Over 7+ years of IT Professional Experience comprising of Linux and System Administration with a major focus on AWS, Continuous Integration/Deployment, Configuration Management, Build and Release Management and Virtualization technologies which also includes Troubleshooting Performance issues. Experienced in all phases of the software development life cycle (SDLC) with specific focus on the build and release of quality software. Experienced in Waterfall, Agile/Scrum, Lean and most recently Continuous Integration (CI) and Continuous Deployment (CD) practices. In-depth understanding of the principles and best practices of Software Configuration Management (SCM) in Agile, SCRUM to Stash Migration, Waterfall methodologies. Wrote Templates for AWS infrastructure as a code using Terraform to build staging and production environments. Experienced in Infrastructure as Code (IaC), Terraform Enterprise and Terraform Cloud deployments. Experienced with integrating Wiz with different cloud environments to enable continuous workload scanning. Experienced in writing Sentinel policies and automated policy tests. Worked with global security teams performing application and IT infrastructure security assessments. An efficient team player in challenging and creative environment with excellent capacity to adapt new technologies and skills. Possess strong technical aptitude with strong analytical, work ethic, problem solving and communication skills. Worked with Devops Integrating Security tooling in CI/CD Pipeline with Checkmarx and Snyk for Static Code analysis and identify Vulnerabilities in Library Dependencies. Wrote Python CLI tools for AWS Security reporting and AWS lambda scripts for monitoring and alerts. Worked with Ansible Playbooks, Terraform for Cloud deployment. Assisted developers with configuring Snyk dependency vulnerability scanner and integrating into Team Services workflow process. Utilized Snyk to analyze, review and approve opensource dependencies or provide remediation for dependencies with vulnerabilities, configured Qualys to perform vulnerability scans on multiple systems. Integrated SAST security testing with the pipeline using various tools for testing vulnerabilities. Developed Application Security program (DAST, SAST, IAST) at the enterprise level to identify, report and remediate security vulnerabilities from applications deployed in DEV, PRE-PROD and PROD environments. Produced Python script to query Twistlock for detailed vulnerability information for distribution to Application Teams. Integrated Twistlock scans into pipelines to verify container security. Architected, deployed, and optimized the Container security tool, Twistlock in AWS. Experience in writing Ansible scripts, Shell, Perl, Python, and YAML scripting. Created Python Scripts to Automate AWS services, include web servers, ELB, Cloud front Distribution, database, EC2 and database security groups, S3 bucket and application configuration, this Script creates stacks, single servers or joins web servers to stacks. Wrote python scripts for implementing Lambda functions. Automation of security processes including, DevSecOps, Continuous Integration (CI) and Continuous Delivery (CD) of security operations. Experience in providing highly available and fault tolerant applications utilizing orchestration technologies like Kubernetes on Google Cloud Platform. Implemented multi-tier application provisioning in AWS, OpenShift cloud and integrating it with Chef/Puppet. Experience in managing the security groups on AWS, focusing on high-availability, fault tolerance, and auto-scaling using Terraform templates, along with Continuous Integration and Continuous Deployment with AWS Lambda and AWS Code Pipeline. Extensively worked with Scheduling, deploying, managing container replicas onto a node cluster using KUBERNETES and experienced in creating KUBERNETES clusters work with frameworks running on the same cluster resources. Experience in monitoring System/Application Logs of server using Splunk to detect Prod issues.