Home

Sai Kumar S - Sr Devops / Cloud Engineer (Azure, AWZ, AKS, EKS, Terraform , Docker, Kubernetes, CICD).
[email protected]
Location: Dallas, Texas, USA
Relocation:
Visa: H1b
I'm looking for a new role Sr Devops / Cloud Engineer (Azure, AWZ, AKS, EKS, Terraform , Docker, Kubernetes, CICD).

I have a diverse background spanning multiple cloud platforms, extensive experience in designing and implementing CI/CD pipelines, strong foundation in Infrastructure as Code (IaC), expertise in tools like Ansible, Docker, Kubernetes, Terraform, and a focus on networking.

Here's a brief overview of my qualifications:

Certifications: I am a certified Azure Associate (AZ-104), AWS DevOps Engineer Professional, HashiCorp Terraform Associate, and Certified Kubernetes Application Developer (CKAD), demonstrating my expertise in cloud technologies and container orchestration.

Technical Proficiency: I excel in managing cloud infrastructures on Azure and AWS, implementing robust CI/CD pipelines using tools like Azure DevOps, Jenkins, ArgoCD, and GitHub Actions, and orchestrating Kubernetes clusters for efficient application deployment.

Infrastructure as Code (IaC): Proficient in designing and implementing infrastructure using Terraform and AWS CloudFormation, ensuring consistency and scalability across deployment projects.

Automation with Ansible: Skilled in utilizing Ansible for machine provisioning, configuration management, and automation of deployment pipelines, streamlining infrastructure management processes.

Containerization with Docker: Experienced in implementing microservices-based architecture using Docker, integrating image build processes with CI/CD pipelines for efficient deployment.

Kubernetes Orchestration: Well-versed in orchestrating Kubernetes clusters, deploying containerized applications, and ensuring efficient management and scalability of Kubernetes environments.

Networking: Experienced in configuring VPCs, subnets, load balancers, and network security groups, optimizing network architecture for performance and security.

I look forward to the possibility of working together.

Warm regards,
Sai Kumar S



Skilled DevOps Engineer certified in Azure Associate (AZ-104), AWS DevOps Engineer Professional, HashiCorp Certified Terraform Associate, Certified Kubernetes Application Developer (CKAD). My expertise lies in effectively managing services on both AWS and Azure platforms, leveraging my strong technical background to design comprehensive CI/CD pipelines that enhance SDLC. I excel in implementing robust monitoring and logging solutions, ensuring real-time visibility into application performance and infrastructure health. Additionally, I have a proven track record of designing and maintaining end-to-end infrastructure, security and IAM configurations for applications deployed across on-premises and cloud.

Cloud Infra Management: Proficient in managing, configuring infra on Azure and AWS, ensuring scalability, reliability, and security.
CI/CD Pipeline Implementation: Experienced in designing and implementing end-to-end CI/CD pipelines for various applications, utilizing Azure DevOps, Jenkins, and GitHub Actions to automate build, test, and deployment workflows.
Technical Support and Troubleshooting: Provided technical expertise and support to application teams, assisting in deployment of application code and Infrastructure as Code (IaC), and troubleshooting issues to optimize CI/CD workflows.
Terraform Expertise: Developed reusable Terraform modules for infrastructure provisioning, enhancing consistency and scalability.
API Management: Created and maintained APIM configurations to support application teams and ensure seamless API integration.
Azure Service Management: Managed multiple Azure services including Azure Service Bus, Azure Storage, Azure AD, and Azure Traffic Manager, facilitating communication and messaging between application components.
GitHub Actions Integration: Conducted Proof of Concepts (POCs) for integrating Azure DevOps with GitHub Actions, leveraging GitHub Actions to automate workflows for code integration, testing, and deployment.
Role-Based Access Controls (RBAC): Designed and implemented role-based access controls within multi-tenant environments, enforcing granular access controls and permissions to maintain data isolation and security compliance.
Documentation and Training: Developed comprehensive documentation for multi-tenant communication, access control mechanisms, and disaster recovery procedures, and provided training to application teams for effective utilization.
AKS Cluster Management: Led the migration of on-premises VM infrastructure to AKS, deploying Docker containers managed by Azure Kubernetes Service, and ensuring minimal disruption and data loss during the migration process.
CI/CD Pipeline with Jenkins: Designed and implemented CI/CD pipelines using Jenkins for image creation and AKS deployments, integrating Twistlock for real-time application vulnerability scanning and security enforcement.
Artifact Management: Managed deployment of artifacts effectively with Artifactory, Nexus, JFrog, for efficient artifact management.
Monitoring and Alerting: Configured monitoring and alerting tool dashboards for Kubernetes applications, ensuring proactive issue detection and system optimization, and integrated monitoring tools like Prometheus, Grafana, and Loki for advanced monitoring.
Compliance and Security: Collaborated with compliance and information security teams to address reported vulnerabilities, performing regular security enhancement, integrating Azure Security Center, Azure Sentinel for continuous monitoring and threat detection.
Azure Sentinel Configuration: Configure and fine-tune Azure Sentinel settings to align with organizational security policies and requirements, ensuring optimal performance and security monitoring.
Deployment and Integration: Deploy Azure Sentinel instances and integrate various data sources such as servers, applications, and security systems to enable comprehensive log collection and analysis.
Alert System Management: Develop and manage alerting rules in Azure Sentinel to promptly notify security teams of potential security threats or anomalies.
Root Cause Analysis: Conducted root cause analysis of post-production performance-related issues using tools like Splunk, ELK, Nagios, and Dynatrace, optimizing application performance and resource utilization.
Kubernetes Orchestration: Orchestrated Kubernetes charts using Helm, ensuring reproducible builds of Kubernetes applications, and implemented HA clusters with multi-zones for fault tolerance.
Infrastructure as Code (IAC): Designed and implemented IAC solutions using AWS CloudFormation and Terraform, leveraging auto-scaling for microservices deployments and integrating Terraform and Ansible across geographically separated hosting zones.
Containerization with Docker: Implemented microservices-based architecture using Docker, integrated image build process with Azure DevOps and GitHub Actions, and facilitated blue-green deployment with CDN for seamless rollouts and rollbacks.
Continuous Improvement: Provided support and mentoring to team members, driving continuous improvement in efficiency, speed, and quality, and conducted regular reviews and optimizations of CI/CD to enhance efficiency and reduce deployment times.
Technical Expertise: Demonstrated proficiency in a wide range of AWS and Azure cloud services, encompassing servers, storage, networking, databases, IAM, resource management, VMs, availability scalability, CI/CD build, and deployment.
CERTIFICATION:

Cloud Native Certified Kubernetes Application Developer (CKAD)
AWS Certified DevOps Engineer Professional (DOP-C01).
Microsoft Certified: Azure Administrator Associate (AZ-104).
Hashicorp Certified: Terraform Associate.

Education: MS from University of Alabama in Huntsville, GPA: 3.6.
PROFESSIONAL EXPERIENCE:

