Srikanth Kamsali
************.*@*****.***
PROFESSIONAL SYNOPSIS
Experienced DevOps Engineer with 10 years in the IT industry, specializing in automation, cloud computing in AWS, GitHub Actions, Kubernetes, GCP & OpenShift, Linux/Unix administration, software configuration, CI/CD pipelines, build and release management, production support, and deployment automation.
Core Expertise:
• Cloud Computing & Infrastructure:
Extensive experience with AWS services, including EC2, S3, EBS, ELB, CloudWatch, Elastic IP, RDS, SNS, SQS, IAM, VPC, CloudFormation, and Route 53.
Strong background in OpenShift and multi-cloud environments, including AWS.
Experience with GitHub actions for NodeJS applications.
Expertise in security and risk mitigation in cloud-based architectures.
• Automation & Configuration Management:
Hands-on experience with Terraform and Ansible for automating infrastructure provisioning and configuration management.
Implemented Continuous Delivery frameworks using Ansible, Kubernetes, Docker, and Jenkins in AWS, GCP, and OpenShift environments.
Automated infrastructure setup with Shell scripting, Python, and YAML/JSON configurations.
• CI/CD & Deployment:
Built and managed CI/CD pipelines using AWS CodeBuild, CodeDeploy, CodePipeline, GitLab, Jenkins, OpenShift, and Docker.
Experience with GitHub, GitLab, for branching, tagging, and version control across Linux and Windows platforms.
Working knowledge of Jenkins, and GitHub Actions for CI/CD automation.
• Monitoring, Logging & Performance Optimization:
Expertise in monitoring and logging solutions using Prometheus, Grafana, Splunk, Dynatrace, AppDynamics, and ELK Stack (Elasticsearch, Logstash, Kibana).
Developed dashboards and metrics for system health tracking in Splunk, AppDynamics, and ServiceNow.
• Microservices & Containerization:
Extensive experience with Docker, Kubernetes, Helm, and OpenShift for container orchestration and microservices architecture.
Hands-on experience with PostgreSQL, MySQL, Redis, Elasticsearch, and message queues for scalable and high-availability systems.
• Agile & DevOps Best Practices:
Strong experience working in Agile environments, ensuring seamless integration between development and operations teams.
Provided 24/7 production on-call support, troubleshooting critical issues and optimizing system performance.
• With a deep understanding of Linux/Unix systems, automation, cloud infrastructure, and security best practices, I bring a security-focused approach to DevOps, ensuring resilient and scalable systems in production environments.
• Utilized Service now for creating ITSR, Incidents, Change tickets & JIRA for user/sprint stories. Used Sentinius for alert detection.
TECHNICAL SKILLS
Programming Languages
Groovy, Python, SQL
Scripting
Shell, Bash, Groovy, Power shell
Versioning Tools
SVN, GIT, GITLAB,
Automation Tools
Jenkins, GitHub Actions, Ansible, Terraform, AWS Cloud Formation
Build Tools
Ant, Maven, Gradle, NPM
Configuration Management Tools
Ansible, YAML
Databases
AWS RDS, Postgres, DBeaver MYSQL, MSSQL, Oracle, DB2 and MongoDB
Virtualization
Docker, Kubernetes, EKS, ECS, GKE
Monitoring Tools
Splunk, AppDynamics, Dynatrace, Prometheus Grafana, Cloud watch
Cloud Technologies
GCP, AWS, OpenShift, Docker Containers
Bug Tracking Tools
JIRA, Rally
Repository Manager
Nexus, J-Frog Artifactory/X-Ray, Docker.io
Web servers
Web logic, IIS, Apache Tomcat, NGINX Web Server
Operating Systems
Redhat LINUX, Unix, Ubuntu, Centos, Windows, Mac
Education:
• Bachelor of Technology from Jawaharlal Nehru Technological University, India. 2012
• Master’s in computer information systems, Rivier University 2016
PROFESSIONAL EXPERIENCE
Fanniemae / Remote Jan 2024 – Present
DevOps Engineer / AWS
Roles and Responsibilities
• I have worked on designing, deploying, and managing AWS infrastructure, including services like EC2, S3, VPC, RDS, Code Build, Code Deploy, Code pipeline, lambda, step functions, SQS, SNS and IAM using terraform and CICD GitHub Action workflows to deploy them to AWS EKS cluster.
