PROFESSIONAL SUMMARY:
Certified Senior DevOps Engineer with over 10 years of hands-on experience in architecting, automating, and optimizing mission-critical deployments across extensive infrastructures. Proficient in AWS, Azure, and GCP, with deep expertise in Kubernetes (EKS, AKS, GKE), CI/CD pipelines (Jenkins, GitLab CI, Azure DevOps), and Infrastructure as Code (Terraform, CloudFormation). Demonstrated success in driving automation, enhancing collaboration, and improving the efficiency of software delivery pipelines. Strong focus on security and compliance with extensive use of tools such as Kafka, SAST, and various CI/CD technologies.
Throughout my career, I have demonstrated a robust understanding of Continuous Integration and Continuous Deployment (CI/CD) practices. I have implemented and managed CI/CD pipelines using tools such as Jenkins, GitLab CI, Azure DevOps, and AWS Code Pipeline, achieving end-to-end automation for build, test, and deployment processes. My proficiency with IaC tools, including Terraform, CloudFormation, and Azure ARM templates, has enabled me to automate and streamline infrastructure provisioning and management efficiently.
My hands-on experience with configuration management tools such as Ansible, Chef, Puppet, and SaltStack has allowed me to manage and automate configurations across diverse environments, ensuring consistency and reducing manual intervention. I have successfully containerized applications using Docker and orchestrated them with Kubernetes (EKS, AKS, GKE), automating deployment, scaling, and management of containerized applications. Supported and maintained a large ECK (Elastic Cloud Kubernetes) platform infrastructure running on AWS, ensuring high availability and scalability.
In the realm of cloud services, I have extensive experience with AWS, Azure, and GCP. I have designed and implemented serverless architectures using AWS Lambda, API Gateway, and DynamoDB, enhancing scalability and operational efficiency. My expertise includes designing AWS network architecture, including VPC, subnets, security groups, VPN, and Direct Connect, and managing multiple AWS accounts with various VPCs. I have also developed Terraform scripts to move existing on-premises applications to the cloud, ensuring efficient and consistent infrastructure provisioning.
Security and compliance are integral to my work. I have integrated advanced security tools such as Saviynt, Okta, Protegrity, IBM CloudPak for Data, AWS Inspector, GuardDuty, AWS Detective, AWS Config, Macie, Tenable, and Splunk to ensure robust data security and compliance with industry standards such as HIPAA, PCI DSS, SOC 2, and ISO 27001. I have implemented strong authentication mechanisms for applications containing sensitive data, including multi-factor authentication (MFA), JWT auth with mTLS, and server/client certificate authentication.
My monitoring and observability expertise includes using Datadog, Prometheus, Grafana, ELK Stack, CloudWatch, and Splunk to gain deep insights into application performance and system health. I have automated the deployment of monitoring agents and implemented comprehensive monitoring solutions to ensure system reliability and performance. Experience with ETL processes, retrieving data from various sources, transforming it, and storing it efficiently.
In addition, I have extensive experience with scripting languages such as Python, Bash, and PowerShell, automating tasks and managing infrastructure efficiently. My work with configuration management tools and cloud infrastructure has equipped me with the skills to transform traditional environments into robust, scalable, and secure cloud-based solutions. I have automated provisioning and deployment using Ansible, Chef, Puppet, and Terraform, enhancing operational efficiency and reducing manual errors.
My technical expertise extends to deploying and managing web application servers such as Apache Tomcat, JBOSS, and WebSphere, ensuring robust and reliable application hosting. I have also been involved in deploying applications and managing infrastructure using tools like Ansible, Chef, Puppet, and Docker, ensuring seamless integration and minimal downtime.
I possess a strong background in network architecture, including VPC, subnets, security groups, IAM policies, and network access control lists (NACLs). Experience in SDLC like Waterfall, Safe Agile, and DevOps methodologies. Used JIRA to keep track of all the ongoing tasks and maintain bug resolutions.
