Home

Militha - AWS DEVOPS
[email protected]
Location: Dallas, Texas, USA
Relocation: yes
Visa: green card
MILITHAANNAM
Sr. AWS DevOps Engineer
Mobile: +1-972-836-9602
Email: [email protected]
LinkedIn:https://www.linkedin.com/in/militha-a-5b0b04112/
Professional Summary:
Sr. Cloud DevOps Engineer 10 years of IT Experience as Cloud/DevOps Engineer comprising of Linux and System Administration with a major focus on AWS, Azure, OpenStack, Continuous Integration, Continuous Deployment, Configuration Management, Build/ReleaseEngineer, and Linux Systems Administrator with expertise in Private, Public, and Hybrid Cloud platforms along with using various tools like Docker, Kubernetes, Ansible, OpenShift, Puppet, Jenkins, Git, Maven.6+ Years of experience asa DevOps Engineerand 4 years of experience asa Network Administrator.
Experience in AWS Services EC2, IAM, Subnets, VPC, Cloud Formation, AMI, S3, SNS, SES, RedShift, CloudWatch, SQS, Route53, CloudTrail, Lambda, Kinesis, and RDS and obtaining High Availability and Fault Tolerance for AWS EC2 instances utilizing the services like Elastic IP, EBS and ELB.
Expertise in Amazon AWS Cloud Administration which includes services like: EC2, S3, EBS, VPC, ELB, AMI, SNS, RDS, IAM, Route 53, Auto scaling, Cloud Front, Cloud Watch.
Experience in AWS Cloud Formation templates to create customized VPCs, subnets, and NAT to ensure successful deployment of Web applications, also expertise in AWS server-less compute service Lambda and used AWS lambda to trigger changes in data shifts and action by users and run the code in the Postgres DB.
Experience with Puppet manifests for deployment and automation and have integrated Puppet with Jenkins to fully deploy onto a Jenkins server to provide continuous deployment and testing to automate the deployment of infrastructure.
Experience in using Docker including Docker Hub, Docker Engine, Docker images, Docker Compose, Docker Swarm, and Docker Registry, and used containerization to make our applications platform consistent and flexible when they are moved into different environments.
Expertise in administering and automating operations across multiple platforms and Windows servers, Performed numerous server migrations on both Linux/Unix.
Experience in integrating Jenkins with various tools like Maven (Build tool), Git (Repository), SonarQube (code verification), Nexus/JFrog (Artifactory), and implementing CI/CD automation for creating Jenkins pipelines programmatically architecting Jenkins Clusters.
Experience in working on version control systems like GIT and using Source code management client tools like Git Bash, GitHub, Git GUI, and other command-line applications.
Experience withELK architecture and its implementation. Handled installation, administration, and configuration of ELK stack on AWS and performed Log Analysis.
Excellent hands-on experience working with monitoring tools such as Splunk, ELK and working with load balancing, Integrating, and monitoring with Splunk also checking the health of applications.
Expert in writing scripts like Ruby, Perl, Power Shell, JSON, Node.js, YAML, Groovy, Bash/Shell, Python for automating the build and release process.
Experience in Working with web servers such as Apache HTTP server, NGINX, Apache TOMCAT, and application servers such as Oracle WebLogic 9.x/10.x, IBM WebSphere 6.x/7.x/8.x, JBoss 4.1.
Expertin using Routed Protocols like FTP, SFTP, SSH, HTTP, HTTPS, and Direct connect. And experience in Kickstart installations; support, configuration, and maintenance of Red Hat Enterprise Linux, CentOS.
Utilized all aspects of the Software Development Life Cycle (SDLC) such as Analysis, Planning, Development, Testing, Implementation, and Post-production analysis of the projects.


Technical Skills:
Cloud Environment AWS, GCP, Azure, OpenStack
Configuration Management tools Puppet, Ansible, Ansible Tower
Build tools Maven, Ant, Docker, MS Build, NPM
Automation tools Jenkins, Azure DevOps, GitLab, Terraform, CloudFormation
Version Control tools GIT, GIT-lab, TFS, Bitbucket, GitHub, Subversion (SVN)
Operation systems Red Hat Linux, SUSE, Ubuntu, CentOS, Windows, MacOS, UNIX
Web servers Apache, Tomcat, JBOSS 4.x/5.x, IIS, NGINX, Web Sphere4.0/5.0
Database System MS SQL Server, MySQL, MongoDB, Oracle 9i/10g/12C, IBM DB2
Monitoring tools CloudWatch, Splunk, ELK-Xpack, GrayLog, Grafana, New Relics
Networking DNS, DHCP, WAN, TCP/IP, NIS, NFS, SMTP, LAN, HTTP
Scripting Python, Ruby, Bash shell, Power shell, JSON
Virtualization Technologies VMware, Windows Hyper-V, Power VM, VirtualBox, Citrix Xen, Vagrant
Programming Python, Groovy, Shell, PowerShell.

