Post Job Free

Resume

Sign in

Sr. Cloud DevOps Engineer

Location:
Sunnyvale, CA
Posted:
February 07, 2024

Contact this candidate

Resume:

Venkatesh Kumar Channamsetti

Sr Cloud DevOps Engineer

LinkedIn: www.linkedin.com/in/venkatesh-kumar-ch-932924178

Phone Number: 234-***-****

Email: ad3gn4@r.postjobfree.com

mailto:ad3gn4@r.postjobfree.com

PROFESSIONAL SUMMARY:

•10 years of IT industry experience in DevOps, Build and Release Engineering with expertise in AWS, Google Cloud Platform (GCP), and Microsoft Azure, demonstrating a complete understanding of Software Development.

•Hands-on experience in Amazon Web Services, including Cloud Formation, Elastic Load Balancer, Elastic Beanstalk, CloudWatch, IAM, Server Migration, Route 53, SQS, VPC, S3, DynamoDB, SNS, Glacier, RDS, EC2 Container Service, Lambda.

•Extensive experience in GCP services such as Compute Engine, App Engine, Cloud Storage, Cloud SQL, Pub/Sub, BigQuery, and other core offerings.

•Proficient in Microsoft Azure services, including Virtual Machines, Azure App Service, Azure Storage, Azure SQL Database, Azure Functions, Azure Container Service, and more. Expertise in Cloud innovations, covering Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS).

•Experience in creating S3 buckets in AWS, Cloud Storage in GCP, and Azure Storage in Microsoft Azure. Proficient in creating custom policies for access management using AWS IAM, GCP IAM, and Azure RBAC (Role-Based Access Control).

•Skilled in setting up databases in AWS using RDS, GCP using Cloud SQL, and Azure using Azure SQL Database. Configuring instance backups to storage services (S3, Cloud Storage, Azure Storage) by creating snapshots.

•Deployed cloud stacks using AWS OpWorks, optimized volumes, and EC2 instances. Applied similar practices in GCP and Azure environments. Created alarms in CloudWatch for AWS, Stackdriver for GCP, and Azure Monitor for monitoring server performance and CPU.

•Hands-on experience with continuous integration and automated deployment tools like Jenkins, Puppet, Chef, in addition to Azure DevOps and Google Cloud Build. Proficient in CI/CD methodologies with Jenkins, Azure DevOps, and Google Cloud Build.

•Worked on Hadoop Cluster Designing, Implementation, Configuration, Administration, Debugging, and Performance tuning across multiple cloud platforms. Collaborated with cross-functional teams to integrate automated test efforts with build systems and address deployment and building issues.

•Strong analytical skills, excellent team player, with good leadership qualities, and strong oral and written communication skills.

•Experience in writing Chef recipes, adding them to Chef Cookbooks, and creating run-lists to automate configuration management using tools like Knife. Hands-on experience with build tools like Maven, Ant, Azure DevOps Pipelines, and Google Cloud Build.

•Automated application deployment in the cloud using Docker technology, utilizing Elastic Container Service scheduler in AWS, Kubernetes Engine in GCP, and Azure Kubernetes Service (AKS).

•Managed Docker deployment pipelines for custom application images in the cloud using Jenkins, Azure DevOps, and Google Cloud Build.

•Proficient in scripting languages such as Shell Scripting (KSH, Bash), Python, Ruby, PowerShell across different cloud platforms.

•Experience working with DynamoDB, MySQL, SQL Server, Oracle 10g databases across AWS, GCP, and Azure. Installed, configured, and managed monitoring tools such as Nagios, AWS CloudWatch, Stackdriver, and Azure Monitor.

•Knowledgeable in various routed protocols like FTP, SFTP, SSH, HTTP, HTTPS, and Connect Direct. Experienced in version control tools like Subversion (SVN), GIT. Hands-on experience with bug tracking tools like JIRA across multiple cloud platforms.

•Experience in the release and deployment of large-scale Java/J2EE web applications. Hands-on experience in Linux/System Administration with RHEL, CentOS, Amazon Linux.

•Good working knowledge of the Software Development Life Cycle (SDLC) encompassing Analysis, Planning, Developing, Testing, Implementing, and Post-production analysis.

•Experience in creating and managing multiple instances of Apache Tomcat, deploying test applications in AWS, GCP, and Azure environments. Involved in the functional usage and deployment of applications in Apache Tomcat and Web Logic Server. Experience in Splunk development, creating Apps, Dashboards, and Data Models.

