Summary
Overview
Work History
Education
Skills
Websites
Certification
Timeline
Generic

Anil Reddy Gali

Summary

Professional Cloud DevSecOps Engineer with nearly 10 years of experience in automating, configuring, and deploying cloud infrastructure across AWS, Azure, and GCP. Proven expertise in DevOps automation, CI/CD pipelines, and Infrastructure as Code (IaC) using tools like Terraform, Ansible, Jenkins, GitHub Actions, and ArgoCD. Skilled in Kubernetes orchestration, container security, and cloud-native application deployment, with a strong focus on shift-left security and secure coding practices.

Experienced in designing and implementing multi-cloud solutions, disaster recovery (DR), and high availability (HA) strategies, ensuring robust and scalable infrastructure. Proficient in Python, Shell, and Groovy scripting for automation, monitoring, and operational efficiency. Adept at integrating security scanning tools (e.g., SonarQube, OWASP ZAP, Prisma Cloud) into CI/CD pipelines to ensure secure code releases and compliance with FedRAMP, NIST, and GDPR standards.

Extensive hands-on experience with Azure services such as Resource Groups, Virtual Machines (VMs), Azure Kubernetes Service (AKS), and Azure DevOps Pipelines, as well as GCP services like Compute Engine, Cloud Storage, and GKE. Expertise in Terraform for automating infrastructure provisioning and managing multi-cloud environments, including writing reusable modules and implementing remote state management. Developed Python automation scripts for cloud resource management, log analysis, and CI/CD pipeline optimizations, reducing manual effort by 40%.

Strong background in observability and monitoring with tools like Prometheus, Grafana, Splunk, and OpenTelemetry, enabling real-time performance insights and anomaly detection. Collaborative team player with a track record of streamlining SDLC processes and implementing Agile methodologies to deliver secure, high-quality software solutions.

