Summary
Overview
Work History
Education
Skills
Timeline
Generic

HARISH P

DEVOPS ENGINEER
Irving

Summary

Dynamic DevOps Engineer with extensive experience at Verizon, specializing in containerization and configuration management. Proven track record in automating CI/CD pipelines and enhancing security protocols. Adept at effective communication and project planning, driving significant improvements in deployment efficiency and infrastructure reliability. Skilled in Terraform and monitoring solutions, ensuring robust system performance.

Overview

2026
2026
years of professional experience

Work History

Dev0ps Engineer

Verizon
  • Configured AWS application deployment infrastructure services like VPC, EC2, S3, RDS, Dynamo DB, Mongo DB, IAM, EBS, Route53, SNS, SES, SQS, CloudWatch, CloudTrail, Security Group, Auto Scaling Group ASG, and RDS using CloudFormation, Terraform templates.
  • Experience in Configuring Auto Scaling in customized VPC, based on elastic load balancer (ELB) traffic and using ELB health check to triggerauto scaling actions and deployed Auto Scaling policies to scale up/down EC2instances based on ELB health checks and created alarms to be used in auto scaling decision making policies. Familiar with AWS ACM and have installed SSL certificates on various Load Balancers.
  • Writing AWS Terraformtemplates for any automation requirements in AWS services. Implemented multiple high-performance MongoDB replica sets on EC2 with robust reliability. Managed and supported AWS Security related issues, such IAM and S3 policies for user access.
  • Automated deployments of web applications based on Node.js, Python, Ruby, Java, PHP using AWS Code Pipeline, EC2, Elastic Beanstalk, and Jenkinsand secured by creating IAM roles and policies for services and users.
  • Executed Lambdafunctions in Python to invoke scripts for data transformations and analytics on large data sets in EMR clusters and Kinesis data streams and call Dynamo DB by REST API.
  • Automated the implementation of VPCs, ELBs, security groups, SQS queues, S3 buckets by using Terraform and used Terraform as a tool to manage different cloud infrastructure resources, i.e., VMware, and Dockercontainers.
  • Experienced in writing Bash and Python scripts, Included Boto3 to supplement automation provided by Ansible and terraform for tasks such as encrypting EBS volumes backing AMI's and Scheduling Lambda functions for routine AWS tasks.
  • Implemented a Kubernetes Container Orchestration solution within AWS leveraging KOPS, which allows easy management creation and recovery of AWS assets.
  • Configured cluster operations in AWS Kubernetes (EKS) to deploy microserviceswith CI/CD system and used Kubernetes cluster to scale up operations of clusters, maintain the cluster services, load balancing, network policies, group Docker containers across different platform.
  • Integrated Dockercontainer-based test infrastructure to Jenkins CI/CD test flow and executed build environment by integrating with GitLaband Jira to trigger builds using Webhooks and Slave Machines.
  • Created required reliable architectures and end-to-end migration plan for migrating Linux/Windows servers along with web applications into AWS cloud platform using services as IPSec tunnel, VPN gateway, Customer Gateway and Data Pipeline.
  • Automated CI/CDpipeline by utilizing DockerContainers, Docker Swarm and orchestration for a microservice-based application and automated with Ansibleplaybooks based on YAML.
  • Built Jenkins jobs to create AWS infrastructure from GitLab repos containing Terraform code and administered and engineered Jenkins for managing weekly Builds.
  • Set up Jenkins server and built jobs to provide continuous automated builds based on polling the GIT SCM during the day and periodically scheduled the builds overnight to support development.
  • Created AWS OpsWorks platform to integrate Ansible process to deploy codes, various DB configurations to modularize and optimize product configuration and expertise in writing Ansible Playbooks, modules and roles and utilized Ansible for configuration management of hosted Instances within AWS.
  • Automated infrastructure activities such as Continuous Deployment, Application Server setup, Stack monitoring using Ansible playbooks and worked on Integrating Ansiblewith Rundeck and Jenkins.
  • Automated builds using Maven, Python and scheduled automated nightly builds using Jenkins. Built Jenkins pipeline to drive all Microservices builds out to the Docker registry and then deployed to Kubernetes.
  • Automated Java builds with Maven and implemented multiple plugins for Code analysis like Junit, SonarQube, etc. Installed and administered Artifactoryrepository to deploy the artifacts generated by Maven.
  • Automated MySQL container deployment in Dockerand monitoring of these containers and configured, monitored distributed and multi-platform servers using Nagios.
  • Installed and configured ELK stack in both legacy and Docker Swarm mode and developed pipeline for application logs from App Server to Elastic search through Logstash and used logs aggregation tool ELK configuration and administration for monitoring EC2 instances.
  • Used ELK stacking to monitor the logs for detailed analysis and worked on dashboarding using Elastic, Logstash & Kibana (ELK) and used ELK to setup real time logging and analytics for Continuous delivery pipelines & applications.
  • Used Shell, Bash, and Python scripts to supplement automation provided by Ansible and Terraform for encryption.
  • Created database tables that can store and retrieve any size of data and serve any level of request traffic using DynamoDB. Configured commercial SSL certificates for Application Servers such as WebSphere, WebLogic, Tomcat using NGINX and Apache web servers to terminate SSL endpoint.
  • Setup up JIRA as defect tracking system and configured various workflows, customizations, and plugins for bug/issue tracking.
  • Worked on troubleshooting various Linux server and network related issues using log files and tools like ping, telnet, strace, and traceroute for application teams, configured NIC bonding/NIC Teaming Configuration in Linux/Unix/window/Vmware systems to increase the performance based on the requirement by the application.

