Home

ateeq - DevOps
[email protected]
Location: Dallas, Texas, USA
Relocation: yes
Visa: green card
Experienced and innovative Senior Cloud DevOps Engineer with a proven track record in
architecting and securing infrastructure on AWS, leveraging EC2 instances, and deploying applications across a wide
range of AWS services. Skilled in ensuring high availability, fault tolerance, and auto-scaling through AWS
CloudFormation StackSets. Proficient in maintaining and developing Docker images for a diverse tech stack, including
Cassandra, Kafka, Apache, and Java services on Kubernetes in Google Cloud Platform (GCP). Adept at creating Python
scripts for automating AWS services such as web servers, ELB, CloudFront distribution, EC2, and database security
groups, optimizing efficiency and reducing manual intervention. Experienced in deploying Kubernetes clusters on Azure
and managing security groups on AWS using Terraform templates. Strong expertise in infrastructure automation using
Ansible and Puppet and deploying Azure IaaS and PaaS instances into secure VNets and subnets. Skilled in migrating
infrastructure and applications across various cloud platforms, with extensive knowledge of AWS and Azure services.
Proficient in utilizing GitLab's Kubernetes cluster integration for automated environment provisioning and testing and
orchestrating intricate CI/CD pipelines leveraging GitHub Actions for seamless software delivery processes.
PROFESSIONAL SUMMARY:
Experience in Architecting and securing the Infrastructure on AWS using EC2 instances and deploying applications
utilizing all the AWS services majorly focusing on high availability, fault tolerance, and Autoscaling in AWS
CloudFormation.
Maintained and developed Docker images for a tech stack including Cassandra, Kafka, Apache, and several in-house
written Java services running in Google Cloud Platform (GCP) on Kubernetes.
Created Python scripts to totally automate AWS services that include web servers, ELB, Cloud
Front distribution,
EC2 and database security groups, S3 bucket. This script creates stacks, single servers, or joins web servers to
stacks.
Experience in deploying Kubernetes Cluster on Azure with master/minion architecture and wrote many YAML files
to create many services like pods, deployments, auto-scaling, load balancers, labels, health checks, and
Namespaces.
Managing security groups on AWS, focusing on high availability, fault tolerance, and auto-scaling using Terraform
templates. Along with CI/CD with AWS Lambda & AWS code Pipeline.
Authored Playbooks in Ansible using YAML scripting and Manifests in Puppet using DSL to provision Nginx, Apache
Spark, Apache Web servers, Tomcat servers. And custom modules with Ansible Playbooks to automate in AWS
services like Launching EC2, Provisioning IAM, and Configuring VPC.
Experience in deploying Azure IaaS virtual machines (VMs) and cloud services (PaaS role instances) into secure
VNets and subnets. Implemented Terraform modules for deployment of applications across multiple
cloud providers like AWS, Azure, and OpenStack.
Experience in migrating infrastructure and applications from on-premises to Azure, AWS, and GCP. Has Experience
in automation of code deployment across AWS, Azure, Google Cloud, VMWare, and OpenStack.
Expertise in various AZURE services like Compute (Web Roles, Worker Roles), Database, Network, Internet of Things
(IoT), PowerShell Automation, Monitoring, Key Vault, and Scheduling.