Overview

10
10
years of professional experience
1
1
Certification

Work History

Cloud DevSecOps Engineer

UPS Mastery
12.2023 - Current
  • Almost 10 years of experience in the IT Industry
  • Around 8 years of experience in automating, configuring, and deploying instances on AWS and Azure Cloud
  • Experience in DevOps Automation using Jenkins, Git, Bitbucket, Ansible, Docker, Kubernetes and Terraform and 6+ years of experience as a system administration in Linux and Windows Servers
  • Automated infrastructure provisioning and updates by integrating GitOps principles with Terraform, Kubernetes, and Helm
  • Managed Kubernetes application deployments using GitOps, enabling declarative and version-controlled configuration management
  • Collaborated with development teams to implement shift-left security, embedding security checks early in the development process to reduce vulnerabilities and costs
  • Designed and enforced secure coding standards and guidelines, ensuring compliance with industry best practices and regulatory requirements
  • Conducted threat modeling and risk assessments during the design phase to identify potential security risks and implement mitigation strategies
  • Streamlined the SDLC by implementing agile methodologies, enabling faster and more efficient delivery of secure software
  • Developed and maintained SDLC documentation, including security policies, procedures, and guidelines, ensuring consistency and knowledge transfer across teams
  • Spearheaded the integration of SAP HANA with SAP BTP, enabling seamless data flow and real-time analytics for enterprise applications
  • Automated SAP system deployments using Terraform and CloudFormation, reducing manual effort and improving deployment accuracy
  • Designed and implemented CI/CD pipelines for SAP applications, leveraging tools like GitHub Actions and ArgoCD to accelerate release cycles
  • Configured and managed web servers (Apache, Nginx) for optimal performance and security, ensuring high availability for SAP-based applications
  • Developed custom scripts (Python, Shell) to automate SAP BTP CLI operations, enhancing operational efficiency and reducing human error
  • Implemented monitoring solutions (Prometheus, Grafana) and SIEM tools (Splunk) to enhance threat detection and incident response capabilities
  • Optimized rollback and recovery processes by leveraging Git as a single source of truth for infrastructure and application states
  • Monitored and mitigated container and workload risks using Prisma Cloud Compute, applying runtime security controls for Kubernetes and serverless environments
  • Automated security compliance checks using Bash scripts, integrating with cloud security tools and audit logs
  • Implemented blue-green and canary deployment strategies within the self-service DevOps platform, enabling seamless rollouts with zero downtime
  • Configured observability and monitoring solutions (Datadog, Splunk, OpenTelemetry) for refactored VB applications to ensure real-time performance insights and anomaly detection
  • Developed and enforced security policies aligned with FedRAMP and NIST guidelines, integrating automated compliance checks within infrastructure pipelines
  • Ensured compliance with FedRAMP security standards by implementing security best practices, access controls, and continuous monitoring
  • Integrated security scanning tools such as 42Crunch and OWASP ZAP to detect vulnerabilities in APIs and enforce compliance
  • Hardened containerized workloads by implementing CIS Docker/Kubernetes benchmarks and enabling image scanning with Prisma Cloud, Twistlock, and Trivy
  • Automated container security scanning within GitOps pipelines, ensuring vulnerabilities and misconfigurations are remediated before deployment
  • Designed and implemented CI/CD pipelines using Harness for automated deployments, rolling updates, blue-green deployments, and canary releases, ensuring zero-downtime deployments
  • Automated disaster recovery (DR) and high availability (HA) configurations using Terraform, Ansible, and AWS Backup to ensure resilience in production environments
  • Developed multi-stage deployment pipelines integrating Jenkins, AWS CodePipeline, and Harness, automating code build, security scanning, and release approvals for seamless application delivery
  • Managed Helm-based Kubernetes deployments in AWS EKS, leveraging Harness for declarative GitOps workflowsto improve reliability and traceability
  • Deep understanding of Kubernetes architecture, including Pods, Deployments, StatefulSets, and ConfigMaps
  • Experience managing OpenShift clusters, configuring Service Accounts, RBAC, Network Policies, and Security Contexts
  • Deployment of microservices using Helm charts, Operators, and OpenShift Templates
  • Strong experience with OpenShift GitOps (ArgoCD), Service Mesh, and Route Management
  • Experience in designing, building, and deploying applications utilizing the AWS services like EC2, S3, ELB, RDS, VPC, Route53, SNS, SQS, SSM, IAM, Security Groups, Cloud Trail, Cloud Front, focusing on high-availability and auto-scaling with Cloud watch
  • Automation scripting using Python, Shell, and Groovy to manage CI/CD pipelines, system monitoring, and orchestration tasks
  • Strong experience in Infrastructure as Code (IaC) automation using Terraform and Ansible
  • Writing and maintaining Terraform modules for provisioning AWS/GCP/Azure infrastructure
  • Implementing Terraform state management, remote backend configuration, and secret management (Vault, SSM, Secrets Manager)
  • Configured and managed AWS Security Groups and Network Access Control Lists (NACLs) to enforce robust security policies
  • Developed scalable, reusable, and modular ARM templates for deploying Azure services such as Virtual Machines, App Services, AKS, Azure SQL, Storage Accounts, and Networking components
  • Implemented Security groups for inbound and outbound access, network ACLs for controlling traffic through subnets, Internet Gateways and Route Tables to direct network traffic and ensure secure zones for organizations in AWS cloud
  • Applied GCP’s security features like IAM, VPC Service Controls, and Cloud Security Command Center to ensure a secure environment and mitigate risks
  • Experience with Terraform to build infrastructure as a code, Utilization of Terraform for automated infrastructure deployments
  • Manage and replicate infrastructure and instance configurations using Terraform and Packer
  • Expertise in Development and Implementation of Continuous Integration (CI) and Continuous Deployment (CD) pipeline involving Jenkins, Ansible, Terraform and Docker containers to complete the automation from commit to deployment
  • Developed Jenkins Files as groovy scripted pipelines to build the Docker images, push them to the Docker registry and perform the rolling deployments on to the Kubernetes Clusters
  • Managed Kubernetes using Helm charts
  • Integrated ARM templates with Azure DevOps Pipelines, enabling automated infrastructure provisioning and CI/CD workflows
  • Worked on all phases of Software Development Life Cycle
  • Well versed with Software development (SDLC) and understanding of the principles and best practices of SCM in Agile, Scrum and Waterfall methodologies
  • Worked with Ansible playbooks for provisioning, configuration management, patching, and software deployment
  • Built and deployed various Ansible playbooks and terraform modules in the dev, QA, pre-prod, and prod environments
  • Installed and configured Zookeeper & Kafka with 3 nodes and connected to Kubernetes deployed application
  • Experience in using the package manager tools like Helm Charts and deployed charts to Kubernetes environments
  • Led the design and implementation of security frameworks using vector.dev for securing Kubernetes and container workloads in AWS EKS, integrating Kafka for real-time data streaming and log aggregation to enhance observability and threat detection across microservices
  • Configured Prometheus and Grafana for Microservices like PODS and Nodes CPU utilizations and Pods deployments and performances
  • Experience in creating dashboards in Grafana by importing data from Prometheus
  • Deploying Open Telemetry across various applications (Java, .NET, Node.js, Python) to enhance system observability
  • Key achievements included auto-instrumentation for capturing vital metrics, traces, and logs, integration with the Open Telemetry Collector, and exporting data to AWS S3 for ingestion into Splunk
  • Extensive experience in AWS Lambda functions in python for AWS's Lambda which invokes python scripts to perform various transformations and analytics on large data sets in EMR clusters
  • AWS Elastic Beanstalk as Platform as a service (PaaS) to manage the AWS cloud environment., Exploring both Azure and AWS Cloud to develop Proof of Concepts (PoCs) for ongoing projects
  • Creating and managing cloud resources using Terraform in AWS and Azure, implementing Infrastructure as Code (IaC) best practices
  • Implemented observability and logging using Prometheus, Grafana, Splunk, and OpenTelemetry, integrating with Harness for deployment insights and rollback strategies
  • Automated SAP system deployments using Terraform and CloudFormation, reducing manual effort and improving deployment accuracy
  • Designed and implemented CI/CD pipelines for SAP applications, leveraging tools like GitHub Actions and ArgoCD to accelerate release cycles
  • Configured and managed web servers (Apache, Nginx) for optimal performance and security, ensuring high availability for SAP-based applications
  • Developed custom scripts (Python, Shell) to automate SAP BTP CLI operations, enhancing operational efficiency and reducing human error
  • Collaborated with security teams to implement vulnerability management processes, ensuring SAP systems adhered to organizational security policies
  • Integrated Static Application Security Testing (SAST) tools (e.g., SonarQube, Checkmarx) into CI/CD pipelines, enabling early detection of code vulnerabilities during development
  • Configured and managed Dynamic Application Security Testing (DAST) tools (e.g., OWASP ZAP, Burp Suite) to identify runtime vulnerabilities in web applications
  • Automated SAST and DAST scans as part of the CI/CD pipeline, ensuring continuous security testing and reducing manual effort
  • Conducted vulnerability assessments using SAST/DAST tools, prioritizing and remediating critical issues to enhance application security
  • Automated the re-architecture process by integrating Terraform, Helm, and Kubernetes Operators, ensuring seamless deployment and orchestration in AWS/Azure
  • Managed source code repositories and enforced branching strategies using GitHub, ensuring seamless collaboration and version control
  • Optimized GitHub repositories by implementing commit message conventions, pull request reviews, and automated release tagging
  • Optimized CI/CD pipelines by integrating JFrog Artifactory with Jenkins, GitHub Actions, and Terraform for automated package management
  • Enforced security and compliance by implementing artifact scanning and vulnerability assessments using JFrog Xray
  • Integrated runtime security monitoring using tools like Falco and Aqua Security to detect malicious activity in Kubernetes and containerized environments
  • Developed and enforced security policies aligned with FedRAMP and NIST guidelines, integrating automated compliance checks within infrastructure pipelines
