructure cost optimization solutions & enhancements.
   Responsible for Continuous Integration and Continuous Delivery creation
    process using AWS CICD tools and Jenkins along with shell scripts to
    automate routine jobs.
   Worked on Ansible for management of servers by writing playbooks as per
    the project requirement
   Implemented full monitoring solution of application using New-Relic, Nagios
    and AWS CloudWatch
   Monitoring of servers, troubleshooting problems pertaining to the server
    administration, applications conflicts, and system bugs
         Architecting and deploying AWS infrastructure using services like EC2, ELB,
          Autoscaling, EBS, VPC, S3, CloudFront, RDS, IAM, CloudFormation, EFS,
          Lambda, Certificate Manager, Trusted Advisor and Route53 & providing the
          solutions with best practices.
         Working on Git-Flow Architecture, branching strategies, end-to-end pipeline
          creation.
         Setup CICD pipelines on Jenkins and AWS Code Pipeline and worked on
          Jenkins Administration.
         Understand, implement, and automate security controls, governance
          processes and compliance validation
         Experience in working on source controller tools like GIT
         Strong knowledge on source controller concepts like Branches, Merges and
          Tags
         Setup CICD pipelines on Jenkins and AWS Code Pipeline and worked on
          Jenkins Administration.
         Administration of the multi-tenant CI/CD platform and offering guidance to
          customers
         Worked with AWS services like EC2, ELB, Autoscaling, EBS, VPC, S3,
          CloudFront, RDS,IAM, CloudFormation, EFS, Lambda, Certificate Manager,
          Trusted Advisor and Route53 for deploying and maintaining infrastructure
          on AWS.
TECHNICAL SKILLS
EDUCATION
PROFESSIONAL EXPERIENCE
USAA Phoenix, AZ                                                       Jan 2020 –
till date
Sr. AWS Cloud Developer & SRE
 Responsibilities:
     Writing Ansible playbooks for configuration management for the
      infrastructure components in cloud environment and setting up CI/CD
      pipeline
     Develop Deployment strategies and migrate on premise applications to
      cloud environments
     Design and develop python, shell scripts to automate cloud environment
     Design, architect and prepare migration strategy for application migrating
      to AWS cloud
     Design and development of serverless infrastructure AWS Lambda
     Support and maintenance of ongoing and new projects.
     Expertise in the Jenkins plugin management areas and implemented
      several CI/CD plugins like AWS ec2, Docker, git, Mesos, AWS Lambda,
      Pipeline plugins, Artifactory
     Develop Jenkins Pipeline involving several Downstream/Upstream Job
      Configurations based on dependencies from other applications & based on
      Release methodologies
     Integration of automated build with deployment pipeline and allow clients
      to pick up the Build from Jenkins repository and deploy in target
      environments (Integration, QA, and Production)
     Building dashboard using ELK (Elastic search, Logstash and Kibana) to
      monitor functionalities of the components, performance of the
      components, monitor logs and track issues
     Building custom dashboards and monitoring tools using JavaScript
      frameworks to visualize AWS service health and application performance.
     Writing integration scripts to connect various AWS services and third-party
      tools, often utilizing the AWS SDK for JavaScript.
     Code quality analysis and maintenance using Sonar with client defined
      standards
     Access NPI/PCI data received and use appropriate encryption techniques
      to ensure data security
     Written pipeline as a code in Groovy for automatic build trigger when the
      code is committed to Git which performs all the stages such as
      SonarQube, building docker image and deploying them into Mesos and
      marathon.
     Attend Agile ceremonies like Sprint planning, Story grooming, Standup and
      Sprint retrospective
     Create design documents for new stories/enhancements and present them
      in design review meetings
     Automating infrastructure deployments using AWS Cloud Development Kit
      (CDK) with TypeScript/JavaScript
     AWS server maintenance and High availability in cloud environment with
      EC2, EBS, S3, Glacier, RDS, DynamoDB, RedShift, VPS, Load balancer,
      instances and components
     Design multiple Aniblse playbooks to launch Ec2 instances, Launch
      configurations, Autoscaling Groups (ASG).
     Setting up Kubernetes or OpenShift clusters on on-premises infrastructure.
      It includes tasks such as selecting appropriate hardware, configuring
         networking, provisioning storage, and installing the necessary software
         components.
        Configuring Kubernetes or OpenShift involves setting up various
         components such as pods, services, deployments, and namespaces. This
         also includes configuring security policies, networking, and storage options
         according to the specific requirements of the organization.
        Managing Kubernetes or OpenShift clusters involves tasks such as scaling
         resources up or down, updating software components, monitoring cluster
         health and performance, configuring backups, and implementing disaster
         recovery plans.
        Automating routine tasks using tools like Ansible, Terraform, or custom
         scripts can greatly streamline the management of Kubernetes or
         OpenShift clusters. This includes automating cluster provisioning,
         application deployment, and configuration management.
        Integrating Kubernetes or OpenShift with continuous integration and
         continuous deployment (CI/CD) pipelines enables automated testing and
         deployment of applications. This often involves using tools like Jenkins,
         GitLab CI/CD, or Tekton to build, test, and deploy containerized
         applications onto Kubernetes or OpenShift clusters.
        Implementing security best practices is crucial for protecting Kubernetes
         or OpenShift clusters and the applications running on them. This includes
         securing access to the cluster, implementing network policies, encrypting
         communication between cluster components, and regularly patching and
         updating software components to address security vulnerabilities.
        Setting up monitoring and logging solutions such as Prometheus, Grafana,
         and Elasticsearch enables administrators to monitor the health and
         performance of Kubernetes or OpenShift clusters, as well as troubleshoot
         issues by analyzing logs and metrics.
        Develop infrastructure automation jobs to build, scale and deploy AWS
         infrastructure
        Build, Configure and deploy RDS and MongoDB database in the AWS
         cloud.
        Contribute to feature team's design in design review meetings
        Collaborate with the development/integration team to gain feedback and
         evaluate feasibility of various solutions
        Assess data received is PCI compliant and use necessary encryption
         techniques if needed.
        Design performance test suite to prove the stack can handle double of the
         anticipated traffic
        Work with product owners to understand desired application capabilities
         and testing scenarios
        Continuously improve software engineering practices
  Environment: Jenkins, Docker, Ansible, AWS, S3, Autoscaling Group, EBS, RDS,
           Maven, Apache Tomcat, Shell, Groovy, AWS Ec2, Mesos/Marathon,
           Consul, Kafka, Chronos, Spark.
 Environment: AWS (EC2, S3, RDS, EBS, and Elastic Load Balancer, Auto scaling
          groups and optimized volumes, EC2 instances), VPC, subnets, NAT,
          EC2 instances, ELB, Security Groups. VMware, Jenkins, Docker,
          Docker containers, kubernetes, Terraform, Ansible, YAML scripting,
          Ruby Scripts, Python Scripts, Perl Scripts, Shell Scripts, GIT, TeamCity,
          JIRA, RPM/YUM, Apache and MySQL database. JBoss, Apache,
          WebLogic, Tomcat and WebSphere, Nginx, NetApp storage LUNs to
          the Red Hat Linux servers.
 Responsibilities:
 Involved in designing and deploying multi applications utilizing most of the AWS
   stack, including EC2, VPC, Security Groups, S3, RDS, ELB, EBS, Lambda, Dynamo
   DB and IAM.
 Built custom scripts, workers, and clients utilizing AWS SDK to manipulate
   Amazon EC2 and S3 resources.
   Created Python script using AWS API Calls to manage resources deployed on
    AWS.
   Configured Continuous Delivery frameworks using AWS CodeCommit, CodeBuild,
    CodeDeploy, CodePipeline, Jenkins, Chef, Maven & Nexus in Linux & Win
    environments.
   Created alarms in CloudWatch service for monitoring the server's performance,
    CPU Utilization, disk usage, maintained user accounts IAM, RDS, and Route53
    services in AWS Cloud.
   Worked with Terraform key features Infrastructure as code, Execution plans,
    Resource Graphs, Change Automation, and extensively used Auto-scaling launch
    configuration templates for launching Amazon EC2 instances while deploying
    Microservices.
   Implemented AWS CodePipeline & Created CloudFormation JSON templates in
    Terraform for IaaS.
   Used IAM to define user’s permissions, created roles and permissions and
    configured AWS IAM and Security Groups in Public and Private Subnets in VPC to
    control inbound and outbound traffic in instances.
   Involved on migrating SQL Server databases to SQL Azure Database using
    SQL Azure Migration Wizard and used Python API to upload agent logs
    into Azure blob storage.
   Configured Nagios to monitor EC2 Linux instances with Chef automation and
    deployed SolarWinds for network monitoring and analysis.
   Implemented a Continuous Delivery pipeline with Docker, Jenkins, GitHub, and
    AWS AMI's, when a new GitHub branch gets started, Jenkins, Continuous
    Integration server, automatically attempts to build a new Docker container from
    it, Docker container leverages Linux containers and has the AMI baked in.
   Configured AWS Route53 to route inbound traffic using DNS name and ELB as
    endpoint with Simple and weighted routing policies.
