Summary
Overview
Work History
Education
Skills
Certification
Education and Training
Timeline
SoftwareEngineer

Dammy Adewale

DEVOPS, DEVSECOPS, CYBER
Owings Mills,MD

Summary

Detail-oriented Cloud DevOps Engineer and Security Engineer with more than 5 years of experience designing and delivering security and network solutions in cloud infrastructure based on AWS cloud security standards- governance and control practices. Advanced knowledge in Infrastructure as a Service (IaaS)- Platform as a Service (PaaS) and Software as a Service (SaaS) on AWS technologies and associated components and variations, knowledge of the AWS shared responsibility model and its application- security controls for workloads on AWS-logging and monitoring strategies; -cloud security threat models- patch management and security automation; ways to enhance AWS security services with third-party tools such as Ansible

Overview

9
9
years of professional experience
4
4
Certification

Work History

Cloud Engineer

LTS
Charlottesville, VA
01.2021 - Current
  • Using Terraform to define, deploy, and manage infrastructure as code on AWS
  • Ensured the infrastructure deployed with Terraform adhered to security guidelines and best practices
  • Developed reusable Terraform modules to standardize infrastructure provisioning across projects
  • Collaborated with other teams to integrate Terraform into their development workflows
  • Automated the deployment and management of AWS resources using Terraform and other automation tools
  • Monitored and audited infrastructure changes made through Terraform to ensure compliance with security and operational requirements
  • Troubleshoot and resolved issues related to Terraform infrastructure deployment and management
  • Advised on project costs, concepts or design changes.
  • Configure and manage AWS user, security, and networking settings
  • Work within Sprint and Increment Planning for tasks
  • Use JIRA, Git, and Confluence for project management and collaboration
  • Planed and implemented scalable, distributed, and high-performance cyber security cloud environments
  • Implementing AWS Organizations to manage multiple AWS accounts within an enterprise
  • Creating and managing Organizational Units (OUs) within AWS Organizations to group and manage AWS accounts based on business needs
  • Using AWS Control Tower to set up and govern a secure, compliant, and multi-account environment on AWS
  • Configuring and managing AWS API Gateway to create, deploy, and manage RESTful APIs that enable communication between software applications
  • Deploying and managing containerized applications using Amazon Elastic Container Service (ECS) and AWS Fargate
  • Configuring and deploying web and mobile applications using AWS Amplify
  • Setting up and managing Aurora databases on AWS, including configuring encryption using AWS Key Management Service (KMS)
  • Configuring and managing AWS Elastic Load Balancing (ELB) to distribute incoming application traffic across multiple targets
  • Setting up and configuring AWS CloudWatch to monitor, analyze, and act on logs, metrics, and events across AWS resources
  • Configuring and managing Virtual Private Cloud (VPC) and Security Groups to control network traffic and ensure network security within the AWS environment.
  • Assumed a technical role in the administration and management of infrastructure solutions deployed in AWS in accordance with Security Guidelines
  • Research new cyber security technologies applicable to current projects and make recommendations to improve performance, optimize operations, and reduce costs
  • Assist with AWS technical designs and documentation

Cloud Solutions Engineer

Apple inc
Irving, Texas
02.2017 - 12.2020
  • Used LucidChart to develop architectural diagrams before implementation and also to give customers and clients a visual workflow of what they require
  • Used Jira to plan, track, support, and close requests, tickets, and incidents
  • Implemented security best practices in AWS including multi-factor authentication, access key rotation, encryption using KMS and TLS, Firewalls, Security Groups, NACLs, S3 bucket policies
  • The reason being the client's data security is of great importance
  • Design & architect self-healing, secured, HA & fault tolerant infrastructure in AWS making use of AWS services like ASG, Elastic Load balancers (NLB and ALB)
  • Used ASG to scale horizontally and vertically based on ingress traffic and CPU utilization, to save on company resources and cost
  • Monitored servers, devices, and applications to identify and rectify potential issues on time
  • Made use of CloudWatch and data dog for intensive monitoring of instances and resources
  • Architect Amazon RDS with Multi-AZ for automatic failover servers and created roles for EC2, RDS, S3, and Cloud Watch resources to communicate with each other using IAM
  • Made use of SSM for automating patching of AMIs by using a patch manager
  • Experience in migrating and implementing multiple applications from on-premises to cloud using AWS services, SMS, DBMS, Cloud Formation, S3, Route 53, Glacier, EC2, AURORA, SNS, Lambda, VPC, Cloud Trail, API gateway
  • Also made use of Content Delivery Service (CloudFront and AWS Global accelerator) to cache company data so that our users from different AWS regions can access data at quicker rates due to low latency
  • Implemented maintenance and configuration of the user account for Dev, QA, and production servers and created roles for EC2, RDS, S3, and cloud watch resources to communicate with each other using IAM
  • Perform continuous in-depth monitoring of cloud applications (CloudWatch, CloudTrail, VPC Flow logs, Config, etc.) and provide recommendations for minimizing loss and destruction, mitigating exploited or exploitable weaknesses, and minimizing impact to service/returning to normal service as quickly as possible.
  • Collaborated with a cross-functional team to define features and build powerful and easy-to-use products and customer-facing workflow tools.
  • Coordinated with project managers to meet development timelines and plan testing.