  • Optimized database migration from on-premises SQL Server/Oracle to cloud-managed databases such as Amazon RDS, Azure SQL MI, and MongoDB Atlas
  • Designed and implemented CI/CD pipelines using Harness, enabling automated build, test, and deployment workflows with blue-green, canary, and rolling updates across multiple environments
  • Integrated Harness with Terraform, AWS CloudFormation, and Ansible to automate infrastructure provisioning, reducing deployment time
  • Integrated security scanning tools (SonarQube, OWASP ZAP, 42Crunch) into Harness CI/CD pipelines, ensuring secure code releases with automated vulnerability assessments
  • Managed end-to-end CI/CD automation using Harness, integrating with AWS services like ECS, EKS, Lambda, and S3 for seamless deployments
  • Integrated HashiCorp Vault and AWS Secrets Manager with Harness pipelines for secure credential management in deployments
  • Automated AMI Rehydration processes in Harness, reducing security vulnerabilities by ensuring instances were frequently updated with the latest patches
  • Worked closely with frontend (Angular) and backend (Spring Boot, GraphQL) teams to streamline deployments, troubleshoot issues, and optimize overall performance
  • Supporting production environments by managing containerized applications using Docker, Kubernetes (EKS, AKS, OpenShift), and deploying microservices using Helm charts and ArgoCD
  • Migrating resources from AWS to Azure, leveraging AWS DMS, Storage Gateway, and S3 for seamless data transfer
  • Experience with Azure Resource Manager (ARM) templates, Azure Kubernetes Service (AKS), AWS Elastic Kubernetes Service (EKS), and Terraform modules for infrastructure automation
  • Strong expertise in CI/CD automation using Jenkins, Azure DevOps, GitOps (ArgoCD), and Ansible
  • Configured Prometheus, Grafana, Splunk, Open Telemetry for monitoring cloud resources and microservices
  • Implemented DevSecOps practices, security scanning (DAST, 42Crunch), IAM roles, Security Groups, and vector.dev for securing Kubernetes workloads
  • Writing and maintaining Terraform modules, ARM templates, and automating VPC deployments, security configurations, and DR/HA strategies
  • Enforcing RBAC, IAM policies, security groups, NACLs, WAF, and DevSecOps best practices
  • Integrated vector.dev for Kubernetes security and Kafka for real-time security monitoring
  • Implemented Jenkins, Azure DevOps Pipelines, AWS CodePipeline, and Ansible for automated container deployments and serverless workflows (AWS Fargate, Lambda)
  • Managed MongoDB, Postgres, SQL MI, and AWS-GCP hybrid cloud solutions using VPN, Interconnect, and Direct Connect
  • Deployed application which is containerized using Docker onto a Kubernetes cluster which is managed by Amazon Elastic Container Service for Kubernetes (EKS)
  • Created automated pipelines in AWS Code Pipeline to deploy Docker containers in AWS ECS using services like CloudFormation, CodeBuild, Code Deploy and S3
  • Automated VPC deployments and configuration management using Infrastructure as Code (IaC) tools like Terraform, AWS CloudFormation, and Ansible
  • Used AWS Fargate, built a serverless compute engine and provisioned ECS task definition, stored the repositories in ECR and worked on managing containers using Amazon Elastic Kubernetes Service (EKS)
  • Integrated security scans and testing into CI/CD pipelines using tools like SonarQube and OWASP ZAP, ensuring compliance and minimizing vulnerabilities in Angular, Spring Boot, and GraphQL codebases
  • Experience in deploying the Kubernetes environment on the AWS and managed the rolling deployments of the patched docker images on to the cluster by tweaking the Pod definition
  • Provisioned AWS S3 buckets and configured Life cycle policies for backup of the application and sync this content with remaining S3 backups
  • Implemented Security groups for inbound and outbound access, network ACLs for controlling traffic through subnets, Internet Gateways, NAT instances and Route Tables to direct network traffic and ensure secure zones for orgs in AWS
  • Configured Vector to collect logs and metrics from OpenShift containers, nodes, and applications for enhanced observability and monitoring
  • Analyze Splunk logs to identify user patterns, potential security breaches, or areas where automation can optimize the process
  • This can help improve the automation of processes like IAM policies or API Gateway security settings
  • Defined and enforced container security policies using vector.dev and container orchestration tools such as Kubernetes and EKS, ensuring adherence to industry best practices across cloud environments like AWS and Azure
  • Integrated Kafka for continuous log aggregation and incident response workflows
  • Implemented end-to-end security measures for cloud-native workloads deployed in AWS, using vector.dev for Kubernetes and container security alongside Kafka to provide observability and security telemetry, enabling faster detection and remediation of security incidents
  • Led the design and implementation of hybrid cloud solutions, connecting on-premises resources with AWS and GCP using VPN, Interconnect, and Direct Connect for seamless data transfer
  • Utilized Terraform and Deployment Manager for GCP to automate infrastructure provisioning and enforce best practices across environments
  • Ensured seamless integration of Vector with existing monitoring and alerting tools in OpenShift, such as Prometheus and Grafana
  • Ensure all AWS services generate detailed logs and push them to Splunk via AWS CloudWatch Logs, VPC Flow Logs, or AWS Lambda
  • Map user requirements like compliance tracking and troubleshooting capabilities to the log data.

