ateeq - DevOps |
[email protected] |
Location: Dallas, Texas, USA |
Relocation: yes |
Visa: green card |
Experienced and innovative Senior Cloud DevOps Engineer with a proven track record in
architecting and securing infrastructure on AWS, leveraging EC2 instances, and deploying applications across a wide range of AWS services. Skilled in ensuring high availability, fault tolerance, and auto-scaling through AWS CloudFormation StackSets. Proficient in maintaining and developing Docker images for a diverse tech stack, including Cassandra, Kafka, Apache, and Java services on Kubernetes in Google Cloud Platform (GCP). Adept at creating Python scripts for automating AWS services such as web servers, ELB, CloudFront distribution, EC2, and database security groups, optimizing efficiency and reducing manual intervention. Experienced in deploying Kubernetes clusters on Azure and managing security groups on AWS using Terraform templates. Strong expertise in infrastructure automation using Ansible and Puppet and deploying Azure IaaS and PaaS instances into secure VNets and subnets. Skilled in migrating infrastructure and applications across various cloud platforms, with extensive knowledge of AWS and Azure services. Proficient in utilizing GitLab's Kubernetes cluster integration for automated environment provisioning and testing and orchestrating intricate CI/CD pipelines leveraging GitHub Actions for seamless software delivery processes. PROFESSIONAL SUMMARY: Experience in Architecting and securing the Infrastructure on AWS using EC2 instances and deploying applications utilizing all the AWS services majorly focusing on high availability, fault tolerance, and Autoscaling in AWS CloudFormation. Maintained and developed Docker images for a tech stack including Cassandra, Kafka, Apache, and several in-house written Java services running in Google Cloud Platform (GCP) on Kubernetes. Created Python scripts to totally automate AWS services that include web servers, ELB, Cloud Front distribution, EC2 and database security groups, S3 bucket. This script creates stacks, single servers, or joins web servers to stacks. Experience in deploying Kubernetes Cluster on Azure with master/minion architecture and wrote many YAML files to create many services like pods, deployments, auto-scaling, load balancers, labels, health checks, and Namespaces. Managing security groups on AWS, focusing on high availability, fault tolerance, and auto-scaling using Terraform templates. Along with CI/CD with AWS Lambda & AWS code Pipeline. Authored Playbooks in Ansible using YAML scripting and Manifests in Puppet using DSL to provision Nginx, Apache Spark, Apache Web servers, Tomcat servers. And custom modules with Ansible Playbooks to automate in AWS services like Launching EC2, Provisioning IAM, and Configuring VPC. Experience in deploying Azure IaaS virtual machines (VMs) and cloud services (PaaS role instances) into secure VNets and subnets. Implemented Terraform modules for deployment of applications across multiple cloud providers like AWS, Azure, and OpenStack. Experience in migrating infrastructure and applications from on-premises to Azure, AWS, and GCP. Has Experience in automation of code deployment across AWS, Azure, Google Cloud, VMWare, and OpenStack. Expertise in various AZURE services like Compute (Web Roles, Worker Roles), Database, Network, Internet of Things (IoT), PowerShell Automation, Monitoring, Key Vault, and Scheduling. Competence in designing AWS Cloud models for Infrastructure-as-a-Service (IAAS), Platform-as-a-Service (PAAS), and Software-as-a-Service (SAAS) and worked on Azure PaaS storages like Blob and SQL Azure. Extensive working knowledge of automation for deployment/configuration of different Application servers like Web Sphere, WebLogic, and JBoss. Web Servers like Apache, and Tomcat, and Web Containers like Nginx, etc. Expertise with Terraform key features such as IaC, Execution plans, Resource Graphs, Change Automation and extensively used Auto-scaling launch configuration templates for launching Amazon EC2 instances while deploying microservices. Extensively used Kubernetes charts using Helm and created reproducible builds of the Kubernetes applications, managed Kubernetes manifest files, and managed releases of Helm packages. Building/Maintaining Docker container clusters managed by Kubernetes Linux, Bash, GIT, and Docker on GCP. Utilized Kubernetes and docker for the runtime environment of the CI/CD system to build, and test deploy. Extensively worked on Chef Roles, Cookbooks, Recipes, Templates, Resources, Attributes & Data bags. Proficient in the setup of Chef Servers, workstations & bootstrapping infrastructure Chef Nodes for configuration management. Implemented and maintained observability tools, including OpenTelemetry, to effectively monitor, log, and