•Configured and deployed application packages on the Apache Tomcat server, coordinating with software development and QA teams across AWS, GCP, and Azure platforms.

EDUCATION

Bachelor of Technology in Computer Science and Engineering Jawaharlal Nehru Technological University, Kakinada (JNTU Kakinada).

TECHNICAL SKILLS

Cloud Environment

Amazon Web Service: EC2, VPC, EBS, AMI, SNS, RDS, ELB, CloudWatch, CloudFormation AWS Config, S3, Cloud Trail, IAM, Azure, OpenStack, VMWare, auto scaling Servers, Glacier, Storage Lifecycle Rules, Elastic Beanstalk, Route 53, Data-Pipeline, EMR, Code Commit, Code Deploy, Direct Connect, Lambda, RedShift, Kinesis.

Version Control Tools

GIT, Perforce, Subversion.

Repositories

Nexus and Artifactory

Virtualization

VMware, Vagrant, ESX

Operating Systems

Windows 98/XP/NT/2000/2003, UNIX, LINUX, RHEL 7, SOLARIS, MAC-OSX

Databases

Oracle, MySQL, SQL Server, Mongo DB, PL/SQL

Language(s)

Python, Ruby, Shell, Java script, Bash, Perl

Web/Application Servers

IBM Web sphere, Apache Web Server, Apache Tomcat, Sun ONE Web Server& IIS Web Server, Web logic.

Network Protocols

TCP/IP, FTP, SMTP, SOAP, TCP/IP, HTTP/HTTPS, NDS, DHCP, NFS, Cisco Routers, LAN.

Build/ CI Tools

ANT, MAVEN, JENKINS, HUDSON, Octopus Deploy, Bamboo, TeamCity, Salt.

Monitoring Tools

Nagios, Splunk, ELK

Containerization/ Orchestration

Docker, Kubernetes.

Configuration Tools

Chef, Ansible, Puppet.

Tracking Tools

JIRA, Remedy

CERTIFICATIONS

Certified Azure Administrator Associate.

Designing and Implementing Microsoft DevOps Solutions

Certified AWS Developer Associate.

Certified Kubernetes Administrator.

PROFESSIONAL EXPERIENCE

Client: Walmart Sunnyvale, CA Aug 2021 - Till Date

Role: AWS DevOps Engineer

Responsibilities:

•Designed, deployed, and maintained Cloud solutions using AWS, Terraform, and Bicep, leveraging IAAS & PAAS services within the SDLC/Agile framework.

•Utilized Agile methodologies throughout the SDLC to ensure iterative development, continuous improvement, and alignment with business objectives. Adapted development processes to changing requirements and priorities, fostering collaboration, and delivering value to stakeholders in a timely manner. Utilized Git and GitHub for version control and collaboration.

•Configured AWS cloud services, Terraform scripts, and Bicep templates for infrastructure provisioning, including AWS Glue for data integration, AWS Glue API, and AWS Glue objects like crawlers, jobs, and triggers.

•Implemented Cloud security controls in SecOps, incorporating Encryption, Tagging, Container Security, Golden AMI policy, IDS/IPS, NSG management, Service Endpoints, DDoS, etc. Utilized Jenkins for continuous integration and continuous deployment (CI/CD) pipelines.

•Configured AWS Security using IAM, AWS Security Hub, and AWS CloudWatch alongside Terraform, Bicep, TypeScript, .NET, and ARM templates, following Site Reliability Engineering (SRE) practices.

•Leveraged Terraform, Bicep, and ARM templates to implement advanced firewall rules, ensuring intricate security policies aligned with SRE principles for robust infrastructure protection.

•Configured AWS Infrastructure Automation using AWS Glue API, AWS CLI command lines, Terraform scripts, Bicep templates, and ARM templates for various environments, embracing SRE methodologies.

•Developed and maintained Java-based microservices within AWS environments, following SRE methodologies to ensure high availability and reliability. Integrated fine-tuning techniques to optimize microservice performance and scalability.

•Utilized AWS AppSync for creating serverless GraphQL APIs, enabling efficient data access and real-time updates for applications. Fine-tuned AppSync configurations for optimal query performance and data synchronization.

•Implemented AWS Lambda functions for event-driven, serverless compute, executing code in response to triggers and events, enhancing scalability and cost-effectiveness. Fine-tuned Lambda configurations for optimal resource utilization and execution speed.

•Utilized Amazon DynamoDB for NoSQL database storage, ensuring high-performance and scalable data storage for applications. Fine-tuned DynamoDB table designs and indexes for efficient query execution and storage utilization.