   Worked on the creation of custom Docker container images, tagging, pushing
    images and Dockers consoles for managing the application lifecycle. Used
    Docker for container snapshots, attaching to a running container, removing
    images, managing containers in Docker registry.
   Created Pods and managed using Kubernetes, established Jenkins Master &
    Slave architecture for reducing traffic of web requests. Build Jenkins pipelines to
    drive all microservices builds out to the Docker registry and then deployed to
    Kubernetes, Created Pods, and orchestrated using Kubernetes.
   Involved in configuration for Web apps, V-net integration, HCM, Application
    gateway, App Insights, Active Directory, Azure Key Vault, Encryption and
    Security on AZURE using ARM templates and PowerShell scripts.
   Administered and Engineered Jenkins to manage weekly Build, Test, and Deploy
    using Jobs and Pipelines, GIT with Development/Test/Production Branching Model
    for weekly releases.
   Created a Python Script to stop all the instances with a specific tag in AWS
    Instance using Lambda functions and made it into Cloud Watch Scheduler to
    schedule it every night.
   Written Ansible Playbooks with Python SSH as the Wrapper to Manage
    Configurations of Nodes and Test Playbooks on AWS instances using Python SDK
    and Automated various infrastructure activities like continuous deployment,
    application server setup, Stack monitoring using Ansible playbooks.
   Worked with Terraform key features such as Infrastructure as code, Execution
    plans, Resource Graphs, Change Automation and extensively used Auto scaling
    for launching Cloud instances while deploying microservices.
   Developed Chef Recipes using Ruby Script through Knife command-line tool to
    create Chef Cookbooks having Data bags, Templates, attributes, and Recipes.
   Managed build and deployment scripts using RUBY in CHEF and triggered the
    jobs using Jenkins to move from one environment to other environments.
   Created YAML playbooks to automate, build and install tools and applications and
    different patches on many servers at the same time using Ansible.
   Managed artifacts generated by Jenkins & configured jobs with the Maven for
    various deployments of .Net enterprise applications in an Agile environment,
    automated solutions using Python & managed Jfrog.
   Configured a centralized logging system using Logstash configured as an ELK
    stack (Elastic Search, Logstash, and Kibana) for monitoring system logs, VPC
    Flow logs, Cloud Trail Events & changes in S3 in integration with AWS Lambda
    and CloudWatch.
   Configured data sources for JBOSS with various versions of databases, configured
    and monitored distributed multi-platform servers using Nagios.
   Used CloudTrail & CloudWatch for monitoring & creating alarms for the health
    status of running instances and setting up SNS alerts to coordinate the delivery
    of messages to subscribing endpoints and clients.
Environment: RedHat Linux 6.0, Win 2012, AWS(EC2, VPC, S3, RDS, ELB, Route53,
         EBS, Lambda, Dynamo DB, IAM, CloudFormation, CodeCommit,
         CodeBuild, CodeDeploy, CodePipeline), Azure, Docker, Kubernetes,
         Jenkins, Ansible, Chef, Maven, JFrog, Nexus, Terraform, Python,
         PowerShell, ELK, Nagios, Solarwinds, JIRA, GITHUB, JBOSS 4.22.GA.
Responsibilities:
     Installation, Configuration, Upgradation and administration of Red Hat
       Linux.
     Jumpstart & Kick-start OS integration, DDNS, DHCP, SMTP, Samba, NFS,
       FTP, SSH, LDAP integration.
     Installed RHEL 5.x using Kick-start server on standalone servers and
       VMware environments.
     Network traffic control, IPSec, Quos, VLAN, Proxy, Radius integration on
       Cisco Hardware via Red Hat Linux Software.
     Responsible for configuring and managing Squid server in Linux.
     Configuration and Administration of NIS environment.
     Creating profiles manifests for new servers and pushing them to servers
       using puppet.
     Responsible for maintenance of development tools and utilities and to
       maintain Shell, Perl automation scripts.
     Creating, installing, WebLogic Application servers, deploying WAR, JAR
       files on them installed on both Linuxservers.
     Checking the quality, security and performance of the customer's
       applications.
     Worked with project manager and auditing teams to implement PCI, SOX
       compliance.
     Installed and assembled hardware components and installed various
       operating systems like CentOS, RedHat.
     Created roles, users, profiles, managed user permissions and implemented
       jumpstart servers on RedHat.
     Administered remote systems using tools like SSH, Telnet, also created
       and cloned Linux virtual machines.
     Monitored server's operating system, system logs, managed software
       builds, scheduled batch and Cron jobs.
     Created and modified bourne shell (sh), korn shell (ksh) and bash shell
      scripts for automation of jobs server.
     Troubleshot most networking issues using Linux commands such as
      ifconfig, NSLookup, netstat, ping etc.