• Managed GitHub actions workflows using jobs and steps inside to create checkout actions, matrix strategies to run unit testing, npm code caching, code coverage integration, building docker image and pushing it to ECR image registry and the whole CICD orchestration through GitHub actions through parallel execution for scalable automation deployments in development environment, staging and production environment.
• Integrated GHES with DevOps tools (Terraform, Ansible, Kubernetes, Jenkins, Artifactory) and external identity providers.
• Creating workflows, jobs, custom actions (docker-action, java-script action), reusable workflows and run them using self-hosted runners & github hosted runners && managing the whole CICD pipeline using GitHub actions.
• Used if expressions and GitHub Advanced Security (GHAS) to catch vulnerabilities using Code Scanning tool (SAST, DAST) & Secret Scanning through repository. Adding secret and variable in settings and calling them in workflows.
• Automate tasks and processes in AWS using tools like AWS Lambda, AWS Step Functions, and AWS CloudFormation to improve efficiency and reduce errors.
• Configured and managed ALB’s for optimal incoming traffic including listener rules, target groups and health checks for EC2 servers.
• Containerized applications using Docker and deployed Java Spring Boot microservices in Kubernetes ECS clusters. Deployed Java Spring Boot applications to cloud platforms like AWS, leveraging services like AWS Lambda, EC2, and RDS.
• Implemented and managed secrets management solutions (HashiCorp Vault, AWS Systems Manager, AWS Secrets Manager) within CI/CD pipelines.
• Deployed and managed EKS (Kubernetes) clusters with Helm charts for microservices applications.
• Experience with DevOps practices, including continuous integration and deployment (CI/CD), infrastructure as code (IaC), and configuration management tools like Ansible and Terraform.
• Have used Groovy scripts for automating CI/CD pipelines in Jenkins. Created custom Jenkins pipelines (Jenkinsfile) using Groovy, enabling automated builds, tests, and deployments.
• I have knowledge on using Groovy-based shared libraries in Jenkins to standardize and reuse pipeline across multiple projects. Troubleshooted and resolve issues related to Kubernetes infrastructure and applications with examples like image issues, resource quota issues.
• I have good knowledge working and managing python scripts for automating CI/CD pipelines, infrastructure provisioning & auto-scaling policies in AWS. Setting up, maintaining, and optimizing CICD pipelines (Jenkins/GitHub Actions).
• We use AWS direct connect for connecting on premises to AWS services. We secure our incoming and outgoing requests using firewalls, private link, reverse proxy mechanism and OWASP (Open Web Application Security Project) to improve application security.
• Worked on Cloud security best practices and implementing security controls in AWS, such as configuring security groups, using IAM policies, and using AWS Config to monitor security issues.
• Experience monitoring AWS infrastructure using tools like AWS CloudWatch, AWS CloudTrail, and AWS X-Ray. Ability to use data and analytics to make informed decisions and optimize AWS infrastructure.
• Implemented Terraform templates to deploy the resources in AWS.
• Created inventory in Ansible for automating updates to system and wrote playbooks using YAML scripting. Cross account resource sharing in AWS help to use resources from other accounts in AWS.
• Provided On call support/ handling production tickets through service now/Remedy.
• Created alarms and trigger points in Cloud Watch based on thresholds and monitored logs via metric filters.
• Used GitOps based ArgoCD to deploy new change onto AWS EKS cluster. Argo cd will be watching GitHub repository and once there is a change it will then deploy it to K8 platform and make sure it synks with the github repo.
