Summary
Overview
Work History
Skills
Timeline
Generic

N Nm

Ohio,OH

Summary

Overall 7+ years of hands-on experience as a cloud DevOps, supporting, automating, and optimizing mission critical deployments in AWS, Azure leveraging configuration management, Application support, CI/CD, Monitoring and DevOps processes.

Overview

8
8
years of professional experience

Work History

DevOps Engineer

Pluto Tv
09.2021 - Current
  • Involved in designing and deploying a multitude of applications utilizing AWS stack (including IAM, VPC, EC2, EBS, ECS, EKS, RDS, S3, API Gateway, Lambda, NLB, Auto Scaling, Route53, CloudFront, Elastic Cache, SQS and SNS) focusing on high availability, fault tolerance and autoscaling using IaC
  • Provide high durability of the available data using data storage in the AWS S3 bucket, versioning S3, lifecycle policies
  • Also, webhosting the data from the S3 bucket by creating URL's
  • And also maintaining complex s3 bucket policies and applied using those by terraform
  • Configured Route 53 to achieve high availability, scalability by using Cloud Formation Templates, assigned DNS mapping for AWS servers, troubleshoot issues of Load Balancers, auto scaling groups and Route 53
  • Created custom JSON policies for User Accounts, Groups, access Permissions and Privileges to the users and services using IAM and automated the deployments of these policy to Aws using GitHub actions
  • Converted Circle CI files to GitHub actions and set up the continuous integration and continuous deployment with GitHub actions using self-hosted runners
  • Documented the deployment process (Migration Doc) of code to production
  • Created and designed reusable Terraform templates to create custom sized Resource groups, Kubernetes cluster, Container, Istio, Istiod
  • Used reusable Terraform modules to build staging, dev, nonprod, preprod, and production environments and used Hashicorp vault to store the secrets, used terraform workspace to work on multiple environments
  • Built Docker images for microservice based applications and setup the Amazon ECR with Docker, actively involved in deployments on Docker using Kubernetes
  • Also responsible for development of Test environment using Docker containers and configuring them using Kubernetes
  • Used Kubernetes charts using Helm and created reproducible builds of the Kubernetes applications, managed Kubernetes manifest files and managed releases of Helm packages
  • Configured the readiness probe, liveliness probe and pod auto-scaling by adding the health checks to pods in handling the failures of the cluster by effectively managing the traffic and balancing the load as part of the project deployment setup
  • Worked on managing Kubernetes containerized applications using config Maps, nodes, selector services, worked on Istio Service mesh to secure services in the Kubernetes cluster and establish communication between microservices
  • Managed the services, resources for the users and managed permissions for allowing and denying the services using IAM roles and assigned individual policies to each group
  • Implemented integration between Kubernetes and Hashi Corp Vault to dynamically inject configurations for each service using init containers, configuration sidecars, and shared persistent volumes between app and config containers
  • Created multiple re-usable Terraform modules to deploy an application AWS service in multiple environments & multi region as part of automation
  • Used Hashicorp Vault to store secrets related to Database and app services and used them as part of infrastructure as code to communicate with resources
  • Extensive experience in deploying, managing, and developing MongoDB clusters
  • Experience in creating Python Script for using DML operation with MongoDB
  • Created a fully automated build & deploy platform and coordinating code build promotions and orchestrated deployments using GitHub and harness
  • Also worked on creating shell scripts for canary and full deployment through harness
  • Created Datadog dashboards for various applications and monitored real time and historical metrics and supported various load tests

DevOps/Cloud Engineer

Beachbody
01.2020 - 08.2021
  • Involved in designing and deploying multiple applications utilizing the AWS stack (including IAM, VPC, EC2, EBS, RDS, S3, Glacier, Lambda, ELB, Auto Scaling, Route53, CloudFront, CloudWatch, CloudTrail, SQS and SNS) focusing on high availability, fault tolerance and autoscaling in AWS cloud formation
  • Responsible for designing the Architecture and creating VPC (Virtual private cloud), Security groups, NACLs, and route tables in AWS private and public networks, as well as ELB (Elastic load balancers), and auto scaling for high availability
  • Working on implementing a Serverless architecture using API Gateway, Lambda and Dynamo DB and deployed AWS Lambda code from Amazon S3 buckets
  • Created a Lambda Deployment function and configured it to receive events from S3 bucket
  • Designed and converted existing AWS infrastructure to serverless architecture deployed via terraform and used those templates for modules to support other teams for flexibility to deploy their application into AWS cloud
  • Managed the services, resources for the users and managed permissions for allowing and denying the services using IAM roles and assigned individual policies to each group
  • Worked on migrating On-premises applications and data onto AWS Cloud, by leveraging the usage of different services available in AWS like AWS Direct Connect, S3 Transfer Acceleration, AWS Snowball Edge, Server migration service and Data Base migration service with live migration of applications implementing Hybrid Migration Strategy
  • Created an AWS elastic beanstalk with company guardrails (IAM Permissions) for developers to push their code and build there infra from scratch
  • Engage in long - term planning of development and solutions lifecycle transition strategy to microservices architecture pattern incorporating CI/CD, Atomic, JSON/REST and simple authentication delivering bottoms-up, simple and modular solutions to complex business requirements and LOB challenges
  • Worked on Blue/green deployment strategy by creating new applications which are identical to the existing production environment using CloudFormation templates & Route53 weighted record sets to redirect traffic from the old version to the new version via DNS
  • Created AWS infrastructure as a code template using Terraform for automation of applications, created multiple staging environments like dev, test, acceptance and production
  • Created multiple re-usable Terraform modules to deploy an application AWS service in multiple environments as part of automation
  • Designed, developed and deployed applications on to several cloud-based solutions using configuration Management tools like Chef, Puppet, Ansible and Salt Stack
  • Experience in using configuration management tools like Puppet/Ansible/ Chef and knowledge on Salt Stack
  • Built Docker images for microservice based applications and setup the Azure Container Registry with Docker, actively involved in deployments on Docker using Kubernetes
  • Also responsible for development of Test environment using Docker containers and configuring them using Kubernetes

DevOps Engineer

Comcast
Va
05.2018 - 12.2019
  • Managed Azure Infrastructure Azure Web Roles, Worker Roles, VM Role, Azure SQL, Azure Storage, Azure AD Licenses, Virtual Machine Backup and Recover from a Recovery Services Vault using Azure PowerShell and Azure Portal
  • Worked as a Cloud Administrator on Microsoft Azure, involved in migrating on-premises applications to Azure Cloud using Azure app services, configuring storage account, resource groups and virtual machines
  • Remotely login to Virtual Machines to troubleshoot, monitor and deploy applications
  • Used Azure Kubernetes services (AKS) to provide a platform for automating deployment, scaling and operations of application containers across clusters of hosts
  • Implemented idea of secret management for micro services and created service and ingress rules for each micro service
  • Worked on setting up the Kubernetes sandbox on Azure Kubernetes Services (AKS) for testing the different features
  • Data was migrated from on-premises SQL Database servers to Azure SQL Database servers, by using the Azure Data Factory copy tool and Self-Hosted Runtimes
  • Created secure VNets and subnets for Azure IaaS virtual machines (VMs) and Cloud services (PaaS role instances)
  • Setup bindings, SSL certificates, configurations (web.config/app.config) on IIS Servers and configured featured as per application requirements
  • Worked on Classless Inter-Domain Routing (CIDR) for allocating IP addresses and IP routing for the Subnets & VM’s
  • Worked with Terraform key features such as infrastructure as code, Execution plans, Resource Graphs, Change Automation
  • Experienced in using Terraform and ansible, migrate legacy and monolithic systems to Azure and managing ubuntu and RHEL virtual servers on Azure by creating Ansible nodes
  • Created Docker environments and maintain containerized systems by establishing docker files micro service-oriented environments, as well as host images in a private container registry on Microsoft Azure
  • Worked with Ansible to automate Kubernetes clusters, while YAML scripting was used to write playbooks
  • To automate tedious activities, patching, and software deployment, I used Ansible and Ansible Tower as configuration management tool
  • Extensively worked with Scheduling, deploying, managing container replicas onto a node using Kubernetes and experienced in creating Kubernetes clusters work with Helm charts running on the same cluster resources
  • Ansible Playbooks were created using Ansible roles, created inventory to automate the continuous deployment
  • Servers were configured, software was installed, and continuous deployments or zero-downtime rolling upgrades were organized
  • On Unix and Linux systems, I have done System Administration, Configuration, Upgrades, Patches, Troubleshooting, Security, Backup, Disaster Recovery, Performance Monitoring, and Fine-tuning
  • Worked with some of the bug tracking tools like JIRA, Bugzilla, ServiceNow, Clear Quest, and Quality

AWS DevOps Engineer

Persistent Systems
12.2016 - 05.2018
  • Company Overview: Ohio
  • Designing, deploying, and maintaining the application servers on AWS infrastructure, using services like EC2, S3, Glacier, VPC, Lambda, Route53, SQS, IAM, Code Deploy, CloudFront, RDS, and CloudFormation etc
  • Created S3 buckets for storing log applications and wrote bucket policies for lifecycle management to delete old logs and to archive logs based on the retention policies of application
  • Designed and converted existing AWS infrastructure to ‘Server-less’ architecture deployed via Terraform which includes AWS Elastic Beanstalk for app deployments
  • Worked on AWS Lambda with Amazon Kinesis and integrated Dynamo DB using Lambda for value storage and for streams backup
  • Used AWS Cloud watch for monitoring and alerting of Production instances
  • Worked with AWS Cloud Formation to create and manage IT infrastructure and application stacks, as well as writing the template file in JSON/YAML
  • Converted existing Terraform modules that had version conflicts to utilize cloud formation during Terraform deployments to enable more control on missing capabilities
  • Performed automation tasks on various Docker components like Docker Engine, Docker Machine, and Docker Registry
  • Custom modules and manifests were written, while pre-written modules were downloaded via puppet-forge
  • Upgrading or migration of the puppet community and enterprise
  • Continuous Delivery is being enabled through Deployment into several environments of Deployment, QA, Staging, and production using Jenkins files
  • Wrote Groovy scripts for Jenkins to execute jobs for a CI pipeline where Groovy Jenkins Plugin and Groovy Post Build Action Plugin is used as a build step and post build actions
  • Wrote Bash and python Scripts to include Boto3 which is provided by Ansible and Terraform for tasks such as encrypting EBS volumes backing AMI’s and scheduling Lambda for routine AWS tasks
  • Automated Nagios services for database server, webserver, application-server, networks, file sizes, RAM utilization, Disk performances using Python script in Chef
  • Created various branches for each purpose, merged from development to release branch, created tags for releases
  • Integrated Puppet with Apache Tomcat and developed load testing and monitoring suites in Python
  • Custom modules and manifests were written, while pre-written modules were downloaded via puppet-forge
  • Upgrading or migration of the puppet community and enterprise
  • Generated reports on different bugs & tickets using Rally/Bug tracking, created & solved blocked/unassigned tickets
  • Worked on version control tools GIT and bitbucket for cloning, mirroring, and pushing the changes, created web-hook in bitbucket for Jenkins
  • Ohio

Skills

  • Linux
  • Red Hat
  • CENTOS
  • SUSE
  • Ubuntu
  • DEBAIN
  • HP-UX
  • Windows
  • MacOS
  • Circle CI
  • Jenkins
  • GitHub Actions
  • Gitlab
  • Harness
  • ANT
  • MAVEN
  • Gradle
  • Amazon Web Services
  • AWS
  • Azure
  • Terraform
  • Cloud Formation
  • Docker
  • Kubernetes
  • OpenShift
  • Docker swarm
  • Apache Mesos
  • GIT
  • Bitbucket
  • GitLab
  • Python
  • Ruby
  • Perl
  • Groovy
  • Shell Scripting
  • Power Shell Scripting
  • Jira
  • ServiceNow
  • Rally
  • HTML
  • CSS
  • Java Script
  • D3js
  • Bootstrap
  • Nagios
  • AWS Cloud Watch
  • Splunk
  • Data Dog
  • ELK
  • Tomcat
  • JBOSS
  • Apache
  • IIS
  • WebSphere
  • WebLogic
  • FTP
  • TCP/IP
  • HTTP
  • POP
  • UDP
  • SMTP

Timeline

DevOps Engineer

Pluto Tv
09.2021 - Current

DevOps/Cloud Engineer

Beachbody
01.2020 - 08.2021

DevOps Engineer

Comcast
05.2018 - 12.2019

AWS DevOps Engineer

Persistent Systems
12.2016 - 05.2018
N Nm