Competence in designing AWS Cloud models for Infrastructure-as-a-Service (IAAS), Platform-as-a-Service (PAAS),
and Software-as-a-Service (SAAS) and worked on Azure PaaS storages like Blob and SQL Azure.
Extensive working knowledge of automation for deployment/configuration of different Application servers like
Web Sphere, WebLogic, and JBoss. Web Servers like Apache, and Tomcat, and Web Containers like Nginx, etc.
Expertise with Terraform key features such as IaC, Execution plans, Resource Graphs, Change Automation and
extensively used Auto-scaling launch configuration templates for launching Amazon EC2 instances while deploying
microservices.
Extensively used Kubernetes charts using Helm and created reproducible builds of the Kubernetes applications,
managed Kubernetes manifest files, and managed releases of Helm packages.
Building/Maintaining Docker container clusters managed by Kubernetes Linux, Bash, GIT, and Docker on
GCP.
Utilized Kubernetes and docker for the runtime environment of the CI/CD system to build, and test deploy.
Extensively worked on Chef Roles, Cookbooks, Recipes, Templates, Resources, Attributes & Data bags. Proficient in
the setup of Chef Servers, workstations & bootstrapping infrastructure Chef Nodes for configuration management.
Implemented and maintained observability tools, including OpenTelemetry, to effectively monitor, log, and trace
cloud-native applications. Ensured swift issue detection and resolution, contributing to enhanced system reliability
and performance.
Led the adoption of Google Cloud's Anthos platform to streamline hybrid and multi-cloud deployments, enabling
seamless application portability and scalability across diverse cloud environments. Collaborated with cross-
functional teams to architect and implement Anthos-based solutions, driving operational efficiency and cost
optimization initiatives.
Installing and configuring the Red Hat /CentOS 6.x using the Kickstart files which are kept in a single Kickstart server
and can be accessible by multiple machines physical and virtual server environment.
Experience in Installing, upgrading, and configuring Red Hat Linux 3.x, 4.x, using Kickstart Servers and Interactive
Installation.
Extensively worked with PowerShell to automate SQL tasks, environment management related tasks, and
procedures on Windows machines.
Orchestrated intricate CI/CD pipelines leveraging GitHub Actions, automating the end-to-end software delivery
process for multiple projects, significantly reducing deployment time.
Led the implementation of advanced GitHub Actions workflows to enable blue-green deployments, canary releases,
and automated rollbacks, enhancing system resilience and minimizing downtime during production updates.
Engineered a custom GitHub Actions solution integrated with AWS Lambda functions and AWS API Gateway,
optimizing serverless application deployment workflows, and reducing operational overhead per deployment cycle.
TECHNICAL SKILLS:

Cloud Microsoft Azure, Amazon Web Services, OpenStack, GCP.
Azure Services Azure VMs, VNet, Azure load Balancer, Azure App Service, Azure Blob Storage,
Azure SQL Database, Azure Key Vault, Azure Monitor, Azure Active Directory
(AD), Azure Functions, ACR, AKS.

AWS Services AWS EC2, AWS VPC, AWS ELB, AWS S3, AWS RDS, IAM (Identity and Access

Management), DynamoDB, AWS Lambda, AWS ECR, Amazon EKS.

Container Orchestration Tools Docker Swarm, Kubernetes, EC2 Container Services, Azure Container Services,

OpenShift

Configuration Management Chef, Ansible, Puppet

Version Control Tools GIT, GITHUB, Bitbucket
Web and Application Servers JBOSS, Apache Tomcat, Web Sphere, Web Logic, Nginx, Send Mail
Monitoring Tools Nagios, Splunk, Dynatrace, ELK, Datadog, Grafana, New Relic
Bug Tracking Tools JIRA, ServiceNow, Bugzilla, HP ALM, Confluence, Rally, IBM ClearQuest
Build Tools Maven, Ant, Gradle
CI/CD Jenkins, Bamboo, GitLab, GitHub Actions.
Scripting Languages Shell, Ruby, Python, PHP, Perl, JavaScript, PowerShell, JSON, YAML
Languages C, C++, Core Java, J2EE
Database MySQL, Oracle, Dynamo DB, Mongo DB, Cassandra
Repository Management Nexus, JFrog, Artifactory
Virtualization VMware ESX/ESXi, Windows Hyper-V, Power VM, Vagrant, Virtual box
Operating System Red Hat, Ubuntu, Debian, Fedora, CentOS, Windows, Solaris, Mac OS
Networking Protocols TCP/IP, DNS, NFS, ICMP, SMTP, DHCP, OSPF, BGP, UDP and RIP
CERTIFICATIONS:
Microsoft Certified Azure Administrator
Certified Kubernetes Administrator
AWS Certified Developer Associate
Role: Sr. AWS DevOps Engineer
Client: Fidelity Investments, Westlake, TX March 2022
Present
Responsibilities:
Managed AWS instances, configuring Security Groups, Elastic Load Balancers (ELB), and IAM roles to ensure secure
and efficient traffic flow within the cloud environment.
Worked in AWS environment, instrumental in utilizing Compute Services (EC2, ELB), Storage Services (S3, Glacier,
Block Storage, and Lifecycle Management policies), Cloud Formation, Lambda, VPC, RDS, and Cloud Watch.
Migrated Linux environment to AWS by creating and executing a migration plan, deployed EC2 instances in VPC,
configured security groups & NACLs, and attached profiles and roles using AWS Cloud Formation templates.
Experienced in implementing AWS Lambda for serverless execution and triggering code via S3 and SNS, and
integrated Access Gateway with identity providers like AWS SSO to manage access to AWS resources. Additionally,
designed policies to control and secure AWS resources and services.
Utilized AWS OpsWorks with Chef Recipes to deploy and manage layers and components for large-scale
applications, streamlining the deployment process and enhancing automation.
Orchestrated Docker deployment pipelines using Jenkins, pulling and pushing Docker images between Docker Hub
and AWS ECR, and managing Docker images for middleware installations and domain configurations.
Implemented continuous delivery pipelines with Docker, Jenkins, and GitHub, automating container builds from
new GitHub branches and ensuring smooth integration into the deployment workflow.
Conducted testing of Chef Cookbooks using Chef Kitchen, Chef Spec, and InSpec, ensuring the reliability and
functionality of automation scripts for various applications and services.
Leveraged Groovy scripts in Jenkins for executing continuous integration jobs, utilizing Groovy Jenkins Plugin and
Groovy Post-Build Action Plugin for build and post-build actions.