trace cloud-native applications. Ensured swift issue detection and resolution, contributing to enhanced system reliability and performance. Led the adoption of Google Cloud's Anthos platform to streamline hybrid and multi-cloud deployments, enabling seamless application portability and scalability across diverse cloud environments. Collaborated with cross- functional teams to architect and implement Anthos-based solutions, driving operational efficiency and cost optimization initiatives. Installing and configuring the Red Hat /CentOS 6.x using the Kickstart files which are kept in a single Kickstart server and can be accessible by multiple machines physical and virtual server environment. Experience in Installing, upgrading, and configuring Red Hat Linux 3.x, 4.x, using Kickstart Servers and Interactive Installation. Extensively worked with PowerShell to automate SQL tasks, environment management related tasks, and procedures on Windows machines. Orchestrated intricate CI/CD pipelines leveraging GitHub Actions, automating the end-to-end software delivery process for multiple projects, significantly reducing deployment time. Led the implementation of advanced GitHub Actions workflows to enable blue-green deployments, canary releases, and automated rollbacks, enhancing system resilience and minimizing downtime during production updates. Engineered a custom GitHub Actions solution integrated with AWS Lambda functions and AWS API Gateway, optimizing serverless application deployment workflows, and reducing operational overhead per deployment cycle. TECHNICAL SKILLS: Cloud Microsoft Azure, Amazon Web Services, OpenStack, GCP. Azure Services Azure VMs, VNet, Azure load Balancer, Azure App Service, Azure Blob Storage, Azure SQL Database, Azure Key Vault, Azure Monitor, Azure Active Directory (AD), Azure Functions, ACR, AKS. AWS Services AWS EC2, AWS VPC, AWS ELB, AWS S3, AWS RDS, IAM (Identity and Access Management), DynamoDB, AWS Lambda, AWS ECR, Amazon EKS. Container Orchestration Tools Docker Swarm, Kubernetes, EC2 Container Services, Azure Container Services, OpenShift Configuration Management Chef, Ansible, Puppet Version Control Tools GIT, GITHUB, Bitbucket Web and Application Servers JBOSS, Apache Tomcat, Web Sphere, Web Logic, Nginx, Send Mail Monitoring Tools Nagios, Splunk, Dynatrace, ELK, Datadog, Grafana, New Relic Bug Tracking Tools JIRA, ServiceNow, Bugzilla, HP ALM, Confluence, Rally, IBM ClearQuest Build Tools Maven, Ant, Gradle CI/CD Jenkins, Bamboo, GitLab, GitHub Actions. Scripting Languages Shell, Ruby, Python, PHP, Perl, JavaScript, PowerShell, JSON, YAML Languages C, C++, Core Java, J2EE Database MySQL, Oracle, Dynamo DB, Mongo DB, Cassandra Repository Management Nexus, JFrog, Artifactory Virtualization VMware ESX/ESXi, Windows Hyper-V, Power VM, Vagrant, Virtual box Operating System Red Hat, Ubuntu, Debian, Fedora, CentOS, Windows, Solaris, Mac OS Networking Protocols TCP/IP, DNS, NFS, ICMP, SMTP, DHCP, OSPF, BGP, UDP and RIP CERTIFICATIONS: Microsoft Certified Azure Administrator Certified Kubernetes Administrator AWS Certified Developer Associate Role: Sr. AWS DevOps Engineer Client: Fidelity Investments, Westlake, TX March 2022 Present Responsibilities: Managed AWS instances, configuring Security Groups, Elastic Load Balancers (ELB), and IAM roles to ensure secure and efficient traffic flow within the cloud environment. Worked in AWS environment, instrumental in utilizing Compute Services (EC2, ELB), Storage Services (S3, Glacier, Block Storage, and Lifecycle Management policies), Cloud Formation, Lambda, VPC, RDS, and Cloud Watch. Migrated Linux environment to AWS by creating and executing a migration plan, deployed EC2 instances in VPC, configured security groups & NACLs, and attached profiles and roles using AWS Cloud Formation templates. Experienced in implementing AWS Lambda for serverless execution and triggering code via S3 and SNS, and integrated Access Gateway with identity providers like AWS SSO to manage access to AWS resources. Additionally, designed policies to control and secure AWS resources and services. Utilized AWS OpsWorks with Chef Recipes to deploy and manage layers and components for large-scale applications, streamlining the deployment process and enhancing automation. Orchestrated Docker deployment pipelines using Jenkins, pulling and pushing Docker images between Docker Hub and AWS ECR, and managing Docker images for middleware installations and domain configurations. Implemented continuous delivery pipelines with Docker, Jenkins, and GitHub, automating container builds from new GitHub branches and ensuring smooth integration into the deployment workflow. Conducted testing of Chef Cookbooks using Chef Kitchen, Chef Spec, and InSpec, ensuring the reliability and functionality of automation scripts for various applications and services. Leveraged Groovy scripts in Jenkins for executing continuous integration jobs, utilizing Groovy Jenkins Plugin and Groovy Post-Build Action Plugin for build and post-build actions. Administered Splunk SDK for JavaScript and Python, along with AWS CloudFormation templates for Splunk distributed cluster deployment, facilitating effective log management and analysis. Automated Java builds with Maven, integrating plugins for code analysis, unit testing, and artifact management, enhancing the efficiency and reliability of the build process. Utilized AWS ClodFormation StackSets to centrally manage and deploy infrastructure across multiple AWS accounts and regions, ensuring consistency and compliance with organizational standards and policies. Implemented AWS Secrets Manager for secure storage and rotation of sensitive credentials and secrets used by applications and services, enabling automated retrieval and management of secrets at runtime. Integrated Git with ServiceNow using Webhooks and scripted REST APIs, enabling seamless communication and data synchronization between version control and service management systems. Developed Shell and Python scripts to automate troubleshooting tasks on the AWS platform based on alerts generated by AWS SNS, improving incident response times and system reliability. Implemented advanced GitHub Actions security scanning workflows using tools such as CodeQL and OWASP ZAP, proactively identifying and mitigating security vulnerabilities in the codebase, achieving compliance with industry standards (e.g., GDPR, HIPAA, PCI-DSS). Collaborated with cross-functional teams to establish GitHub Actions best practices and standards, conducting regular knowledge-sharing sessions and workshops to empower development teams in leveraging GitHub Actions effectively for continuous integration and delivery. Architected a scalable infrastructure as code (IaC) framework using GitHub Actions workflows combined with Terraform, enabling automated provisioning and configuration of AWS resources, resulting in improved resource utilization and cost savings annually. Integrated GitHub Actions with Slack and JIRA to enable real-time notifications and issue tracking, improving collaboration and visibility across development and operations teams, and enhancing overall project management and communication. Utilized GitLab's built-in Kubernetes cluster integration for automated environment provisioning and testing, enabling developers to deploy and validate changes in isolated environments before promoting them to production, reducing the risk of production incidents. Implemented GitLab's monitoring and observability features, including Prometheus and Grafana integration, to gain insights into application performance and infrastructure health, facilitating proactive issue detection and resolution. Role: AWS DevOps Engineer Client: kore.ai, Orlando, FL Feb 2020 Feb 2022 Responsibilities: Created AWS Cloud Formation templates to create custom sized VPC, subnets, EC2 instances, ELB, security groups. Worked on tagging standards for proper identification and ownership of EC2 instance and other AWS Services like Cloud Front, Cloud Watch, RDS, S3, Route53, SNS, SQS, and Cloud Trail. Experience in Converting existing AWS Infrastructure to Serverless architecture (AWS Lambda, Kinesis), deploying via Terraform and AWS Cloud Formation templates. Managed container images using Harbor Container Registry, ensuring secure storage and compliance with industry standards. Implemented best practices for container security throughout the software development lifecycle. Integrated Terraform into the workflow for efficient provisioning and automation of AWS resources. Streamlined deployments of artifacts and services, enhancing agility and scalability. Automated resource creation and management in OpenStack Cloud using Python and Terraform scripts. This included tasks like managing Cinder volumes, optimizing resource utilization, and improving operational efficiency. Designed robust data models for AWS Lambda applications, enabling comprehensive data analysis and generating actionable insights for strategic decision-making. Implemented end-to-end traceability and lineage for key business elements. Implemented monitoring solutions using Datadog, CloudWatch, and ELK Stack (Elasticsearch, Logstash, Kibana) to monitor real-time metrics, detect anomalies, and ensure system performance and reliability. Utilized a combination of Shell, Bash, Python, Ansible, and Terraform to automate various tasks such as encrypting EBS volumes, scheduling Lambda functions, and managing infrastructure as code (IaC) practices. Developed Ansible Playbooks for automating infrastructure provisioning and management in AWS, optimizing costs, and improving resource utilization. Implemented auto start/stop of AWS resources to reduce operational expenses. Deployed and configured Jenkins within a Docker swarm cluster to minimize failover downtime and automate container deployments, improving deployment efficiency and reliability. Established a real-time data analysis platform and implemented a GitOps workflow using GitLab CI/CD and ArgoCD. This facilitated declarative infrastructure management, automated application deployments, and enhanced deployment reliability. Developed Docker images to support development, testing, and deployment automation, including tools like Jenkins, Selenium, JMeter, and ELK (Elasticsearch, Logstash, Kibana) for log analytics and monitoring. Created automated alerting mechanisms to promptly notify stakeholders about critical system events and performance anomalies, enabling proactive incident response and resolution. Wrote AWS Cloud Formation templates to build the infrastructure and used Ansible playbook to build Open-Shift master instances, etcd instances, and node instances on AWS infra. To trigger changes made in AWS Dynamo DB integrated it with Lambda, created Cron jobs for initiating our daily batch data pulls, executing our continuous integration tests done under Jenkins & backup the Dynamo DB streams. Conducted regular audits and assessments of Harbor Container Registry to enforce container security best practices and compliance standards. Implemented image scanning and vulnerability management processes to mitigate security risks and ensure the integrity of containerized workloads throughout their lifecycle. Implemented advanced GitLab CI/CD features such as parallel job execution, caching, and artifact management to optimize build and deployment processes, achieving faster feedback loops and improved developer productivity. Developed an Ansible playbook for Gerrit and ELK cluster, implementing automated deployment and configuration. Managed the GIT using Nexus tool to automate the build process and used the same to share the snapshots and releases of internal projects. Role: DevOps Engineer Client: National Grid, Waltham, MA Dec 2016 Jan 2020 Responsibilities: Involved in Serverless services (Azure Functions) where I created and configured HTTP Triggers in the Azure Functions with Application Insights for monitoring and performing the load testing on the Applications using the VSTS (Visual Studio Team Services). Created and implemented (Azure Resource Manager) ARM templates and deployed them using the Azure portal, also used Azure quick start templates for Cloud Infrastructure design and implementation to deploy Web applications on Azure PowerShell Workflow Created Azure SQL database and performed monitoring and restoring of Azure SQL database. Performed migration of On-premises Microsoft SQL server to Azure SQL database. Migrated the application from Infrastructure as a Service (IaaS) to Platform as a Service (PaaS) by converting the existing solution to a Windows Azure Worker Role. Developed Microservices tools using Python, Shell scripting, and XML to automate some of the menial tasks. Created automated Stack driver monitoring alerts using Terraform on GCP. Worked on Python runbooks as well as PowerShell runbooks in automation accounts for creating and removing the projects within a Subscription. Automated VSTS (Visual Studio Team Services) build and deployment to IAAS and PAAS environment in Azure and developed build support utilities in PowerShell. Generated Azure OMS Hybrid Automation PowerShell Runbooks to automate the creation of testing and QA environments using vSphere. Designed Terraform templates to create custom sized VPC, subnets, and NAT to ensure successful deployment of Web applications and database templates and migration from traditional to cloud environment. Configured the Kubernetes provider with Terraform which is used to interact with resources supported by Kubernetes to create several services such as Deployments, services, ingress rules, Config Map, secrets, etc., in different Namespaces. Experience in developing APIs using Kubernetes to manage and specify the copies of the Docker containers to run the actual servers in the Azure cloud environment. Scheduled, deployed, and managed Container replicas onto a node cluster using Kubernetes. Setting up Kubernetes (k8s) Clusters for running microservices and pushing microservices into production with Kubernetes backed Infrastructure. Development of automation of Kubernetes clusters via playbooks in Ansible. Implemented cluster services using Docker and Kubernetes to manage local deployments in Kubernetes by building a self-hosted Kubernetes cluster using Terraform and Ansible and deploying application containers. Implemented the automated Nagios in Ops environment for alerts & email notifications using Python script & executed them through Ansible. Designed and implemented continuous integration/continuous deployment (CI/CD) pipelines using industry- standard tools like Jenkins, GitLab CI/CD, and Spinnaker. Integrated observability tools into CI/CD workflows to enable end-to-end visibility and traceability of code changes, deployments, and performance metrics. Collaborated with development teams to optimize application performance and resource utilization through performance tuning, capacity planning, and infrastructure automation. Utilized insights from observability tools to identify optimization opportunities and implement infrastructure-as-code (IaC) solutions using Terraform and Ansible. Installing WebLogic/tomcat application, deployment of WAR, JAR, and EAR files across all the environments through Ansible playbooks. Configured Spark Standalone and Cassandra Multi-node Clusters using Ansible. Worked with Ansible playbooks and inventory which are the entry point for Ansible provisioning and management where the automation is defined through tasks and run Ansible scripts to provision servers. Integrated Ansible Tower with Jenkins to quickly deploy critical applications, managed changes, and provided encryption needed for task files with Ansible Vault. Used Nagios as a monitoring tool to identify and resolve infrastructure problems before they affect critical processes and worked on Nagios Event handlers in case of automatic restart of failed applications and services. Setup SCM Polling for Immediate Build with Maven and Maven Repository (Nexus Artifactory) by installing Jenkins Plugins for GIT Repository Composed Python and shell scripts to do all CI/CD using Jenkins, Git in GitHub, to access the databases to retrieve and archive data and to improve application security. Configured and deployed Bitnami ELK stack on Azure, worked on Installing plugins and troubleshooting HTTPS support with SSL certificates. As part of continuously delivering Agile team, develop, test, and deploy Data platform features Develop ongoing test automation using chef, Python-based framework using Ansible to Setup/teardown of ELK Stack. Worked in development, testing and production environment using SQL, PL/SQL procedure, Python, PowerShell, and shell scripts and managed hosting servers like Tomcat, Apache, and NGINX. Role: Linux System Administrator Client: Meijer, Michigan. Feb 2013 Nov 2016 Responsibilities: Installed the latest patches for, Oracle on Red Hat Linux servers, Configured and administered Send mail, Samba, and Squid servers in a Linux environment. Set up Linux Cron jobs to automate various build-related and application data synchronization tasks and handled the building of Linux OS servers using kick-start automation applications, additionally configuring Kickstart and Jumpstart servers to initiate installations of Red Hat Linux and Solaris on multiple machines simultaneously. Updated previous LDAP tools to be compatible with the version of Ruby Rails, and was involved in installing, configuring, and upgrading Red Hat Linux AS 4/5 and Solaris 9/10 operating systems. Performed automated installations of Operating systems using kick start for Red Hat Enterprise Linux5/6 and Jumpstart for Solaris 9/10 Linux. Proficiently managed and maintained diverse Linux distributions, such as Linux Enterprise Desktop, SUSE Linux Enterprise Server, Red Hat, and Solaris. Demonstrated expertise in installing, upgrading, and configuring Drupal and WordPress within the LAMP stack environment on Unix/Linux servers. Proficiently utilized RPM and YUM for Linux package installations while effectively provisioning systems with LVM. Developed, customized, and constructed packages for Solaris and RPMs for Linux, ensuring seamless deployment across multiple servers throughout the Software Development Life Cycle. Expertly gathered pre-migration data using Shell scripts tailored for Solaris and Linux, facilitating smooth server migration processes. Performed automated jobs to do patching, saline, FTP, Vulnerability, log rotate, Inventory backup, post build tasks using scripting. Actively involved in configuration and deployment of various sets of custom configurations about Linux/UNIX server security, OS hardening, and maintenance of Baseline standards. Deployed built artifacts to WebSphere application server using Python. Writing Python script to start/stop web logic servers/cluster and deployment of code and used Python for automation. Automated Nagios services for database server, webserver, application-server, networks, file sizes, RAM utilization, and Disk performances using Python script in Chef. Keywords: cprogramm cplusplus continuous integration continuous deployment quality analyst artificial intelligence sthree database active directory information technology hewlett packard procedural language Florida Massachusetts Texas |