Azure Devops (Platform Engineering), Berkshire Hathaway Homestate Companies - Workers Compensation, April 2023.
Managed Azure DevOps infrastructure and configurations, ensuring scalability, reliability, and security of CI/CD pipelines, including the implementation of disaster recovery strategies to maintain high availability and data integrity.
Implemented end-to-end CI/CD pipelines for various applications within the organization, leveraging Azure DevOps to automate build, test, and deployment workflows, incorporating disaster recovery strategies such as Cloud-Based DR and Multi-site Redundancy.
Provided technical expertise and support to application teams, assisting in the deployment of both application code and Infrastructure as Code (IaC), with a focus on incorporating DR practices in environment setups.
Collaborated with cross-functional teams, including finance, EIS, Salesforce, and marketing, to deploy microservice-based applications.
Worked closely with teams to debug error logs, troubleshoot issues, and optimize CI/CD workflows for efficient software delivery.
Developed reusable Terraform modules for infrastructure provisioning, enhancing consistency and scalability across deployment projects.
Created and maintained critical API Management nfigurations to support application teams and ensure seamless API integration.
Engineered Python scripts to automate the deployment of API Management (APIM) using Terraform, streamlining the APIM resources.
Implemented version control, release management practices for Helm charts, facilitating versioning, rollback for deployment.
Managed Helm chart dependencies effectively, orchestrating the installation and lifecycle management of dependent services and components within Kubernetes clusters.
Implemented ArgoCD for GitOps-based to enable declarative configuration management and automated deployment synchronization.
Managed Azure Kubernetes Service clusters to orchestrate containerized applications, ensuring efficient deployment and scalability.
Contributed to the adoption of new tools and technologies, including GitHub Actions, to improve development workflows.
Provided guidance and support to development teams in configuring and customizing GitHub Actions workflows.
Developed Terraform module to automate the trust establishment and role authorization within app registrations hosted in multi-tenant.
Defined roles within the multi-tenant to enforce granular access controls, maintaining data isolation and security compliance.
Designed multi-tenant communication strategies between applications and APIs, ensuring secure and efficient data flow.
Collaborated with application teams to integrate role-based access controls (RBAC) into their deployments, ensuring adherence to organizational security policies and standards.
Provided training and documentation on multi-tenant communication, access control mechanisms, and disaster recovery procedures, enabling application teams to effectively utilize the implemented solutions.
Azure Devops Engineer (Infra Management & App code Migration), Global Medical Response, July 2022 March 2023
Collaborated on code development, build, and deployment using Azure DevOps services like Azure Repos and Pipelines.
Led the seamless migration of a large-scale application from Bamboo to Azure DevOps, optimizing CI/CD processes.
Deployed and managed CI/CD system using Azure DevOps to build, test, and deploy code with a working knowledge of migrating existing Bitbucket code to Azure DevOps and building CI/CD pipelines for .NET and Node.js applications.
Worked with DBAs and multiple teams during the migration of a monolithic application, documenting the process comprehensively.
Modernized legacy Jenkins pipelines by migrating them to Azure Repos and Pipelines.
Supported infrastructure management using Terraform, ensuring robust and scalable cloud infrastructure.
Managed Azure Kubernetes policies, provisioned access to different Azure resources, and improved workflows.
Supported infrastructure management using Terraform and Azure Kubernetes, ensuring that disaster recovery plans are implemented and tested for robust and scalable cloud infrastructure, Service Fabric clusters, and Kubernetes policies.
Conducted periodic security assessments and configuration audits of the Azure Sentinel environment to ensure compliance.
Created documentation, operational runbooks, user guides to ensure smooth operation and quick reference for security team.
Minimized service degradation with monitoring tools such as Azure Log Analytics, Azure Network Watcher, and Azure Service Health.
Utilized monitoring tools like Azure Log Analytics, Network Watcher, and Service Health to minimize service degradation.
Cerner Corp, Kansas City (Remote), March 2021- June 2022.
AWS DevOps Engineer (Infrastructure Engineer) (Software Engineer)
Led the implementation of AWS Connect, a cloud-based call center solution, at Cerner, responsible for setting up the infrastructure, including ETL pipelines, database configuration, and integration with Salesforce.
Led the implementation of AWS Connect at Cerner, setting up infrastructure, ETL pipelines, and database configuration.
Developed end-to-end infrastructure for ETL pipelines, integrating AWS Connect with Salesforce & streaming data to for BI reporting.
Leveraged AWS CDK with Python to deploy infrastructure for ETL jobs and Glue Crawlers within AWS Connect.
Managed CI/CD pipelines for microservices-based applications using AWS Code Deploy, Code Pipeline, and CloudFormation.
Collaborated with developers to ensure application deployment on various AWS services like EC2, RDS, Lambda, and SNS.
Wrote custom Lambda functions within AWS for processing JSON data and flat file processing through Glue jobs.
Implemented secure cloud configuration and cloud security technologies like CloudTrail, AWS Config, VPC, security groups, and IAM.
Integrated Amazon Connect with CloudWatch to analyze CloudWatch metrics and migrated call metrics data from legacy systems.
Automated backup mechanisms for critical infrastructure components and application data, ensuring data integrity and availability during disaster recovery scenarios.
Azure Devops Engineer (Infra and App code Migration):
Led the migration of on-premises VM infrastructure to a scalable container-based solution orchestrated with AKS, deploying Docker containers managed by Azure Container Service.
Implemented disaster recovery strategies during the migration to AKS, minimizing disruption and data loss by designing failover mechanisms within AKS clusters, configuring geo-replication for persistent data storage, and establishing backup and restore procedures.
Conducted thorough testing of disaster recovery (DR) processes to validate effectiveness and documented recovery procedures for swift restoration in case of unforeseen events, ensuring business continuity during migration.
Utilized Azure Container Service for deploying and managing Docker containers, ensuring scalability and high availability.
Authored Helm charts for microservices and Kubernetes objects, streamlining application containerization.
Integrated Helm chart deployment pipelines into CI/CD workflows, automating the packaging, testing, and deployment of applications.
Supported the development teams for Helm chart-related issues, diagnosing problems and ensure smooth application deployments.
Developed comprehensive documentation to facilitate smooth onboarding of new teams for AKS implementation.
Designed and implemented CI/CD pipelines using Jenkins for image creation and AKS deployments.
Integrated Twistlock plugin and TwistCLI into Jenkins pipeline for real-time application vulnerability scanning and security enforcement.
Analyzed Twistlock scan reports, offering code recommendations to enhance system security.
Sr. DevOps Engineer, Santander Inc, Dallas, TX (Remote), February 2020- February 2021
Extensively worked on AWS infrastructure utilizing CloudFormation templates and terraform for provisioning, orchestrated Kubernetes clusters, automated deployments with Docker, ECS/EKS, and managed Kafka components.
Configured AWS S3 buckets with permissions, logging, versioning, and automated backup solutions for enhanced data resilience.
Led migration efforts from on-premises applications to AWS Cloud, provisioning infrastructure through Terraform and CFT.
Orchestrated Kubernetes clusters for application deployment using Docker and ECS scheduler, ensuring continuous availability during infrastructure migrations.
This integration also included advanced management of Kafka components, facilitating robust, scalable messaging solutions that supported critical real-time data processing tasks.
Automated app deployment with Amazon Elastic Beanstalk, implementing capacity provisioning, load balancing, and auto-scaling.
Utilized AWS S3 services to configure buckets with permissions, logging, versioning, and tagging for efficient data management.
Supported Node.js application development, troubleshooting issues, and implementing best practices.
Integrated Docker image vulnerability scanning using Twistlock and JFrog X-ray for enhanced security.
Implemented Kubernetes integration with HashiCorp Vault for runtime configuration injection and managed secrets.
Monitored Kubernetes clusters using Splunk agents and AWS CloudWatch for efficient visibility.
Developed reusable infrastructure components with Terraform modules, implementing versioning to support multiple environments.
Administered Jenkins servers, resolving job failures, managing permissions, and plugin upgrades.
Provided support and mentoring to team members, driving continuous improvement in efficiency and quality.
Designed and implemented complex JIRA workflows, including project workflows and notification schemes.
Integrated Datadog, Splunk, and New Relic dashboards with AWS for comprehensive performance monitoring.
Sr. Azure DevOps Engineer, Kivyo Inc, Fremont, CA, September 2018- December 2019
Led the comprehensive administration and automation of Azure infrastructure utilizing Terraform and Azure DevOps for CI/CD.
Administered the Azure environment by building, designing, and deploying infrastructure using Terraform.
Managed Terraform modules in a central repository for efficient infrastructure provisioning and management across Azure environments.
Automated Azure IaaS virtual machines using Terraform templates and modules for streamlined deployment and management.
Used Ansible for machine creations, SQL server, cluster server, and MySQL installations, for efficient provisioning and configuration.
Configured Vnets, subnets, private, public-facing Azure load balancers for optimizing network architecture and performance.
Achieved CD by leveraging Kubernetes, maintaining auto-scaling, and load-balancing applications for optimal performance. Integrated Kubernetes with network, storage, security services to provide comprehensive infrastructure orchestration for containerized workloads.
Configured Prometheus to monitor Kubernetes nodes with node-exporter and monitor Kubernetes API resources with Kubestate metrics.
Implemented microservices based architecture using Docker, integrated the image build process with Azure DevOps.
Implemented Blue-green deployment with CDN for seamless rollouts and rollbacks, managing asset delivery, network load efficiently.
Customized and maintained Azure Sentinel workbooks and dashboards to visualize and monitor security metrics for organization s needs.
Integrated external threat intelligence with Azure Sentinel to enhance detection capabilities and provide context to security alerts.
Provide training and support to security team members, including best practices for monitoring, analysis, and incident response.
Configured Azure Traffic Manager for routing user traffic and migrations, facilitating seamless transition for virtualized infrastructure.
Managed the ELK cluster for centralized logging and search functionalities, integrating Grafana and Nagios for server monitoring.
Used Ansible for setup/teardown of ELK stack, troubleshooting builds, ensuring efficient management and maintenance of infrastructure.
Provided training and guidance to teams on Terraform best practices, coding standards, and CI/CD pipeline integration with Azure.
Infrastructure Engineer, 3M, Saint Paul, MN, May 2016 - June 2018
Automated provisioning and management of resources, including ELB, CloudFront distribution, RDS, EC2 instances, database security groups, Route 53 configurations, VPC setups, subnets, security groups, and S3 buckets, using Terraform and CFT.
Integrated Jenkins with AWS via the Code Pipeline plugin, facilitating the creation of EC2 instances to provide virtual servers.
Implemented cost-saving measures by developing Ansible Playbooks to start/stop AWS resources, triggered from Jenkins.
Engineered custom VPCs, subnets, NAT gateways, and Route53 configurations using AWS CloudFormation Templates to support successful deployment of web applications and database templates.
Automated deployments and created cutover documentation to facilitate the migration from a managed hosting environment to AWS.
Managed Kubernetes using Helm charts, establishing a robust CI pipeline with Artifactory and CD environment using Jenkins.
Orchestrated Kubernetes applications using nodes, ConfigMaps, selectors, services, deploying containers as Pods to ensure efficient resource utilization, implemented multi-tenant clusters using Rancher.
Built a secret management system using Hashicorp Vault, automating the process for managing application credentials, tokens, and API keys, leveraged Vault Enterprise for enhanced security and compliance features.
Provided support for application development, troubleshooting issues, and implementing best practices for security and performance.
Implemented ELK to monitor system logs, AWS CloudWatch metrics, VPC Flow Logs, CloudTrail events, and changes in S3.
Automated the installation of ELK with Ansible Playbooks and established a centralized logging mechanism on Docker containers.
Managed AWS node configurations using Ansible Playbook with Python SSH as the wrapper, automating the deployment of ELK agent.
Integrated Prometheus, Grafana, and Loki for advanced monitoring and logging capabilities.
Sr. Build and Release Engineer, John Hancock Financial, Bangalore, India, November 2014 - April 2016
Led the development of a robust CI/CD system with Jenkins, leveraging Docker for building, testing, and deploying applications. Responsible for overseeing and monitoring over 200 daily builds and maintaining Jenkins pipeline scripts.
Collaborated closely with developers to troubleshoot failures and iteratively improve the CI/CD process based on developers' feedback.
Integrated additional build technologies such as Maven and MSBuild to optimize and streamline the build process effectively.
Proactively maintained and optimized Jenkins build servers to enhance build automation and minimize delivery pipeline bottlenecks.
Implemented a secure multi-tenant architecture utilizing tools like Artifactory and Vault for artifact management and secrets storage.
Integrated Jenkins with various tools including Maven, Git, SonarQube, Nexus, and Selenium, leveraging Chef and Vagrant for CD.
Managed and configuration the MySQL instances on both EC2 and RDS platforms, ensuring optimal performance and reliability.
Managed centralized logging, metrics collection, and alerting to effectively monitor application health and performance.
Provided on-call support for teams during deployments, ensuring smooth and successful deployments while promptly addressing issues.
Conducted regular reviews and optimizations of CI/CD to enhance efficiency, reduce deployment times and improve system reliability.
Keywords: continuous integration continuous deployment javascript access management business intelligence sthree active directory microsoft Arizona California Minnesota Texas

To remove this resume please click here or send an email from [email protected] to [email protected] with subject as "delete" (without inverted commas)
[email protected];2533
Enter the captcha code and we will send and email at [email protected]
with a link to edit / delete this resume
Captcha Image: