Summary
Overview
Work History
Education
Skills
Certification
Timeline
Generic

Venkateswararao Velpula

Dallas,TX

Summary

  • Around 10+ years of experience in the IT sector in Linux, Cloud, and Cyber Security Industry for SOC environment using SIEM tools, EDR,XDR,VM,GRC, NGFW, and Email Security. Worked on the IBM Q RADAR and LogRhythm (console & web console) providing operations support at the Security Operations Centre for different firms. Troubleshooting SIEM dashboard issues when there are no reports being generated or no data available. Managed and resolved high-priority L3 (Level 3) tickets in an ITSM environment, ensuring timely resolution aligned with SLAs. Conduct Vulnerability assessments of Network and Security devices using various tools like NMAP and Burp Suit. Map out a network, discover ports and services running on the different exposed network and security devices. Experience on Office365 into Email gateway security to overcome phishing attacks. Handling the complete incident management framework cycle right from incident identification, incident containment, performing root cause analysis, suggestion and implementation of preventive and corrective controls, and perform network analysis as needed on a case-by-case basis. Analyzing Phishing and Spam related emails using header analysis, body analysis using various tools and block them in O365. Preparing Weekly and Monthly reports. Will document the tickets with all the action taken for the incident and update it on frequent basis and maintain ticket quality by documenting it with all the required information. Conducted and managed vulnerability scans using the Qualys tool. Identified critical weaknesses across diverse IT environments. Collaborating with IT teams for patch management and ensures timely deployment of patches and reduce system vulnerabilities. Generating detailed security reports and dashboards, summarizing findings for senior management and stakeholders. Worked with cross-functional teams to address complex issues, including software bugs, infrastructure failures, and security vulnerabilities. Ensured all firewalls, security devices, systems, databases and applications reported data to SIEM and resolved any reporting issues while performing regular health checks. Blocklisting and whitelisting the Domains, Emails in Email security tool Proofpoint. Blocklisting the malicious IPs in Firewalls. We have deployed EDR agent for all the servers and it is communicating continuously 24
  • 7 to EDR server. Providing USB access request for specific users for business requirement through the requests in the ITSM ticketing tool. Purging the hostname if any one leaves the organization in the sentinel one. Blocking the malicious Hash values in the EDR tool. Expertise in LINUX / UNIX system builds, administration, Installations, Upgrades, Troubleshooting on different distributions such as Ubuntu, CentOS, RHEL. Resolving the hardware issues (DIMM, Hard disk) on data center for physical servers. In-depth knowledge on different file systems like ext3, ext4, XFS and NFS. Expertise in user & group management, disk partitioning (LVM) and working experience in large-scale enterprise development environment. Installation and Configuration SSH, FTP, TELNET AND NFS, DNS, DHCP & IPAM (DDI). Led DDI architecture planning and implementation, ensuring seamless integration between DNS, DHCP, and IPAM solutions, optimizing network resource management. Managed DDI solutions (e.g., Infoblox, Microsoft DDI) for enterprise-scale networks, reducing administrative overhead and improving network efficiency. Implemented automation in DDI operations, reducing manual configuration errors by 40% and streamlining DNS record updates and IP address assignments. Developed DDI policies for network security and efficiency, such as automatic IP address assignment for guest networks and secure DNS filtering for endpoints. Collaborated with security teams to configure DDI components to align with company-wide security policies, ensuring robust network defenses against unauthorized access. Utilize tools like top, htop, iostat, and vmstat to monitor CPU, memory, disk I/O, and network usage. Developed custom shell scripts for system monitoring and automation, improving response times to incidents. Provided 24/7 support for critical production systems, reducing average incident resolution time by 40%. Collaborated with development teams to optimize CI/CD pipelines, enhancing deployment frequency by 25%. Spearheaded a migration project to RHEL 8, resulting in enhanced system security and performance. Recognized for leading a team in a successful data center consolidation, reducing operational costs by 15%. Analyze output to identify bottlenecks, such as high CPU load or excessive swapping. Adjust kernel parameters using sysctl to optimize performance. Use tune2fs to adjust filesystem parameters, such as enabling journaling or optimizing block sizes based on application needs. Implement RAID configurations (e.g., RAID 0, RAID 1, or RAID 10) to improve disk performance and redundancy. Use ulimit to manage resource limits for users and processes. Tune caching parameters for applications (e.g., database caching) to reduce disk I/O. Adjust read_ahead settings for block devices to enhance performance for read-intensive applications. Collect historical performance data to identify usage patterns using tools like SAR or collectl. Analyze CPU, memory, and storage trends to forecast future needs. Identify thresholds for CPU, memory, and disk I/O before performance degradation occurs. Evaluate applications for horizontal vs. vertical scaling options, determining the best approach to meet increasing demand. Plan for adding more servers (horizontal scaling) versus upgrading existing hardware (vertical scaling). Establish key performance indicators (KPIs) such as response times, throughput, and error rates to evaluate performance against expectations. Set thresholds for resource utilization (e.g., CPU usage consistently above 80%) to trigger scaling or optimization actions. Maintain documentation of capacity planning processes and decisions for future reference. Regularly report on system performance and capacity forecasts to stakeholders for informed decision-making. Developed and conducted training programs for junior staff on RHEL best practices and troubleshooting techniques. Experience in deploying and maintaining various applications utilizing AWS services stack including EC2, S3, Route 53, VPC, Cloud Front, RDS, IAM, ECS, ELB, SNS, SQS focusing on High Availability, Fault-Tolerance and Auto Scaling. Oversaw migration of existing application into Micro Services Architecture using Rest APIs and AWS. Good knowledge on creating Kubernetes Pods, Services, ConfigMaps, Deployments and Rollouts by writing the yaml script and creating the resources using Kubectl. Implemented infrastructure automation using Terraform scripts. Utilized Terraform to map more complex dependencies and identify network issue. Worked with Terraform a tool for building, changing, and versioning infrastructure safely and efficiently. Worked with Terraform key features such as Infrastructure as code, Execution plans, Resource Graphs, Change Automation. Experienced Azure Devops Boards/Jira/Confluence/Service Now tools for sprint work. Extensively worked on monitoring servers using Splunk and Grafana. Highly capable of mentoring Team Members and helping them realize their full potential. An effective communicator with strong leadership, people management, analytical and problem-solving skills. At equal ease in interacting with people across hierarchical levels in an organization for ensuring smooth task execution. Proficient in designing, deploying, and managing scalable, high-performance applications and infrastructure using Oracle Cloud Infrastructure (OCI). Hands-on experience in provisioning and managing compute instances, networking, storage, and databases in OCI. Deep understanding of OCI core services such as Compute, Storage, Networking, and Identity and Access Management (IAM). Designed, deployed, and maintained scalable OCI infrastructure for high-performance applications, using services like Compute, Networking, and Storage. Implemented continuous integration/continuous deployment (CI/CD) pipelines using Oracle Cloud Developer tools (Resource Manager, Kubernetes). Automated resource provisioning and cloud infrastructure management using Terraform and OCI CLI. Collaborated with security and compliance teams to ensure OCI solutions adhere to organizational policies and regulatory requirements. Provided technical support and troubleshooting for OCI-based environments, ensuring minimal downtime. Automated OCI infrastructure provisioning and management using Terraform, Ansible, and OCI CLI. Developed custom scripts for monitoring and managing OCI resources, including cost tracking and reporting. Implemented auto-scaling and load balancing to optimize resource usage and maintain application performance. Configured Virtual Cloud Networks (VCNs), subnets, route tables, and security lists to establish secure networking in OCI. Implemented OCI Identity and Access Management (IAM) policies and roles to control access to cloud resources. Architected and deployed cloud-native applications on OCI leveraging micro services, container orchestration (Kubernetes), and server less functions. Designed high-availability, fault-tolerant, and cost-effective solutions in OCI based on business requirements. Experience in multi-cloud and hybrid cloud architectures integrating OCI with AWS, Azure, and on-premises environments. Deployed, configured, and managed Oracle VM servers and guest virtual machines for production environments. Administered Oracle VM Manager for centralized management, including tasks such as VM creation, migration, and resource allocation. Conducted performance tuning and optimization of Oracle VM hosts and virtual machines to ensure high availability and reliability. Implemented Oracle VM Server for x86-based systems, resulting in improved resource utilization and reduced hardware costs. Created and maintained Oracle VM templates for rapid deployment of virtual machines with predefined configurations. Set up and maintained KVM-based virtualized environments using tools like virt-manager, libvirt, and qemu. Managed KVM hypervisors on Linux servers, deploying virtual machines (VMs) running various guest OSes including Linux, Windows, and BSD. Tuned KVM host systems and guest VMs to ensure optimal CPU, memory, and I/O performance, achieving enhanced VM density and reduced latency. Monitored KVM system performance and utilized monitoring tools like virt-top, top, and iostat to ensure high system availability. Installed, configured, and maintained VMware ESXi hypervisors and vSphere clusters to host multiple virtual machines. Managed VMware vCenter for centralized management of ESXi hosts, including VM provisioning, migration, and resource management.

Overview

5
5
years of professional experience
1
1
Certification

Work History

Senior Security & Linux Engineer

Salient Global Technology
08.2024 - Current
  • Working on the IBM Q RADAR and Log Rhythm, (console & web console) providing operations support at the Security Operations Centre for different firms
  • Troubleshooting SIEM dashboard issues when there are no reports getting generated or no data available
  • Managed and resolved high-priority L3 (Level 3) tickets in an ITSM environment, ensuring timely resolution aligned with SLAs
  • Conduct Vulnerability assessments of Network and Security devices using various tools like NMAP and Burp Suit
  • Map out a network, discover ports and services running on the different exposed network and security devices
  • Experience on Office365 into Email gateway security to overcome phishing attacks
  • Handling the complete incident management framework cycle right from incident identification, incident containment, performing root cause analysis, suggestion and implementation of preventive and corrective controls and perform network analysis as needed on a case-to-case basis
  • Analyzing Phishing and Spam related mails using header analysis, Body analysis using various tools and block them in O365
  • Preparing Weekly and Monthly reports
  • Will document the tickets with all the action taken for the incident and update it on frequent basis and maintain ticket quality by documenting it with all the required information
  • Conducted and managed Vulnerability scans using Qualys tool
  • Identifying critical weaknesses across diverse IT environments
  • Collaborating with IT teams for patch management and ensures timely deployment of patches and reduce system vulnerabilities
  • Generating detailed security reports and dashboards, summarizing findings for senior management and stakeholders
  • Worked with cross-functional teams to address complex issues, including software bugs, infrastructure failures, and security vulnerabilities
  • Ensured all firewalls, security devices, systems, databases and applications reported data to SIEM and resolved any reporting issues while performing regular health checks
  • Block listing and whitelisting the Domains, Emails in Email security tool Proof point
  • Block listing the malicious IPs in Firewalls
  • We have deployed EDR agent for all the servers and it is communicating continuously 24
  • 7 to EDR server
  • Providing USB access request for specific users for business requirement through the requests in the ITSM ticketing tool
  • Purging the host name if any one leaves the organization in the sentinel one
  • Blocking the malicious Hash values in the EDR tool
  • Exposure to Ticketing tool Service Now
  • Installation and Configuration SSH, FTP, TELNET AND NFS, DNS, DHCP & IPAM (DDI)
  • Expertise on different file systems like ext3, ext4, XFS and NFS
  • Expertise in server troubleshooting and hardening
  • Coordinating with customers for change management
  • Installing & removing packages using RPM & YUM; contributing to kernel patching by using satellite server
  • System Administration, maintenance and monitoring various day-to-day operations
  • Adding route entries for accessing servers from different zones & executing system administration, maintaining & monitoring various day-to-day operations

Performing patch upgradation and OS upgradation as per vendor or customer requirements & automating job for various tasks using CRON & AT

  • Securing the servers as per organization’s policies & providing L1, L2 & L3 level support to the customer on all Linux server issues as per SLA
  • Installing software, patching, upgrading, & maintaining operating system & implementing RHEL Pacemaker cluster setup
  • Worked as data center operator for configuring rack setup of physical server’s induction (HP, Cisco, Lenovo, and Dell) and storage cable’s connectivity of servers
  • Resolving the hardware issues (DIMM, Hard disk) on data center for physical servers
  • Expertise in user & group management, disk partitioning (LVM) and working experience in large-scale enterprise development environment
  • In-depth knowledge on different file systems like ext3, ext4, XFS and NFS; experience on Kubernetes & Samba configuration
  • Managed KVM hypervisors on Linux servers, deploying virtual machines (VMs) running various guest OSes including Linux, Windows, and BSD
  • Tuned KVM host systems and guest VMs to ensure optimal CPU, memory, and I/O performance, achieving enhanced VM density and reduced latency
  • Monitored KVM system performance and utilized monitoring tools like virt-top, top, and iostat to ensure high system availability
  • Installed, configured, and maintained VMware ESXi hypervisors and vSphere clusters to host multiple virtual machines
  • Managed VMware vCenter for centralized management of ESXi hosts, including VM provisioning, migration, and resource management
  • Contributed to cost savings efforts by identifying opportunities for infrastructure optimization and resource consolidation in a Linux environment.
  • Implemented version control systems such as Git for better collaboration among team members and more efficient code management.
  • Managed multiple projects concurrently while adhering to strict deadlines, prioritizing work effectively to ensure successful delivery in a fast-paced environment.

Senior Security & Linux Engineer

Skill mine technologies
05.2022 - 07.2024
  • Worked on the IBM Q RADAR and LogRhythm, (console & web console) providing operations support at the Security Operations Centre for different firms
  • Troubleshooting SIEM dashboard issues when there are no reports getting generated or no data available
  • Managed and resolved high-priority L3 (Level 3) tickets in an ITSM environment, ensuring timely resolution aligned with SLAs
  • Conduct Vulnerability assessments of Network and Security devices using various tools like NMAP and Burp Suit
  • Map out a network, discover ports and services running on the different exposed network and security devices
  • Experience on Office365 into Email gateway security to overcome phishing attacks
  • Handling the complete incident management framework cycle right from incident identification, incident containment, performing root cause analysis, suggestion and implementation of preventive and corrective controls and perform network analysis as needed on a case-to-case basis
  • Analyzing Phishing and Spam related mails using header analysis, Body analysis using various tools and block them in O365
  • Preparing Weekly and Monthly reports
  • Will document the tickets with all the action taken for the incident and update it on frequent basis and maintain ticket quality by documenting it with all the required information
  • Conducted and managed Vulnerability scans using Qualys tool
  • Identifying critical weaknesses across diverse IT environments
  • Collaborating with IT teams for patch management and ensures timely deployment of patches and reduce system vulnerabilities
  • Generating detailed security reports and dashboards, summarizing findings for senior management and stakeholders
  • Worked with cross-functional teams to address complex issues, including software bugs, infrastructure failures, and security vulnerabilities
  • Ensured all firewalls, security devices, systems, databases and applications reported data to SIEM and resolved any reporting issues while performing regular health checks
  • Blocklisting and whitelisting the Domains, Emails in Email security tool Proofpoint
  • Blocklisting the malicious IPs in Firewalls
  • We have deployed EDR agent for all the servers and it is communicating continuously 24
  • 7 to EDR server
  • Providing USB access request for specific users for business requirement through the requests in the ITSM ticketing tool
  • Purging the hostname if any one leaves the organization in the sentinel one
  • Blocking the malicious Hash values in the EDR tool
  • Exposure to Ticketing tool Service Now
  • Installation and Configuration SSH, FTP, TELNET AND NFS, DNS, DHCP & IPAM (DDI)
  • Expertise on different file systems like ext3, ext4, XFS and NFS
  • Expertise in server troubleshooting and hardening
  • Coordinating with customers for change management
  • Installing & removing packages using RPM & YUM; contributing to kernel patching by using satellite server
  • System Administration, maintenance and monitoring various day-to-day operations
  • Adding route entries for accessing servers from different zones & executing system administration, maintaining & monitoring various day-to-day operations
  • Performing patch upgradation and OS upgradation as per vendor or customer requirements & automating job for various tasks using CRON & AT
  • Securing the servers as per organization’s policies & providing L1, L2 & L3 level support to the customer on all Linux server issues as per SLA
  • Installing software, patching, upgrading, & maintaining operating system & implementing RHEL Pacemaker cluster setup
  • Worked as data center operator for configuring rack setup of physical server’s induction (HP, Cisco, Lenovo, and Dell) and storage cable’s connectivity of servers
  • Resolving the hardware issues (DIMM, Hard disk) on data center for physical servers
  • Expertise in user & group management, disk partitioning (LVM) and working experience in large-scale enterprise development environment
  • In-depth knowledge on different file systems like ext3, ext4, XFS and NFS; experience on Kubernetes & Samba configuration
  • Managed KVM hypervisors on Linux servers, deploying virtual machines (VMs) running various guest OSes including Linux, Windows, and BSD
  • Tuned KVM host systems and guest VMs to ensure optimal CPU, memory, and I/O performance, achieving enhanced VM density and reduced latency
  • Monitored KVM system performance and utilized monitoring tools like virt-top, top, and iostat to ensure high system availability
  • Installed, configured, and maintained VMware ESXi hypervisors and vSphere clusters to host multiple virtual machines
  • Managed VMware vCenter for centralized management of ESXi hosts, including VM provisioning, migration, and resource management

Associate Manager

3i Infotech
04.2020 - 05.2022
  • Served as Senior Associate in SOC operations for real-time monitoring, analysing logs from various security/Industrial appliances
  • Administered various incidents/security alerts triggered in the SIEM tool
  • Carrying out log monitoring and incident analysis for various devices such as Firewalls, IDS, IPS, databases, web servers, and so forth
  • Security event analysis and intrusion detection by review and analysis of events generated by various components including IDS/IPS, firewalls, Routers, DB, and various types of security devices
  • Performed Real-Time Monitoring, Investigation, Analysis, Reporting, and Escalations of Security Events from multiple log sources
  • Preparing RCA documents and daily/weekly/monthly Reports
  • Support security incident response processes in the event of a security breach by providing incident reporting
  • Conducting penetration tests and launch exploits using Burp Suit
  • Review software posture and work with operations to plan code version upgrade requirements of supported security and network devices
  • Automating routine responses to security events to reducing the human intervention
  • Responsible for managing all aspects of the Vulnerability Risk Management Program including vulnerability identification, analysis, remediation coordination and reporting
  • Coordinate with Admin team to report vulnerabilities by explaining the exploitation and the impact of the issue
  • Managing permissions and access to the product
  • Performing authenticated and unauthenticated vulnerability scanning
  • Assisting teams with vulnerability resolution, including providing assistance researching vulnerabilities solutions and addressing false positives to reduce system workloads, performing confirmation scans when appropriate, meeting regularly with remediation team, and building reports to provide teams with necessary data
  • Understanding the incident based on to determine whether it’s false or true positive
  • Worked on Sentinel one EDR tool
  • Expertise in LINUX / UNIX system builds, administration, Installations, Upgrades, Troubleshooting on different distributions such as Ubuntu, CentOS, RHEL
  • Resolving the hardware issues (DIMM, Hard disk) on data center for physical servers
  • In-depth knowledge on different file systems like ext3, ext4, XFS and NFS
  • Installation and Configuration SSH, FTP, TELNET AND NFS, DNS, DHCP & IPAM (DDI)
  • Utilize tools like top, htop, iostat, and vmstat to monitor CPU, memory, disk I/O, and network usage
  • Developed custom shell scripts for system monitoring and automation, improving response times to incidents
  • Provided 24/7 support for critical production systems, reducing average incident resolution time by 40%
  • Collaborated with development teams to optimize CI/CD pipelines, enhancing deployment frequency by 25%
  • Spearheaded a migration project to RHEL 8, resulting in enhanced system security and performance
  • Recognized for leading a team in a successful data center consolidation, reducing operational costs by 15%
  • Analyze output to identify bottlenecks, such as high CPU load or excessive swapping
  • Adjust kernel parameters using sysctl to optimize performance
  • Use tune2fs to adjust filesystem parameters, such as enabling journaling or optimizing block sizes based on application needs
  • Implement RAID configurations (e.g., RAID 0, RAID 1, or RAID 10) to improve disk performance and redundancy
  • Use ulimit to manage resource limits for users and processes
  • Tune caching parameters for applications (e.g., database caching) to reduce disk I/O
  • Adjust read_ahead settings for block devices to enhance performance for read-intensive applications
  • Collect historical performance data to identify usage patterns using tools like SAR or collectl
  • Analyze CPU, memory, and storage trends to forecast future needs
  • Identify thresholds for CPU, memory, and disk I/O before performance degradation occurs
  • Evaluate applications for horizontal vs
  • Vertical scaling options, determining the best approach to meet increasing demand
  • Plan for adding more servers (horizontal scaling) versus upgrading existing hardware (vertical scaling)
  • Establish key performance indicators (KPIs) such as response times, throughput, and error rates to evaluate performance against expectations
  • Set thresholds for resource utilization (e.g., CPU usage consistently above 80%) to trigger scaling or optimization actions
  • Maintain documentation of capacity planning processes and decisions for future reference
  • Regularly report on system performance and capacity forecasts to stakeholders for informed decision-making

Education

Master of Science - Computer Science

Osmania University
India
01.2011

Bachelor of Science - Computer Science

Kakatiya University
India
01.2008

Skills

  • RHEL
  • CENTOS
  • UBUNTU
  • Logical Volume Manager
  • HPOV
  • Service now
  • Jira
  • Xymon
  • Grafana
  • Nagios
  • AWSCloudwatch
  • Ansible
  • Bash
  • Python
  • Redhat
  • Satellite
  • Jenkins
  • GIT Hub
  • Apache Tomcat
  • Nginx
  • Docker
  • Kubernetes
  • OpenShift
  • Redhat cluster Pacemaker
  • CI
  • CD
  • Terraform
  • FortiGATE
  • IDS/IPS
  • Windows and Linux server’s patches and security updates and Migration
  • Qualys
  • Nessus
  • SentinelOne
  • Crowd Strike
  • LogRhythm
  • IBM QRadar
  • Palo Alto
  • WAF
  • Splunk Phantom
  • IBM Resilient
  • Proofpoint
  • Forcepoint
  • AWS
  • Azure
  • GCP
  • OCI
  • ISO27001
  • PCI DSS
  • HIPAA
  • SOX
  • Threat Modelling
  • SAST
  • DAST
  • TPS Analysis
  • Penetration testing
  • OT
  • IoT

Certification

  • Certified Ethical Hacker v12 (CEH)
  • Microsoft Certified: DevOps Engineer Expert
  • Microsoft Certified: Azure Administrator Associate
  • AWS Certified Solutions Architect – Associate
  • HashiCorp Certified: Terraform Associate (003)
  • RHCSA Rapid Track Course Red Hat Enterprise Linux 6, 11/12/14 - 11/15/14
  • Red Hat System Administration III Red Hat Enterprise Linux 6, 01/14/15 - 01/17/15

Timeline

Senior Security & Linux Engineer

Salient Global Technology
08.2024 - Current

Senior Security & Linux Engineer

Skill mine technologies
05.2022 - 07.2024

Associate Manager

3i Infotech
04.2020 - 05.2022
  • Certified Ethical Hacker v12 (CEH)
  • Microsoft Certified: DevOps Engineer Expert
  • Microsoft Certified: Azure Administrator Associate
  • AWS Certified Solutions Architect – Associate
  • HashiCorp Certified: Terraform Associate (003)
  • RHCSA Rapid Track Course Red Hat Enterprise Linux 6, 11/12/14 - 11/15/14
  • Red Hat System Administration III Red Hat Enterprise Linux 6, 01/14/15 - 01/17/15

Master of Science - Computer Science

Osmania University

Bachelor of Science - Computer Science

Kakatiya University
Venkateswararao Velpula