• Troubleshoot Kubernetes related issues as well as AWS networking, loadbalancer, NAT gateway, istio & servicemesh related issues.
• Setup Log Analysis AWS Logs to Elastic Search, Logstash and Kibana and Manage Searches, Dashboards, custom mapping and Automation of data.
• Worked with Terraform for automating VPCs, ELBs, security groups, SQS queues, S3 buckets, and continuing to replace the rest of our infrastructure.
• Created Docker images using a Docker file, worked on Docker container snapshots, removed images and managing Docker volumes. Worked in Sprint based model. Used JIRA for user stories points and tracking.
• Managed Confluence spaces improving documentation and sharing the links to team members. I knowledge on integrating Confluence with JIRA, Bitbucket, and other Atlassian tools to enhance project tracking. Also managed permissions and access control to role-based access.
• Used bash/shell scripting to automate some of the adhoc tasks that we usually get in the process.
• Good working knowledge on branching strategies. We have main/master, feature, release & hotfix branch. We use release branch prod release. We use branch protection rules to ensure code is reviewed and tested before merging the PR to release branch. We use Git commands on daily basis (git add, commit, push, pull, stash, merge, rebase & cherrypick for specific commit, log).
• Respond to tickets within service level agreement timeframes.
Environment: Redhat Linux, GitHub Actions, AWS EC2, S3, VPC, RDS, Code Build, Code pipeline, lambda, step functions, SQS, SNS IAM Red Hat Enterprise Linux, Oracle SQL, AWS Cloud Formation, Splunk, AWS CLI, Agile, Scrum, GitHub, Visual Studio, Power Shell, Bash, Groovy, Python, Docker, Kubernetes, spring boot microservices, Autosys, Control-m, Ansible, Jenkins, Confluence, SharePoint, GitHub, Nexus JFrog, Rally, Jira, GIT.
Florida Blue/Jacksonville FL Mar 2020 – Nov 2023
DevOps Engineer / AWS
Roles and Responsibilities
• Experience with ROSA (Redhat OpenShift Service on AWS) OpenShift OCP implementation, and complete lifecycle of OpenShift clusters/support, deploying, scaling, and upgrading OpenShift clusters. We have few microservices 50+ which are hosted in OpenShift platform. Integrated OpenShift with various AWS services, including EC2, S3, IAM, RDS, and ELB, to leverage AWS infrastructure and enhance application functionality.
• I have managed worker nodes, resource allocations and cluster configuration enforcing security policies. We used GitLab as the source code, Jenkins as an orchestrator (configured webhook to trigger jenkins), integrated SAST and DAST scans, trivy for image scans. Created Docker images using the Dockerfile and orchestrating the whole CI process. We have invoked CD process through Argo image updater to update the image and finally we use ArgoCD as a GitOps approach to deploy our services into the OpenShift Container platform. Here AWS along with OpenShift will manage the control plane.
• Worked with persistent volume claims pvc, storage clases, persistent volume pv. Also worked with YAML files such as Pods, replicas, Configmaps, Secrets, statefulsets, Operators, Deployment, routes and service yaml files.
• We have others applications related to ECIR, OPD and DPT where we have all together 500+ applications. Here we use AWS services for multi region deployment to ensure high availabilty & scalability.
• We have configured and implemented AWS EKS for our microservice deployments. In this process we used terraform to build the infrastrucure automation where we used modular approach creating different modules like EC2, VPC, S3 etc. Used Containerized technology such as Docker and Kubernetes for spring boot Java & NodeJs microservices.
• Created CICD pipelines using GitHub Actions and using custom workflows in GitHub along with deploy/terraform templates in yaml files. Managed Github actions workflows using jobs and steps inside to create checkout actions, matrix strategies to run unit testing, npm code caching, code coverage integration, building docker image and pushing it to ECR registry and the whole CICD orchestration through GitHub actions through parallel execution for scalable automation deployments in development environment, staging and production environment.
• Integrated GitHub Enterprise Server with DevOps tools (Maven, Junit, Sonarqube, trivy, Terraform, Ansible, ECR, Docker, Kubernetes) and external third-party providers.
• Creating workflows, jobs, custom actions (docker-action, java-script action), reusable workflows and run them using self-hosted runners & github hosted runners && managing the whole CICD pipeline using GitHub actions.
• Used if expressions and GitHub Advanced Security (GHAS) to catch vulnerabilities using Code Scanning (CodeQL) & Secret Scanning through repository. Adding secret and variable in settings and calling them in workflows.
• Troubleshoot GitHub microservices, runner issues, webhook failures, and API rate limits.
• Used Ansible for Configuration updates to services within AWS like security groups, EC2, VPN. Worked with Ansible Playbooks, inventory and Ansible Roles for modular approach to optimize the configuration.
• Utilized AWS CloudFormation stacks for managing/deploying the infrastructure for some of the adhoc one-time tasks in our organization.
• Proficient Knowledge in scripting languages like such as Shell/Bash and Python.
• Experience with implementing monitoring and logging tools such as Prometheus and Grafana & ELK stack.
• We use AWS direct connect for connecting on premises to AWS services. We secure our incoming and outgoing requests using firewalls, private link, reverse proxy mechanism and OWASP (Open Web Application Security Project) to improve application security.
• Good working knowledge on branching strategies. We have main/master, feature, release & hotfix branch. We use branch protection rules to ensure code is reviewed and tested before merging the PR to release branch. We use Git commands on daily basis (git add, commit, push, pull, stash, merge, rebase & cherrypick for specific commit, log).
• Managed Kubernetes operators installations using Helm charts, managed Kubernetes manifest files and managed releases of Helm packages.
• Provided Oncall support/ handling production tickets through service now/Remedy/JIRA. Troubleshoot, diagnose, and escalate customer issues as needed.
• Experience in managing Ansible Playbooks with Ansible roles. Used file module in Ansible playbook to copy and remove files on remote systems. Created inventory in Ansible for automating the continuous deployment.
• Having good knowledge of Cloud Network Security, Disaster Recovery, Environmental Safeguards, Third-party TLS Certificates(lemur/Venafi) and Security Policies.
• Implemented IAM policies and attached permissions to talk to different AWS services within the cluster. Created Role based Access controls RBAC where access is assigned to Role and users are assigned to these roles to ensure least privilege access. SSO is also enabled so its single sign on and use all apps.
• We used to monitor the CPU memory and usage metrics in Prometheus & Grafana. Providing technical support to to resolve incidents adhering to SLA’s.
• Implemented Canary & blue/green deployment strategies to the microservices.
• Maintained & managed Atlassian Confluence for enterprise-level documentation, ldap based access controls and integrated Confluence with Jira, and other third-party tools.
• Experience in installing, configuring, package management, filesystem partitions LVM, kernel upgrades, and software patching for Red Hat Enterprise Linux (RHEL) systems. Automated system administration tasks using Bash, Python, and Ansible. I am also experienced in user management, authentication (LDAP, Active Directory).
• Experience in logging, monitoring solutions using Prometheus, Grafana and developing dashboards / metrics in Grafana.
• Worked on production issues, troubleshooting by checking the logs and coordinating with different teams to resolve the issue.
Environment: GitHub Actions, AWS, EC2, VPC, EKS, S3, CloudFormation, Lambda, RDS, Oracle SQL, OCP, Python, Maven, Splunk, Ansible, Terraform, Agile, Scrum, Prometheus, Grafana, Confluence, GitLab, GitHub, OpenShift, Visual Studio, Docker, Kubernetes, Jenkins, Jfrog, ECR, Helm, IAM, Python, Shell, Jira, GIT.