Senior DevOps Engineer

Barracuda
01.2024 - 04.2025
  • The team used Azure Boardsfor epic, feature, and user-story breakdown and prioritization to provide full visibility and streamlined planning.
  • We used Azure Reposwith Git Flowthat enforced branch protection, mandatory peer reviews, and automated static-analysis checks for every pull request.
  • The Azure DevOps YAML pipelineswere designed to operate automatically at multiple stages during push and PR operations.
  • The CI pipeline integrated linting tools Prettier + ESLintfor React and Check stylefor Java together with unit testing tools JUnit and SonarQube scanning.
  • Maven built applications which were packaged into Azure Artifacts and Docker images stored in Azure Container Registry (ACR).
  • The infrastructure was built using TerraformIaC to create core elements such as AKS, App Services, Azure SQL Database, Storage Accounts, VNets, and Private Endpoints.
  • Terraform modules were developed for networking and compute and storage (150+), with version control and environmental isolation features.
  • The application was deployed to AKSthrough Helmcharts that required manual approval for each environment deployment.
  • Flagger and Istiowere used to enable blue-green deployments, providing zero-downtime rollouts and immediate rollback functionality.
  • Azure Key Vault and Azure App Configurationwere used to externalize secrets and configuration, accessed via Managed Identities with strict RBAC.
  • Quality gates were established through Postmanfor API tests, Selenium& Playwrightfor UI tests, OWASP ZAPfor security scans, and Trivyfor vulnerability scanning.
  • End-to-end monitoring and alerting were deployed via Azure Monitor, Log Analytics, Application Insights, Grafana (via Azure Monitor), Prometheus(AKS metrics), and notifications to Microsoft Teams & PagerDuty.
  • Azure Cost Management budgets enabled automated cost controls alongside Bash/PowerShell/Python scripts for tagging and scheduled dev-environment shutdowns.
  • Continuous compliance was enforced using Azure Policy, Microsoft Defender for Cloud scans, and vulnerability assessments across all subscriptions.
  • Deployment time was shortened to under 10 minutes—enabling daily releases—while making infrastructure provisioning both repeatable and auditable.
  • 5+ teams received reusable YAMLtemplates and extensive documentation to ensure future maintainability during onboarding.

Education

Master of Science -

Wilmington University
New Castle, DE
05.2001 -

Bachelor of Science -

ANDHRA UNIVERSITY
ANDHRA PRADESH , INDIA
05.2001 -

Skills

Containerization technologies

Configuration management

Maintenance and troubleshooting

Monitoring and logging

Security best practices

IT solution development

Windows operating system

Microservices architecture

Virtualization technologies

Project planning

Effective communication

Test automation

Timeline

Senior DevOps Engineer

Barracuda
01.2024 - 04.2025

Master of Science -

Wilmington University
05.2001 -

Bachelor of Science -

ANDHRA UNIVERSITY
05.2001 -

Dev0ps Engineer

Verizon
HARISH PDEVOPS ENGINEER
Profile created at Zety.com