Post Job Free
Sign in

Aws Manager

Location:
Capitol Heights, MD
Salary:
145
Posted:
September 01, 2020

Contact this candidate

Resume:

Name: Felix Foncham Azoh

Address: **** ******** ** ***********, ** 20785

Tel: 240-***-****

Email: *********@*****.***

Skype ID: live:.cid.c5b0f1f4c347f9d7

Summary of Qualifications:

A self-motivated Cloud (AWS and Azure) Engineer offering about 8 years of experience in Cloud/Linux/ environments with proficiency in cloud orchestration, security, identity & access management, monitoring and event management, governance & compliance, application delivery, data protection, image and patch management, self-service and ops analytics in AWS and Azure platforms.

Technical Skills and Technology Stack:

• Cloud Orchestration/Automation: AWS CloudFormation, AWS Lambda, AWS Systems Manager, AWS SSM Parameter Store, Ansible, Docker

• AWS Security: AWS Security Hub, AWS Guard Duty, AWS Shield, AWS Firewall Manager, AWS Inspector, etc.

• Monitoring & Event Management: AWS CloudWatch (Events & Logs), AWS SNS, AWS S3

• Identity & Access Management: AWS Organization, AWS IAM, AWS AD Connector, Active Directory, AWS Workspaces, AWS Secrets Manager, etc.

• Governance & Compliance: AWS Config Rules, AWS Organization, AWS Control Tower, AWS Trusted Advisor, AWS Well Architected Tool, AWS Budgets, AWS License Manager, etc.

• Programming Languages: Bash, JSON, YML, Python

• Application Delivery: Jira Jenkins, Bitbucket, Confluence, AWS Code Pipeline, AWS Code Commit, AW

• Data Protection: AWS Certificate Manager, AWS KMS, Snapshot Lifecyle Manager, AWS Cloud HSM,

• Self Service: Service Catalog

• Network: VPC, VGW, TGW, CGW, IGW, NGW etc.

• Image & Patch: AWS SSM Patch Manager, AWS Golden AMI Pipeline

• AWS Platform: AWS CloudFormation, AWS Lambda, AWS Systems Manager, S3, VPC, EC2, ELB, RDS, SNS, SQS, SES, Route53, CloudFront, Service Catalog, AWS Auto Scaling, Trusted Advisor, CloudWatch etc. Education:

Howard University

Chemical Engineering/ 2018 – Present

Montgomery College, United States of America

Associate of Science in General Engineering /2014 - 05/2018 Certifications :

• AWS Certified Solutions Architect – Associate

• AWS Certified Cloud Practioner

Professional Experience:

AWS Architect 12/2018 – Present

PFSCM, Arlington VA

• Developed and leveraged baseline and custom guardrails, policies, centralized policy enforcement, tagging policies and a well architected multi account environment.

• Implemented Machine Image Pipeline and integrated Patch Management

• Migrated legacy applications to AWS cloud environment

• Leveraged Docker to build, test and deploy applications in different environments.

• Developed LLDs for migrating various applications including network sizing, Instance types, names, tags etc.

• Developed required and optional tagging reference document for automation, compliance and consolidated billing

• Developed baseline VPC and Network design including leveraging VPN connectivity and Direct Connect

• Developed baseline AWS account security, implemented/integrated end-point protection, vulnerability scanning and intelligent threat detection

• Built serverless architecture with Lambda integrated with SNS, CloudWatch logs and other AWS services.

• Leveraged automated DevOps tools deployment and Blue-green deployment patterns and strategies

• Configured CI/CD Pipelines using Jenkins connected to GitHub and build environments (Dev, stage & Prod)

• Implemented IAM best practices and role-based access control

• Implemented AWS Organization to centrally manage multiple AWS accounts including consolidated billing and policy-based restrictions

• Implemented Control Tower Preventive and Detective guardrails and leveraged Account Factory, integrated with Lambda for new AWS account creation and setup.

• Setup Ansible control and slave nodes and developed playbooks to automation configuration of servers across environments.

AWS Engineer 01/2017 – 12/2018

Bank of America, VA

• Managed provisioning of AWS infrastructures using CloudFormation

• Design for high availability and business continuity using self-healing-based architectures, fail-over routing policies, multi-AZ deployment of EC2 instances, ELB health checks, Auto Scaling and other disaster recovery models.