Kohl's Departmental stores/Menomonee Falls, WI June 2018 – Feb 2020
DevOps Engineer / AWS
Roles and Responsibilities
• Played a significant role as a part of an engineering team designated to design a new platform to host applications on AWS and set up VPN tunnels for corporate network like VPC, also designed the Subnets (public and private), IG, Elastic Load balancer, NAT instance, Autoscaling groups, Routing table associations and IAM policies for users and AWS services to communicate in AWS.
• Used AWS EKS for deploying the workloads and services for high availability, reliability, scalability across different zones and regions.
• Managed storage in AWS using Elastic Block Storage, S3, created Volumes and configured Snapshots as to take backups.
• Used AWS Lambda as a event triggered to run batch jobs as serverless compute. Used S3 SQS to check available messages in the queue and SNS for sending notifications related to AWS services through email.
• Utilized CloudFormation stacks for managing/deploying the infrastructure for some of the services in our organization and Integrated with Ansible playbooks for Configuration Automation.
• Also started using Terraform for building Infrastructure as Code as it is platform independent. Used a modular approach creating modules for VPC, EC2 and others for code re-usability and reliability and calling them in the main.tf file. Used S3 backend for storing the state file. Also used data source, import, provisioners with in terraform.
• Used Ansible playbooks and inventory files for managing the configurations on multi-node configuration management over SSH.
• Involved in writing various custom Ansible playbooks for deployment, orchestration and developed Ansible Playbooks to simplify and automate day-to-day server administration tasks.
• Maintained Ansible playbooks using Ansible roles, Ansible Galaxy, utilized a combination of different module in Ansible playbook with YAML scripting to configure the files on remote servers.
• Some of applications related to SAS are deployed using the Codepipeline which has the source code as github, AWS Codebuild for building the app source code and AWS Codedeploy for deploying it to AWS Fargate as serverless compute for containers.
• Wrote Groovy-based shared libraries in Jenkins to standardize and reuse pipeline across multiple projects. I have created and managed declarative pipelines in the Jenkinsfile with different stages involved to orchestrate the CI & CD process. Configured different plugins through manage jenkins and used them.
• Utilized Hashicorp Vault for storing the credentials, api keys and secrets as it has the mechanism for encoding and decoding the keys and password rotation policy for every 10 or more days as required by the team.
• Used build tools like maven for java based applications and npm for node js applications in the jenkins orchestrator.
• Utilized Dockerfile to create the application docker image from the base image being alpine or nginx images.
• Used bash/shell scripting to automate some of the adhoc tasks that we usually get in the process.
• Good working knowledge on branching strategies. We have main/master, feature, release & hotfix branch. We use release branch prod release.
• Monitoring & logging using CloudWatch, Log groups, splunk, prometheus and grafana. Dashboards in grafana for visualization of system metrics like cpu, memory, error rates, api errors, etc.
• Worked in Sprint based model 2 weeks every sprint. Used JIRA for user stories points and tracking.
• Creating change tickets in serviceNow, following up on approvals and working on changeticket implementation. Also used ServiceNow for incident management and resolving tickets.
Environment: AWS EC2, S3, VPC, EKS, Fargate, CloudFormation, Lambda, RDS, ELB, IAM, CodePipeline, CloudWatch, Oracle SQL, Agile, Scrum, Ansible, Docker, Kubernetes, SPLUNK, Jenkins, Confluence, GitHub, Terraform, Shell, Prometheus, Grafana, JFrog, JIRA, ServiceNow, GIT.
DevOps/Build & Release Engineer (First 6 months)
Roles and Responsibilities
• Manage Low level environments and data related activities for all the applications (50+) in merchandising line of business.
• Implement CICD pipelines as part of DevOps practice using tools like Jenkins, GitHub, Maven, Jfrog Artifactory, sonarQube, GCP, Docker and Kubernetes.
• We use Ansible templates as a configuration management tool for our CD framework and target as Kubernetes cluster with namespaces (dev, QA, test, Stress & prod).