•Utilized Amazon S3 for scalable object storage, ensuring reliable and secure storage for various types of data, including static assets, backups, and log files. Fine-tuned S3 configurations for optimal data access and durability.

•Designed Network Security Groups (NSGs) & Load Balancer using Terraform, Bicep, and ARM templates to control inbound and outbound access to network interfaces (NICs), VMs, and subnets, incorporating SRE principles for reliability.

•Implemented highly available and reliable deployment models with AWS Classic and AWS Resource Manager, utilizing Terraform, Bicep, and ARM templates, with an emphasis on SRE-based practices for robust systems.

•Utilized Amazon Cognito for user authentication and authorization, providing secure access control for applications and APIs. Fine-tuned Cognito configurations for optimal authentication and user management.

•Configured AWS Identity and Access Management (IAM) for user and group management, including SSO/SAML and multifactor authentication, incorporating Terraform, Bicep, ARM templates, and SRE practices.

•Deployed and managed AWS Glue jobs with application insights using Terraform, Bicep, TypeScript, .NET, ARM templates, and following SRE principles for efficient and reliable operations.

•Implemented automated build & operational tasks using Python, PowerShell scripts, Terraform, Bicep, AWS CLI command lines, and integrated SRE methodologies for reliability and efficiency. Experienced in scripted automation of application deployments and configuration settings. Utilized Jenkins for CI/CD pipelines.

•Implemented Serverless Cloud Services using AWS Glue for data integration and processing, deploying and managing them using Terraform, Bicep, ARM templates, and adhering to SRE principles.

•Implemented a CI/CD pipeline using AWS DevOps (CodePipeline, CodeBuild, CodeDeploy), Git, Docker, Maven, Jenkins, Terraform, Bicep, ARM templates, and SRE best practices.

•Enabled safe code deployment in AWS Kubernetes Services (EKS) with YAML scripts and HELM charts, incorporating SRE principles for reliability.

•Orchestrated Kubernetes clusters in AWS using Terraform, Bicep, and ARM templates, emphasizing SRE methodologies for enhanced system resilience and scalability.

•Monitored and troubleshooted Kubernetes clusters using Prometheus and Grafana, creating scripts in DSL Groovy integrating with Jenkins for automation and creating seed jobs. Emphasized SRE practices for reliable operations.

•Utilized Ansible for configuration management and automation of infrastructure provisioning tasks, ensuring consistency and reliability across environments.

•Experienced with developing Ansible Playbooks, Modules, and Kubernetes configurations using Terraform, Bicep, ARM templates, and integrated SRE methodologies.

•Utilized Ansible Galaxy to leverage community-contributed Ansible roles and modules, accelerating development and deployment processes. Developed custom Ansible modules and plugins to extend Ansible's capabilities and integrate with proprietary systems and APIs.

•Configured Docker Hub, Engine, Swarm, Compose & Registry and created Docker images using Docker Files, incorporating Terraform, Bicep, ARM templates, and SRE practices for CI/CD deployments.

•Integrated TypeScript and React unit tests into CI/CD pipelines, ensuring consistent testing and validation of application functionality. Fine-tuned frontend microservices for optimal performance and scalability.

•Employed Ansible for orchestration and management of Docker containers, ensuring consistent deployment and configuration of containerized applications.

•Integrated logging frameworks such as ELK (Elasticsearch, Logstash, Kibana) and CloudWatch Logs for centralized log management, monitoring, and troubleshooting of application and infrastructure issues.

•Utilized Rancher for Kubernetes cluster management and orchestration, streamlining deployment, scaling, and maintenance of containerized applications. Integrated Rancher with CI/CD pipelines for automated deployment and lifecycle management of Kubernetes workloads.

Experiences: AWS (EC2, VPC, ELB, S3, RDS, Cloud Trail), GIT, EBS, CloudWatch, VMware, Scala, CloudFormation, SaltStack, Docker, Jira, AWS CLI, AWS Auto Scaling, AWS CodePipeline, SaaS, Unix/Linux, Shell scripting, TypeScript, Graphana.

Client: Chubb, Jersey City, NJ Feb 2020 – Jul 2021

Role: Azure DevOps Engineer

Responsibilities:

•Designed, deployed, and maintained Microsoft Azure cloud infrastructure consisting of multiple VM instances and virtual networks, incorporating Software as a Service (SaaS) solutions for enhanced cloud functionality. Utilized GitHub for version control and collaboration.

