Home

SHARAT CHANDRA - Devops
[email protected]
Location: Apex, North Carolina, USA
Relocation: Eastern
Visa:
SHARAT CHANDRA

Email id: [email protected]
Contact: 505-718-3499
2815 Haw River Trl,
Apex, NC, 27502

PROFESSIONAL SUMMARY:
• 10+ years of overall IT Experience
• Planned and lead a team of engineers to successfully deliver Region Migration of a Business-critical application.
• Worked with implementing DevSecOps practices by integrating Contrast security tools into CICD pipelines
• Deployed applications to Cloud Infrastructure using Jenkins, and did automation using Python
• Upgraded EKS and Azure Kuberenetes Service Versions from 1.17 to latest.
• Monitored applications and K8s clusters using Prometheus and Grafana
• Extensive experience working with Infrastructure as a code using Cloudformation Templates and Terraform
• Supported applications running on EKS, GKE, and AKS.
• Supported applications running on Java, Nodejs, Python and Go.
• Implemented Blue-Green Deployment Strategies for Production Applications on AWS.
• Experienced building Micro-services Architecture (Docker, Kubernetes, ECS and EKS)
• Transitioned applications from monolithic applications to containerization.
• Implemented micro-services architecture using API gateways, Lambdas and containerized applications
• Good hands-on experience with deploying and managing different AWS databases like RDS, DynamoDB, ElastiCache and Redshift.
• Migrated Applications from Onprem to AWS.
• Lead the development teams to employ security best practices in development life cycle.
• Implemented Spot Fleets for lower environments to reduce instance costs by 60-70%.
• Involved in SDLC of an application from the infrastructure perspective in terms of capacity planning, requirements, automation and CICD Pipelines.
• Extensive experience with networking and configuring VPCs and securing the applications.
• Extensive experience with many AWS services like IAM, Cloudwatch, Route53, S3, EC2, etc..
• Experience with Log Aggregation tools like ELK and Grafana.
• Experience with ECS, Kubernetes and Openshift
• Well versed with Cloudflare and all its offerings.
• Experience working in Agile Environment to make sure the project deliverables are completed on time and meeting their respective deadlines.
• Experience working with DevOps tools like Puppet, Ansible, Jenkins, GIT, Splunk, ELK, Grafana, monitoring tools like SolarWinds, Site24x7, New Relic, Sensu, Nagios and Scheduling tools like Rundeck.
• Well versed with CICD implementation of Infrastructure using Cloudformation/Terraform, GIT, Jenkins, Ansible.
• Well versed with CI/CD concepts and implementation using GIT, Jenkins and Puppet.
• Expertise in Unix, Red Hat Linux Enterprise 5,6,7, CentOS, Ubuntu 12,14, SUSE 10,11, Solaris 9,10, programming (Ruby, Shell and Python Scripting).

CERTIFICATIONS & EDUCATION:
• Certified AWS Solutions Architect Professional (2020)
• Certified HashiCorp Terraform Associate (2020)
• Certified Microsoft Azure Administrator (2020)
• Certified Microsoft Azure Fundamentals (2020)
• New Relic Certified Performance Pro.
• Completed Master’s Degree in Electrical Engineering from University of Texas at San Antonio. With an overall GPA of 3.6 (2012)
• Completed B.E in Electrical and Electronics Engineering from MVSR Engineering College, affiliated to Osmania University, Hyderabad, with a GPA of 3.65 (2010)

PROFESSIONAL EXPERIENCE:
NETAPP
Sr SRE (Feb 2020 – Present)
Raleigh, NC
• Upgraded EKS Versions from 1.17 to 1.18 to 1.19, ensuring no downtime for the applications.
• Worked on designing and enabling WAF on applications.
• Deployed applications to Azure using CICD.
• Built Observability into applications as part of SRE.
• Automated Alerts and monitors using Python scripts.
• Built IaC using Terraform for Azure and ensured that it is built with security best practices in mind.
• Configured application gateway and WAF in Azure for application security.
• As an SRE Supported Azure Kubernetes clusters, upgraded the AKS versions.
• Supported P1 and P2 incidents and helped resolve them in time.
• Supported applications running on GKE 1.18 and 1.19
• Supported security incidents by deploying the respective patches and shielding the applications.
• Created Helm charts, and deployed/upgraded applications on Kubernetes using helm deployments and Kustomize
• Created automations for better deployments using Python and Bash.
• Monitored applications and K8s clusters using Prometheus and Grafana
• As an SRE Enabled Log Aggregation for applications running on Kubernetes using ELK.
• Created Metrics, Dashboards and alerts for applications in ELK
• Leveraged Prometheus for monitoring as needed.
• Transitioned applications from monolithic applications to containerization.
• Built docker images for microservices to run on ECS/EKS.
• Worked extensively with EC2 and autoscaling.
• Implemented AWS Best Practices with respect to Security standards and deployment perspective on all AWS Services.
• Used Terraform for Infrastructure creation.

ELSEVIER Inc
Sr SRE (Sept 2016 – Feb 2020)
Philadelphia, PA
• Worked with multiple teams to ensure they are following the company’s Architecture standards and Application security standards.
• Planned and lead a team of engineers to successfully deliver Region Migration of a Business-critical application.
• As an SRE Monitored containerized applications using Prometheus, Grafana and Fluentd
• Took the initiative and worked with development teams to employ security best practices in their development lifecycle with sonar scanning and contrast.
• Implemented CICD pipelines to incorporate DevSecOps practices by including Contrast security scanning into it.
• Built High availability and Reliability into Infrastructure and applications as part of SRE work.
• Implemented micro-services architecture using API gateways, Lambdas and containerized applications
• Crated Python scripts for Lambda’s for Infrastructure Automation
• As an SRE Managed DNS, firewalls, CDN using Cloudflare and well versed with all its offerings.
• Deep knowledge and Experience in creating Infrastructure as a code using Terraform and Cloudformation Templates.
• Extensive experience with configuring and managing all the services offered by New Relic (APM, Infrastructure, synthetics, browser, alerts, insights etc…)
• Worked with and lead QA teams both Onsite and offshore to incorporate QA tests into CICD pipelines, so deployments can happen all the way from development to production without anyone’s manual intervention.
• Migrated Applications from onprem to AWS using Terrafrom / Cloudformation Templates and following the CICD process, and automating where needed in Python and Bash
• Used terraform to build infrastructure on AWS for services like EC2, EKS, etc..
• Built custom AMI images for EC2 for applications using packer.
• Implemented Blue-Green deployment style for applications for major releases and patch updates.
• Patching Instances regularly by updating / modifying the AMIs of EC2 instances.
• Reduced Infrastructure costs of the application account by 30-40% by doing capacity planning, reservations and using EC2 Spot Fleet where needed.
• Managed ECS Clusters, deployments and scaling of microservices.
• Experience with building and deploying applications to Kubernetes (EKS) and Openshift.
• Involved in SDLC of an application from its inception in the infrastructure side. Worked with the team on capacity planning, application requirements and building out Automated infrastructure using Cloudformation, GIT, Jenkins, and Ansible for dev, qa, staging and prod environments.
• Implemented CICD pipelines for infrastructure using Terraform/Cloudformation Templates, Jenkins AWS Resources and Ansible.
• Implemented Spot Fleets for lower environments to reduce instance costs by 60-70%.
• Implemented CICD Pipelines for Applications using GIT, Jenkins and Ansible.
• Implemented Role Based Cross Account CLI Access for users.
• Architectured, Designed, Built out and managed Log Aggregation tools like ELK (5.x, 6.x, 7.x) and Grafana (on both Spot Fleet and reserved Instances) using Infrastructure as a code and configuration management tools like Ansible.
• Configured, managed and enabled New Relic Monitoring for Java and Node based applications using Ansible.
• Experience with setting up synthetic monitoring tools like New Relic, Solarwinds, and Site24x7.
• Supporting the production platforms during regular releases and production issues.
• Supporting applications by going on on-call schedule.