• I have used Terraform as IAC tool for configuring GCP GKE and troubleshoot any issues with nodes or images.
• Used Jfrog Artifactory as a repository for storing artifacts and private Docker hub registry for images.
• Perform patch upgrades to the GCP VM's to address the security vulnerabilities.
• Configured application health checks to make sure the environment is stable, proactive problem solving and complex problem analysis.
• Converted Pom.xml (java dependencies) into maven build and deployed the code through Jenkins in different environments (QA, Stress & Prod).
• Experience in using Microsoft IIS Web Server, Tomcat, JBOSS, Web logic and WebSphere Application servers for deployment for on prem applications.
• Worked on creating CICD pipelines for migrating the current applications monolithic (on prem) to micro service architecture.
• Managed groovy-based Declarative pipelines in Jenkins for CI & CD. Used Monitoring based solutions like Prometheus to scrape the metrics & Grafana as visualization tool/ dashboards.
• Managing/writing shell Scripts for various application-level tasks like performing upgrades, copying/moving the files as per dev team and scheduling cron jobs to run tasks at specific times and send out email notifications.
• Good knowledge on networking, version control systems like GIT, SVN & branching strategies for development, feature, release & hotfix.
• Good understanding of hardware, operating system, virtualization platforms and middleware components frequently used by Cloud providers (RedHat Enterprise Linux, MS Windows Server, VMware products).
• Document all the work in Confluence. Worked in an AGILE sprint-based model using JIRA as the tracking tool for every 2 weeks.
Environment: Red Hat Enterprise Linux, Maven, Sonarqube, Jfrog, GCP, Agile, Scrum, Ansible, Docker, Kubernetes, Jenkins, Confluence, GitHub, ServiceNow, WebLogic, SPLUNK, Tomcat, GCP, Compute Engine, VPC, Cloud storage, IAM, Cloud Build, Terraform, Cloud Load Balancer, GKE, Cloud Monitoring, Oracle SQL, GIT, SVN.
Mphasis, Bangalore, India June 2012 – May 2015
Linux Administrator
Roles and Responsibilities
• Installation and configuration Linux servers (Red Hat Enterprise Linux, Cent OS, Ubuntu Server) and support for servers.
• Planned and performed the patches/upgrades to linux (RHEL 4x, 5x, Suse 10, 11, Ubuntu, CentOS) operating systems and hardware maintenance like changing memory modules, replacing disk drives.
• Monitoring CPU, memory, physical disk, hardware, and software raid, multi-path, file systems, networks.
• Deployment and configuration of application server Tomcat for deploying java and J2EE-specific application web application.
• Monitoring dashboards for alerts and respond to support tickets as per Queue.
• Writing Bash/Shell Scripts for automation of daily tasks, analyzing the error logs, analyzing the user logs, analyzing the /var/log/Messages.
• Good understanding of 7 layers of OSI Model, TCP/IP protocol suite DNS, DHCP, IP/TCP, UDP, SMTP, FTP, and TFTP.
• Utilized configuration management tools like Ansible for server configuration upgrades for 1000 of servers remotely.
• Document all upgrades/fixes in confluence. Worked in sprint-based model using JIRA.
• Implementing Security policies using Network ACL and CISCO PIX firewalls. Troubleshooted network connectivity issues/ updated routing tables rules for inbound and outbound traffic.
• Creating new nodes and Pools in F5 Loadbalancers to support newly added servers in Layer 3 environment.
• Involved in capacity planning, performance tuning & security hardening of systems.
Environment: Red Hat Enterprise Linux, CentOS, Ubuntu, Agile, Scrum, Kanban, Virtualization, Ansible, Apache Tomcat, FTP, SFTP, LDAP, TCP/IP, DNS, Mount, Bash/Shell Scripting, Load Balancer, Patches, Migration, Cisco Firewall, Routers & Switches, WebSphere, JBoss, JIRA, Monitoring.