•Utilized Terraform for Infrastructure as Code (IaC) to define and provision Azure resources, ensuring consistent and repeatable infrastructure deployment across environments. Integrated Terraform with Azure DevOps pipelines for automated infrastructure provisioning. Employed Jenkins for CI/CD pipelines.

•Used network security groups, Azure Firewall, and route tables to ensure a secure environment in Azure, integrating additional SaaS security layers for comprehensive protection. Implemented Azure IAM permissions and policies for secure access control. Managed network configurations through Terraform for Infrastructure as Code (IaC).

•Onboarded and migrated test and staging use cases for applications to Azure cloud with public and private IP ranges to increase development productivity by reducing test-run times, leveraging SaaS offerings for streamlined migration.

•Involved in building own Platform as a Service (PaaS) with Docker and deployed various applications through Docker containers, utilizing SaaS containers for efficient application deployment. Utilized Terraform for managing container infrastructure.

•Created monitors, alarms, and notifications for VM instances using Azure Monitor, integrating additional SaaS monitoring tools for comprehensive insights. Utilized PowerShell scripting for automation tasks, including monitoring setup and configuration.

•Implemented and maintained Azure DevOps pipelines for configuration management, incorporating SaaS-based solutions for streamlined operations. Integrated Terraform scripts into Azure DevOps for managing infrastructure changes.

•Working on multiple Azure instances, set up security groups, load balancers, and managed VM images to design cost-effective, fault-tolerant, and highly available systems, integrating SaaS tools for optimized system design. Implemented and managed Load Balancers and VM instances for scalable and reliable applications.

•Creating Azure Storage accounts and managing policies for data storage, utilizing Azure Blob Storage and Azure Backup for archival storage and backup, with added SaaS storage solutions for enhanced data management. Implemented Azure Functions for serverless computing. Familiar with VNet configurations.

•Implemented Global Network Access Control (GNAC) strategies for comprehensive network access management, managing access control configurations through Terraform.

•Worked on integrating Git into the continuous Integration (CI) environment along with Azure DevOps, Jenkins, and additional SaaS-based CI tools for streamlined development workflows. Leveraged PowerShell scripting for automation tasks within the CI/CD pipeline.

•Developed automation scripting in PowerShell to deploy and manage applications across Windows servers, conducting meetings with developers and managers to resolve merge issues during build and release, with added SaaS automation for efficient deployment.

•Continuously optimized and refined PowerShell scripts to enhance automation efficiency, reduce manual intervention, and improve overall system reliability and performance.

•Virtualized the servers using Docker for the test environments and dev-environments needs, and configuration automation using Docker containers, incorporating SaaS containerization for streamlined environment management. Familiar with Kubernetes within Azure environments.

•Wrote Ansible playbooks with PowerShell as a wrapper to manage configurations and test playbooks on Azure instances using Python, integrating SaaS-based configuration management for efficient operations.

•Used Azure Monitor as a monitoring tool to identify and resolve infrastructure problems before they affect critical processes, incorporating additional SaaS monitoring tools for comprehensive infrastructure monitoring.

•Well Versed with Configuring Access for inbound and outbound traffic to Azure services, Azure SQL databases, Azure Storage accounts to set alerts for notifications or automated actions, integrating SaaS access management for enhanced security. Familiar with Single Sign-On (SSO) implementations.

•Expert Knowledge in PowerShell scripting, Automation of scheduled tasks, incorporating SaaS scripting solutions for streamlined automation. Utilized Python scripting for various automation tasks.

•Implemented a Git mirror for SVN repository, enabling users to use both Git and SVN, incorporating additional SaaS-based version control for efficient code management.

•Implemented Continuous Integration using Azure DevOps and Git, leveraging SaaS-based CI tools for streamlined development workflows. Utilized PowerShell scripting for automation tasks within the CI/CD pipeline.

•Developed build and deployment scripts using MSBuild and Azure Pipelines as build tools in Azure DevOps to move from one environment to other environments, incorporating SaaS-based build and deployment tools for efficient release management. Integrated .NET for specific build and deployment tasks.

•Configured and ensured connection to Azure SQL databases, integrating additional SaaS database management solutions for optimized database connectivity. Utilized TypeScript for scripting tasks in database management. Familiar with Azure IAM permissions and policies for secure database access.

•Fine-tuned Azure infrastructure configurations and resource allocations to optimize performance, cost-efficiency, and scalability.

•Implemented microservices architecture for frontend applications, leveraging Azure services like Azure Kubernetes Service (AKS) and Azure Functions for scalable and modular application development.

•Utilized Rancher for container orchestration and management, providing a centralized platform for managing Kubernetes clusters and deploying applications at scale.

Environment: Azure, Terraform, Ansible, Docker, Kubernetes, ARM, Git, Maven, Kafka, Bicep, Groovy, Splunk, SaltStack, Webmethods, Nagios, PowerShell, Python Scripts, Java, Kickstart, Java/J2EE, VMare, SharePoint, .NET, Java development, Shell Scripting, Linux in the project environment, Virtual Desktop, TypeScript, React, Windows XP.

Client: AT&T, Plano, TX Aug 2018 - Jan 2020

Role: GCP/AWS DevOps Engineer

Responsibilities:

•Designed and deployed applications across AWS and GCP, leveraging services such as EC2, Route53, S3, RDS, Dynamo DB, SNS, SQS, IAM, and their GCP equivalents, with a particular focus on integrating with Google Kubernetes Engine (GKE) for container orchestration.

•Collaborated with Project Managers and client teams for successful releases and deployment requests in both AWS and GCP, ensuring seamless integration with GKE clusters for scalable and reliable application hosting.

•Distributed applications across hybrid AWS and GCP environments, configuring IAM Security Groups in public and private subnets, and implementing Federated Identity Access Management for seamless access control, with a strategic emphasis on integrating with GKE for workload management.

•Developed Cloud Formation templates for AWS and deployed resources in GCP, ensuring seamless integration with GKE clusters and adherence to IAM policies for secure resource provisioning.

•Managed S3 buckets, applied policies, and leveraged Glacier for storage and backup on AWS, with similar practices in GCP Cloud Storage, while ensuring seamless data access and management within GKE clusters.

•Configured CloudWatch alerts and integrated them into Auto Scaling launch configurations, engaging in scrum ceremonies with cross-functional teams, and implementing IAM roles for secure access control in both AWS and GCP environments, with a focus on GKE integration.

•Maintained user accounts, RDS, Route 53, VPC, RDB, Dynamo DB, SES, SQS, and SNS services in both AWS and GCP, ensuring alignment with IAM policies and security best practices for comprehensive security within GKE clusters.

•Established Continuous Integration with Jenkins, deploying applications on AWS using Elastic Beanstalk, orchestrating deployments on GCP, and integrating IAM roles for secure CI/CD processes, while ensuring seamless integration with GKE for container-based deployments.

•Dockerized applications for portability across both AWS and GCP, implementing IAM policies for secure container orchestration, and leveraging IAM roles for container security within GKE clusters.

•Implemented Kubernetes for automating deployment, scaling, and operations of application containers in hybrid clusters, utilizing IAM roles and policies for Kubernetes cluster security, and ensuring seamless integration with GKE for workload management.

•Collaborated with Development teams and test engineers for optimizing EC2 sizes and Docker build containers across both clouds, ensuring seamless integration with GKE clusters for efficient workload management and resource optimization.

•Implemented Ansible playbooks and roles for configuration management and automation of infrastructure provisioning tasks across AWS and GCP environments, ensuring consistency and reliability.

•Well Versed with Configuring Access for inbound and outbound traffic RDS DB services, DynamoDB tables, EBS volumes to set alarms for notifications or automated actions, integrating SaaS access management, and SRE principles for enhanced security, with a focus on securing access within GKE environments.

•Expert Knowledge in Bash Shell Scripting, Automation of CRON Jobs, incorporating SaaS scripting solutions, and SRE methodologies for streamlined automation, while ensuring seamless integration with GKE for automated workload management.

•Utilized build automation tools like ANT, Maven, and Ansible for infrastructure automation in both AWS and GCP, ensuring seamless integration with GKE clusters for efficient and reliable workload management.

•Integrated Ansible with cloud-native services such as EC2, Route53, GCP equivalents, ensuring seamless deployment and management of resources.

•• Utilized Ansible for orchestration and automation of deployments on Google Kubernetes Engine (GKE) and other container orchestration platforms, ensuring efficient and reliable container-based deployments.

•Created and maintained Chef recipes and cookbooks for streamlined deployment of applications across both clouds, ensuring seamless integration with GKE clusters for efficient and secure application hosting.

•Ensured highly durable and available data using S3, versioning, lifecycle policies, and created AMIs for backup in both AWS and GCP, implementing IAM roles and policies for secure data management within GKE environments.

•Leveraged AWS and GCP services to build secure and scalable systems, designing scalable, secure cloud architecture using IAM principles, and ensuring IAM controls for secure architecture design within GKE clusters.

•Developed custom Ansible modules and plugins to extend Ansible's capabilities and integrate with proprietary systems and APIs within AWS, GCP, and GKE environments.

•Utilized Ansible for infrastructure as code practices, defining and managing cloud infrastructure configurations declaratively, improving scalability and maintainability across AWS and GCP environments.

•Troubleshooted, configured, and deployed enterprise applications in Web Logic, Web Sphere, and Tomcat across both clouds, implementing IAM controls for secure application hosting and management within GKE clusters.

•Managed JIRA for tracking project defects and tasks, documenting post-deployment issues centrally, and ensuring IAM principles for secure project tracking and management within GKE environments.

Environment: AWS (EC2, VPC, ELB, S3, RDS, CloudTrail, Route 53), GCP (Compute Engine, Cloud Storage, IAM, Pub/Sub), GIT, SQL, CloudWatch, AWS Auto Scaling, Kafka, Cloud Formation, Chef, Ansible, Jenkins, Nagios, ELB, Scala, Shell Scripts, Unix/Linux Environment.

Client: Vanguard, Malvern, PA. July 2015 to July 2018

Role: Site Reliability Engineer

Responsibilities:

Directed Release Management Calls to synchronize with Developers, Testers, and DBA teams for successful releases.

Collaborated with development/testing, deployment, systems/infrastructure, and project teams to ensure continuous operation of build and test systems.

Monitored software, hardware, and/or middleware updates using technologies like Jenkins/Hudson, Ant, MS Build, TFS Team Explorer, and Subversion.

Developed installer scripts using Ant, Python, and UNIX for various products hosted on Application Servers.

Set up and configured Tomcat, creating multiple instances, and deploying war files.

Developed Continuous Integration, Nightly, and On-demand build systems from scratch with Jenkins, ANT, and Maven.

Utilized Puppet Dashboard and Puppet DB for configuration management of existing infrastructure.

Automated deployment modules of IIS web applications, bindings, and configuration settings using a combination of PowerShell scripts and Puppet.

Managed code using both GIT and Bitbucket source control systems.

Coordinated/assisted developers in establishing and applying appropriate branching, labeling/naming conventions using GIT source control.

Tracked issues and Change Management using JIRA.

Utilized Splunk for constructing searches and creating well-structured search queries to minimize performance impact.

Created and deployed a tool to automate branch and project creation in Subversion using Perl and Chef Scripts.

Used Jenkins, Chef, and shell scripts to automate code deployment and continuous integration infrastructure (GIT and Nexus were also part of this process).

Led the rewrite of a massive Chef code base to make cookbooks composable and testable, facilitating the migration from Ubuntu to Centos.

Performed WebLogic Server administration tasks such as installing, configuring, monitoring, and performance tuning on Linux Environment.

Configured baselines, branches, and merges in SVN, and automated processes using Shell and Batch Scripts.

Environment: ANT, Puppet, Chef, Jenkins, Make, JIRA, Perforce, Shell, UNIX, Linux, Subversion, AWS, Apache 2.x, Apache Tomcat 6.x/7.x, Splunk.

Client: LBrands, Columbus, OH. Oct 2013 to June 2015

Role: Linux Administrator

Responsibilities:

Participated in the release cycle of the product, which involves environment like Development, QA and Production.

Installed and designed RHEL Kickstart Installation by configuring NFS, NIS, DNS, DHCP

Monitoring system performance, adding physical memory to the servers and User administration setup

Troubleshooting Network, File system memory, CPU, Swap Space and issues, TCP/IP, NFS, DNS, SMTP in Linux and Solaris servers

Maintaining infrastructure environment containing RHEL and Solaris

Troubleshooting issues by checking logs.

Performed Disaster Recovery in RHEL servers which comprises of LVM based FS and Red Hat Clustering

Worked on Red Hat 5.x, 6.x and performed daily tasks using CRON scheduler and automated it.

Installed and arranged Disk and document framework administration utilizing Logical Volume Manager (LVM) for LINUX frameworks

Performed OS upgrades Kernel Upgrades to Solaris and RHEL on production servers and testing servers

Installed and configured Nagios system monitoring, writing custom scripts for ESXi servers.

Administered VMware ESXi, for running the RHEL, Solaris, Windows, Centos and Servers on Development and test servers using vCenter

Environment: RHEL, Solaris, Centos, Nagios, VMware ESXi, LVM, TCP, DNS, SMTP, Bash Scripting.



Contact this candidate