Post Job Free

Resume

Sign in

Ci Cd Aws Cloud

Location:
Downingtown, PA, 19335
Posted:
October 22, 2023

Contact this candidate

Resume:

Name: Sai Prakash Gannagouni

Online Profile: https://www.linkedin.com/in/sai-prakash-gannagouni-714550176

Overview

●System Engineer over 10 years of experience.

●Object oriented programming skills in Java, J2EE and micro service development in spring boot frame work

●Experience in integrating logs to ELK and monitoring using Prometheus and Grafana

●Experience in API management using Kong Gateway and Apigee

●Good experience in working with various databases like Oracle, SQL Server, PostgreSQL, DynamoDB and MySQL.

●Experience in creating stored procedure and packages

●Experience in installing ELK, Prometheus, Grafana, and Kong Gateway

●Having good experience in developing and consuming API’s Services.

●Experience in creating CI/CD pipelines using Jenkins, Tomcat, Ansible, SonarQube, Nagios, Nexus, Argo CD, Git repository and Aws CI/CD.

●Experience in AWS cloud

●Experience in creating instances on amazon EC2, RDS and S3 bucket

●Having good knowledge on containerization service like Kubernetes and Docker.

●Having good experience in deploying the applications and plugins.

●Experience in working on vba macros.

●Having experience in adding required certificates.

●Proficient in analysing problems, identifying root causes and implementing solutions

●Significant experience with API Gateways and API Management platforms such as Google Apigee, Amazon API Gateway, Azure API Management, IBM API Connect

●Experienced in Presentation layer design and development using HTML, Angular and JSP.

●Good experience in working with Web and Application servers.

●Expert knowledge of Active Directory, GroupPolicyObject(GPO), Dynamic Host Configuration Protocol(DHCP), DNS, PKI concepts and administration

●Ability to swiftly learn new technologies and adapt to dynamic business requirements

●Having good knowledge in SOAP and REST web services.

●Proficient in tools such as Log4j, JBuilder, Net Beans and Eclipse IDE.

●Experience with PowerShell scripting and AD administrative tools

●Experience in using version control tools SVN, GIT and bit bucket

Solution Experience

Client: Letshego, Botswana-SA

Project: Kong Gateway/ Apigee

Environment: Kong Gateway, Apigee, LUA, Linux, AWS

Role: Kong/Apigee Developer

Duration: OCT 2021 – Till date

●Created new services, routes and adding plugins

●Proxying the original services provided by client.

●Creating new postman collection on proxy service

●Creating authentication keys to access the proxy services.

●Developing custom plugins to transform request and responses and deploying plugins.

●Creation of swagger files and generating API proxies using the swagger files.

●Development of new API’s and Enhancement of existing API’s for the proxies.

●Publishing the API docs in the APIGEE portal and Kong portal

●Integrated with third party vendor API’S through on prem APIGEE.

●Involved in migration of SOAP API’s to RESTful interfaces, XML to JSON.

●Experience with federation protocol such as SAML, OAuth 2.0 and OIDC

●Ensure the security, reliability, and scalability of our API infrastructure

●Involved installations, upgrades, patch, and fixes

●Deploy APIs to cloud platforms

●Created mock API’s to fast track the development

●Installing Kong gateway via helm Charts

●Created CloudFormation template to deploy the resources

●Built custom Kong docker images.

●Implemented ArgoCD to pull updated code from Git repositories and deploy it directly to Kubernetes resources.

●Automated continuous integration and deployments using Jenkins, Docker.

●Designing and deploying applications utilizing almost all of the AWS stack (Including EC2, Route53, S3, RDS, SNS, SQS, IAM) focusing on high-availability, fault tolerance, and auto-scaling in AWS Cloud Formation.

●Integrated Kong logs with Datadog and SolarWinds

●Identifying and deploying cybersecurity measures by continuously performing vulnerability assessment and risk management

●Used Chef in installation of Apache servers, tomcat servers.

●Monitoring logs and metrics via Splunk and creating alerts in Splunk

●Installing ELK, Grafana, Prometheus and Wso2

●Used Elasticsearch for powering not only Search but using ELK stack for logging and monitoring our systems end to end Using Beats.

●Integrated SolarWinds, Splunk plugins with Kong gateway

●Created Oath API’s, tested and documented those API’s

●Integrating graphs and logs in ELK and Grafana

●Assisted clients and internal staff with troubleshooting to quickly and effectively resolve Splunk performance and data quality issues.