CERTIFICATIONS:
Certified Azure Administrator Associate.
Certified AWS Developer Associate.
Certified Kubernetes Administrator.


Experience
Role: Sr. AWSDevOps EngineerDec 2022 to current
Client:General Motors,Detroit, Michigan
Responsibilities:
Utilized Terraform to automate Security groups, VPCs, ELBs, SQS queues, and S3 buckets. Worked on replacing the infrastructure with code from scratch. ELBs, S3 buckets, and EC2 instances were all given their own Terraform scripts.
Proven ability to build customized machine images and perform automated software installations after infrastructure provisioning using Terraform in conjunction with Packer.
Designed and developed Helm charts for deploying AWS-based applications, ensuring consistency and scalability across environments.
Deployed and managed Kubernetes applications on Amazon EKS using Helm charts, streamlining the deployment process for microservices and containerized applications.
Experience inusing infrastructure-as-code using Terraform templates and used Ansible for configuration management. used AWS Code Deploy to distribute code to the required environments.
Designed and deployed AWS infrastructure using CloudFormation templates to automate the provisioning of resources such as EC2, VPCs, S3, RDS, and Lambda, ensuring consistent and repeatable infrastructure deployments.
Developed automated compliance checks using AWS Lambda and Python to detect misconfigured resources and vulnerabilities, reducing security risks in cloud environments.
AWS certifications (e.g., AWS Certified DevOps Engineer, AWS Certified Solutions Architect) are highly preferred.
Utilized setting up and overseeing AWS networking services, including CloudFront, Direct Connect, Route 53, and VPC.
Experiencein utilizing AWS services such as Network Access Control Lists (NACLs), Identity and Access Management (IAM), and Security Groups to execute security best practices.
Experience in reusable Helm templates to standardize the deployment of microservices and Kubernetes workloads on Amazon EKS.
Managed AWS products for continuous integration and deployment, such as AWS Elastic Beanstalk, AWS Code Deploy, and AWS Code Pipeline.
Automated the release process of containerized applications using Helm, enabling version-controlled and consistent deployments across multiple environments.
Expert in monitoring and auditing AWS resources in real-time with knowledge of CloudWatch and CloudTrail, two AWS monitoring and logging services.
Proficient in moving on-premises apps to the AWS Cloud, encompassing the evaluation of applicability, choice of suitable AWS services, and implementation of the migration strategy.
Enhanced knowledge of AWS products including API Gateway, ECS, Lambda, S3, EC2, and S3.
Expertin automating deployment and provisioning procedures using AWS CDK and CloudFormation while building infrastructure as code.
Experience in creating serverless apps using AWS Lambda, API Gateway, and DynamoDB, producing highly scalable and reasonably priced solutions.
Created and customized Helm charts to define Kubernetes resources like Deployments, Services, Ingress, ConfigMaps, and Secrets, ensuring efficient configuration management and deployment.
Integrated maximizing the performance, affordability, and dependability of AWS resources, including rightsizing EC2 instances and setting up auto-scaling rules.
Implemented putting security measures in place to safeguard AWS resources and best practices for security on the platform.
Adaptive at keeping an eye on AWS setups and proactively diagnosing and optimizing them via CloudWatch metrics, alerts, and logs.
Automated version-controlled deployments of Kubernetes applications by integrating Helm with AWS CodePipeline and Jenkins, reducing manual deployment efforts and improving release consistency.
Utilized AWS services like AWS Storage Gateway, AWS Backup, and AWS Disaster Recovery in backup and disaster recovery plans.
Deployed and managed Docker containers for Java, Golang, and Python-based microservices, improving application scalability and reducing deployment time.
Automated AWS security configurations using Python and PowerShell scripts to enforce security best practices, including AWS Config rules, GuardDuty, and Security Hub integration.
Expert in reducing expenses through AWS utilization analysis and the use of cost-cutting strategies like Reserved Instances and Spot Instances.
Experience in Helm chart repositories, ensuring version control and seamless integration with CI/CD pipelines for automated deployments.
Monitored Helm chart releases for application health and performance, using Prometheus and Grafana to visualize key metrics and ensure optimized performance in AWS EKS environments.
Utilized tools like Ansible, Kubernetes, and Docker, I managed infrastructure upgrades and enhanced the Continuous Delivery process. I have strong expertise in the DevOps area.
Integrated Helm-deployed applications with AWS CloudWatch, Prometheus, and Grafana, enabling real-time monitoring and alerting for Kubernetes clusters on Amazon EKS.
Expert in robust security and compliance by managing IAM policies, conducting regular security assessments, and implementing automated security scans.