• Created patch management using Systems Manager automation for multi-region and multi account execution

• Implemented preventive guardrails using Service Control Policies (SCPs)

• Implemented detective guardrails using Cloud Custodian policies and AWS config

• Designed and implemented for elasticity and scalability using Elastic ache, CloudFront – Edge locations, RDS (read replicas, instance sizes) etc.

• Implemented security best practices in AWS including multi factor authentication, access key rotation, encryption using KMS, firewalls- security groups and NACLs, S3 bucket policies and ACLs, mitigating DDOS attacks etc.

• Implemented Jenkins, GitHub and Git for version control, code build, testing and release and CI/CD.

• Monitored end-to-end infrastructure using CloudWatch and SNS for notification

• Used AWS system manager to automate operational tasks across AWS resources

• Project Management -AWS Infra design & application migration

• Used System Manager to automate operational tasks across WK AWS infrastructure.

• Setup AWS Single Sign On (SSO) for on premise Active Director (AD)

• Built kinesis dashboards and applications that react to incoming data using AWS provided SDKs; and exported data from kinesis to other AWS services including EMR for analytics, S3 for storage, Redshift for big data and Lambda for event driven actions

• Developed and documented security guardrails for AWS Cloud environments

• Built custom images though docker server, docker compose with multiple local containers and created production grade workflows and a continuous application workflow for multiple images

• Implemented multiple container deployments to AWS and maintained sets of containers with deployments

• Setup, Configured, and used Ad Hoc ansible Command

• Designed secured, cost optimized, highly available and fault tolerant infrastructure in AWS

• Architected and configured Dev/Stage/QA environments in AWS (VPC, subnets, security groups, EC2 instances, load balancer, RDS, Redis, route53, etc.)

• Implemented security best practices in AWS including multi factor authentication, access key rotation, role- based permissions, enforced strong password policy, configured security groups and NACLs, S3 bucket policies and ACLs, etc.

• Optimized cost through reserved instances, selection and changing of EC2 instance types based on resource need, S3 storage classes and S3 lifecycle policies, leveraging Autoscaling etc.

• Leveraged EC2 Create Snapshot API call to create snapshots of EBS Volumes on scheduled intervals

• Configured CloudWatch alarm rules for operational and performance metrics for our AWS resources and applications

• Setup and configured logs files for detail monitoring and alerts notification when changes are made.

• Monitoring from end-to-end view of runtime systems CPU, bandwidth, disk space and log files using New Relic

• Deployed and configured infrastructure using Terraform and Ansible

• Architected and implemented continuous integration and deployment pipelines using Jenkins and other CI

• Implemented identity federation using FreeIPA to enable users to seamlessly connect to multiple services AWS/Linux Administrative 03/2013 – 01/2017

Vertex Group Inc, Columbia MD

• Designed, deployed and clustered High Availability servers on VMware Exsi using vSphere Client

• Performed applications installation, upgrades/patches, troubleshooting, maintenance, and monitoring Linux servers

• Installation, configuration and administration of Enterprise Linux

• Created, managed and administered user accounts security and ssh password less login

• Network configuration & troubleshoot issues with respect to network and configuration files

• Configuring Apache, NFS, FTP, and SMB

• Create users, groups and give permissions on bear metal servers

• Task automation, service management and application deployment using Ansible and Jenkins

• Build and configured Linux servers from scratch with type one hypervisors for virtualization and network components

• Perform security setup, networking, system backup and patching for both AWS, and on-premise environments.

• Architect high availability environment with auto scaling & Elastic Load Balancer

• Securely deploy MySQL Primary DB and its read replica in private subnet with multi AZ for disaster recovery and best practice

• Migration of high availability webservers and databases to AWS EC2 and RDS with minimum or no downtime

• VPC build with Private and Public Subnet couple with VPNs setup back to on premise datacenter and cooperate offices

• VPC peering with other Accounts allowing access and routing to service and users of separate account to communicate.

• SSL setup for Apache and Nginx application couple with AWS ELB SSL for all http to https thereby maximizing security

• Network, CPU, Disk and connectivity monitoring with CloudWatch and setup to trigger alarm and notify system administrators

• Aide setup for and configured for logs files detail monitoring and alerts notification when changes are made.

• Performed root-cause analysis of recurring issues, system backup, and security setup

• Security groups configured and locked down to the various authorized subnet and IP addresses in AWS

• Automated deployment, configuration and security settings using Ansible

• Experienced in GitHub (cloning a Git repository, creating a branch, pushing to Git from local, making a PR, etc.)

• Architected and implemented continuous integration and deployment pipelines using Jenkins and other CI

• Experienced in GitHub



Contact this candidate