Summary
Overview
Work History
Education
Skills
Certification
Timeline
Generic

Shiva Krishna Reddy

IL

Summary

xyz

Overview

8
8
years of professional experience
1
1
Certification

Work History

Azure DevOps Engineer/Environment Build Engineer

Northern Trust
01.2024 - Current
  • Built and automated Azure cloud infrastructure using Terraform and ARM templates, provisioning resources like VMs, VNets, Storage Accounts, Key Vault, and Load Balancers to support scalable and secure environments
  • Automated provisioning of Azure resources (VMs, VNets, Storage, Key Vaults, Load Balancers) using Terraform scripts, ensuring scalable, consistent, and efficient infrastructure setups
  • Developed reusable Terraform modules to streamline resource deployment, reducing configuration errors and accelerating environment builds
  • Leveraged Terraform state management and backend configurations to enable collaborative infrastructure development and version control
  • Configured Azure security services such as Network Security Groups, Azure Firewall, and DDoS Protection, while implementing data encryption, backup, and disaster recovery solutions to ensure data protection and business continuity
  • Configured Azure Storage (Blob, Table, and Queue Storage) for scalable data storage, integrating with applications for cost-effective data management solutions
  • Set up Azure Monitoring, Log Analytics, and Application Insights to monitor cloud resources, applications, and services, providing proactive alerts and performance insights
  • Automated SSL certificate management using Azure Key Vault, ensuring secure communication channels for web applications hosted on Azure
  • Managed on-premises to cloud data migration using Azure Data Factory and Ora2pg to migrate Oracle databases to Azure, ensuring minimal downtime and secure data transfer throughout the process
  • Utilized tools like SQL Developer, SQL Server Managed Instance, Liquibase, and Azure Data Factory to streamline database management, automate schema updates, and optimize ETL workflows for efficient data integration
  • Coordinated with infrastructure teams as an Environment Build Engineer to set up and configure environments, including Linux, Windows, Tomcat, Kafka, and .NET servers, ensuring readiness for application deployments
  • Implemented data masking in non-production environments to protect sensitive information, automating masking processes to enhance security in development and testing stages
  • Developed data encryption and decryption workflows using SecuPi for enhanced data protection, ensuring compliance with regulatory standards such as GDPR in cloud environments
  • Deployed and managed scalable Azure Kubernetes Service (AKS) clusters, leveraging Helm charts for efficient microservices deployment, versioning, and automated scaling using Horizontal Pod Autoscaling (HPA)
  • Integrated CI/CD pipelines with Kubernetes, automating container image builds, security scans, and deployments via Azure DevOps; implemented blue-green and canary strategies to minimize downtime during releases
  • Configured Kubernetes Secrets, ConfigMaps, and Network Policies to securely manage sensitive data and enforce traffic controls, while monitoring performance with Prometheus, Grafana, and Azure Monitor for proactive alerting
  • Designed and optimized CI/CD pipelines in Azure DevOps, automating build, testing, and deployment processes across various environments like Dev, QA, UAT, and Production, reducing manual intervention and speeding up release cycles
  • Leveraged Docker for containerizing applications, developing Docker files for micro services, and managing multi-container setups using Docker Compose to simplify local development and testing
  • Developed and maintained PowerShell and Bash scripts to automate routine tasks such as infrastructure provisioning, resource management, and data migration, reducing manual intervention
  • Created Terraform scripts to provision and configure Azure resources, ensuring consistent environments across development, test, and production stages
  • Automated CI/CD pipeline configurations and application deployments using Azure CLI and PowerShell, streamlining processes and improving deployment speed
  • Environment: Azure Services, Terraform, ARM Templates, Kubernetes, Helm, Azure DevOps, Azure CLI, PowerShell, Bash, Docker, Prometheus, Grafana, Azure Monitor, Application Insights, Key Vault, Azure Data Factory, SQL Server Managed Instance, Liquibase, SQL Developer, Azure SQL, Dynatrace, SecuPi, Data Maskings

Sr. Azure DevOps Engineer

Green Lake – IDP Team, HP Enterprise
12.2021 - 12.2023
  • Worked in designing and configuring Azure Virtual Networks (VNets) and subnets, managing network settings, DHCP, DNS, and security policies
  • Proficient in creating and deploying VMs using ARM templates and managing virtual networks
  • Worked on Azure Resource Manager Template and extensive knowledge on designing custom build steps using PowerShell, created various custom template for azure resource such as ASE, ASP, WebApp, PostgreSQL, App Gateway, Storage Account, container registry, key vault, Azure Cache for Redis to create complete infrastructure for the application
  • Have setup and manage continuous integration jobs and continuous delivery pipelines in Azure DevOps (VSTS) and Experience with designing APIs and working with REST-based microservices and deploying the infrastructure and application in various environment like Demo, Test, PENTEST, Training, CTDEV, Sandbox, UAT, and PROD Environments
  • Utilized Azure Databricks for custom DNS configurations and network security group (NSG) rules
  • Automate provisioning and repetitive tasks using Terraform and Python, Docker container, Service Orchestration
  • Worked on Terraform, a tool for building, changing, and versioning infrastructure safely and efficiently, also worked with Terraform modules
  • Created CI/CD pipelines using Azure DevOps environments by providing their dependencies and tasks
  • Also have experience in implementing and managing continuous delivery systems and methodologies on Azure and created an end-to-end automation
  • Improved automation and configuration management using Ansible and Ansible-based YAML scripts
  • Leveraged Azure Automation for runbook creation, migration, authorization, and scheduling
  • I have developed build workflows using Gradle, Gitlab-CI, Docker, and Openshift
  • Worked on Azure Active Directory connect to sync on-premises Active Directory user data, groups, and organizations to Azure AD and troubleshoot Azure services sync with on-premises AD and resync using the Azure tools also Configure security in Azure AD using privilege access management, Identity protection, multi-factor authentication (MFA) for two-factor authentication and also configured Azure Role-based Access Control (RBAC) to enforce granular user access management
  • Successfully migrated on-premises data to Azure Data Lake Store (ADLS) using Azure Data Factory
  • Configuring and Controlling the Scale Up and Scale Out of the App Service Plans and Pricing tier (scale DTUs) while migrating the Databases and Applications from on-premises to Azure Cloud Platform
  • Configured Azure Blob storage for efficient storage and retrieval of unstructured object data
  • Successfully migrated on-premises data to Azure Data Lake Store (ADLS) using Azure Data Factory
  • Skilled in Azure infrastructure management using Terraform and SCOM
  • Implement migration strategies for traditional systems on Azure (Lift and shift, Azure Migrate Service)
  • While migrating the data provided encryptions and firewalls
  • Implemented centralized identity management using Ping Directory, enabling single sign-on (SSO) for multiple applications
  • Deployed microservices on Azure Kubernetes using Docker
  • Integrated Docker container orchestration using Kubernetes, creating pods and deployments
  • Configured various types of Docker networks, including bridge, host, overlay, and macvlan networks, to meet specific application requirements
  • Used Azure Kubernetes service (AKS) to deploy a managed Kubernetes cluster in Azure and created an AKS cluster in the Azure portal, with the Azure CLI, also used template driven deployment options such as Resource Manager Templates and in Terraform
  • Managed Kubernetes resources, such as pods, services, deployments, and ingress controllers, using Azure-specific tools and APIs
  • Have used Prometheus and Grafana Dashboard for getting Kubernetes metrics logs
  • Maintained comprehensive documentation for Kafka configurations, procedures, and troubleshooting guidelines
  • Expertise in Microsoft Azure Cloud Services (PaaS & IaaS), Application Insights, Azure Monitoring, Key Vault, Visual Studio Online (VSO) and SQL
  • Handling various project application on azure such as understand and troubleshooting various issues on Azure resources like App Insights, SQL, Webapps, Application Gateway, Auto scale resources based on utilization, managed and Manage SSL certificates on domain name, CDN and AD authentication
  • Environment: Azure Services, Terraform, Ansible, Docker, Kubernetes, GIT, Maven, Splunk, Nagios, Python Scripts, Java/J2EE, Linux, Azure DevOps, App services, AKS, Azure monitor, Application Insights, Key Vault, Azure Data Factory, Azure SQL

AWS/DevOps Engineer

Cisco
02.2020 - 11.2021
  • Successfully migrated applications and data from on-premises to AWS using services like EC2, S3, Route53, and IAM
  • Worked on Amazon EC2 setting up instances, virtual private cloud (VPCs), and security groups and created AWS Route53 to route traffic between different regions and used BOTO3 and Fabric for launching and deploying instances in AWS
  • Configured Amazon S3, Elastic Load Balancing, IAM and Security Groups in Public and Private Subnets in VPC, created storage cached and storage volume gateways to store data and other services
  • Architected and configured a virtual data center in the AWS cloud to support Enterprise Data Warehouse hosting including Virtual Private Cloud (VPC), Public and Private Subnets, Security Groups and Route Tables
  • Used Security Groups, Network ACLs, Internet Gateways, NAT instances and Route tables to ensure a secure zone for organizations in AWS public cloud
  • Worked on migration services like AWS Server Migration Service (SMS) to migrate on-premises workloads to AWS in easier and faster way using Rehost "lift and shift" methodology and AWS Database Migration Service (DMS), AWS Snowball to transfer large amounts of data and Amazon S3 Transfer Acceleration
  • Leveraging Terraform to manage various AWS resources, such as EC2 instances, VPCs, subnets, security groups, IAM roles, S3 buckets, RDS databases, and more
  • Managed and maintained highly available EC2 instances using Terraform and CloudFormation
  • Implemented strategies for horizontal scaling and load balancing in Kafka to handle increased data volume and traffic
  • Created reusable and modular infrastructure components using Terraform modules
  • Wrote Terraform scripts for automating AWS services provisioning, infrastructure deployment, and Lambda functions
  • Worked on CI/CD pipelines using Jenkins to build, test, and deploy microservices containers on Kubernetes clusters using Ansible on DEV, UAT, and PROD environment
  • Installed and configured Jenkins for continuous integration and delivery pipelines integrating with Nexus, SonarQube, and Ansible, created Ansible playbooks for automation purposes, including file manipulation, configuration changes, and deployments
  • Implemented centralized identity management using Ping Directory, enabling single sign-on (SSO) for multiple applications
  • Utilization of Docker containers to deploy applications on AWS services like Amazon ECS (Elastic Container Service) or Amazon EKS (Elastic Kubernetes Service)
  • Proficiency in writing Dockerfile instructions to define the desired state of applications and their dependencies
  • Configured and optimized Docker images specifically for AWS deployments
  • Worked with multi-stage builds, cache optimization, and reducing image size in Dockerfile configurations
  • Configuration of various Docker network types, including bridge networks, overlay networks, or custom networks tailored to specific AWS project requirements
  • Integrated AWS services such as Amazon RDS, Amazon S3, AWS Lambda, Amazon DynamoDB, or AWS Elastic Load Balancer (ELB) with Kubernetes applications
  • Set up Kubernetes using Amazon Elastic Kubernetes Service (Amazon EKS) or self-managed Kubernetes on Amazon EC2 instances
  • Managed Kubernetes charts using Helm, created reproducible builds of the Kubernetes applications, Kubernetes manifest files and releases of Helm packages
  • Developed CI/CD system with Jenkins on Kubernetes container environment, utilizing Kubernetes and Docker for the CI/CD system to build, test, deploy and configured Kubernetes to deploy scale, load balance, scale and manage Docker containers with multiple names spaced versions
  • Have used Prometheus and Grafana Dashboard for getting Kubernetes metrics logs
  • Written Templates for infrastructure as a code using Terraform to build staging and production environments
  • Used Nagios for monitoring web applications, web services, and URL monitoring, content monitoring and HTTP status
  • Managing multiple corporate applications in GitHub, Bitbucket code management repositories and creating & granting access for users related to GIT, Bitbucket project directories for the code changes
  • Regular monitoring activities in Unix/Linux servers like Log verification, Server CPU usage, Memory check, Load check, Disk space verification, to ensure the application availability and performance by using Dynatrace and Zabbix
  • Managing multiple corporate applications in GitHub, Bitbucket code management repositories and creating & granting access for users related to GIT, Bitbucket project directories for the code changes
  • Worked in integrating TFS with Visual Studio VSTS
  • Monitored and gained insights about infrastructure, applications, and services using AWS CloudWatch, CloudTrail, and other third-party tools like Splunk, New Relic
  • Implemented robust monitoring solutions with tools such as Prometheus, Grafana, and ELK Stack to track Kafka cluster performance
  • Administration of CentOS/RHEL 5.x, 6.x, 7.x, installation, testing, tuning, upgrading and patching, troubleshooting both physical and virtual servers
  • Installed, configured and maintained Tomcat, Apache and WebSphere Applications on Red Hat Linux
  • Environment: Amazon Web Services (Aws), EC2, RDS, S3, Cloud Watch, EBS, NACL, VPC, DNS, Docker Containers, Docker swarm, Kubernetes(k8s), Chef, Terraform, Jenkins, Git, GitHub, MAVEN, ELK, Nagios, Shell, Python, JIRA, Linux, Nexus, SonarQube, JFrog, Webhooks.

Azure Cloud/ DevOps Engineer

Fidelity Investments
08.2018 - 01.2020
  • Focused on improving software development, deployment, and operations processes
  • Worked in designing, implementing, and maintaining scalable and highly available infrastructure solutions
  • Collaborated with development teams to define infrastructure requirements and create infrastructure as code (IaC) using tools like Terraform, CloudFormation
  • Automated the provisioning and configuration of infrastructure components such as servers, networks, load balancers, and databases, also implemented and maintained scalable and highly available infrastructure architectures, leveraging cloud platform Azure
  • Implement and maintain CI/CD pipelines to automate the build, test, and deployment processes for applications and services
  • Integrate source control systems using Git and build automation tools Jenkins, GitLab CI/CD to enable continuous integration and delivery of software
  • Managed and optimized release processes, including version control, release coordination, and rollback strategies
  • Have used ServiceNow for incident management, change management, and problem management
  • Have set up monitoring and alerting systems like Splunk, Nagios, Azure Monitor, CloudWatch, and ELK to track application and infrastructure performance, and ensure system availability
  • Implement proactive measures to anticipate and prevent system failures or performance degradation
  • Participated in incident response and on-call rotations to address system outages or performance incidents
  • Collaborated with development and operations teams to conduct root cause analysis (RCAs) and implement measures to prevent recurrence
  • Worked to improve system reliability, resilience, and fault tolerance, implementing practices like fault injection, chaos engineering, and disaster recovery planning
  • Collaborated with security teams to ensure adherence to security best practices and compliance requirements
  • Implemented and maintained secure infrastructure configurations, network segmentation, access controls, and vulnerability management practices
  • Automated the security checks and scans using static code analysis, vulnerability assessments as part of the CI/CD pipeline
  • Work closely with cross-functional teams, including developers, system administrators, and business stakeholders, to align goals and priorities
  • Orchestrated the creation of Pods with Kubernetes and implemented Jenkins pipelines to manage the builds of microservices, facilitating their deployment to the Docker registry and Kubernetes
  • Leveraged Docker to virtualize servers, creating isolated environments for testing, development, and production
  • Integrated the Kubernetes Container orchestration framework with Docker, streamlining container management by creating Pods, Configuration Maps, and Deployments
  • Engineered Azure infrastructure using Terraform, ensuring reliable versioning and utilizing Azure Terraform modules for automated resource provisioning
  • Implemented CI/CD pipelines for AKS using Helm charts in Azure DevOps, enabling automated build, testing, and deployment processes for efficient software delivery
  • Document and share best practices, processes, and system configurations to improve knowledge sharing and onboarding processes
  • Environment: Azure, Terraform, Jenkins, Ansible, Git, GitHub, MAVEN, ELK, Nagios, Shell, Python, JIRA, Linux, Nexus, SonarQube, GIT, Maven, Splunk, Nagios, Python Scripts, Kick start, Java/J2EE, Linux, ServiceNow, Azure Monitor.

Linux System Admin

Kroger
02.2017 - 05.2018
  • Worked on variety of Linux platforms (Ubuntu, Red hat) which includes installation, configuring and maintenance of applications on this environment
  • Performed Data Migration from AIX LINUX to Redhat Linux
  • Created the CRON jobs for file backups
  • Configured and Monitored JBOSS instances
  • Troubleshoot complex issues ranging from system resources to application stack traces
  • Installed, configured and updated LDAP, DNS, DHCP, NFS, and NIS+ on Red Hat Linux and IBM AIX servers
  • Involved in support databases and performed MS SQL upgrades running on Windows servers
  • Code compilation and moving to test environment by automated process
  • Installation, configuration and administration of Linux (Red hat, CentOS)
  • Remotely copying files using SFTP, FTP, SCP and FileZilla
  • Wrote UNIX shell scripts for automated installations, to extract logs using C, Bash, Perl and Python
  • Set up and configure Network, switches, routers, WAN and Firewall.

Education

Bachelors of Technology - CS & IT

JNTUK

Skills

  • M

Certification

  • Certified AWS Solution Architect Professional - Revised
  • AZ-104/330/701: Microsoft Azure Administrator
  • Certified Terraform Associate
  • AZ-700: Azure Networking Certified
  • Certified Kubernetes Administrator
  • Certified RedHat Linux Administrator and Ansible Automation
  • Certified Oracle Sun Java - Weblogic - Module

Timeline

Azure DevOps Engineer/Environment Build Engineer

Northern Trust
01.2024 - Current

Sr. Azure DevOps Engineer

Green Lake – IDP Team, HP Enterprise
12.2021 - 12.2023

AWS/DevOps Engineer

Cisco
02.2020 - 11.2021

Azure Cloud/ DevOps Engineer

Fidelity Investments
08.2018 - 01.2020

Linux System Admin

Kroger
02.2017 - 05.2018

Bachelors of Technology - CS & IT

JNTUK
Shiva Krishna Reddy