Established automation capabilities offered by Ansible and Terraform for a variety of AWS-related tasks, I utilized the programming languages Bash and Java.
Developed custom Helm charts tailored to specific AWS services (e.g., RDS, S3, Lambda) and application requirements, enhancing deployment efficiency.
Developed and deployed automated solutions to enhance server performance and scalability on AWS using Python, Shell scripting, and AWS SDKs, improving infrastructure reliability.
Role: AWSDevOps Engineer Jan 2020 to Nov 2022
Client: State of Kentucky, Frankfort, Kentucky
Responsibilities:
Designed, provisioned, and managed AWS cloud infrastructures, including EC2, EBS, S3 with cross-region replication, ELB, Auto Scaling, VPCs across multiple availability zones, RDS, and Route53 for optimal traffic routing.
Implemented comprehensive cloud security measures using IAM, Security Groups, Network ACLs, and encryption techniques to safeguard data and applications.
Managed the full lifecycle of Kubernetes applications using Helm, including installation, upgrade, and rollback processes in Amazon EKS, improving application management and minimizing downtime.
Configured and deployed AWS CloudWatch for real-time monitoring of AWS infrastructure, integrating custom metrics and logs from C++, Java, and Python applications.
Experience in Writing Templates for AWS infrastructure as a code using Terraform to build staging and production environments.
Automated cloud service provisioning and application deployment using Terraform, AWS CloudFormation, and custom Python scripts with Boto3.
Streamlined infrastructure management and version control with Git, integrating CI/CD pipelines using Jenkins, Ansible, and Docker for efficient build, test, and deployment processes.
Experience in creating different instances of AWS EC2, AWS AMI s creation, managing the volumes and configuring the security groups.
Experience in automated alerts and dashboards using CloudWatch, Prometheus, and Grafana to monitor key performance indicators (KPIs) and system health for AWS-based services.
Experience in Helm charts with Jenkins, GitHub Actions, and AWS CodePipeline to automate the deployment of applications on EKS clusters.
Integrated GIT with Jenkins using the GitHub plugin to automate the process of source code check-out by providing the URL and credentials of the GIT repository.
Expert in training sessions and workshops on DevOps tools and practices, promoting a culture of continuous learning and improvement.
Automated the provisioning and configuration of EKS clusters using infrastructure as code tools like Terraform and AWS CloudFormation.
Designed and optimized CI/CD pipelines using Jenkins, AWS CodePipeline, and AWS CodeBuild to automate testing, building, and deployment of Java, C#, and Ruby applications.
Experience in Converting existing Terraform modules that had version conflicts to utilize CloudFormation templates during deployments, worked with Terraform to create stacks in AWS and updated the Terraform scripts based on the requirement regularly.
Established a robust monitoring framework using AWS CloudWatch, ELK Stack (Elasticsearch, Logstash, & Kibana) for log aggregation, analysis, and visualization.
Debugged and optimized performance of AWS EC2 instances by analyzing server logs, tuning kernel parameters, and diagnosing networking issues in VPCs and subnets.
Ensured Helm chart deployments adhered to AWS security best practices, including IAM roles, VPC configurations, and security group settings.
Implemented cost-saving strategies by automating start/stop schedules for AWS resources with Ansible Playbooks, triggered via Jenkins.
Deployed Prometheus for monitoring and alerting, utilizing its powerful querying language to gain insights into system performance.
Set up Grafana dashboards to visualize metrics from Prometheus and other data sources, providing clear and actionable insights for stakeholders.
utilizing Splunk as a monitoring tool to proactively detect and address infrastructure issues before they impact critical processes.
Role: DevOps Engineer May2018 to Dec 2019
Client: Citi Bank, Tampa, Florida.
Responsibilities:
Managed Jenkins pipelines were created to automate the building of microservices, the storage of Docker images, the deployment of Kubernetes, and the integration of Ansible-driven deployments with Bitbucket.
Experience in AWS infrastructure provisioning using Python and Golang scripts, leveraging AWS SDKs (Boto3, AWS SDK for Go) to interact with EC2, S3, RDS, Lambda, and other AWS services.
Developed and maintained Infrastructure as Code (IaC) templates using Python-based AWS CloudFormation and Terraform, ensuring repeatable and scalable deployments.
Experience in AWS Systems Manager for automated patch management, configuration, and state enforcement across EC2 instances, reducing manual intervention and ensuring compliance
Developed custom build scripts in Ruby and Python to extend Jenkins and AWS CodeBuild functionality, supporting complex application build and deployment workflows.
Implemented Infrastructure as Code (IaC) using Terraform and CloudFormation to define and provision AWS resources, such as VPCs, EC2 instances, and RDS databases.
Experience in unit testing, code quality checks, and security scans into CI/CD pipelines using tools like SonarQube, ensuring robust, high-quality code releases.
Experience in Integrating AWS Lambda with services like API Gateway, SQS, and DynamoDB to build serverless APIs and event-driven architectures, improving application responsiveness and reducing infrastructure costs.
Contributed to cloud transformation projects, guiding teams through complex cloud migrations and architecture optimizations.
Executed decision-making processes, contributing to the strategic planning and execution of cloud services adoption, which resulted in enhanced operational efficiency and reduced costs.
Automated configuration management of AWS environments using Ansible and custom PowerShell scripts, ensuring consistent and repeatable infrastructure deployments.
Automated deployment pipelines for Lambda functions using AWS SAM (Serverless Application Model) and integrated with CI/CD tools like Jenkins and GitHub Actions.
Developed and deployed AWS Lambda functions using Python, Java, and Golang for microservice-based applications, enabling cost-efficient, scalable, serverless workflows.
Fostered strong collaboration between development, operations, and security teams to ensure seamless integration of DevOps practices. Led initiatives to break down silos, which significantly improved deployment frequency and reduced lead time for changes, enhancing overall productivity and agility.
Mentored junior team members and led workshops on cloud best practices and automation techniques, contributing to the development of a highly skilled IT department.

Role: Build and Release Engineer July 2013 to Aug 2017
Client: Imaginate Technology, Hyderabad, India.
Responsibilities:
Designed and maintained robust CI/CD pipelines using tools like Jenkins, GitLab CI, and CircleCI, significantly automating the software release process, improving deployment frequency by 40%, and reducing deployment failures.
Collaborated closely with development teams to integrate new code seamlessly into the main branch, ensuring adherence to quality standards through rigorous code review practices and automated testing, resulting in a 30% reduction in post-deployment issues.
Developed and maintained complex cloud architectures and deployment pipelines using AWS CDK, TypeScript, and AWS CodePipeline.
Monitored the release process using ELK stack and Prometheus, swiftly identifying and resolving bottlenecks, which improved build success rates and minimized downtime during deployments.
Ensured meticulous versioning, secure storage, and archiving of all release artifacts using Artifactory and Nexus, aligning with compliance requirements and facilitating easy retrieval for audit purposes.
Collaborated with QA teams to integrate automated testing frameworks like Selenium and JUnit into the CI/CD pipeline, significantly enhancing code quality and reducing time-to-market by 25%.
Implemented infrastructure as code (IaC) using Terraform and Ansible to automate the provisioning and management of cloud environments, reducing manual setup efforts by 60% and ensuring consistency across development, testing, and production environments.
Actively participated in the DevOps culture shift, leading workshops and training sessions for development and operations teams on best practices, tools, and methodologies, fostering a collaborative and efficient working environment.
Conducted thorough security audits of the CI/CD pipeline and integrated security practices into the development lifecycle, utilizing tools like SonarQube and OWASP ZAP to enhance application security posture.
Integrated AWS CDK with CI/CD pipelines, automating the deployment and updates of AWS infrastructure in a continuous delivery model.
Experience in Installing Firmware Upgrades, kernel patches, systems configuration, performance tuning on Unix/Linux systems.
Worked on web servers as Apache and application servers like Web logic, Tomcat, WebSphere, and JBOSS to deploy code.
Configured AWS CloudWatch Alarms and Logs using AWS CDK to monitor application performance and resource usage, providing real-time insights.
Providing training and support to developers and other team members on build/release tools and processes.
Documenting build and release procedures, including setup instructions and troubleshooting guides.
Identifying areas for improvement and implementing enhancements to optimize the release process.
Generating reports on build metrics, deployment success rates, and other key performance indicators.
Implemented blue-green deployments or canary releases to minimize downtime and risks.
Worked closely with DevOps, security, and development teams to ensure seamless integration of AWS CDK deployments with existing workflows.
Ensured that builds are triggered automatically upon code commits or scheduled intervals.
Managed release schedules and ensured alignment with project milestones and business objectives.
Ensured compliance with internal policies and external regulations related to software development and deployment.
Collaborated with product management to prioritize feature enhancements and bug fixes based on customer needs.
Expertise in Global File System (GFS), Creating, configuring and managing clusters in Redhat Linux Servers using GFS.
Implemented security best practices using AWS CDK and TypeScript, including IAM roles and policies, VPC configurations, and encryption.
Coordinate/assist developers with establishing and applying appropriate branching, labeling/naming conventions using GIT source control.
Monitored customer satisfaction metrics and used feedback to drive improvements in product quality and delivery.
Keywords: cplusplus csharp continuous integration continuous deployment quality analyst javascript sthree database information technology golang microsoft

To remove this resume please click here or send an email from [email protected] to [email protected] with subject as "delete" (without inverted commas)
[email protected];3952
Enter the captcha code and we will send and email at [email protected]
with a link to edit / delete this resume
Captcha Image: