Summary
Overview
Work History
Skills
Languages
Citizenship
Timeline
Generic

Robert Strilkivsky

Jacksonville,FL

Summary

Experienced DevOps Engineer with a background in automating software deployments, infrastructure management and Integrating security measures. Proficient in leveraging various DevOps tools and technologies to streamline workflows, optimize system performance, and ensure continuous integration and delivery. Skilled in implementing cloud-based solutions, version control systems, and CI/CD pipelines to drive efficiency and enhance collaboration. A proactive problem-solver with a focus on enhancing scalability, security, and reliability in IT environments.

Overview

9
9
years of professional experience

Work History

DevSecOps Cloud Engineer

PNC Bank
Pittsburgh, PA
01.2019 - Current

CI/CD Pipelines:

  • Created and maintained pipelines to automate resource provisioning and configuration, as well as to validate code changes, including new commits, merge requests, and pull requests.
  • Implemented secret detection scan to identify potential secret leaks, such as application tokens in source code and files.
  • Implemented Unit-tests in pipelines to ensure that new changes don't introduce bugs.
  • Implemented SonarQube scan to continuously inspect the code, detect bugs, code smells and vulnerabilities, allowing developers to address issues earlier in the development cycle.
  • Migrated pipeline build and deploy jobs from Jenkins to GitLab.
  • Integrated Python scripts into Jenkins and Gitlab pipelines to validate infrastructure-as-code configurations before deployment.
  • Automated application deployment triggers using Python scripts within GitLab pipelines, integrating with AWS APIs to update ECS services and Lambda functions.

Git(Version Control) for:

  • Managing code repositories, tracking changes, collaborate with development teams, and maintain a history of code modifications.
  • Tasks like branching, merging, and resolving conflicts enable parallel development and seamless collaboration among team members.

Leveraged GitLab to:

  • Store and manage repositories.
  • Utilize pull request feature to review and discuss code changes before merging them into the main codebase, ensuring code quality and managing team feedback.
  • Implement GitLab CI/CD tools to automate code testing, builds, and deployments, streamlining the software development lifecycle.
  • Integrate GitLab with other DevOps tools and services, such as Jenkins, Docker, JFrog, SecretScans, unit tests, and SonarScans, to create smooth workflows for continuous integration and delivery, guaranteeing fast and reliable software releases.

Leveraged Docker to:

  • Create lightweight, isolated containers for applications, streamlining the deployment process, and eliminating compatibility issues between different environments.
  • Develop and test stages to ensure consistency across the development lifecycle.

Utilized OpenShift.

  • To developed, deploy, and manage containerized applications on OpenShift.
  • For integrated GitLab CI/CD with OpenShift to automate build, test, and deployment workflows.
  • For creating and maintaining OpenShift ImageStreams to enable automated application rollouts with the latest container images.

Testing/Troubleshooting/Twistlock:

  • Configured Twistlock for GitLab to scan Docker images for vulnerabilities, fail builds if high-severity issues are found and enforce compliance policies before pushing to a registry.
  • Remediated all Go, Maven, Ruby and cpp node image vulnerabilities that would arise during Twistlock image/container scans.
  • Maintained and troubleshot Go/Java micro-services/applications, and Node image vulnerabilities and issue.
  • Tested and implemented new functions and features for Go/Java build jobs in CI/CD pipelines.
  • Performed Twistlock scans, smoke tests, and Regression/cucumber tests to ensure all images, updates, and code changes are valid and function properly, without errors or vulnerabilities.
  • Performed ad-hoc SQL queries in production environments to troubleshoot application issues, verify data integrity, and support incident resolution.
  • Automated execution of SQL queries for database health checks, slow query analysis, and performance tuning, integrating results into Grafana and PagerDuty alerts.

Grafana:

  • Migrated from DataDog monitoring to Grafana, ensuring a seamless transition of monitoring capabilities.
  • Designed and implemented comprehensive dashboards and panels for monitoring. Implemented labels and tags to organize and filter metrics and logs, improving monitoring and troubleshooting.
  • Setup alerts to ensure notifications for critical events.
  • Interacted with charts, graphs, logs & traces to help analyze data and spot issues in logs and events.

Pagerduty/On-Call:

  • Responded to on-call alerts and resolved critical issues, minimizing downtime.
  • Monitored and maintained the production environment using PagerDuty, Datadog, and AWS resources, ensuring high availability and quick incident response times.
  • Wrote documentation of incident responses and standard operating procedures for faster resolution and knowledge sharing.

Utilized Ansible to:

  • Automate configuration management and application deployment, streamlining software installations and updates.
  • Create playbooks, orchestrate workflows, and coordinate tasks and dependencies during application deployment and server configuration.
  • Automate CI/CD pipelines from one-click deployment of GitHub, and automated build configuration with the use of Git, Ansible, and homegrown shell scripts.
  • Develop GitHub Pipelines for multi-branch builds.
  • Collaborate with teams to integrate Ansible with cloud platforms, enabling efficient management of cloud resources and infrastructure.

Leveraged Terraform to:

  • Build, scale, provision, and manage infrastructure as code.
  • Deploy cloud infrastructure and configuration using Terraform resources and modules.
  • Provision and manage various cloud resources, like virtual machines, networks, and storage, streamlining deployment processes and reducing manual errors.
  • Secure infrastructure deployments by utilizing home-spun Terraform modules and templates.
  • Automate deployments to Amazon ECS through Terraform modules.

Applied AWS to:

  • Monitor application performance, trigger automatic actions, and optimize resource usage for efficient and reliable operations.
  • Provision and manage scalable infrastructure, including virtual servers, storage, and networking components.
  • Launch and manage EC2 instances, configure network and security, EBS, load balancing, auto-scaling groups, and oversee scalability while monitoring the health of various projects.
  • Leverage IAM, controlling user permissions, securely managing access to resources, and enforcing least privilege principles within our work environment, maintaining data protection and compliance.
  • Create S3s for data storage, backup and recovery, backend storage for applications, content distribution, and storing other files for teams/users to access.
  • Create and work with AWS services, including IAM policies, roles, and tokens, to maintain secure access controls across different applications.
  • Manage AWS services such as EC2, S3, VPC, Lambda, Step Functions, SNS, ECS, EKS, ALB, Auto-Scaling, RDS, and DynamoDB.

Utilized Kubernetes to:

  • Manage containerized applications in a dynamic work environment.
  • Create YAML templates for Deployments and StatefulSets, allowing scaling and management using pods, ensuring high availability, and good use of resources.
  • Auto-scale capabilities automatically adjust the number of containers based on workload demands, improving performance.

Applied Unix/Linux to:

  • Manage storage and disk using Logical Volume Manager in Red Hat Linux.
  • Manage system security services such as IPTABLES, FIREWALL D, and SELinux.
  • Troubleshoot and resolve Linux-related network issues.
  • Analyze and debug configuration management and Linux OS.
  • Upgrade packages on Linux and patched systems to maintain the production environment.
  • Assisted users with creating and managing SSH keys, provided access to Linux servers using SSH-based tools, and troubleshot remote access issues.

Pagerduty/On-Call:

  • Responded to on-call alerts and resolved critical issues, minimizing downtime, and maintaining service reliability.
  • Monitored and maintained production environments using PagerDuty, Datadog and AWS resources, ensuring high availability and quick incident response times.
  • Maintained documentation of incident responses and standard operating procedures for faster resolution and knowledge sharing.
  • Troubleshot various issues, from misbehaving processes and high loads in production, to disk utilization exceeding thresholds, autoscaling issues, and more.

Linux / Security Engineer

Strike
Jacksonville, FL
02.2017 - 01.2019

(Majority of the CI/CD tools, services and providers listed above such AWS, Github/GitHub Actions, Terraform, Ansible, Docker and more, I had exposure to and worked with at Strike. For the sake of not making this resume repetitive and extensive, a description of how those tools/services were used at Strike will not be listed below.)

  • Managed virtual machines, from creating, configuring, monitoring, to maintaining virtualized instances.
  • Performed various networking tests to confirm that Virtual Machines operated correctly before deploying to client.
  • Managed Linux-based systems, overseeing user accounts, setting permissions, and handling user access to resources and services.
  • Maintained file systems, disk space, and storage devices, ensuring efficient utilization and data integrity.
  • Implemented security measures, configured & managed firewall rules and SELinux policies.
  • Installed, updated, and configured software packages and applications across Linux systems.
  • Analyzed system logs, diagnosing issues, and resolving technical problems to maintain system uptime and stability.
  • Configured and provided support for DHCP servers and configured static DHCP leases, ensuring that devices on the network receive consistent and reliable network configurations, including IP addresses, subnet masks, gateways, and DNS servers.
  • Used Cron to schedule scripts to automatically run full, differential & incremental backups.
  • Monitored and scaled up machine resources by extending file systems and additional space.
  • Troubleshot and resolved Linux-related network issues.
  • Setup NFS file sharing, enabling seamless collaboration and resource sharing across teams.
  • Deployed AutoFS auto-mounter, simplifying remote file system access for users.
  • Utilized tools like Top and Ps to actively monitor system processes.
  • Adjusted process priorities by applying renice to allocating resources appropriately to critical tasks and enhancing overall responsiveness.
  • Troubleshot and terminated misbehaving processes using kill command in order to resolve system disruptions.
  • Utilized LVM snapshots for efficient backups and system restore points, enhancing data protection strategies.
  • Collaborated with teams to design LVM configurations that aligned with performance and redundancy requirements.

Skills

  • Amazon Web Services
  • Terraform(IAC)
  • Ansible
  • Docker
  • Containerization
  • Microservices
  • OpenShift
  • GitHub/Gitlab
  • Jenkins
  • JFog
  • CI/CD
  • Pipelines
  • Unix/Linux Environments
  • Troubleshooting
  • Bash
  • Python
  • Java/Golang
  • HashiCorp
  • HCL
  • YAML
  • Jira
  • Confluence
  • Slack
  • System Administration
  • Analytical Thinking and Problem Solving
  • Grafana
  • Datadog
  • Pagerduty

Languages

Bash
Professional
Python
Professional
JSON
Professional
YAML
Professional
HCL
Professional
Java
Professional

Citizenship

  • US Citizen

Timeline

DevSecOps Cloud Engineer

PNC Bank
01.2019 - Current

Linux / Security Engineer

Strike
02.2017 - 01.2019
Robert Strilkivsky