COMCAST
DevOps Engineer / Linux Systems Administrator (Feb 2015 – Sept 2016)
Philadelphia, PA
• Experience working in Agile Environment.
• Well versed with Rally and Jira.
• Working in DevOps model to define, develop, maintain and support products
• Designed, Architectured and Built out Highly Available Puppet Masters as the configuration management tool for the team, Jenkins for the Continuous Integration, and Sensu Monitoring tool (Open Source) to replace Nagios for monitoring the health of all the critical applications and servers health.
• Created custom Modules in Puppet to support the applications.
• Experience working with librarian-puppet-simple.
• Created custom checks for Monitoring applications and their content in Sensu.
• Integrated Jenkins to build code pushed to GIT using bash.
• Integration of the Sensu Monitoring tool to send out notifications to Slack and Email using plugins and custom scripts.
• Achieved the Continuous Integration and Continuous Deployment (CI/CD) process using GIT, Jenkins, Puppet and Custom Repositories.
• Worked on Jenkins builds using Ant and Maven.
• Configured servers to send the server and application data to Splunk
• Hands on experience with generating reports and building performance metrics dashboards using Splunk.
• Worked with and managed Big Data tools like Cassandra and Spark clusters.
• Puppetized Cassandra and Spark to install configure and tune the applications via puppet.
• Built and managed servers, firewall rules, storage and authentication to servers on OpenStack and AWS.
• Well versed with AWS tools like IAM, CloudWatch, CloudTrail, EC2, S3, EBS, Rout53.
• Created, managed load balancers in AWS, taking snapshots and backups of instances when needed in AWS.
• Experience with working on scripting and automation in Bash and Perl to achieve the interconnectivity and integrate the DevOps tools.
• Created automation using Python scripts.
• Managed Disks and File systems using LVM on Linux.
• Managing servers on day-to-day basis and doing necessary system administration tasks.

TIAA-CREF
Unix / DevOps Engineer (July 2014 – Feb 2015)
Charlotte, NC
• Involved in OS patching leading a team of engineers on both Linux and Solaris.
• Worked on Solaris (9, 10) OS and Security Patching, both in Live Upgrade Method and traditional Mirror Break Method.
• Experienced on Installations, Configurations and Managing of Solaris Zones.
• Troubleshooting, Working and Maintaining VERITAS Cluster in Solaris and Linux.
• Worked on Server configuration management using Puppet on close to 200 client machines.
• Provided assistance to engineers on performance tuning for critical areas.
• Install, Configure, tune and support Apache, Tomcat and Web applications using Puppet.

FEDEX GROUND
Linux Systems Administrator (July 2013 – June 2014)
Pittsburgh, PA
• Helped in the Architectural Design for the Implementation of Single Sign On (SSO) in the Linux Environment.
• Hands on experience with LDOM (partition management virtual machine)
• Hands on experience on Advanced Virtualization on Sun Servers using Zones & LDoms.
• Involved in using SAN Multipathing software like EMC Powerpath and Native multipathing on Linux OE.
• Configured dynamic and static network settings for IPv4 and filter packets, Review file system management concepts, removable media and configure NFS shares with AutoFS.
• Involved in supporting AWS Cloud Instances running Linux and also supported S3 Storage and Dynamo DB in Virtual Private Cloud (VPC) environment.
• Experience in DevOps with managing the servers using scripting languages like Shell, Perl & Ruby for automation activities on Linux and Unix OE.
• Experience in supporting Puppet Master Server with 350 clients and involved in understanding and creating Manifest and Modules for different flavors of Linux Servers.

INGRAM MICRO
Linux Systems Administrator (Sept 2012 – July 2013)
Irvine, CA
• Worked on Building and maintaining servers (HP Proliant DL G4, G5, G6 & G7, C7000 Blade Centers) of different flavours (Red Hat and SUSE Linux).
• Worked on installing their configurations, tools, patches and transitioned servers to production support.
• Managed file systems using Software RAID and recover an array.
• Created Bash scripts where needed for automation.
• Managed file systems using Logical Volume Management, Resize file systems and protect them with LVM Snapshots.
• Installed patches to latest patch level, applied patch cluster and installed software packages as needed.
• Configured Kick Start servers to install Red Hat Linux on multiple machines.
• Experience working and supporting servers being managed under Veritas Cluster.



TECHNICAL SKILLS:
• Proficient with Configuration Management Tools like Puppet and Ansible.
• Proficient with Source code management tools like GIT.
• Proficient with containerization platforms as EKS and ECS.
• Proficient with CICD pipelines, and CI tools like Jenkins
• Proficient with managing servers on the cloud environments like AWS, Openstack and VMWare.
• Proficient with reporting tools like Splunk, and ELK.
• Proficient with monitoring tools like Sensu, Nagios, NewRelic, Prometheus, Site24x7 and SolarWinds.
• Proficient in scripting language like shell, Python and Ruby.

Keywords: continuous integration continuous deployment quality analyst sthree database information technology golang computer associates hewlett packard

To remove this resume please click here or send an email from [email protected] to [email protected] with subject as "delete" (without inverted commas)
[email protected];4
Enter the captcha code and we will send and email at [email protected]
with a link to edit / delete this resume
Captcha Image: