Over 10+ years of work experience in the IT Industry, DevOps Build/Release Management, Systems Administration, Change/Incident Management, and Cloud Management with 6+ years of experience in Hybrid Cloud platforms like Azure, and AWS.
Collaborated with development teams to create and maintain efficient CI/CD pipelines by using CI tools like Jenkins, Gitlab, and VSTS, and continuous integration with GIT repositories to produce high-quality deployable code.
Designed and accomplished end-to-end implementation of Microservices architecture of the application through CI/CD pipeline by integrating Git, Maven, Jenkins, Docker, Ansible, Kubernetes (AKS, EKS), and Terraform.
Overview
12
12
years of professional experience
1
1
Certification
Work History
Sr. Azure Cloud Engineer
ADP
06.2021 - Current
Worked on the cloud-native, microservices-based application which offered 200 customers and partners access to secure shipment data, invoicing, and other information through the internet, helping to increase revenue by 73%
Participated in lift and shift migration to Microsoft Azure using Azure Site Recovery and Azure Backup
Deployed Azure IaaS (VMs) and PaaS Services into secure VNETs
Worked as an Azure DevOps Engineer to set up the required infrastructure
Used Kubernetes for orchestration and Docker containerization
Implemented microservices, application development, and migration using Azure services such as Kubernetes API for AKS clusters
Implemented Datadog agent on the AKS cluster for service monitoring
Automated Datadog Dashboards through Terraform Scripts and configured CloudWatch and Datadog for real-time metrics
Data ingestion to Azure services (Azure Data Lake, Azure Storage) and processing in Azure Databricks
Created Azure DevOps pipelines for infrastructure automation using ARM templates, Azure DevOps Pipelines, Azure Blob Storage, Azure Functions, and other services
Expertise in Installation, Configuration, Troubleshooting, and Maintenance of Dynatrace Managed APM tool
Configured and administered MongoDB databases for efficient data storage and retrieval
Proficiency in writing Terraform modules for AKS resource provisioning and management
Used SaltStack for configuration management and developed Python scripts for various activities
Utilized Ansible for configuration management, automating the provisioning and management of infrastructure resources in Azure environments
Proficiency in deploying and managing containerized applications on Pivotal Cloud Foundry (PCF) using Docker containers and Kubernetes orchestration
Experience in configuring and scaling microservices-based architectures on PCF, ensuring high availability and fault tolerance
Utilized PCF's built-in monitoring and logging capabilities for application performance management and troubleshooting
Implemented blue-green deployments and canary releases on PCF for seamless application updates with minimal downtime
Conducted performance tuning and optimization of applications deployed on PCF to achieve optimal resource utilization and cost efficiency
Collaborated with development teams to migrate existing applications to PCF, providing guidance on best practices and ensuring successful migration with minimal disruptions
Managed and orchestrated Azure resources using Ansible playbooks, ensuring consistent and scalable infrastructure configurations across deployments
Implemented Ansible roles and modules for automating common infrastructure tasks such as VM provisioning, network configuration, and application deployment on Azure
Leveraged Ansible Tower for centralized management and orchestration of Ansible playbooks, providing a web-based interface for scheduling and monitoring automation tasks
Integrated Ansible with Azure DevOps pipelines for continuous integration and deployment, automating infrastructure provisioning and application deployment processes
Implemented Ansible dynamic inventories for dynamic discovery and management of Azure resources, enabling flexible and scalable automation workflows
Utilized Ansible Vault for securely storing and managing sensitive information such as passwords, API keys, and certificates used in automation tasks
Implemented Ansible for configuration drift detection and remediation, ensuring that deployed infrastructure remains in compliance with defined configurations and policies
Implemented data management solutions using Cassandra for high availability and scalability
Extensive experience with continuous integration tools like Jenkins, integrating with Git/Artifactory/SonarQube
Configured Jump box/Bastion host in a Public Subnet in an Azure environment with AAD integration
Deployed applications in Azure Kubernetes Service (AKS) and managed Docker containers using Helm charts
Collaborated with the Infrastructure as Code (IaC) team for Terraform scripts
Configured and deployed MS Azure Key Vaults using CI/CD pipeline for secure data transfer
Developed and maintained data processing pipelines with Hadoop
Demonstrated knowledge of Azure Networking core components and load balancing
Used Prometheus, Grafana, BPM, RUM, SiteScope, and APM for Monitoring and Observability
Maintained infrastructure for PCI Compliance
Collaborated with Bitbucket for version control, integrating with CI/CD pipelines
Managed source code repositories using Bitbucket features for code reviews, branching strategies, and pull requests
Utilized Terraform for implementing network security group (NSG) rules, virtual network (VNET) configurations, and network interfaces (NICs) in Azure environments
Implemented Terraform for automating Azure Virtual Machine Scale Sets (VMSS), enabling dynamic scaling and management of VM instances based on demand
Proficiency in handling exceptions and error handling in C# using try-catch blocks and exception-handling mechanisms for robust application behavior
Participated in lift and shift migration to Microsoft Azure using Azure Site Recovery and Azure Backup, involving CAB approval and coordination for change management processes
Collaborated with CAB for reviewing and approving changes related to the deployment of Azure IaaS (VMs) and PaaS Services into secure VNETs
Engaged with CAB for reviewing and approving changes related to the deployment and orchestration of containerized applications using Kubernetes on Azure, ensuring compliance with organizational standards and best practices
Presented proposed changes and their impact on microservices architecture, application development, and migration using Azure services to the CAB for evaluation and approval
Experience in working with JSON and XML data formats in C# applications, including serialization and deserialization using libraries like Newtonsoft.Json
Knowledge of cryptography and secure coding practices in C# for implementing encryption, hashing, and secure communication protocols
Familiarity with .NET Standard and .NET Core libraries for cross-platform development and compatibility across different .NET implementations
Experience in developing desktop applications using Windows Presentation Foundation (WPF) or Windows Forms for building rich user interfaces in C#
Understanding of performance optimization techniques in C# applications, including memory management, code profiling, and performance monitoring
Implemented role-based access control (RBAC) in Azure to manage permissions for users and groups, ensuring least privilege access
Configured Azure Active Directory (Azure AD) for centralized identity management and single sign-on (SSO) across Azure services
Integrated Azure AD with on-premises Active Directory for hybrid identity management, enabling seamless authentication and access control
Implemented multi-factor authentication (MFA) for enhanced security and user authentication
Configured conditional access policies in Azure AD to enforce access controls based on user location, device health, and other risk factors
Utilized Azure AD Privileged Identity Management (PIM) to manage, control, and monitor access to privileged roles and resources
Implemented Azure AD Identity Protection for detecting and mitigating identity-based risks and threats
Configured Azure AD B2B (Business-to-Business) and Azure AD B2C (Business-to-Consumer) for external user access and customer identity management
Utilized Azure Key Vault for securely storing and managing sensitive information such as passwords, certificates, and encryption keys
Utilized Terraform for managing Azure Blob Storage resources, enabling automated provisioning and configuration of blob containers, access policies, and lifecycle management
Integrated Terraform with Azure Monitor for monitoring and logging infrastructure changes and events, providing insights into system performance and health
Implemented Azure Databricks for data ingestion, processing, and analytics, leveraging distributed computing capabilities for large-scale data processing tasks
Collaborated with stakeholders to define data ingestion strategies and workflows in Azure Databricks, ensuring efficient and scalable data ingestion from diverse data sources
Utilized Azure Databricks for data transformation and manipulation tasks, including ETL (Extract, Transform, Load) processes and data cleansing activities
Implemented data pipelines and workflows in Azure Databricks for batch and streaming data processing, ensuring real-time insights and analytics capabilities
Integrated Azure Databricks with Azure services such as Azure Data Lake Storage, Azure Blob Storage, and Azure SQL Database for seamless data integration and storage
Leveraged Azure Databricks for machine learning and advanced analytics tasks, including model training, evaluation, and deployment in production environments
Implemented Enterprise Data Hub (EDH) solutions using Azure Databricks as a central platform for storing, processing, and analyzing enterprise-wide data assets