Administered Splunk SDK for JavaScript and Python, along with AWS CloudFormation templates for Splunk
distributed cluster deployment, facilitating effective log management and analysis.
Automated Java builds with Maven, integrating plugins for code analysis, unit testing, and artifact management,
enhancing the efficiency and reliability of the build process.
Utilized AWS ClodFormation StackSets to centrally manage and deploy infrastructure across multiple AWS accounts
and regions, ensuring consistency and compliance with organizational standards and policies.
Implemented AWS Secrets Manager for secure storage and rotation of sensitive credentials and secrets used by
applications and services, enabling automated retrieval and management of secrets at runtime.
Integrated Git with ServiceNow using Webhooks and scripted REST APIs, enabling seamless communication and
data synchronization between version control and service management systems.
Developed Shell and Python scripts to automate troubleshooting tasks on the AWS platform based on alerts
generated by AWS SNS, improving incident response times and system reliability.
Implemented advanced GitHub Actions security scanning workflows using tools such as CodeQL and OWASP ZAP,
proactively identifying and mitigating security vulnerabilities in the codebase, achieving compliance with industry
standards (e.g., GDPR, HIPAA, PCI-DSS).
Collaborated with cross-functional teams to establish GitHub Actions best practices and standards, conducting
regular knowledge-sharing sessions and workshops to empower development teams in leveraging GitHub Actions
effectively for continuous integration and delivery.
Architected a scalable infrastructure as code (IaC) framework using GitHub Actions workflows combined with
Terraform, enabling automated provisioning and configuration of AWS resources, resulting in improved resource
utilization and cost savings annually.
Integrated GitHub Actions with Slack and JIRA to enable real-time notifications and issue tracking, improving
collaboration and visibility across development and operations teams, and enhancing overall project management
and communication.
Utilized GitLab's built-in Kubernetes cluster integration for automated environment provisioning and testing,
enabling developers to deploy and validate changes in isolated environments before promoting them to
production, reducing the risk of production incidents.
Implemented GitLab's monitoring and observability features, including Prometheus and Grafana integration, to
gain insights into application performance and infrastructure health, facilitating proactive issue detection and
resolution.
Role: AWS DevOps Engineer
Client: kore.ai, Orlando, FL Feb 2020
Feb 2022
Responsibilities:
Created AWS Cloud Formation templates to create custom sized VPC, subnets, EC2 instances, ELB, security groups.
Worked on tagging standards for proper identification and ownership of EC2 instance and other AWS Services like
Cloud Front, Cloud Watch, RDS, S3, Route53, SNS, SQS, and Cloud Trail.
Experience in Converting existing AWS Infrastructure to Serverless architecture (AWS Lambda, Kinesis), deploying
via Terraform and AWS Cloud Formation templates.
Managed container images using Harbor Container Registry, ensuring secure storage and compliance with industry
standards. Implemented best practices for container security throughout the software development lifecycle.
Integrated Terraform into the workflow for efficient provisioning and automation of AWS resources. Streamlined
deployments of artifacts and services, enhancing agility and scalability.