DevSecOps Engineer

JPMC
10.2022 - 11.2023
  • Designed, Created, and configured AWS Services, Including EC2, S3, ELB, ECR, ECS, Auto Scaling, RDS, VPC, Route53, Cloud Watch, Lambda, Snapshots and IAM
  • Worked with AWS service Virtual private cloud (VPC) for provisioning a secure infrastructure by configuring private and public subnets, Internet gateway, route tables, NACL (network access control list) and security groups
  • Utilized AWS Data Migration Service (DMS), AWS Storage Gateway, and S3 for efficient data migration, minimizing data transfer time and ensuring data integrity across large datasets
  • Led Azure migration and transformation projects, converting manual resource deployments to Infrastructure as Code (IaC) using ARM templates
  • Automated disaster recovery (DR) and high availability (HA) configurations using ARM templates for mission-critical applications
  • Managed role-based access control (RBAC) and Azure AD integrations within ARM template deployments to enforce security policies
  • Integrated ARM templates with Azure Monitor, Log Analytics, and Application Insights for real-time monitoring and logging
  • Troubleshot and resolved Azure deployment failures and template validation issues to ensure successful infrastructure rollouts
  • Implemented Security groups for inbound and outbound access, network ACLs for controlling traffic through subnets, Internet Gateways, NAT instances and Route Tables to direct network traffic and ensure secure zones for orgs in AWS
  • Spearheaded the integration and configuration of PEGA PRPC with continuous integration/continuous deployment (CI/CD) pipelines to automate application deployment and updates
  • Collaborated with development teams to triage and resolve findings from SAST/DAST scans, ensuring timely remediation of vulnerabilities
  • Implemented Infrastructure as Code (IaC) scanning tools (e.g., Prisma Cloud, Terrascan) to identify misconfigurations and security risks in cloud infrastructure
  • Developed custom scripts to automate SAST/DAST tool integration and reporting, improving efficiency and reducing time-to-resolution for security issues
  • Monitored and analyzed SAST/DAST scan results, providing actionable insights to development and security teams for continuous improvement
  • Created various Terraform scripts to deploy Kubernetes, Dev, QA, and Pre-prod environments in AWS Cloud
  • Manage and replicate infrastructure and instance configurations using Terraform and Packer
  • Utilized Cloud Watch to monitor the Events and Used SNS Service to send alert notifications via emails that provides full environment monitoring solutions
  • Created Lambda job to add the CloudWatch log group to ELK with Subscription filter
  • Redesigned Python Installation Qualification (IQ) script to automate post deployment validation to check desired and deployed versions of AWS resources and pods and posting results to S3 bucket based on the environment
  • Deployed application which is containerized using Docker onto a Kubernetes cluster which is managed by Amazon Elastic Container Service for Kubernetes (EKS)
  • Created automated pipelines in AWS Code Pipeline to deploy Docker containers in AWS ECS using services like CloudFormation, CodeBuild, Code Deploy and S3
  • Automated VPC deployments and configuration management using Infrastructure as Code (IaC) tools like Terraform, AWS CloudFormation, and Ansible
  • Used AWS Fargate, built a serverless compute engine and provisioned ECS task definition, stored the repositories in ECR and worked on managing containers using Amazon Elastic Kubernetes Service (EKS)
  • Integrated security scans and testing into CI/CD pipelines using tools like SonarQube and OWASP ZAP, ensuring compliance and minimizing vulnerabilities in Angular, Spring Boot, and GraphQL codebases
  • Experience in deploying the Kubernetes environment on the AWS and managed the rolling deployments of the patched docker images on to the cluster by tweaking the Pod definition
  • Provisioned AWS S3 buckets and configured Life cycle policies for backup of the application and sync this content with remaining S3 backups
  • Configured Vector to collect logs and metrics from OpenShift containers, nodes, and applications for enhanced observability and monitoring
  • Analyze Splunk logs to identify user patterns, potential security breaches, or areas where automation can optimize the process
  • This can help improve the automation of processes like IAM policies or API Gateway security settings
  • Defined and enforced container security policies using vector.dev and container orchestration tools such as Kubernetes and EKS, ensuring adherence to industry best practices across cloud environments like AWS and Azure
  • Integrated Kafka for continuous log aggregation and incident response workflows
  • Implemented end-to-end security measures for cloud-native workloads deployed in AWS, using vector.dev for Kubernetes and container security alongside Kafka to provide observability and security telemetry, enabling faster detection and remediation of security incidents
  • Ensure all AWS services generate detailed logs and push them to Splunk via AWS CloudWatch Logs, VPC Flow Logs, or AWS Lambda
  • Map user requirements like compliance tracking and troubleshooting capabilities to the log data
  • Integrated WAF solutions with CI/CD pipelines to enable automated security testing and compliance checks during the development lifecycle
  • Maintained thorough documentation and version control for CloudFormation templates in GitLab, facilitating smooth updates and management of observability infrastructures
  • Enforced database security best practices by managing encryption-at-rest and in-transit, setting up role-based access control (RBAC), and ensuring MongoDB, Postgres, and SQL MI deployments adhered to security policies like GDPR and HIPAA.

DevOps / Build Engineer

CTRLS Data Centers
04.2020 - 07.2022
  • Worked on AWS Cloud platform and its features which includes EC2, VPC, S3, AMI, SNS, RDS, Cloud Watch, Auto scaling, Cloud Front, IAM, S3 for Configuring and managing IaaS
  • Wrote CloudFormation scripts to deploy different AWS Infrastructure components related to the respective services, managed various resources and data elements defined in the scripts
  • Designed AWS CloudFormation templates (CFT) to create custom sized VPC, subnets, NAT to ensure successful deployment of Web applications and database templates in AWS Cloud
  • Provisioned Azure of Cloud Services (PaaS & IaaS), Storage, Web Apps, Active Directory, Application Insights, and Logic Apps on Microsoft Azure classic and Azure resource manager(ARM Templates)
  • Used version control system GIT, which includes Git branching strategy like developing branches, staging branches, master, push, pull requests and code reviews are performed
  • Implemented Security groups for inbound/outbound, network ACLs for controlling traffic through subnets, Internet Gateways, NAT instances and Route Tables to direct the network traffic and to ensure secure zones for organizations in Azure and AWS
  • Responsible for creating Kubernetes clusters in AWS environments using Terraform
  • Implement process and quality improvements through task automation
  • Instituted infrastructure as code(terraform), security automation and automation of routine maintenance tasks
  • Expertise in building application CI/CD pipelines using Jenkins for continuous integration and deployment to Cloud platform
  • Creating and maintaining Docker images in ECR for managing the application lifecycle in dev, QA, prod environment as well as deployment in ECS
  • Maintain, troubleshoot, and deploy cloud security tools & technologies such as Secrets Manager and strong expertise in Amazon Web Services (AWS)
  • Developed Shell, Python Scripts to automate daily, weekly builds primarily using Maven & Ant for some legacy projects
  • Developed Python scripts for testing the car functioning on different services
  • Installed Docker Registry for local upload and download of Docker images and even from Docker hub
  • Worked on the Docker ecosystem with a bunch of open-source tools like Docker machine, Docker Compose, Docker Swarm
  • Used Zabbix as monitoring tool and used Zabbix plugin for Grafana for analysis & visualization.

Cloud Middleware Engineer

Cloud4C Services
08.2018 - 03.2020
  • SSL certificate generation and configuration
  • SMTP relay configuration sends email notifications from the application
  • Automated with PowerShell script to sync display images from Azure AD to on-prem SharePoint application
  • Application Deployment to all environments (Demo, Dev, Staging, Pre-Production and Production)
  • Worked in the process of hosting/deploying the entire application into Microsoft Azure Cloud.

Linux System Administrator

Motivity Labs Inc
05.2015 - 07.2018
  • Responsible for the build and deployment of Java applications in different environments like Dev/QA & Production
  • Installed and configured Jenkins on a Linux machine, implementing a master and slave configuration to facilitate multiple parallel builds through a build farm
  • Executed application installation and troubleshooting for Solaris, Red Hat Linux, and CentOS
  • Designed, administered, and troubleshooted database servers like MySQL 5.7, MySQL 5.6, MySQL 5.5
  • Designed and implemented efficient SCM processes and procedures while ensuring regular patching of Linux servers
  • Implemented a scalable Master-Slave architecture in Jenkins to optimize performance and enable efficient distributed builds
  • Leveraged OpenStack and AWS cloud services to launch Linux and Windows instances, while
  • Implementing security groups and developing PowerShell scripts for backups and network shared drives
  • Responsible for user access and permissions for AWS services and resources using IAM roles, groups, and policies
  • Provided 24x7 on-call supports in debugging and fixing issues related to Linux, Solaris, HP-U Installation/Maintenance of Hardware/Software in Production, Development & Test Environment as an integral part of the Unix/Linux (RHEL/SUSE/SOLARIS/HP-UX/AIX) Support team
  • Experience managing various file systems using LVM and SVM and configured file systems through network using NFS, NAS, SAN methodologies and installed RAID devices
  • Resolving TCP/IP network access problems for the clients
  • Develop, Maintain, update various scripts for services (start, stop, restart, recycle, Cron jobs) UNIX based shell
  • Diagnosed and resolved problems associated with DNS, DHCP, VPN, NFS, and Apache
  • Windows Server installation, configuration, and monitoring
  • Installation and configuration of Active Directory and DNS
  • User administration like adding/deleting users and managing user’s queries and providing required access permissions
  • Transferring websites from old host to webhosting pad servers
  • Troubleshoot mail client issues
  • Installing form mail scripts for customer’s site
  • Backup and restore MySQL databases with phpMyAdmin tool from WHM cPanel
  • Installed, configured, and troubleshooted various applications
  • Configured and Administrated IIS, FTP sites
  • SSL certificate generation and configuration and Creating A, CNAME, MX, SPF Records in Domain DNS.

Education

Master of computer science (MSCS) -

Campbellsville University
12.2023

Bachelor of computers (B.com(computers)) -

Palamuru University
12.2015

Skills

  • AWS
  • OpenStack
  • MS Azure
  • Rackspace
  • GCP
  • VMware vSphere
  • VMware Workstation
  • GitLab
  • OpenShift
  • Docker
  • Kubernetes
  • Ansible
  • Puppet
  • Chef
  • Vagrant
  • Terraform
  • EKS
  • AKS
  • Cloud Formation
  • Jenkins
  • Azure DevOps
  • Argo CD
  • AWS code build
  • AWS code commit
  • AWS code pipeline
  • AWS code deploy
  • GitLab Pipelines
  • GitHub Actions
  • ANT
  • MAVEN
  • Gradle
  • Npm
  • Node
  • Pip
  • Yum
  • Anaconda
  • Ruby Gems
  • Build Forge
  • Git
  • GitHub
  • Bitbucket
  • Gitlab
  • JIRA
  • Rally
  • Nexus
  • Remedy
  • Python
  • Bash
  • Shell
  • PowerShell
  • SonarQube
  • Black duck
  • Twist lock
  • Sysdig
  • Veracode
  • Checkmarx
  • OWASP
  • Terrascan
  • Jfrog
  • Docker Hub
  • Quay
  • Apache
  • Nginx
  • JBOSS
  • Apache Tomcat
  • WebSphere
  • WebLogic
  • DynamoDB
  • MongoDB
  • DB2
  • Cassandra
  • Redis
  • Oracle
  • SQL Server
  • MySQL
  • Windows
  • Linux
  • Unix
  • Solaris
  • RHEL
  • Centos
  • Ubuntu
  • SUSE
  • LDAP
  • DNS
  • NIS
  • DHCP
  • NFS
  • Web
  • Mail
  • FTP
  • Open Telemetry
  • New Relic
  • AppDynamics
  • Dynatrace
  • Splunk
  • Grafana
  • Prometheus
  • Datadog
  • ELK
  • Pager duty
  • Slack
  • MS Teams
  • Yarn
  • HDFS
  • Hive
  • Kafka
  • Zookeeper
  • Hbase
  • WAF
  • DDos protection plans
  • SASE
  • Engineering documentation
  • Root-cause analysis
  • System troubleshooting
  • Technical writing
  • Software development
  • Programming languages
  • Process development
  • Machine learning
  • Data management
  • Big data analysis
  • Multitasking

Certification

  • Red Hat System Administration
  • AWS Certified SysOps Administrator – Associate
  • Microsoft Certified Azure Administrator

Timeline

Cloud DevSecOps Engineer

UPS Mastery
12.2023 - Current

DevSecOps Engineer

JPMC
10.2022 - 11.2023

DevOps / Build Engineer

CTRLS Data Centers
04.2020 - 07.2022

Cloud Middleware Engineer

Cloud4C Services
08.2018 - 03.2020

Linux System Administrator

Motivity Labs Inc
05.2015 - 07.2018

Bachelor of computers (B.com(computers)) -

Palamuru University

Master of computer science (MSCS) -

Campbellsville University
Anil Reddy Gali