Designed and implemented data governance policies and procedures within Azure Databricks and EDH environments, ensuring data security, privacy, and compliance with regulatory requirements
Using Task Parallel Library (TPL) for improving application performance
Implemented Terraform for disaster recovery automation in Azure environments, enabling automated provisioning and configuration of backup and recovery solutions
Worked on Dynatrace collector installations and monitored APM environment for high availability
Experience with ITIL concepts for best practice implementations
Integrated ServiceNow into workflows for incident management, change management, and service request processes
Configured and managed CentOS and Red Hat Linux servers in Azure environments for hosting various applications and services
Implemented security hardening measures and applied system updates and patches to ensure server security and compliance with industry standards
Utilized YUM package manager for software installation and package management on CentOS and Red Hat Linux servers
Implemented SELinux (Security-Enhanced Linux) policies for enforcing mandatory access controls and enhancing server security
Implemented Azure AD Conditional Access policies to enforce access controls based on user context, device state, and risk factors
Utilized Azure AD Privileged Identity Management (PIM) to monitor, manage, and audit privileged roles and access in the organization
Implemented Azure AD Identity Governance features such as Access Reviews and Entitlement Management to ensure compliance and security in access provisioning and management
Configured Azure AD Multi-Tenant and Multi-Factor Authentication (MFA) to enhance authentication security for users accessing Azure resources
Implemented Azure AD Identity Protection to detect and remediate identity-based risks and threats using advanced machine learning algorithms
Configured network services and firewall rules on CentOS and Red Hat Linux servers to control inbound and outbound traffic and enhance network security
Implemented ServiceNow connectors in Azure DevOps pipelines for data synchronization
Utilized ServiceNow for ITIL-based practices in Azure cloud environment.
Sr. Cloud Engineer
US bank
Jersey, NJ
11.2019 - 04.2021
Created an integration layer that allows the payroll solution of 10 internal divisions in the organization to be connected to any Enterprise Resource Planning (ERP) application and Administered 51 AWS infrastructures such as S3, EC2, RDS, Route 53, ECS, and Application Load Balancer
Created and managed S3 buckets and implemented access controls for S3 buckets, like bucket policies, ACLs, and IAM roles
Maintained an AWS Virtual Private Cloud (VPC), Public and Private Subnets, NACLs, Route Tables, and Elastic Load Balancer
Responsible for provisioning AWS Cloud environment by writing Terraform templates with services involving Route 53, global accelerator, Load balancer, Target Group, Autoscaling Group, Launch Wizard, EC2, CloudFront, and Lambda functions in AWS Cloud through AWS CLI
Built and configured a Virtual data center in the AWS cloud to support Enterprise Datawarehouse hosting which includes Virtual Private Cloud (VPC), Private and Public Subnets, Security Groups, Route Tables, ELB (Elastic Load Balancer), NAT, and NACL
Configured AWS Route53 domain service to redirect the URL into FQDN (Fully Qualified Domain Name) and route traffic to different regions using Simple, Weighted, Latency, Failover, and Geolocation Policies
Configured AWS High Availability Services with Load balancer, CloudFront, CloudWatch, AWS lambda, and Auto Scaling features by enabling Automated monitoring and Failure Detection
Created AWS Code Pipeline for infrastructure automation using AWS services like CloudFormation, Code Build, Code Deploy, S3, Lambda, and other services of AWS
Virtualized the servers on AWS using Docker, created Docker files, and version control to achieve Continuous Delivery goals on a highly scalable environment, and used Docker coupled with load-balancing Nginx
Used GIT plugins in Jenkins to automate triggering builds for the latest code commit in GIT and store the .jar/
Ear artifacts into the Nexus repository and used Rundeck as an orchestration tool to deploy those artifacts to desired environments with the help of AWS CLI and/or Bash scripts at runtime
Developed Terraform scripts to build, change, and version infrastructure as code using AWS as a provider and launched a multi-tiered stack to be provisioned and configured with Terraform scripts
Actively involved in deploying Microservices and created Ansibles-supported YAML scripts to restart JBoss, Nginx, WebSphere, and Tomcat servers through GUI
Worked with a two-member team to migrate all the jobs in open-source Jenkins to the Cloudbees Jenkins Platform
Created Ansible scripts to provision development servers and integrated Ansible Playbooks with Python SSH as a wrapper to manage configurations of AWS Nodes and to test Playbooks on AWS instances using Python
Implemented Cloudbees Jenkins enterprise software delivery solution to automate configuration management (Ansible/puppet), CI/CD pipelines, security, infrastructure automation, and enhancement of existing pipelines
Installed, Configured, and automated the Jenkins build jobs for continuous integration and AWS deployment pipelines using various plugins like Jenkins EC2 plugin and Jenkins CloudFormation plugin
Integrated ServiceNow for streamlined incident, problem, and change management processes within the AWS and Azure environments, ensuring alignment with ITIL best practices
Used Dynatrace in AWS cloud to auto-discovery new AWS resources, auto injection monitoring agents, and autoconfiguration monitoring settings
Managed services, maintained and managed log files, monitored events, and logs, troubleshooted system problems using the Nagios tool, and resolved any reported issues
Experienced in Branching, Tagging, versioning, and maintaining the versions across different SCM tools like GitHub, and Subversion (SVN) on Linux and Windows platforms by developing Shell/Groovy Scripts
Experienced with creating and extending logical volumes (LVM) for Linux Operating Systems such as Red Hat, CentOS, and Ubuntu servers, and installing and removing packages using YUM and APT packages
Architected and designed the Adobe Experience Manager (AEM) platform at MasterCard for Content Management System; oversaw all aspects of Web Engineering and technical implementation
Designed and implemented AWS EKS clusters spanning 5 AWS regions and availability zones to run 1000s of batch jobs daily with high availability
Installed and configured the ELK stack on the environment to ship logs from applications hosted on the EKS cluster
Created Kibana dashboards visualizing key app/infra metrics like CPU, memory usage, and disk capacity to tune infrastructure sizing and integrated with the Grafana plugin to build interactive dashboards leveraging aggregated logs
Created alarms in CloudWatch to monitor sudden cost increases of AWS resources and analyzed billing reports.
Azure Cloud Engineer
Kennametal
Latrobe, PA
03.2018 - 10.2019
Worked with a 10-member cross-functional team for the conception, implementation, and management of shopping cart microservices (REST API| and Ul)
Proficient in leveraging Azure Compute Services (Virtual Machines, Load Balancers), Storage Services (Blob Storage, Disk Storage), Azure App Services, Virtual Networks, and Databricks
Conducted a Proof of Concept (POC) to implement DevOps practices in Azure, setting up a CI/CD pipeline using Azure DevOps Services, Azure Pipelines, Azure Repos, Azure Artifacts, and Azure Key Vault
Managed security and user access through Azure Active Directory (AAD), creating custom roles and policies to enforce access controls and quotas
Utilized Azure Monitor to track resource utilization, set up alerts for key metrics, and analyse logs for performance optimization
Configured Shell scripts to automate Azure cloud system creation, VMs, firewall rules, and SQL tasks on Windows machines
Used Ansible for configuring and managing infrastructure, creating Playbooks, and adhering to Ansible best practices
Implemented Azure AD Conditional Access policies to enforce access controls based on user context, device state, and risk factors
Utilized Azure AD Privileged Identity Management (PIM) to monitor, manage, and audit privileged roles and access in the organization
Implemented Azure AD Identity Governance features such as Access Reviews and Entitlement Management to ensure compliance and security in access provisioning and management
Configured Azure AD Multi-Tenant and Multi-Factor Authentication (MFA) to enhance authentication security for users accessing Azure resources
Implemented Azure AD Identity Protection to detect and remediate identity-based risks and threats using advanced machine learning algorithms
Created Docker files for containerizing .NET and Node.js applications, optimized images for size and performance, and pushed images to Azure Container Registry through pipelines
Experience in deploying applications and managing cloud-native infrastructure using Pivotal Cloud Foundry
Proficiency in leveraging PCF services for building, deploying, and scaling applications
Leveraged Azure DevOps for incident management, ensuring efficient resolution of critical production issues
Proficient in automation and infrastructure as code (IaC) tools like Terraform, ARM, PowerShell, and Shell for rapid provisioning and lifecycle management of resources in Azure/AWS/GCP
Implemented automated provisioning and lifecycle management for Linux VMs using Azure Resource Manager (ARM) templates, PowerShell DSC, and custom scripts
Proficiency in C# programming language for developing applications on the .NET platform
Experience in building and deploying applications using .NET Core, a cross-platform, open-source framework for building modern, cloud-based applications
Familiarity with Microsoft Azure's Cognitive Services for implementing AI capabilities such as natural language processing, computer vision, and speech recognition into applications
Knowledge of Azure Synapse Analytics (formerly SQL Data Warehouse) for big data and data warehousing solutions in Azure
Proficiency in object-oriented programming (OOP) concepts such as encapsulation, inheritance, and polymorphism using C#
Experience in developing web applications using ASP.NET Core, including MVC (Model-View-Controller) and Razor Pages for server-side rendering
Knowledge of Entity Framework Core for data access and ORM (Object-Relational Mapping) in C#/.NET Core applications
Familiarity with LINQ (Language Integrated Query) for querying collections and databases in a type-safe manner
Facilitated CAB discussions and approvals for automating Datadog Dashboards through Terraform Scripts and configuring CloudWatch and Datadog for real-time metrics, ensuring transparency and accountability in monitoring solutions
Engaged with CAB for reviewing and approving changes related to data ingestion to Azure services (Azure Data Lake, Azure Storage) and processing in Azure Databricks, ensuring data governance and compliance considerations are addressed
Presented proposed changes in Azure DevOps pipelines for infrastructure automation, including ARM templates, Azure DevOps Pipelines, Azure Blob Storage, and Azure Functions, to the CAB for review and approval
Coordinated with CAB for reviewing and approving changes related to the orchestration of containerized applications using AKS for scalability and manageability, ensuring alignment with architectural standards and performance requirements
Experience in building RESTful APIs and web services using ASP.NET Core Web API for communication between different systems and platforms.
Release Engineer/ Linux Admin
EMC2 Technology
Bangalore, India
10.2015 - 12.2016
Experience in integrating Azure services with third-party tools and platforms for seamless data flow and interoperability
Integrated Jenkins with Azure services for automated build and deployment workflows
Extensive experience in continuous integration with Jenkins, integrating with Azure Repos, Azure Artifacts, and Azure DevOps Pipelines
Developed Splunk queries and dashboards to analyze application performance and capacity in Azure environments
Implemented Azure Resource Manager (ARM) templates for consistent and repeatable deployment of Azure resources
Configured Azure Virtual Machine Scale Sets (VMSS) for dynamic scaling based on demand
Utilized Azure Policy to enforce organizational standards and compliance
Implemented Azure Blueprints for managing and governing subscriptions at scale
Configured Azure Bastion for secure and seamless RDP/SSH access to Azure VMs
Managed and configured Azure Load Balancers for distributing incoming network traffic
Implemented Azure Traffic Manager for global load balancing and high availability
Configured Azure ExpressRoute for dedicated private network connections between on-premises and Azure
Implemented Azure Application Gateway for optimizing application delivery and security
Utilized Azure Policy and Azure Security Center for continuous security monitoring and compliance
Implemented Azure Storage Security features such as Shared Access Signatures (SAS) and Azure Private Link for secure data access
Configured Azure AD Multi-Factor Authentication (MFA) for enhanced identity protection
Leveraged Azure Managed Identity for secure authentication to Azure services
Troubleshooted and monitored various applications using Azure Monitor, Azure Application Insights, and third-party tools like Dynatrace in Azure cloud environments
Collaborated with Azure AI services for implementing machine learning models and integrating them into the application deployment pipeline
Utilized Azure Site Recovery for disaster recovery planning and implementation
Utilized Azure Kubernetes Service (AKS) for container orchestration
Implemented Azure Functions for serverless computing
Configured Azure Data Lake Storage for storing and analyzing large volumes of structured and unstructured data
Collaborated with data engineers and data scientists to optimize data processing workflows and performance in Azure Databricks, achieving efficient resource utilization and cost-effectiveness
Conducted performance tuning and optimization of data processing jobs and Spark applications in Azure Databricks, ensuring optimal execution speed and resource utilization
Implemented data lineage and metadata management solutions in Azure Databricks to track data lineage and provenance, ensuring data quality and governance across the data lifecycle
Collaborated with stakeholders to define and implement data access control policies and role-based access control (RBAC) in Azure Databricks and EDH environments, ensuring secure and compliant data access
Integrated Azure DevOps with Azure Logic Apps for automating workflows and integrating services across different platforms and applications
Utilized Databricks for efficient data processing and analytics
Proficient in Python and SQL
Experience in managing and administering CentOS and Red Hat Linux distributions in both on-premises and cloud environments
Proficiency in installation, configuration, and troubleshooting of CentOS and Red Hat Linux servers and services
Implemented security measures such as firewalls, SELinux, and intrusion detection systems (IDS) to secure CentOS and Red Hat Linux systems
Managed package repositories and performed package management tasks using YUM and RPM package managers on CentOS and Red Hat Linux
Configured and maintained network services such as DHCP, DNS, FTP, SSH, and NFS on CentOS and Red Hat Linux servers
Conducted system monitoring, performance tuning, and optimization of CentOS and Red Hat Linux servers for improved reliability and performance
Implemented backup and disaster recovery solutions for CentOS and Red Hat Linux systems, ensuring data protection and business continuity
Provided technical support and troubleshooting for CentOS and Red Hat Linux systems, resolving issues related to system errors, performance degradation, and security vulnerabilities
Familiarity with Google Cloud IAM (Identity and Access Management) for managing user access and permissions across GCP resources, implementing least privilege principles and security best practices
Managed Git repository, code merging, and production deployments
Coordinate/assist developers with establishing, and applying appropriate branching, labeling/naming conventions using Subversion, and Git source control
Worked on Software Development Life Cycle (SDLC) methodologies such as Agile and SCRUM
Deployed and managed web applications on Azure using services such as App Service, Azure Functions, and Azure Container Instances
Worked on ADO for continuous integration from pulling up the code from version control tools like GIT and building Artifacts using Maven and deploying them into artifact repositories like Nexus
Created release pipelines from scratch in Azure DevOps using both Classic and YAML-based editors to deploy Java web apps on Windows and Linux web servers
Worked as an administrator on Microsoft Azure and part of the DevOps Team for internal project automation and build configuration management
Involved in configuring virtual machines, storage accounts, and resource groups
Extensively worked on Jenkins CI/CD pipeline jobs for end-to-end automation to build, test, and deliver artifacts and troubleshoot the build issue during the Jenkins build process
Developed Terraform Templates to automate Azure IAAS virtual machines using Terraform modules and deployed virtual machine scale sets in a production environment
Also created resources, using Azure Terraform modules, and automated infrastructure management
Implemented Infrastructure automation through Ansible, for Auto provisioning, Code deployments, software installation, and configuration updates
Configured Shell scripts to automate the Azure cloud system creation including end-to-end infrastructure, VMs, and firewall rules, and worked with Shell to automate SQL tasks, environment management-related tasks, and procedures
Used Ansible to configure and manage infrastructure, created Playbooks to automate the configuration setups, Established Ansible Best practices approach to system deployment with tools with Vagrant, and managed Ansible Playbooks as a unit of software deployment and independently version-controlled
Created Docker files using best practices for containerizing .NET and Node.js applications and pushed images to Azure Container Registry through pipelines, including optimizing images for size and performance
Worked on Docker container snapshots, removing images, and managing Docker volumes and experienced with Docker container service
Configured self-hosted agents on the AKS cluster to provide scalable pools executing Windows and Linux jobs for Azure pipelines and deployed Kubernetes clusters into Azure using Azure Kubernetes Service (AKS)
Managed Kubernetes clusters using tools like kubectl, Helm, and kubeadm, including creating and managing deployments, services, and pods
Created automated dashboards visualizing database metrics across multiple accounts and availability zones providing centralized observability and documented Datadog naming conventions, tags, and dashboards
Involved in logging, APM tracing, and metrics from applications deployed on AKS using Datadog, established automated alerts detecting SLO breaches, and anomalies, and drove incident response
Automated post-release cleanup of branches using Cron jobs and git filter branch improving compliance
Experience to Integrate Release with Jira for Requirements Management, Deploy for Build & Deployment, and Service Now for Change Management process via plugins.
Service Now Developer
GSS Infotech
Hyderabad, INDIA
08.2012 - 09.2015
Installation and administration of RHEL 4.0/5.0 and SUSE 10
Set up and configured Linux (Red Hat& SUSE) and Solaris servers/workstations for clients
Configuring the NFS servers, setting up servers in a network environment, and configuring FTP/NTP/NIS Servers, clients for various departments and clients
Experience working with high availability, high performance, multi-data center systems, and hybrid cloud environments
Installing and setting up Linux Systems
I am creating users, and groups and setting file permissions to different groups and users
Handling the scheduling tasks (cron jobs and task scheduler) for the scripts for various purposes
Troubleshoot complex issues ranging from system resources to application stack traces
Daily execution of build ops in an automated and continuous process
Involved in support databases and performed MS SQL upgrades running on Windows servers
Compiling code to move into test environments via automated processes
Installation, configuration, and administration of Linux (Red Hat/SUSE, Centos)
I am configuring network services such as DNS/NFS/NIS/NTP for UNIX/Linux Servers
Improve speed, efficiency, and scalability of the continuous integration environment
Extensive knowledge of Linux/Windows-based systems including hardware, software, and applications
Creating change requests, work orders, and problem tickets using the BMC Remedy tool and getting approvals from process owners
Experience in development with PowerShell or other scripting languages
On-call support 24/7 for troubleshooting production issues
Project Management for various UNIX/Linux/Windows system integration projects.
MySQL, Oracle, PostgreSQL, MS Access, NoSQL (MongoDB, Dynamo DB)
Web Servers
Apache HTTP 3 x, Apache Tomcat, Nginx
Build Tools
Maven, ANT, Gradle, Selenium, Junit
Bug Tracking Tools
JIRA, Service Now, BMX Remedy
Repository Management
Nexus, JFrog, Artifactory
Networking Tools
Active Directory, Cisco Routers/Switches, IP, DHCP
DNS, LDAP, ADDS, FTP, Wireshark
Knowledge of design patterns such as
Factory, Singleton, and Repository patterns for writing clean, maintainable, and scalable code in C#
Experience in using Visual Studio and Visual Studio Code as integrated development environments (IDEs) for C# development, debugging, and profiling
Familiarity with version control systems such as Git for collaborative development and managing source code repositories in C# projects
Experience in developing and deploying web applications using ASPNET Core, a cross-platform, high-performance web framework for building modern web applications
Experience in developing and deploying microservices-based applications using Azure Service Fabric or Kubernetes on Azure
Familiarity with Azure Functions for building serverless applications and event-driven architectures
Certification
Certified by AWS associate developer.
AWS Solutions Architect Associate (AWS)
Certified by Kubernetes.
Certified by Azure Administrator.
Additional Information
Hands-on experience with infrastructure development and operation involving designing and deploying using AWS Amazon Cloud Administration services like (EC2, S3, EBS, Elastic Beanstalk, Route 53, ECS, ECR, Cloud Formation, Cloud Watch, CloudTrail, Code Pipeline, VPC, Load Balancer, Auto Scaling, Lambda, API Gateway, AWS Import/export).
Extensively worked with IAM policies for organizations in AWS Cloud to define groups, create users, assign roles, and define rules for role-based access to AWS resources.
Responsible for operational support activities to ensure the availability of customer websites hosted on AWS cloud infrastructure using Virtual Private Cloud and public cloud.
Experience in building a Continuous Integration/Continuous Deployment workflow through the implementation of DevOps tools like AWS Code Pipeline, AWS Code Build, and AWS Code Deploy to build and deploy a microservices architecture using ECS (Cluster, Task Definition, and Service).
Responsible for implementing containerized-based applications on Azure Kubernetes by using.
Azure Kubernetes (AKS), and Kubernetes cluster, which is responsible for cluster management.
I worked on implementing backup methodologies by PowerShell Scripts for Azure Services like Azure SQL Database, Key Vault, Storage blobs, and App services.
Experience in Kubernetes to deploy scale, load balance, and manage Docker containers with multiple namespace versions.
We built largely open-source technology such as Docker, Kubernetes, and Terraform and leveraged multiple cloud platforms both public and private to deliver a consistent global platform continuously deploying applications.
Proficient in writing Kubernetes YAML files and Helm charts for deploying microservices into Kubernetes Clusters, and used Kubernetes to orchestrate the deployment, scaling, and management of Docker Containers.
Experienced in Bluegreen Deployment, and Canary Deployment in the production, and Managed Kubernetes cluster in the rollback and rollout methods in the deployment strategies.
Responsible for using Kubernetes Istio Service Mesh to address needs for traffic management, service security, and application monitoring, as well as to monitor all the services across clusters and data centers.
Hands-on experience with Azure Cloud Services (SaaS & IaaS) Web Apps, Application Insights, Document DB, Internet of Things (IoT), Logic Apps, Data Factory, Traffic Manager, and Azure Monitoring.
Managing Azure Cloud Infrastructure which includes MS Azure Web Roles, SQL AZURE, Azure Storage, Azure Web Roles, Worker Roles, and AD licenses with Service Fabric, Containers, Resource Manager, ARM automation, Key Vault, Encryption, and Security.
Proficient as Azure Cloud Administrator, involved in configuration for Function apps, SQL Server DB, Storage Account, Redis Cache, Vnet integration, HCM, Application gateway, App Insights, Key Vault, Encryption, and Security on Azure using ARM templates and PowerShell script.
An excellent DevSecOps Engineer with hands-on implementation experience on Hashicorp Vault with Consul, AWS Systems Manager, AWS Secrets Management, and MSAzure Key Vault.
Expertise in setting up Docker Daemon, Docker Client, Docker Hub, Docker Registries, Docker Images from Docker files, and managing multiple images by storing them in containers to deploy.
Hands-on experience in writing code for building, changing, and managing existing AWS cloud Infrastructure and custom in-house solutions.
Worked with Terraform key features such as infrastructure as a code, execution plans, resource groups, and change automation, and used auto scaling launch configuration templates for launching AWS EC2 instances.
Expert in Ansible as a configuration management tool, to automate repetitive tasks, quickly deploy critical applications, and enthusiastically manage changes on multiple platforms.
Proficient in working with Ansible handlers with multiple tasks to trigger multiple handlers and to decouple handlers from their names, making it easier to share handlers among Playbooks and Roles.
Experienced with Ansible Centralized Server (Tower) to allow the granting permissions to perform specific tasks (View, create, or modify the file) through RBAC (Role Based Access Control), and created the playbooks to support various middleware applications servers and involved in configuring the Ansible as a configuration management tool for automotive repetitive tasks.
Implemented a CI/CD pipeline using AZURE DevOps (VSTS, TFS) in both cloud and on-premises with GIT, MS Build, Docker, and Maven along with Jenkins plugins.
Used GIT as an SCM tool with MSAZURE DevOps, created a local repo, cloned the repo, added, committed, pushed the changes in the local repo, recovered files, created tags, and viewed logs.
Extensively worked on Jenkins CI/CD pipeline jobs for end-to-end automation to build, test, and deliver artifacts and troubleshoot the build issue during the Jenkins build process.
Experience in installing Tomcat application, deployment of WAR, JAR, integrating with Jenkins, and verifying with Jenkins Plugins, deploying the applications across all the environments using Ansible Playbooks.
Expertise in the maintenance of Source control management systems such as GIT and Subversion, strong experience with Continuous integration with Continuous development methodologies with GIT, Maven, Docker, Jenkins, SonarQube, Nagios, JIRA, and Nexus Repository.
Built and managed a highly available monitoring infrastructure to monitor different application servers and their components through Nagios, Splunk, and Centreon Monitoring tools.
Able to use Chef and other configuration management tools Ansible, and Puppet to deploy consistent infrastructure code across multiple environments.
Hands-on experience in using ELK (Elastic Search, Kibana, Log stash), Splunk, Dynatrace, Prometheus, Grafana, and Nagios to monitor the resource utilization for each application, Application Monitoring, Performance, and health.
Expert in using ELK (Elasticsearch, Logstash, Kibana) stack solutions integrated with Kubernetes for collecting, storing, and analyzing Kubernetes data.
Experience in monitoring servers with NRPE plugin in Nagios tool and worked with logging/monitoring such as Nagios. AWS CloudWatch, Remedy, JIRA, ServiceNow, and Clear Quest.
Timeline
Sr. Azure Cloud Engineer
ADP
06.2021 - Current
Sr. Cloud Engineer
US bank
11.2019 - 04.2021
Azure Cloud Engineer
Kennametal
03.2018 - 10.2019
Release Engineer/ Linux Admin
EMC2 Technology
10.2015 - 12.2016
Service Now Developer
GSS Infotech
08.2012 - 09.2015
Certified by AWS associate developer.
AWS Solutions Architect Associate (AWS)
Certified by Kubernetes.
Certified by Azure Administrator.