Automated resource creation and management in OpenStack Cloud using Python and Terraform scripts. This
included tasks like managing Cinder volumes, optimizing resource utilization, and improving operational efficiency.
Designed robust data models for AWS Lambda applications, enabling comprehensive data analysis and generating
actionable insights for strategic decision-making. Implemented end-to-end traceability and lineage for key business
elements.
Implemented monitoring solutions using Datadog, CloudWatch, and ELK Stack (Elasticsearch, Logstash, Kibana) to
monitor real-time metrics, detect anomalies, and ensure system performance and reliability.
Utilized a combination of Shell, Bash, Python, Ansible, and Terraform to automate various tasks such as encrypting
EBS volumes, scheduling Lambda functions, and managing infrastructure as code (IaC) practices.
Developed Ansible Playbooks for automating infrastructure provisioning and management in AWS, optimizing
costs, and improving resource utilization. Implemented auto start/stop of AWS resources to reduce operational
expenses.
Deployed and configured Jenkins within a Docker swarm cluster to minimize failover downtime and automate
container deployments, improving deployment efficiency and reliability.
Established a real-time data analysis platform and implemented a GitOps workflow using GitLab CI/CD and ArgoCD.
This facilitated declarative infrastructure management, automated application deployments, and enhanced
deployment reliability.
Developed Docker images to support development, testing, and deployment automation, including tools like
Jenkins, Selenium, JMeter, and ELK (Elasticsearch, Logstash, Kibana) for log analytics and monitoring.
Created automated alerting mechanisms to promptly notify stakeholders about critical system events and
performance anomalies, enabling proactive incident response and resolution.
Wrote AWS Cloud Formation templates to build the infrastructure and used Ansible playbook to build Open-Shift
master instances, etcd instances, and node instances on AWS infra.
To trigger changes made in AWS Dynamo DB integrated it with Lambda, created Cron jobs for initiating our daily
batch data pulls, executing our continuous integration tests done under Jenkins & backup the Dynamo DB streams.
Conducted regular audits and assessments of Harbor Container Registry to enforce container security best practices
and compliance standards. Implemented image scanning and vulnerability management processes to mitigate
security risks and ensure the integrity of containerized workloads throughout their lifecycle.
Implemented advanced GitLab CI/CD features such as parallel job execution, caching, and artifact management to
optimize build and deployment processes, achieving faster feedback loops and improved developer productivity.
Developed an Ansible playbook for Gerrit and ELK cluster, implementing automated deployment and configuration.
Managed the GIT using Nexus tool to automate the build process and used the same to share the snapshots and
releases of internal projects.
Role: DevOps Engineer
Client: National Grid, Waltham, MA Dec 2016 Jan
2020
Responsibilities:
Involved in Serverless services (Azure Functions) where I created and configured HTTP Triggers in the Azure
Functions with Application Insights for monitoring and performing the load testing on the Applications using the
VSTS (Visual Studio Team Services).
Created and implemented (Azure Resource Manager) ARM templates and deployed them using the Azure portal,
also used Azure quick start templates for Cloud Infrastructure design and implementation to deploy Web
applications on Azure PowerShell Workflow

Created Azure SQL database and performed monitoring and restoring of Azure SQL database. Performed migration
of On-premises Microsoft SQL server to Azure SQL database.
Migrated the application from Infrastructure as a Service (IaaS) to Platform as a Service (PaaS) by converting the
existing solution to a Windows Azure Worker Role. Developed Microservices tools using Python, Shell scripting, and
XML to automate some of the menial tasks.
Created automated Stack driver monitoring alerts using Terraform on GCP. Worked on Python runbooks as well as
PowerShell runbooks in automation accounts for creating and removing the projects within a Subscription.
Automated VSTS (Visual Studio Team Services) build and deployment to IAAS and PAAS environment in Azure and
developed build support utilities in PowerShell.
Generated Azure OMS Hybrid Automation PowerShell Runbooks to automate the creation of testing and QA
environments using vSphere.
Designed Terraform templates to create custom sized VPC, subnets, and NAT to ensure successful deployment of
Web applications and database templates and migration from traditional to cloud environment.
Configured the Kubernetes provider with Terraform which is used to interact with resources supported by
Kubernetes to create several services such as Deployments, services, ingress rules, Config Map, secrets, etc., in
different Namespaces.
Experience in developing APIs using Kubernetes to manage and specify the copies of the Docker containers to run
the actual servers in the Azure cloud environment. Scheduled, deployed, and managed Container replicas onto a
node cluster using Kubernetes.
Setting up Kubernetes (k8s) Clusters for running microservices and pushing microservices into production with
Kubernetes backed Infrastructure. Development of automation of Kubernetes clusters via playbooks in Ansible.
Implemented cluster services using Docker and Kubernetes to manage local deployments in Kubernetes by building
a self-hosted Kubernetes cluster using Terraform and Ansible and deploying application containers.
Implemented the automated Nagios in Ops environment for alerts & email notifications using Python script &
executed them through Ansible.
Designed and implemented continuous integration/continuous deployment (CI/CD) pipelines using industry-
standard tools like Jenkins, GitLab CI/CD, and Spinnaker. Integrated observability tools into CI/CD workflows to
enable end-to-end visibility and traceability of code changes, deployments, and performance metrics.
Collaborated with development teams to optimize application performance and resource utilization through
performance tuning, capacity planning, and infrastructure automation. Utilized insights from observability tools to
identify optimization opportunities and implement infrastructure-as-code (IaC) solutions using Terraform and
Ansible.
Installing WebLogic/tomcat application, deployment of WAR, JAR, and EAR files across all the environments
through Ansible playbooks. Configured Spark Standalone and Cassandra Multi-node Clusters using Ansible.
Worked with Ansible playbooks and inventory which are the entry point for Ansible provisioning and management
where the automation is defined through tasks and run Ansible scripts to provision servers.
Integrated Ansible Tower with Jenkins to quickly deploy critical applications, managed changes, and provided
encryption needed for task files with Ansible Vault.
Used Nagios as a monitoring tool to identify and resolve infrastructure problems before they affect critical
processes and worked on Nagios Event handlers in case of automatic restart of failed applications and services.
Setup SCM Polling for Immediate Build with Maven and Maven Repository (Nexus Artifactory) by installing Jenkins
Plugins for GIT Repository
Composed Python and shell scripts to do all CI/CD using Jenkins, Git in GitHub, to access the databases to retrieve
and archive data and to improve application security.

Configured and deployed Bitnami ELK stack on Azure, worked on Installing plugins and troubleshooting HTTPS
support with SSL certificates.
As part of continuously delivering Agile team, develop, test, and deploy Data platform features Develop ongoing
test automation using chef, Python-based framework using Ansible to Setup/teardown of ELK Stack.
Worked in development, testing and production environment using SQL, PL/SQL procedure, Python, PowerShell,
and shell scripts and managed hosting servers like Tomcat, Apache, and NGINX.
Role: Linux System Administrator
Client: Meijer, Michigan. Feb 2013 Nov
2016
Responsibilities:
Installed the latest patches for, Oracle on Red Hat Linux servers, Configured and administered Send mail, Samba,
and Squid servers in a Linux environment.
Set up Linux Cron jobs to automate various build-related and application data synchronization tasks and handled
the building of Linux OS servers using kick-start automation applications, additionally configuring Kickstart and
Jumpstart servers to initiate installations of Red Hat Linux and Solaris on multiple machines simultaneously.
Updated previous LDAP tools to be compatible with the version of Ruby Rails, and was involved in installing,
configuring, and upgrading Red Hat Linux AS 4/5 and Solaris 9/10 operating systems.
Performed automated installations of Operating systems using kick start for Red Hat Enterprise Linux5/6 and
Jumpstart for Solaris 9/10 Linux.
Proficiently managed and maintained diverse Linux distributions, such as Linux Enterprise Desktop, SUSE Linux
Enterprise Server, Red Hat, and Solaris. Demonstrated expertise in installing, upgrading, and configuring Drupal and
WordPress within the LAMP stack environment on Unix/Linux servers. Proficiently utilized RPM and YUM for Linux
package installations while effectively provisioning systems with LVM.
Developed, customized, and constructed packages for Solaris and RPMs for Linux, ensuring seamless deployment
across multiple servers throughout the Software Development Life Cycle. Expertly gathered pre-migration data
using Shell scripts tailored for Solaris and Linux, facilitating smooth server migration processes.
Performed automated jobs to do patching, saline, FTP, Vulnerability, log rotate, Inventory backup, post build tasks
using scripting.
Actively involved in configuration and deployment of various sets of custom configurations about Linux/UNIX server
security, OS hardening, and maintenance of Baseline standards.
Deployed built artifacts to WebSphere application server using Python. Writing Python script to start/stop web
logic servers/cluster and deployment of code and used Python for automation.
Automated Nagios services for database server, webserver, application-server, networks, file sizes, RAM utilization,
and Disk performances using Python script in Chef.
Keywords: cprogramm cplusplus continuous integration continuous deployment quality analyst artificial intelligence sthree database active directory information technology hewlett packard procedural language Florida Massachusetts Texas

To remove this resume please click here or send an email from [email protected] to [email protected] with subject as "delete" (without inverted commas)
[email protected];3302
Enter the captcha code and we will send and email at [email protected]
with a link to edit / delete this resume
Captcha Image: