Summary
Overview
Work History
Skills
Expertise Fields:
Certification
Timeline
Generic

Bhanu Kola Sree

Summary

Experienced DevOps professional with a strong background in implementing and managing CI/CD pipelines, cloud infrastructure, and automation tools. Proven ability to foster team collaboration and achieve results while adapting to changing needs and ensuring reliability. Skilled in containerization, orchestration, and configuration management, with a focus on continuous improvement and operational excellence.

Overview

12
12
years of professional experience
1
1
Certification

Work History

Sr. DevOps Engineer

Blue Cross Blue Sheild
08.2023 - Current
  • Worked in Migrating on-premises DevOps platform to Azure CI/CD process by utilizing ARM templates, Azure DevOps services such as Boards, Repos, Test Plans, Pipelines and Artifacts
  • Utilized advanced Azure Networking functionalities like Azure Virtual WAN and ExpressRoute to improve network connectivity and boost performance between on-premises environments and Azure cloud resources
  • Configured Azure Virtual Networks, subnets, DHCP address blocks, azure network settings, DNS settings, security policies and routing
  • Also, deployed Azure IaaS virtual machines and Cloud services (PaaS role instances) into secure Virtual Networks, Subnet, Virtual Machines, Azure App Service, Azure Storage and Azure Key Vault
  • Deployed and configured Azure Backups for Virtual Machines and files & folders backups on Windows and Linux operating systems using Recovery Services Vault in Azure Resource Manager
  • Designed and implementation of complex hybrid identity federation solutions using Active Directory Federation Services (ADFS), AD Connect Synchronization and Azure AD
  • Utilized Virtual network peering to establish communication between resources in different Virtual Networks, resize the address space of Azure Virtual Networks, and direct traffic from one virtual network to another using service chains integrated with Azure Firewall, Azure Load Balancer, Azure VPN Gateway and Azure Private Link
  • Utilized Azure Service Bus to allow microservices to communicate asynchronously and automatically trigger functions to process the messages from Service Bus and execute tasks
  • Developed T-SQL queries to retrieve and work with data from Azure Cosmos DB, and NoSQL databases
  • Utilized Azure services such as Azure Data Factory, Azure Data Lake and Azure SQL Database to extract data from Azure sources and prepare it for migration
  • Automated data workflows with Azure Data factory, ensuring secure and isolated communication through Azure Virtual network and configured Cosmos DB for storing processed data and enabling fast queries
  • Facilitated event-driven communication between microservices using Azure Event Grid and triggered Azure Logic apps by these event queues to process messages and execute business logic asynchronously
  • Automated the creation and management of the Azure Databricks workspace, clusters, and jobs using Azure CLI and stored processed data in Azure Blob Storage for downstream analytics and reporting
  • Utilizing both Docker Compose and Docker Swarm to orchestrate containerized workloads on Azure infrastructure, multi-container application deployment and management across Azure environments is made possible
  • Responsible for implementing containerized based applications on Azure Kubernetes by using Azure Kubernetes service (AKS), Kubernetes Cluster, which are responsible for cluster management, Virtual Network to deploy agent nodes, Ingress API Gateway, MySQL Databases and Cosmo DB for stateless storage of external data, and setup reverse proxy Nginx in the cluster
  • Successfully Migrated Version control from Team Foundation Server (TFS) to Azure Repos, utilizing Git for enhanced code quality, traceability, and streamlined collaboration within the software development lifecycle
  • Incorporated Azure DevOps Pipelines with Azure infrastructure deployments via Azure Resource Manager (ARM) templates and terraform, facilitating automated provisioning and deployment of Azure resources within CI/CD workflows
  • Utilized Azure Kubernetes service to deploy a managed Kubernetes cluster in azure and created an AKS cluster in the Azure portal, with the Azure CLI, also used template driven deployment options such as Resource Manager templates and terraform
  • Created and troubleshooted Kubernetes YAML files to deploy SCM CI/CD applications automatically and Idempotently to reduce time costs
  • Used Kubernetes to deploy, load balance, scale and manage docker containers with multiple name-spaced versions
  • Experienced in configuring Azure Kubernetes Service (AKS) cluster for high availability and auto-scaling based on workload demands and setup kubectl utility to manage and monitor the deployed applications
  • Utilized Helm charts and Kubernetes manifests to define and manage Kubernetes resources including pods, services, deployments, and ingress controllers, I deployed and scaled containerized workloads on AKS clusters
  • Devised Terraform to deploy the infrastructure necessary to formulate development, test, and production environments
  • Configured Azure VPN gateway and established Site-to-Site connectivity, Express Route with on premise Networks and Azure
  • Developed Terraform modules for setting up VPN Gateway to establish a secure site-to-site VPN connection with the on-premises data center and also configured multiple VPN connections for redundancy to ensure failover in case the primary connection fails
  • Created Terraform templates for provisioning virtual networks, VM Scale sets, Load balancers, NAT rules and used Terraform graph to visualize execution plan using graph command
  • Utilized Terraform to deploy the infrastructure necessary to create development, test, production environments for software development project
  • Utilized Terraform modules to automate the deployment of resources in Azure for a multi-tier application and set up a secure Virtual network with Subnets, Network Security Groups (NSGs), and firewalls
  • Created cloud modules for interacting with Azure services which provides the tools to easily create and orchestrate infrastructure on Azure and automated cloud-native applications in Azure using Azure microservices such as azure functions and Kubernetes on Azure, Ansible
  • Automated Ansible for configure management and application deployment across Azure Linux VMs to ensure that all VMs are configured consistently and utilized Ansible Playbooks to automate tasks such as software installation, application deployment, and security configuration
  • Orchestrated the integration of various DevSecOps tools into the development pipeline, creating a cohesive toolchain for security testing, monitoring, and compliance
  • Created deployment areas such as testing, pre-production and production environment in managed Azure Kubernetes cluster and configured App Insights, Prometheus and Grafana monitoring dashboard for regular analysis
  • Implemented Azure Log Analytics and Azure Monitor to gather, analyze, and present log and telemetry data from Azure resources, empowering proactive issue resolution and performance enhancement across Azure environments through insightful troubleshooting and optimization measures
  • Worked on GitLab Admin Area to assign permission for Users and created GitLab System Hooks for changing the existing information in servers
  • Experienced in using log analytics workspace to create alerts, set alert conditions, set up alert action groups, and user activity logs to get notifications on backup status
  • Created security alerts and job failure alerts for backups using Azure Monitor.


Environment: Azure Active Directory, Azure storage, IIS, Azure Resource Manager, Azure Blob Storage, Azure VM, SQL Database, Azure Functions, Azure CLI, Helm Charts, Docker, Kubernetes, Terraform, GitHub Actions, YAML, , SQL server, MySQL, Oracle database, Ansible, Tableau, Power BI, Git, Bitbucket, Maven, GitLab CI, Jenkins, , Dynatrace, Datadog, QRadar, Cloud Trail, Cloud Watch, ELB, Selenium, Bash Shell Scripting, Chef

Sr. Azure DevOps Engineer

CARDINAL HEALTH
03.2022 - 07.2023
  • Developed Azure configurations utilizing services like Azure Cosmos DB, Azure Storage Queues, Azure Redis Cache, Azure API Management, Azure Logic Apps, Azure Data Factory, Azure Functions, Azure Cognitive Services, Azure DevOps, and Azure Policy to expedited project deployments through efficient CI/CD pipelines
  • Implemented Azure solutions by integrating various services such as Azure Kubernetes Service (AKS), Azure Blob Storage, Azure Functions, Azure Virtual Network, Azure Traffic Manager, Azure API Management
  • Designed Azure solutions using Azure Machine Learning, Azure Queue Storage, Azure PostgreSQL Hyperscale, Azure B2C, Azure Event Hubs, Azure SignalR Service, Azure Private Link, Azure Front Door, and Azure API Management to simplify SDLC
  • Configured Azure web apps, App Services, and Azure DNS for web solutions and utilized Azure Application Insights and Traffic Manager for monitoring and traffic management also Integrated Key Vault, Load Balancer, and Security Center for scalable, secure, and optimized performance
  • Designed and executed migration strategies for traditional systems on Azure by methodologies like Lift and Shift and Azure Migrate and also utilized Azure Data Factory (ADF V1/V2) for migration of on-premises data repositories such as MongoDB to Azure Data Lake Store (ADLS)
  • Utilized Azure Logic Apps to build serverless architectures, integrating Azure Event Grid for event-driven communication and Azure Service Bus for reliable message queuing
  • Successfully executed backup and restore operations for Azure services, ensuring data integrity and business continuity
  • Configured Azure Virtual Networks (VNets) and subnets, managed DHCP and DNS settings, and designed secure and scalable network architectures and implemented Azure Site Recovery (ASR) for disaster recovery solutions
  • Enhanced Azure solutions by integrating services like Azure SQL Data Warehouse, Azure Key Vault, Azure Service Fabric, Azure Stream Analytics, Azure VPN Gateway, and Azure Sentinel to ensure efficient project deployments through CI/CD pipelines
  • Implemented Azure Pipelines for end-to-end CI/CD with Azure Functions, Web Apps, AKS, and Container Instances
  • Integrated Azure Repos and Azure Boards for source control, project tracking, utilized Azure Artifacts, Test Plans, Monitor, Application Insights, and Log Analytics for analytics and performance insights
  • Enhanced DevSecOps practices in Azure DevOps workflows by employing Azure Key Vault for secrets management, Azure Security Center for security assessments, Azure Policy for compliance enforcement, Azure Active Directory for identity and access management, Azure Sentinel for threat detection, and Azure Monitor for continuous monitoring
  • Implemented Azure DevOps CI/CD pipelines to automate ETL(Extract, Transform and Load), optimized deployment of data models
  • Utilized Visual Studio for development, seamlessly integrating Azure Analysis Services for OLAP cube processing
  • Optimized Dockerfile builds for efficient containerization, utilizing Alpine images and multi-stage processes
  • Securely managed in Azure Container Registry (ACR), automated container deployment to AKS through Azure DevOps
  • Integrated PowerShell scripts for dynamic configuration and enhanced integration
  • Managed Kubernetes deployments, services using YAML manifests, integrating Azure Key Vault with ConfigMaps and Secrets for secure and dynamic application configurations also ensured seamless operations in AKS clusters, implementing Azure Policy and ARM templates for consistent governance and infrastructure provisioning
  • Set up Kubernetes volumes and stateful sets for application data, integrated Azure Disk and Azure Files for storage solutions, and implemented network policies and Ingress controllers with Azure Application Gateway for traffic control, used Azure Monitor for container and AKS performance monitoring
  • Created Terraform templates for provisioning virtual networks, VM Scale Sets, Load Balancers, NAT rules and used Terraform graph to visualize execution plan using graph command
  • Integrated Terraform to define Azure Storage resources like blob containers, queues, tables and configured access policies, encryption settings, and performance tiers
  • Utilized Terraform for seamless infrastructure provisioning, orchestrated by Azure Automation, with Azure Functions triggering task execution through ARM templates for automated workflow and efficient resource management
  • Developed and managed ARM templates in JSON format for automated provisioning of Azure resources, including virtual machines, networks, and storage accounts
  • Developed and managed Azure cloud infrastructure using Pulumi as the IaC tool using Typescript to simplify and automate cross-cloud resource provisioning
  • I have designed Modular Bicep templates to encapsulate common infrastructure patterns used across various projects and used parameters within Bicep templates to customize deployments based on the environment (development, staging, production), location, and specific project requirements
  • Integrated these templates with Azure DevOps CI/CD pipelines, utilizing Azure Pipelines for seamless deployment and version control, ensuring infrastructure is consistently deployed across environments
  • Worked on modular and reusable ARM templates to streamline Azure infrastructure deployments, enforcing governance with Azure Policy and optimizing costs using Azure Cost Management tools
  • Integrated ARM deployments with Azure Active Directory (AAD) for identity and access management to enhance security and operational efficiency
  • Utilized Ansible extensively in Azure, utilizing playbooks, roles, inventory, variables, templates, handlers, facts, and integrated Ansible Vault for comprehensive infrastructure automation, management, secure credential management
  • Optimized Ansible playbooks collaboration via GitHub utilizing YAML syntax, integrating Azure DevOps for version control and Azure Pipelines for automated testing and deployment, ensuring efficient infrastructure management
  • Expertise in Ansible installation and maintenance for Azure infrastructure automation, utilizing Azure Automation for task scheduling and Ansible Tower for centralized management and RBAC implementation, enhancing build and deployment processes with Python scripting
  • Utilized Ansible in Azure environments for dynamic private cloud deployments, seamlessly integrating with Azure Resource Manager templates using YAML definitions and DevTest Labs for automated provisioning and scaling
  • Integrated AKS with Azure Virtual Network for network isolation and implemented Azure Network Policies, enforced security measures using Azure Policy, Security Center, and Azure AD integration for identity management and integrated Azure Site Recovery for disaster recovery
  • Worked on integrating Ansible with Jenkins to call Ansible Playbooks using Jenkins pipelines for dynamic inventory management and parameter passing
  • Created and maintained Continuous Integration (CI) using tools like Azure DevOps (VSTS) over multiple environments to facilitate an agile development process which is automated and repeatable, enabling teams to safely deploy code in Azure Kubernetes Services (AKS) using Azure DevOps by YAML scripting
  • Implemented Azure Bastion for secure RDP and SSH access to virtual machines (VMs) within Azure Virtual Networks (VNets), eliminating the need for public IP addresses and reducing exposure to external threats
  • Integrated Jenkins with Prometheus, Grafana, Datadog, and Dynatrace to customize monitoring metrics and to set up alerts for anomaly detection to minimize downtime and optimize deployment process of CI/CD pipeline
  • Integrate Python scripts and YAML configurations into Continuous Integration and Continuous Deployment (CI/CD) pipelines using Azure DevOps and also defined security policies and roles in Azure
  • Worked on Git operations, including branching, merging, rebasing, and conflict resolution and utilized Azure Repos for efficient repository hosting, access control, and enforcing version control best practices
  • Connected source code management with project management tools like JIRA or Azure Boards for traceability between code changes and user stories or issues


Environment: ARM templates, Azure Active Directory, Azure storage, Azure cloud services, IIS, Azure Resource Manager, Azure Blob Storage, Azure VM, SQL, Azure Functions, Azure Service Fabric, Azure Service Bus, Azure Kubernetes Service, Helm Charts, Docker, Kubernetes, Terraform, GCP, MySQL, Oracle database, Ansible, Tableau, GitHub Actions, YAML, Bitbucket, Maven, Jenkins, YAML Azure monitoring, Dynatrace, ARM Template, Azure CLI, QRadar, CloudTrail, CloudWatch, Elastic load balancer, Selenium, Bash Shell Scripting, Chef, GitLab CI, AKS, COBOL, DB2, Azure Policy, Azure Blueprints, Azure Resource Graph.

AWS DevOps Engineer

Mind Tree
06.2018 - 02.2022
  • Worked on different AWS services like S3, Route53, EFS, EKS, ECS to manage and maintain the workloads in the EKS cluster
  • Utilized different storage services like EBS volumes, EFS, RDS Aurora in a Kubernetes application as shared and un-shared storage classes
  • Experienced in setting up the infrastructure using AWS services including ELB, EC2, Elastic Container Services (ECS), Auto-Scaling, S3, IAM, VPC, Red Shift, DynamoDB, Cloud Trail, Cloud Watch, Elastic Cache, Lambda, SNS, Glacier, Cloud Formation, Amazon SQS, Amazon EFS and AWS Storage Gateway
  • Administered a scalable, secure cloud architecture on Amazon Web Services, utilizing services like EC2, Auto-Scaling and VPC to build resilient systems capable of handling anticipated and unexpected load surges, while adapting swiftly during development cycles
  • Enabled AWS IAM, Security Groups and VPC settings with MFA (Multifactor authentication), adhering to industry standards
  • Implemented role-based access controls and Multifactor authentication across public and private subnets, enhancing AWS security and access protocols
  • Developed and supervised IAM policies within AWS cloud infrastructure, specifying user groups, allocating roles, and defining regulations for role-based access to AWS resources for organizational requirements
  • Automated CI/CD Pipelines, deployment of web applications based on .NET, Node.js, Python, Java using AWS Code Deploy, Code Pipeline, EC2 and secured by creating IAM roles and policies for services and users
  • Implemented SAST tools like SonarQube within AWS CodePipeline, automating the detection of security vulnerabilities in source code before deployment in AWS environments
  • Implemented Jenkins-Git integration, leveraging multi-branch pipelines for parallel testing, and engineered custom Java plugins to extend Terraform capabilities, specifically tailored for provisioning AWS infrastructure stored within Bitbucket Repositories
  • Configured Jenkins jobs to automate AWS Lambda function deployments using python, incorporating AWS SAM (Serverless Application Model) and implemented role-based access control (RBAC) on Jenkins, carefully assigning roles to team members for specific access levels
  • Created and automated Jenkins Pipeline using Groovy Script for the applications and owning the activity of upgrading, administering, plug-in management, user management and Job creation in Jenkins
  • Utilized Groovy scripts to customize AWS API Gateway integrations, automated encryption key rotation using AWS KMS and conducted comprehensive testing of AWS CloudFormation or AWS CDK infrastructure templates
  • Collaborated with agile software development teams to drive continuous improvement using Jenkins within the CI/CD pipeline
  • Integrated Ant, Nexus and Jira and automated the code checkout process using Git with Jenkins
  • Implemented custom metric monitoring using CloudWatch API, orchestrated centralized monitoring across multiple AWS accounts and regions with CloudWatch Cross-Account-Cross-Region (CACR) and utilized CloudWatch VPC flow logs for network traffic analysis in Amazon VPC environments
  • Integrated Jenkins with Nexus repository manager to automate the publishing of build artifacts using Maven/Gradle tasks, enhancing artifact management and facilitating efficient sharing across development teams using java for streamlined build and deployment process
  • Experience in Building and deploying the application code using CLI of Kubernetes called kubectl, kubelet, kubeadm, kubespray and scheduled the jobs using Kube-Scheduler
  • Managed K8s charts using Helm and created reproducible builds of the Kubernetes applications
  • Implemented microservices deployment on AWS EKS, utilizing simplified cluster management and integrating with AWS services for monitoring and security, while orchestrating Kubernetes components including ingress controllers for efficient application delivery
  • Integrated DAST tools like OWASP ZAP into AWS CodePipeline, enabling automated and manual vulnerability scanning of web applications hosted on AWS
  • Utilized REST APIs for configuring and automating deployments of containerized applications in Kubernetes clusters, enhancing scalability and agility of microservices architecture
  • Experience in writing Terraform modules using python to deploy Kubernetes clusters, enabling node auto-scaling, implementing Log-Analytics workspace and expertise in writing Helm charts for deploying microservices into Kubernetes
  • Automated Amazon CloudFront setup with Terraform, integrated SNS for notifications, and utilized CloudWatch for monitoring, optimizing web app performance and availability via content delivery network (CDN)
  • Deployed AWS Cloud infrastructure using Terraform modules and automated management practices, with proficiency across key Terraform functionalities including Infrastructure as Code, Execution Plans, Resource Graphs and Change Automation
  • Designed and configured AWS bastion host using Terraform for enhanced network security, employed Auto Scaling for Microservices deployment, and utilized Python for automation
  • Developed Chef cookbooks and recipes to manage configuration drift, enforcing compliance policies and streamlining system administration tasks
  • Strong experience in using Chef and AWS OpsWorks within AWS environments, deploying Chef-Kitchen on AWS and Pivotal Cloud Foundry (PCF) and wrote Recipes and Cookbooks to configure, deploy and maintain software components within existing infrastructure
  • Written Python and Shell scripts for automating daily tasks and developed custom scripts to deploy microservices, monitor repositories and server storage


Environment: AWS Services, S3, Route53, EFS, EKS, ECS, EBS, RDS Aurora, ELB, EC2, Auto-Scaling, IAM, VPC, Red Shift, DynamoDB, CloudTrail, CloudWatch, Elastic Cache, Lambda, SNS, Glacier, CloudFormation, SQS, EFS, Storage Gateway, Jenkins, Git, Terraform, Kubernetes, Helm, CloudFront, SNS, CloudWatch, Chef, OpsWorks, Bastion Host, Auto Scaling, Python, Shell Scripts.

AWS Cloud Engineer

Mind Tree
11.2016 - 05.2018
  • Setup and build various AWS infrastructure resources, VPC, EC2, S3, SQS, IAM, EBS, Security Group, Auto Scaling, SNS and RDS in Cloud Formation JSON templates
  • Implemented app logging service using logging tool Splunk and deployed stacks using AWS cloud Formation templates
  • Utilized Kubernetes for the runtime environment of the CI/CD system to build, test deploy
  • Experience in setting up the build and deployment automation for Terraform scripts using Jenkins
  • Automate provisioning and repetitive tasks using Terraform and Python, Docker container, Service Orchestration
  • Involved in development of test environment on Docker containers and configuring the Docker containers using Kubernetes
  • Developed microservices on boarding tools leveraging Python and Jenkins allowing for easy creation and maintenance of build jobs and Kubernetes deploy and services
  • Implemented AWS solutions using EC2, S3, RDS, SQS, EBS, ECS, Elastic Load Balancer, and Auto scaling groups, Optimized volumes and EC2 instances
  • Developed and maintained the continuous integration and deployment systems using Jenkins, Maven, and Docker
  • Source code admin-Manage and configure GIT resolve issue regarding source code management, manage branching and merging, code freeze process
  • Setup full CI/CD pipelines so that each commit a developer makes will go through standard process of software lifecycle and gets tested well enough before it can make it to the production
  • Experience in working with different build automation tools like Jenkins and Maven to achieve End-to-End Automation and Responsible for installing Jenkins master and slave nodes
  • Virtualized the servers using the Docker for the dev and test environments needs
  • Configured App Dynamics and created dashboards to monitor and gather required metrics for server and application level
  • Created and configured the service endpoints in App Dynamics to monitor the specific methods of classes independent of the business transactions
  • Experience in JIRA Administration, analysis, design, development, Project management, agile methodologies, Collaboration tools, Continuous integration
  • Worked at optimizing volumes and EC2 instances and created multiple VPC instances
  • Used Jenkins to implement continuous integration and deployment into Tomcat/WebSphere application server
  • Used to write Jenkins Pipeline Python scripts for continuous Integration and build workflows.


Environment: AWS Services, S3, Route53, EFS, EKS, ECS, EBS, RDS Aurora, ELB, EC2, Auto-Scaling, IAM, VPC

QA Test Engineer

HARMAN
02.2013 - 10.2016
  • Performed Manual and Functional testing to test the functionality of the modules
  • Performed functional decomposition of requirements for developing test cases
  • Generated Test cases and traced them to the relevant use cases
  • Worked with Users and Business Analysts to define and design test scenarios and test data
  • Ensured that testing activities allow applications to meet business requirements and systems goals, fulfill end-user requirements, and identify existing or potential issues
  • Worked with the QA Manager in developing Responsibility Matrices for the Team Members periodically
  • Created Test Plans and Test Strategy that clarify the features and functions to be tested
  • Implemented quality software best practices to develop test strategy, test plan, test data, test case, and test automation, actively participating in process improvements
  • Ensured the conceptual integrity of the system, ensuring that the product and product architecture meet or exceed the defined technical requirements
  • Developed open-source web test tool Selenium WebDriver for cross-browser testing
  • Utilized QA Automation Test Frameworks such as Keyword Driven, Data Driven, and Behavior Driven Testing to ensure code reusability and maintainability, reducing script development time
  • Built automated test suite to increase automation coverage for regression test cycles
  • Implemented cross-browser and cross-platform testing with Selenium WebDriver
  • Developed and implemented a robust MVC Pattern-based Keyword Driven, Selenium Page Object Model framework using Java and TestNG, cutting down script development time
  • Created detailed periodic status reports for senior management on implementation progress
  • Worked directly with Business users during User Acceptance Testing (UAT)
  • Planned, designed, and executed test plans and test cases for automated and manual tests to support maintenance releases for multiple web-based applications
  • Installed product builds on test environments and maintained test environments
  • Performed application, regression, and acceptance testing.


Environment : Selenium WebDriver, Java, J2EE, Servlet, JSP, SOA, Restful Web Service, HTML, and MySQL

Skills

  • Cloud Platforms : AWS, Azure, GCP
  • Continuous Integration Tools : Jenkins, TeamCity, ADO
  • Containerization Tools : Docker, Kubernetes Clusters, AWS ECS, AKS
  • Config Management Tools : Ansible, Puppet and Chef
  • Source Control Management : GIT, Bitbucket and Gitlab, Azure Repos
  • Tracking Tools : JIRA, Gitlab and Azure Boards
  • Artifact Repositories : Nexus, GitHub Package Registry and JFrog
  • Logging & Monitoring Tools : Datadog, Splunk, Grafana, Prometheus, App Insights, App Dynamics
  • Database : Amazon Aurora, Dynamo DB, MongoDB, Oracle, SQL Server, MySQL
  • Scripting languages : Shell, Python, SQL, Groovy, HCL, JSON and YAML, Azure CLI
  • Infrastructure Spin-up Tools : Terraform, CloudFormation and ARM Templates
  • Operating Systems : Windows, Linux/Unix, and MAC OS
  • Network Topologies : LDAP, DNS, Web, FTP, Sub netting, LAN, VPC

Expertise Fields:

Cloud ( AWS, GCP, Azure ), Terraform, Ansible, Python, Datadog, Jfrog, Splunk, Docker and Kubernetes.

Certification

  • AWS DevOps certification- professional
  • AWS Certified SysOps Administrator - Associate
  • Designing and Implementing Microsoft DevOps Solutions
  • Microsoft Azure Administrator
  • VMware Certified Associate in Data Center Virtualization

Timeline

Sr. DevOps Engineer

Blue Cross Blue Sheild
08.2023 - Current

Sr. Azure DevOps Engineer

CARDINAL HEALTH
03.2022 - 07.2023

AWS DevOps Engineer

Mind Tree
06.2018 - 02.2022

AWS Cloud Engineer

Mind Tree
11.2016 - 05.2018

QA Test Engineer

HARMAN
02.2013 - 10.2016
Bhanu Kola Sree