●Tested and validated Splunk data in the UAT environment prior to going into Production to alleviate and troubleshoot issues.

●Involved in API testing provided by developers and added extra security on top of those API’s in Api Management tools

●Involved in supporting Linux servers and troubleshooting

●Involved in documentation, performing unit testing and UAT testing

Client: Old Mutual, Cape town-SA

Project: Oracle Identity Suite (Identity Manager, Single Sign on and Access Governance)

Environment: Oracle IAM, Java, SQL, Web Logic, Angular, Linux, Layer 7, Selenium, Spring boot and Apigee

Role: Java Api developer/Oracle IAM Consultant

Duration: OCT 2020 – SEPT 2021

●Followed Agile software methodology for project development.

●Design and developed Microservices/Rest API’S in Spring boot

●Used Hibernate Annotations concept to retrieve data from the database and integrate with Spring BOOT to interact with back end SQL Server.

●Used Data Source concept to connect to Database and retrieve the information from DB and designed one Rest Service to display the output.

●Developed Rest Api to processes the data from DB to another Rest Service.

●Created Container’s for Api’s using Docker in LINUX to get deployed in Rancher Server.

●Used Jenkins build and deploy for Continuous Integration and Continuous Deployment.

●Used JIRA tracking tool for assigning and defect management.

●Logging framework Log4J2 is used for log messages.

●Develop the service document using Swagger.

●Designed and developed automation tool suite to automate different testing scenarios on the application using Selenium.

●Developed Restful Webservices to CREATE, DELETE and UPDATE

●Created EC2 instance for my application and created S3 storage bucket in AWS cloud.

●Experience working with Splunk for searching logs and debugging issues in dev and prod environments.

●Developing SQL stored procedure and prepared statements for updating and accessing data from database.

●Extensively worked on developing UI components using Angular

●Extensively used Spring JDBC in data access layer to access and update information in the database.

●Perform Identity and access management activities

●Configured security policy standards such as OAuth2.0, APIKey, SAML and mutual author for incoming and outgoing APIGEE calls

●Publish API documents on the APIGEE portal

●Worked as an OIM engineer for performance engineering and development

●Setting up Provisioning and Reconciliation for AD and OID targets.

●Performed tuning of LDAP, OAM and OIM components

●Involved in patching WebLogic, OIM and OAM

●Managing user lifecycle in OIM

●Involved in upgrade of OAM10g to OAM11gr2 and integration of OIM11gr2 as user identity store for user creation and request management

●Involved in setup environment of oracle identity and access management

●Deployed API’s to WebLogic server and tested functionality of deployed API’s

●Installed, Configured and troubleshooting the Oracle Identity and Access Management in three different environments DEV, STAGE and PROD

●Configured BI publisher to run different kind of reports and also developed custom reports to meet client’s requirements

Client: NIBBS, Johannesburg-SA

Project: Okta

Role: IAM Consultant -Okta/CyberArk

Duration: OCT 2019 – SEPT 2020

●Understanding the requirements from Business requirement specification

●Have integrated Okta Internal and Customer applications with Okta B2E and B2B tenants.

●Installed and Implemented Okta Access Gateway for securing access to on-prem apps and protecting organizations hybrid cloud infrastructure Integrated Okta SSO applications with MFA enabled at Okta level and app-level

●Integrated with Okta to enable Single Sign-on and Multi-Factor Authentication

●Reviewed Users login report, users MFA report and application usage

●Configured End-User dashboard as per requirements

●Imported users from Active Directory (Source of Truth) to OKTA.

●Involved in integrating Okta with CyberArk and Google Workspace

●Administer, manage, and maintain the Google Workspace ecosystem

●Deployed multiple Okta tenants for Normal Users, ADM accounts, service accounts, and craft workers based on business requirements.

●Integrated Okta with O365 provisioning and de-provisioning including assigning/re-assigning licenses.

●Troubleshoot and debug issues related to APIs

●Setting up and configuration on monitoring tools Dynatrace, SolarWinds datadog and Splunk

●Have integrated substantial number of applications for Okta provisioning via API. Have created different API tokens and share same with application team to configure at their end for successful integration.

●Troubleshoot issues related to Google Workspace applications like Gmail, Drive, Groups, Docs, etc.

●Have setup MFA for all applications in scope to Okta such as Okta push, Okta verify, SMS authentication, voice call authentication and security questions

Client: Old Mutual, Cape town- SA

Project: IAM

Environment: ForgeRock

Role: ForgeRock Developer

Duration: APRIL 2018 – SEPT 2019

●Understanding the requirements from Business requirement specification

●Participated in CIAM Requirements sessions as part of the Channels Technology group

●Installation and Configuration of ForgeRock AM, DS, IG and IDM.

●Working experience for Single Sign-On, Access management, Identity Federation, Multi-factor authentication

●Expertise in extending services using OAuth2.0 based protocols namely OAuth2.0, OpenID Connect (OIDC)

●Crated users in IDM via user management Admin API’s

●Knowledge in Token Technologies such as: SAML, OpenID Connect, JSON Web Tokens.

●Working with ForgeRock UI customization and LDAP directories

●Implemented basic user Self-Service feature, account lockout after multiple attempts, second factor authentication such as HOTP and push notification.

●Developed and integrated an unprotected website to fully functional access management solution using ForgeRock Open AM.

●Troubleshooting issues and finding root cause

Client: UNISA, Johannesburg-SA

Project: IAM

Environment: Ping Identity

Role: IAM Consultant

Duration: JAN 2016 – MAR 2018

●Upgrade and built PingFederate on all the environments available.

●Engaged in the implementation of new Authentication methodologies like PingID

●Gather the System configurations and Requirements for the SSO Requests by engaging in meetings with the Application team.

●Working Knowledge of OpenID connect

●Experience in configuring PingOne to enable PingID

●Experience Configuring and integrating applications with Single-SignOn (SSO) and SAML

●Implemented and configured both IDP & SP connections using PingFederate (SAML)

●Working experience with STS/WS-FED. Usage of Username token processor for authentication of email, mobile and other thin clients.

●Experience with modern authentication protocols including SAML, OpenID Connect (OIDC), and OAuth

●Experience in setting up SSO Environment for PingFederate, and Ping Access. PF as Auth server and PA as Resource server protecting API

●Documented applications and changes when a new application is integrated with PingFederate.

●Working with PingID setup using PingFederate for MFA (Multi-Factor Authentication)

Client: Sizwe hosmed, Johannesburg-SA

Project: IAM

Environment: SailPoint

Role: Identity Management Consultant

Duration: JAN 2014 – DEC 2015

●Centralized user repository and role-based provisioning throughout the user lifecycle i.e., promotion, changing roles, add, edit, delete, enable, disable for connected resources.

●Comprehensive auditing and reporting to facilitate monitoring of identity management activities, compliance with security policies and identification of security breaches.

●Strong password policy, self-service and synchronization to facilitate the strengthening of password controls and user authentication.

●Provisioning and de provisioning of users in applications.

●Integrated SailPoint Identity IQ with multiple external databases and applications for provisioning and de-provisioning using Active Directory and LDAP.

●Performed installation and configuration of SailPoint identity IQ.

●Configured Observability, monitoring, and logging tools Like Dynatrace and SolarWinds

●Worked with different teams in implementing OAuth for different applications.

●Troubleshooting issues and finding root cause

Relevant Skills

Any additional skills such as Java, Linux, Windows 2012 etc.

Linux, Ubuntu, Windows OS Kubernetes, Docker, DevOps, Kong gateway, Apigee

Database (SQL Server, MySQL, Postgres and Oracle 12c)

Application Servers (WebLogic, Jboss and Apache Tomcat)

Frameworks (Spring boot, Spring, Sakai, Struts)

IDM Tools (Oracle, CA, Wso2, ForgeRock, Okta, Syncope, PingIdentity, SailPoint)

HTML, CSS, XML, XSD, WSDL, ANT, SOAP, REST Linux

Documentation (Technical and Design)

Education

Education details (University/College/School/Qualifications/Certifications)

Certification

LFS158x: Introduction to Kubernetes -ID: a2ccd4205a7b4c3390a0360ba90e4bb9

Auth0 Specialist

AZ-400: Designing and Implementing Microsoft DevOps Solutions

ForgeRock Identity Management Core Skills

ForgeRock Access Management Product Knowledge

AWS Certified Developer – Associate

B. Tech Computer Science and Engineering (Jawaharlal Nehru Technological University, Hyderabad)



Contact this candidate