CLOUD ENGINEER

Rural Sourcing
Buffalo, NY
01.2016 - 01.2017
  • Build and configure a virtual data center in the AWS Cloud to support Enterprise Data Warehouse hosting including Virtual Private Cloud (VPC), Public and Private Subnets, Security Groups (SG), Route Tables, Elastic Load Balancers ELB), Route 53
  • Deployed cloudwatch unified agents on instances for monitoring system metrics and application metrics and logs
  • Advised and implemented the hosting of company applications within the Private Subnet and access to those applications were done with the help of bastion host
  • Partook in disaster recovery scenarios for backing up data and utilizing AWS backup and restore tools like AWS storage gateway and developed solutions around pilot light and warm standby
  • Build servers using AWS, importing volumes, launching EC2, RDS, creating SG, auto-scaling, and ELBs in the defined VPC
  • Established VPC connectivity by making use of Transit Gateway for connecting VPCs and VPN connection to a data center
  • Automate Compliance Governance by provisioning and leveraging AWS Landing Zone as well as AWS Control Tower for centralized enterprise architecture and also centralized managing
  • Recommended AWS SSO on Control Tower for managing user access on multiple platforms
  • Using CloudWatch, and VPC Flow Logs to monitor and retain account activity related to actions across AWS infrastructure
  • Supported our CI/CD pipeline running on ECS with the use of Terraform.
  • Created Task definitions, Tasks, and services for these resources
  • Deployed and managed EKS clusters with the use of Terraform.
  • Created cluster resources like pods, ingress controllers, etc
  • Used Jenkins as a continuous integration tool for the automation of our daily process
  • Used Groovy for setting up pipeline jobs for different processes for the test, build, and code coverage with different plugins
  • Set up and manage Docker containers running Go and PHP applications for deployment into Kubernetes pods.
  • Proposed and developed solutions for application deployments by making use of AWS code pipelines as compared to native tools for cost management
  • Worked on a Database Migration Project from the client's data center to Amazon Aurora.
  • Verified stability, security, and scalability of system architecture.
  • Handled troubleshooting tasks for Local Area Networks, Wide Area Networks, and voice systems to reduce network connectivity problems.
  • Selected appropriate AWS service based on computing, data, or security requirements.

Jr. System Administrator

Royal Import Export
Sacramento, CA
11.2015 - 12.2016
  • Designed, deployed, and clustered High Availability servers on VMware ESXi using vSphere Client
  • Performed applications installation, upgrades/patches, troubleshooting, maintenance, and monitoring of the Linux server
  • Installation, configuration, and administration of Enterprise Linux
  • Created, managed, and administered user accounts security and SSH password-less login
  • Network configuration & troubleshoot issues concerning network and configuration files
  • Configuring Apache, NFS, FTP, and SMB
  • Create users, and groups and give permissions on bare metal servers
  • Task automation, service management, and application deployment using Ansible and Jenkins
  • Build and configured Linux servers from scratch with type one hypervisors for virtualization and network components
  • Perform security setup, networking, system backup, and patching for both AWS and on-premises environments
  • Architect high availability environment with auto-scaling & Elastic Load Balancer
  • Securely deploy MySQL Primary DB and its read replica in a private subnet with multi-AZ for disaster recovery and best practice
  • Migration of high-availability web servers and databases to AWS EC2 and RDS with minimum or no downtime
  • VPC built with Private and Public Subnet coupled with VPNs setup back to the on-premises data center and corporate offices
  • VPC peering with other Accounts allows access and routing to service and users of separate accounts to communicate
  • SSL setup for Apache and Nginx applications coupled with AWS ELB SSL for all HTTP to HTTPS thereby maximizing security
  • Network, CPU, Disk, and connectivity monitoring with CloudWatch and setup to trigger an alarm and notify system administrators
  • Aide setup for and configured for logs files detail monitoring and alerts notification when changes are made
  • Performed root-cause analysis of recurring issues, system backup, and security setup
  • Security groups configured and locked down to the various authorized subnet and IP addresses in AWS
  • Automated deployment, configuration, and security settings using Ansible
  • Experienced in GitHub (cloning a Git repository, creating a branch, pushing to Git from local, making a PR, etc.)
  • Architected and implemented continuous integration and deployment pipelines using Jenkins and other CI
  • Experienced in GitHub
  • Monitored IT architecture for large enterprises, assessing current operations to identify potential process improvements.
  • Monitored client computer network operations, from planning and budgeting to installation, maintenance, and support.

Education

Associate of Applied Science - Computer science

The Community College of Baltimore County

Bachelor of Science - Information Technology

Towson University

Skills

  • AWS Cloud: Ec2, EFS, VPC, RDS, S3, Glacier, IAM, Kinesis, CloudFront, Cloud Watch, Cloud Trail, Cloud Formation, DynamoDB, Aurora, Memcached, Lambda, Route53, SNS, SQS, API Gateway, Elastic cache, Redshift, ASG, WAF, Shield, AWS Config, Jenkins
  • Monitoring Tools:
  • Data sync, STC, DMS, SMS, AWS Discovery services, DR strategies, Migration Hub
  • DevOps Tools: GitHub, Code Commit, Code Pipeline, Code Build, Code Deploy SSMECR, EKS, ECS, SSM (systems manager)
  • Migration Tools:
  • Networking Tools: CIDR Block range, VPC Subnets, switches, Routers, LAN, WAN, transit gateway,
  • VPC endpoint, VPC peering, Site to Site VPN, direct connect, VPG, NACLS, Bastion Host, Subnetting
  • Databases: MYSQL, MYSQL 56, T-SQL, MongoDB, Enterprise Oracle, Postgres, Documents DB, Amazon Aurora, Dynamic DB, RDBM, PL/SQL
  • Scripting Languages: Python, YAML, JSON, BASH Scripting, Powershell3
  • AWS Organization user management: SSO with OKTA, Cognito, AWS Organizations, Control Tower, AWS manage AD, STS
  • Programming Language: Bash Shell, JSON, YAML, Python
  • DevOps/CI/CD: Terraform, Jenkins, GitHub, Git, Gitlab, Bitbucket, Maven, Code Commit, SonarQube, Kubernetes, Code Build, Code Deploy SSM, Docker, etc
  • Ticketing tools: Jira (agile/scrum methodology)
  • Operating Systems: Windows, Linux, Ubuntu, Redhat, Centos
  • Expert in utilizing CrowdStrike's cloud-native modules for real-time threat detection and response
  • Proficient in deploying Tenablesc for vulnerability management, data consolidation, and security risk response
  • Proficient in managing and troubleshooting Juniper network security solutions and firewalls
  • Skilled in using Axonius for cybersecurity asset management, gap identification, and threat response
  • Experience in using Splunk for real-time security monitoring, threat detection, forensics, incident management, and compliance reporting

Certification

  • CompTIA Security+
  • AWS Cloud Solutions Architect

Education and Training

other

Timeline

Cloud Engineer

LTS
01.2021 - Current

Cloud Solutions Engineer

Apple inc
02.2017 - 12.2020

CLOUD ENGINEER

Rural Sourcing
01.2016 - 01.2017

Jr. System Administrator

Royal Import Export
11.2015 - 12.2016

Associate of Applied Science - Computer science

The Community College of Baltimore County

Bachelor of Science - Information Technology

Towson University
Dammy AdewaleDEVOPS, DEVSECOPS, CYBER