Post Job Free

Resume

Sign in

Configuration Management Data

Location:
Lanham, MD
Posted:
January 13, 2024

Contact this candidate

Resume:

Ebesoh Etiendem

Lanham, Maryland

Email: ad2qrc@r.postjobfree.com

Phone Number: 240-***-****

PROFILE SUMMARY

I have over 8 years of experience in IT focusing on configuration management, deploy, CI/CD pipeline, AWS, Azure, and DevOps methodologies.

Expertise in managing and deploying Azure Release pipelines.

Expertise in troubleshooting problems generated during building and deployment processes.

Working experience in Git, GitHub, Jenkins. Debugging issues in case of any failures in broken Jenkins build and Jenkins build pipeline maintenance.

Expertise knowledge in Source Code Management (Version control system) tools using GIT.

Experience on containerization tools like Docker

Experience on Branching, Merging and Tagging concepts in Version Control tools like

GIT

Proficient in developing Continuous Integration / Continuous Delivery

I have in-depth experience in setting up accounts in AWS for data management by creating of snapshots for recovery as a security measure in case of any disaster.

I have implemented Docker based Continuous Integration and Deployment framework.

Strong experience in building tools and packaging the source code with the use of Maven.

Experience in scheduling builds overnight to enable development needs using Jenkins, Git, and Maven

I have experience in integrating Unit Test and Code Quality Analysis Tools Selenium and SonarQube.

Experience in using Nexus Repository Manager for Maven builds.

Experience in orchestration tools like Docker Swam and Kubernetes.

Experience with services like EC2, IAM, Compute Engine, Kubernetes Engine, Storage Buckets, VPC Network and Pub Sub

Experienced with using HAProxy LB/Webserver

Experience in creating Amazon Web Services, configuring, and managing EC2s, Storage, IAM, S3, VPC, ELB, ECR, EKS, SNS, Route 53 services in AWS.

Experience using Apache Tomcat and Red Hat Server application servers for deployments.

I have working experience in Operating Systems such as Linux, Windows, Ubuntu RedHat.

Performed continuous Builds and Deployments to multiple environments like DEV, QA, PRE-Prod/UAT and PROD environments.

Experience on ticketing working tools like ServiceNow, JIRA, Incident management tool.

Experience in writing programs with Python

Having Knowledge on Argo CD Kubernetes deployment/monitoring

Having experience of Shell Scripting knowledge on Google Cloud Platform

Having e on Helm

Good listener, teachable and smart to learn new skills and easily apply.

ACADEMIC DETAILS

Software Engineer E-Master Program (Landmark Metropolitan University)

Fundamentals of Visualization with Tableau (UCDAVIS)

Introduction to Structured Query Language (SQL – University of Michigan)

CompTIA Security+ (Crest Consulting Group)

BSc. Computer Science (Landmark Metropolitan University)

BSc. Sciences (University of Buea)

PROFESSIONAL

Work as an Azure Release Engineer at Assure Care, LL 2022 to 2023

Worked as a Site Reliability Engineer at Dominion Systems in 2021

Worked as a Sr. DevOps Engineer at Dominion Systems from February 2017

Worked as Vulnerability Analyst at Morfaw Tax Solutions & F.S, LLC 2018 to 2020

TECHNICAL SKILLS SETS

Version control tools GitHub

Build tools Maven, Ant

Monitoring tool New Relic, Grafana, Cloud watch.

CI & CD Jenkins

Artifactory Repository Nexus, JFrog, S3

Configuration Management Ansible, Hasicorp/Vault

Web Servers Apache Tomcat, JBoss

Scripting Languages Shell Script, Yml

Programming Language Python

Containerization Docker

Deployment/ Orchestration Docker Swarm, Kubernetes

Docker Registry Harbor, DTR

Cloud Environment ASW, Azure

Ticketing Tools Service Now, Jira

Operating Systems Windows, Linux (Admin)

SAMPLE PROJECT:

Company: Assure Care, LLC

Duration: 2022 to Current 2023 – Contract to Full Time

Tools: Git, GitHub, Maven, SonarQube, Jenkins, Docker, Nexus, Kubernetes, Terraform, Ansible, Azure,

Roles and Responsibilities: Azure Release Engineer

Team Size: 11

I was involved with the daily meeting discussions towards application code releases, pipeline/manual on server deployments to lower environments both On-Prem and on Azure Cloud environments.

I maintained a solid and detailed documentation and reporting each day’s activities by the end of the day to all the teams like the client’s team, product team, development team, config team, quality assurance team, etc. for a better tracking of products upgrades.

I maintained and managed our hotfixes, minor and major releases of codes once or twice every month.

I was involved with the creation and managing Azure pipelines and releases in collaboration with other team members like the developers, the configuration and DBA teams.

I was involved in CI/CD process and integrated GIT, Nexus, SonarQube, Maven artifacts build with Jenkins and creating Docker image and use the Docker image to deploy over EKS (Kubernetes).

Building and deploying various micro services in EKS

Created and maintained namespaces, Azure namespace, configMaps, secrets, services, ingress, RBAC in Kubernetes.

Implemented and maintained the Branch and build/release strategies using Git.

Experienced with container-based deployment using Docker, working with Docker images, Docker Hub, and Docker-registries and Kubernetes.

Building /Maintaining Docker containers clusters managed by Kubernetes, Linux, Bash, Git, Docker

Implemented Docker-Maven-Plugins in maven pom to build docker images for all micro services and move on to use Docker file to build docker images from the java jar files.

Used Kubernetes for the runtime environment of the CI/CD system to build, test deploy.

Identified, troubleshot, and resolved some issues relating to the build and deploy process.

Deployed Docker images in Kubernetes cluster and exposing the application to internet using service object.

For security reasons stored the Docker images into Nexus registry.

Created Namespaces, service account in Kubernetes.

Created Kubernetes dashboard, Network policies.

SAMPLE PROJECT:

Company: Dominion Systems

Duration: 2018 to Current 2022 – Full Time

Tools: Git, GitHub, Maven, SonarQube, Jenkins, Docker, Nexus, Kubernetes, Terraform, Ansible, AWS,

Roles and Responsibilities: Sr. DevOps Engineer

Team Size: 12

I was involved in CI/CD process and integrated GIT, Nexus, SonarQube, Maven artifacts build with Jenkins and creating Docker image and use the Docker image to deploy over EKS (Kubernetes).

I used Jenkins to automate and run freestyle projects, maven projects, pipeline projects and multi-branch pipelines.

I have also used Jenkins to manage projects like software application builds, testing and deployment, system monitoring, application monitoring, database backups, infrastructure provisioning with Jenkins-terraform integration and infrastructure configuration mgt – Jenkins/ansible integration.

I have installed, removed, and updated plugins that extended Jenkins’ functionality like deploy to container, update deploy to container and removed deploy to container etc.

I used Jenkins plugins like ssh, SSHAgent, publish over SSH, slack notification, job import, Jacoco, etc, to achieve automation.

I have also used Jenkins in configuring Build triggers using pollSCM, webhooks, etc for automation.

Also, I used Jenkins in configuring credentials for automation like GitHub Credentials, Tomcat-user credentials, Docker-hub/Nexus/SonarQube/SonarCloud credentials and username/temporal access credentials,

I have configured Jenkins slave agents using ssh plugins.

I troubleshot Jenkins’ build related problems like permissions, authorization, integration, and configuration issues.

Building and deploying various micro services in EKS

Created and maintained namespaces, ConfigMaps, secrets, services, ingress, RBAC in Kubernetes.

Implemented and maintained the Branch and build/release strategies using Git.

Experienced with container-based deployment using Docker, working with Docker images, Docker Hub, and Docker-registries and Kubernetes.

Building /Maintaining Docker containers clusters managed by Kubernetes, Linux, Bash, Git, Docker

Implemented Docker-Maven-Plugins in maven pom to build docker images for all micro services and move on to use Docker file to build docker images from the java jar files.

Used Kubernetes for the runtime environment of the CI/CD system to build, test deploy.

Experience in working on AWS and its services such as AWS IAM, VPC, EC2, EKS, EBS, S3, ELB, Auto scaling, Route 53, Cloud Front, Cloud Watch, Cloud Trail and SNS.

Experienced in cloud automation using AWS Cloud Formation templates to create custom sized VPC, subnets, NAT, EC2 instances, ELB and Security Groups

Experienced in creating complex IAM policies, Roles, and user management for delegated access within AWS.

Identified, troubleshot, and resolved some issues relating to the build and deploy process.

Deployed Docker images in Kubernetes cluster using Yaml files and exposing the application to internet using service object.

For security reasons stored the Docker images into Docker/Nexus registry.

Created Namespaces, service account in Kubernetes.

Building and deploying several applications in Harbor

Created Kubernetes dashboard, Network policies.

SAMPLE PROJECT:

Company: Dominion Systems

Duration: (2016 to 2018) – Contract

Roles and Responsibilities: Jr. DevOps Engineer

Worked closely in and with different development teams to provide support in the building, releasing and deployment activities.

Experienced in the application of best practices in cloud security, auditing, and security control implementation.

Experience in the implementing security best practices in AWS including multi-factor authentication, access key rotation, encryption using KMS, firewalls-security groups, RBAC and NACLs, S3 bucket policies and mitigation DDOS attacks and the likes.

Also worked on many projects and managers from different vendors to understand release plans and gave required support.

Worked on new applications by collaborating with development teams to get the requirements of application release process.

Experience in analyzing cloud infrastructures while recommending improvements for performance gains and cost-efficiency.

Made use of Terraform for configuration, provision and managing infrastructure.

Capable of building, managing, and optimizing Kubernetes deployments, volumes, and replicas in the entire software development lifecycle.

Performed applications installation, upgrade, and patch, troubleshooting, maintenance, and monitoring of Linux servers.

VPC peering with other accounts enabling access and routing to service and users of separate accounts.

Created AWS templates based on customized AMI and used the lunch to configure auto-scaling groups.

Provisioned multi-regional VPCs with Private and Public subnets on AWS.

Company: Morfaw Tax Solutions & Financial Services.

Duration: (2018 to January 2020) – Contract

Roles and Responsibility: Security Analyst

Performed configuration and deployment of vulnerability scanning in network assessment tools such as Nessus, App-Detective and HP fortify, Wepinspect, Nmap scan,

Evaluate threats and vulnerabilities through Nessus scan results and work with the IT team staff for mitigation actions for various cloud systems.

Create and track the corrective actions in the Plan of Action and Milestone (POA&Ms) of all risks identified in the Nessus tool upon completion of Security Control Assessment (SCA) for various cloud systems.

Responsible for making sure that any vulnerability information reported on the various systems are tracked and updated using Service Desk application.

Worked to ensure that CIS benchmarks are implemented within the system with the respective teams.

Collecting Security Artifacts for Fed Ramp Audits and uploading in Coal Fire

Participate in bi-weekly meetings to obtain updates and to present status reports on ongoing projects.

Creating/analyzing scan reports withing Tenable Security Center and communicating them to the respective teams or individuals.

Creating/organizing dashboards within Tenable Security Center for various systems

Used Kali Linux in performing Penetration Testing on VMware

References available upon request,

Thanks!



Contact this candidate