EDUCATION:
Master of Science in Information Technology St. Francis College NYC, USA 2012-2013
TECHNICAL SKILLS:
Cloud Environments
Microsoft Azure, Amazon Web Services (AWS)
AWS Services
RDS, EC2, VPC, IAM, CloudFormation, EBS, S3, ELB, Auto Scaling, CloudTrial, SQS,
SNS, SWF, CloudWatch.
Azure Services
App Services, Key vault, function app, Blob storage, Azure Active Directory (Azure AD), Service Bus, Azure Container Registry (ACR) and Azure Kubernetes Service (AKS), Azure SQL, and Azure Cosmos DB.
Version Control Tools
GIT, Azure Repos, GitLab, Bitbucket
CI/CD
Jenkins, Azure Pipelines, GitLab, GitHub Actions
Configuration& Automation Tools
Terraform, Ansible, Chef, ARM Templates
Container Platforms
Docker, Docker Swarm, Kubernetes, OpenShift, AWS ECS.
Monitoring Tools
Nagios, Dynatrace, Prometheus, Grafana, Splunk, New Relic, ELK, CloudWatch, Azure Monitor
Languages
Bash, Shell Scripting, RUBY, C, XML, PL/SQL, HTML, Power Shell, Python, .Net, Groovy
Artifactory
Docker Hub, JFrog, and Nexus
Web Servers
Web logic, Web sphere, Apache Tomcat, Nginx, Oracle application server
Security Tools
Prisma Cloud, Aqua Security, IBM CloudPak for Data, Tenable.io, Tenable.sc, Nessus, Qualys, SonarQube, Veracode, Fortify, Snyk, Black Duck
Operating Systems
Microsoft Windows XP/ 2000, Linux, UNIX.
Bug Tracking Tools
Jira, Bugzilla, Remedy, HP Quality Center, IBM Clear Quest, Nexus
Code Scanning
SonarQube, JFrog X ray, ECR Inspector
Databases
RDS, Cosmos DB, DynamoDB, SQL Server, My SQL DB.
Logging
CloudWatch, CloudTrail, Azure App Insights, Azure Monitor
CERTIFICATIONS
●Microsoft Certified Azure Administrator
●Certified Kubernetes Administrator
●AWS Solution Architect– Associate & Professional
●Red Hat Certified System Administrator
WORK EXPERIENCE
Sr. AWS DevOps Engineer Oct 2022 – Present
Fifth Third Bank
Environment & Tools: AWS, Azure, GCP, Terraform, CloudFormation, CDK (TypeScript/Python), ARM Templates, Jenkins, GitLab CI, GitHub Actions, Azure DevOps, Ansible, Chef, Puppet, Packer, Docker, Kubernetes (EKS, AKS, OpenShift), Docker Swarm, Prometheus, Grafana, ELK Stack, Splunk, New Relic, AWS CloudWatch, Azure Monitor, Prisma Cloud, IBM CloudPak for Data, AWS Security Hub, AWS Inspector, GuardDuty, Tenable.io, Okta, Protegrity, SonarQube, Veracode, Fortify, Snyk, Git, GitLab, Bitbucket, Azure Repos, Bash, Python, PowerShell, Groovy, AWS RDS, DynamoDB, Azure Cosmos DB, MySQL, SQL Server
●Architected and implemented highly scalable AWS infrastructure using Terraform for efficient configuration management and Infrastructure as Code (IaC), reducing deployment time by 20% and infrastructure provisioning errors by 35%.
●Designed and optimized AWS cloud architectures with CDK (TypeScript/Python), enhancing automation, security, and cost efficiency.
●Engineered Kubernetes (EKS) clusters to orchestrate containerized applications, ensuring high availability and resilience.
●Built and optimized CI/CD pipelines using Jenkins and GitLab CI, integrating automated testing, security scans, and multi-environment deployments, reducing deployment failures by 35%.
●Developed custom resource hooks in Argo CD to manage complex deployment tasks, including external secrets integration.
●Integrated Kafka with CI/CD pipelines using Jenkins and Docker, enabling seamless deployment and testing of Kafka-based applications.
●Implemented multi-factor authentication (MFA), JWT auth with mTLS, and server/client certificate authentication to enhance security for sensitive applications.
●Utilized AWS security tools (Inspector, GuardDuty, AWS Detective, AWS Config, Macie, Tenable, Splunk) to ensure compliance with industry standards such as HIPAA, PCI DSS, SOC 2, and ISO 27001.
●Automated AWS infrastructure provisioning with Terraform and CloudFormation, configuring VPCs, ELBs, security groups, SQS queues, and S3 buckets.
●Employed Ansible, Chef, and Packer for configuration management and custom machine image creation, reducing manual intervention.
●Developed Ansible roles in YAML to automate deployment and configuration management across multi-node environments.
●Configured Datadog APM for transaction performance monitoring, reducing latency for high-traffic services by 30%.
●Deployed monitoring solutions using Prometheus, Grafana, ELK Stack, Splunk, and AWS CloudWatch, ensuring high system availability.
●Configured Azure Monitor custom metrics to track key performance indicators (KPIs) and optimize resource utilization.
●Designed and deployed Dockerized applications on Kubernetes (EKS, AKS, OpenShift), streamlining deployments and improving operational efficiency.
●Automated Kubernetes workload orchestration using Argo CD and Gardener, enabling seamless deployment of microservices.
●Configured Kubernetes clusters for testing, pre-production, and production environments, ensuring smooth CI/CD integration.
●Managed GitHub Actions, GitLab, Bitbucket, and Azure Repos, ensuring efficient version control and collaboration.
●Configured GitLab repositories with branching, forking, tagging, and merge requests to optimize workflow efficiency.
●Configured and maintained AWS S3 buckets, Glacier, and Azure Blob Storage for secure data storage and backups.
●Automated AWS service provisioning using CloudFormation, CDK (TypeScript/Python), and Terraform, reducing operational overhead.
●Configured ServiceNow to receive real-time notifications of configuration changes and update CMDB records.
●Implemented load balancing, monitoring, and alerting using Splunk, ELK, Nagios, and New Relic, ensuring system health and performance
AWS DevOps Engineer Sep 2018 – Oct 2020
Cisco San Jose, CA
Environment & Tools:
AWS, Azure, GCP, Terraform, CloudFormation, CDK, Jenkins, GitHub Actions, GitLab CI, Azure DevOps, Ansible, Chef, Puppet, Docker, Kubernetes (EKS, GKE, OpenShift), Istio, Prisma Cloud, AWS Security Hub, Aqua Security, Tenable.io, Tenable.sc, Qualys, Nessus, Okta, ArgoCD, Prometheus, Grafana, ELK Stack, Splunk, Datadog, AWS CloudWatch, Azure Monitor, Git, Bitbucket, Azure Repos, GitHub, Python, Bash, PowerShell, Groovy, MySQL, AWS RDS, DynamoDB, Aurora DB
●Designed and configured log aggregation pipelines to collect, parse, and index log files from servers, applications, and network devices, improving real-time system visibility.
●Automated AWS infrastructure provisioning using Terraform and CloudFormation, reducing manual deployment efforts and increasing scalability.
●Designed and managed automated workflows for vulnerability detection, prioritization, and remediation using Tenable.io and Tenable.sc, ensuring timely security updates.
●Applied GitOps principles for software delivery using FluxCD and ArgoCD, resulting in a 20% reduction in deployment errors.
●Implemented Vulnerability Management solutions for AWS and Azure environments, integrating Tenable, Splunk, ServiceNow, and JIRA for streamlined security operations.
●Conducted security audits and compliance checks using Aqua Security and Trivy, providing actionable risk mitigation reports.
●Implemented advanced security controls for Kubernetes, including RBAC, Network Policies, and Pod Security Policies, ensuring compliance and protection.
●Automated security tool deployment and configuration using Ansible and Terraform, enhancing consistency and reducing manual errors.
●Implemented MFA, JWT authentication with mTLS, and IAM policies using Terraform and Ansible, enhancing access security and governance.
●Conducted penetration testing and vulnerability assessments using Nessus and Qualys, collaborating with development teams to remediate security risks.
●Developed Jenkins pipelines with Groovy and Shell scripting, integrating security tools like Sysdig, Fortify, and Black Duck for automated security scanning.
●Configured Jenkins clusters and integrated pipelines with security and monitoring tools, ensuring continuous compliance.
●Automated application security compliance validation in GitHub Actions workflows, enforcing security policies, and scanning for vulnerabilities.
●Deployed and managed Docker containers and Kubernetes clusters on AWS (EKS), GCP (GKE), and OpenShift, ensuring high availability and resilience.
●Implemented Istio service mesh on OpenShift for enhanced traffic management and service resilience, reducing service disruptions.
●Utilized Kubernetes ConfigMaps and Secrets to securely manage and inject configuration data into applications.
●Deployed applications in EKS clusters using Jenkins-templated Groovy scripts, streamlining containerized deployments.
●Designed and enforced monitoring solutions using Prometheus, Grafana, ELK Stack, and Splunk, providing real-time performance and security metrics tracking.
●Configured Datadog synthetic monitoring and RUM, integrating with ServiceNow for automated incident creation.
●Monitored network traffic and system logs to identify and respond to security incidents in real time, ensuring a proactive security approach.
●Led cloud migration projects using lift-and-shift and re-platforming approaches, ensuring seamless transitions with minimal downtime.
●Automated system patching deployments using AWS Systems Manager (SSM) by configuring patch baselines, maintenance windows, SSM associations, and automation documents.
●Defined IAM roles and permission boundaries for services like EC2, Lambda, Glue, and RDS using CloudFormation YAML files stored in repositories.
●Migrated MySQL DB files to Aurora DB, automating the update process via AWS Step Functions and API Gateway.
●Configured AWS ElastiCache using Redis & Memcached to improve application performance and session management.
●Implemented Infrastructure as Code (IaC) templates to provision and configure DynamoDB tables, Global Secondary Indexes (GSIs), and streams, ensuring consistency.
●Deployed Okta-based SSO and MFA authentication for secure access control, reducing unauthorized access risks.
●Utilized Prisma Cloud and AWS Security Hub for continuous cloud security posture management (CSPM), detecting and mitigating real-time misconfigurations.
●Designed and deployed Go-based services on AWS Lambda, improving serverless application scalability and efficiency.
Sr. Cloud DevOps Engineer Nov 2020 – Sep 2022
State of Maryland Annapolis, MD
Environment & Tools:
Azure, AWS, Terraform, Bicep, ARM Templates, Azure DevOps (VSTS), Jenkins, GitHub Actions, GitLab CI, Ansible, Puppet, Chef, Docker, Kubernetes (AKS, OpenShift), Helm, ArgoCD, Azure AD, RBAC, Prisma Cloud, Okta, Splunk, AWS Security Hub, Azure Monitor, CloudWatch, Datadog, Splunk, ELK Stack, Git, Bitbucket, Azure Repos, Python, Bash, PowerShell, YAML, JSON, MySQL, AWS RDS, Aurora DB, DynamoDB
●Designed and implemented CI/CD pipelines in Azure DevOps (VSTS), automating build and deployment processes for Azure Kubernetes Service (AKS) using Helm charts.
●Developed custom YAML-based build and release definitions in Azure DevOps, ensuring streamlined deployments across Azure and On-Premises environments.
●Integrated Bicep templates into CI/CD pipelines for infrastructure automation, enabling rapid testing, validation, and deployment of Azure resources.
●Migrated Docker Swarm environments to Azure Kubernetes Service (AKS), optimizing container orchestration using Helm charts.
●Implemented Terraform Enterprise to provision infrastructure across Azure workloads and Kubernetes clusters, ensuring consistent resource management.
●Automated Azure infrastructure provisioning using Terraform and ARM templates, ensuring scalable and repeatable deployments.
●Configured Azure Load Balancer and Application Gateway for high availability and fault tolerance.
●Deployed and managed Docker containers using AKS and Docker Swarm, optimizing application performance and resource utilization.
●Utilized Ansible playbooks for automated service deployments in Azure Kubernetes Service (AKS), ensuring seamless containerized application management.
●Developed Azure CLI scripts to automate ETL processes, orchestrate data lake management, and facilitate file transfers across storage accounts.
●Managed Azure Active Directory (AAD) user accounts and permissions for TFS/VSTS, enforcing RBAC roles and conditional access policies.
●Automated security configurations on Azure Web Apps using JSON-based settings within Azure DevOps, ensuring policy compliance.
●Developed Azure PowerShell scripts for automated VM backups, restores, and conditional access implementations, strengthening cloud security.
●Configured Splunk to capture and analyze data from multiple layers, including Load Balancers and Web Servers, ensuring proactive system health monitoring.
●Set up AWS CloudWatch alarms and Amazon CloudWatch Logs for DynamoDB performance tracking, identifying and mitigating throttling issues.
●Created custom dashboards in Azure Monitor Workbooks, providing real-time insights into application health and performance metrics.
●Developed a unified monitoring dashboard in Datadog, consolidating alerts, logs, and APM data to improve system observability.
●Developed Python scripts to execute Ansible templates from Ansible Tower, automating environment variable updates across instances.
●Implemented cron jobs in Azure DevOps (VSTS) to optimize disk space usage and operational efficiency.
●Automated incident management by integrating Azure Monitor with Azure Logic Apps, reducing system downtime.
●Developed Terraform scripts to automate Azure IaaS virtual machine deployments and virtual machine scale sets in a production environment.
●Migrated MySQL database files to Aurora DB, orchestrating the process through ECR containers at each deployment stage.
●Executed ETL batch jobs on Azure Data Lake, automating data loads across storage accounts using Azure CLI scripts.
●Implemented CI/CD pipelines in OpenShift, integrating Jenkins and Git for seamless software delivery.
●Developed Dockerfiles and orchestrated deployments on Azure Kubernetes Service (AKS) and OpenShift, optimizing multi-cloud operations.
●Configured Argo CD with GitOps principles, improving rollback efficiency and deployment safety.
DevOps Engineer / Build & Release Engineer Jun 2016 – Aug 2018
Fiserv Berkeley Heights, NJ
Environment & Tools: AWS (EC2, S3, Glacier, CloudWatch), Terraform, HashiCorp Packer, Jenkins, Nexus, JFrog, GitHub, Jenkins Pipeline (Groovy), Ansible, Chef, Puppet, Docker, Kubernetes (Helm), OpenShift, IAM, Security Groups, ELB, AWS Networking, ELK Stack, CloudWatch, New Relic, PagerDuty, Groovy, Bash, Python, Maven, ANT, Nginx
●Designed and implemented CI/CD pipelines using Jenkins, Maven, Nexus, and GitHub, ensuring seamless software delivery.
●Developed Jenkins pipeline scripts (Groovy) for automated builds, artifact management (JFrog, Nexus), and deployment workflows.
●Built upstream/downstream jobs in Jenkins, managing multi-environment deployments and integrating Jenkins CLI for job automation.
●Implemented Jenkins master-slave configuration, optimizing job execution, backups, and plugin management.
●Deployed applications to AWS (EC2, S3, EBS), configuring and monitoring cloud environments for optimal performance.
●Leveraged Terraform for provisioning AWS resources (EC2, IAM, VPC, ELB, Security Groups), maintaining Terraform state in S3.
●Implemented infrastructure as code (IaC) with Terraform and HashiCorp Packer, improving consistency across cloud environments.
●Configured AWS CloudWatch and New Relic to monitor containerized workloads and troubleshoot performance issues.
●Containerized microservices using Docker, optimizing deployments on AWS, Kubernetes, and private cloud environments.
●Deployed and managed Kubernetes clusters, utilizing Helm charts for consistent application releases.
●Implemented the Docker-Maven plugin in Maven POM.xml, automating Docker image builds from Java JAR files.
●Used Helm charts to manage Kubernetes applications, templating Kubernetes manifests and handling Helm package releases.
●Developed Ansible playbooks for automated deployments of SQL servers, cluster servers, and ELK stack components.
●Configured and managed Chef infrastructure, including Chef servers, workstations, cookbooks, and bootstrapping nodes.
●Maintained Puppet manifests and modules to automate infrastructure provisioning and server configurations.
●Configured ELK Stack (Elasticsearch, Logstash, Kibana) with Ansible for centralized logging and issue resolution.
●Integrated Slack, PagerDuty, and email notifications for real-time alerting and incident response.
●Managed Nginx web server, maintaining access logs, error logs, and multiple virtual hosts.
●Developed ANT and Maven build scripts in Jenkins to facilitate environment-specific deployments.
●Automated artifact uploads to JFrog Repository using Jenkins pipeline scripts.
●Built and managed Docker images using Dockerfiles and Docker Compose, optimizing container orchestration.
DevOps Engineer Mar 2014 – May 2016
UnitedHealth Group Basking Ridge, NJ
Environment & Tools: Jenkins, Ansible, Build Forge, Nagios, Zabbix, Python, Bash, Perl, PowerShell, Linux (Ubuntu, Red Hat), Windows Server, Active Directory, MSSQL, TCP/IP, OSI Model, Routing Protocols, Firewalls, VMware ESXi, Okta’s Universal Directory, GitHub, JIRA, SFTP, FTP, SCP, FileZilla
●Managed Linux (Ubuntu, Red Hat) and Windows environments, including installation, configuration, and maintenance of applications.
●Administered Active Directory, DNS, MSSQL, and IAM tools, ensuring secure and reliable system operations.
●Configured and optimized networks, switches, routers, WAN, and firewalls, improving security and performance.
●Automated deployment and configuration management using Jenkins and Ansible, reducing downtime and improving application reliability.
●Developed shell scripts (Bash, Perl, Python) for automated installations, log extractions, and process optimizations.
●Managed build and release processes using source code management tools (GitHub, JIRA) and automated testing tools.
●Utilized Build Forge for continuous integration and deployment in WebSphere Application Servers.
●Conducted regular performance monitoring and tuning using Nagios and Zabbix, proactively addressing system issues.
●Set up automated alerts and incident response workflows, improving system uptime and operational efficiency.
●Conducted regular backups, recovery tests, and disaster recovery planning to ensure data integrity and availability.
●Set up VMware ESXi servers for internal QA environments, optimizing testing and development workflows.
●Automated user provisioning and de-provisioning using Okta’s Universal Directory, enhancing security and compliance.
●Applied knowledge of TCP/IP, OSI model, and routing protocols to enhance network security and load balancing.
●Managed remote file transfers using SFTP, FTP, SCP, and FileZilla, ensuring secure and efficient data movement.
●Developed and maintained technical documentation, including configuration guides and troubleshooting manuals.
●Led UNIX/Linux/Windows system integration projects, ensuring seamless implementation and operational consistency.
PRAKASH Goud
DevOps Engineer Site Reliability Engineer
LinkedIn 470-***-****
Email:***************@*****.***