Name: QUINTA K FOINBAINDA
Address: ***** **** ********* ** ********* OH
Phone: 216-***-****
Email: **********@*****.***
LinkedIn ID: www.linkedin.com/in/quinta-kimbeng-26a2b4236
PROFESSIONAL SUMMARY
As a highly dedicated, performance-driven, and self-motivated AWS DEVOPS ENGINEER /AWS CLOUD ENGINEER/ AWS SECURITY ENGINEER with over 5+ years of experience creating solutions consistent with enterprise application and security standard policies. Provisioning resources and providing solutions based on the AWS 5 pillars of a well architected framework. I have comprehensive knowledge of building, planning, implementing, and maintaining system applications in the AWS Cloud platform. Fully involved in the implementation, analysis, optimization, troubleshooting, and documentation of all Development and production support tasks. I have effective communication skills and the ability to work in a team environment, emphasizing team goals as well as ready to learn new technologies.
TECHNICAL SKILLS
Cloud Orchestration & Automation: Ansible, Terraform, CloudFormation, and SSM.
Networking & Content Delivery: EC2, AMI, VPC, Subnets, Direct Connect, NACL, Security Group, Route53, Auto Scaling, ELB, SNS, SQS, Cloud Watch, Application Load balancer and Network Load Balancer.
Migration & Transfer: AWS Migration Hub, AWS Application Migration Service, Server Migration Service, and AWS Snow Family
Security, Identity, & Compliance: IAM, Security Measures, Cognito, Secrets Manager, Guard Duty, Amazon Macie, AWS Single Sign-On (SSO), Key Management Service (KMS), CloudTrail, VPC Flow Logs. Security Group, NACLs, AWS WAF, AWS Shield, and AWS Secrets Manager, service control policies and detective guardrails.
Management & Governance: AWS Organizations, CloudWatch, Auto Scaling, Aws Config, CloudTrail, Systems Manager, Trusted Advisor, Control Tower.
Storage: EBS, EFS, S3, Encryption, Secret Manager, Inspector.
DevOps: GitHub, Git, CI/CD, Lambda, Jenkins, Amazon CodeCommit, CodeBuild, and CodeDeploy, Ansible, Docker and Splunk.
Monitoring & Event Management: AWS CloudWatch Events & Flow Logs, AWS SNS, AWS S3
Programming Languages: Python, JSON, YAML, Java.
PROFESSIONAL EXPERIENCE
DEVOPS ENGINEER: February 2019 – present. Verizon Communications Texas
Collaborate across multiple functional and technical teams to deliver an Agile-based project
Built infrastructure, networks and systems for scalability, resiliency, availability, security, and recovery through infrastructure as a code.
Work with clients to meet business needs and solve problems using the cloud.
Work with developers, architects, system administrators and other stakeholders to architect and configure Dev / Stage / QA and Prod environments in AWS (VPC, subnets, Security groups, EC2 instances, load balancer, Database, Redis, Route53.
Design and implement end-to-end Continuous Integration and Continuous Delivery (CI/CD) pipelines using both Jenkins and AWS pipeline.
Automate the deployment and testing of resources using Infrastructure as Code (Terraform and CloudFormation) through pipelines using DevOps principals, allowing customers to rapidly build, test, and release code while minimizing errors
Work with developers to build, deploy and orchestrate containers using Docker and Kubernetes
Provide technical guidance and mentoring to peers, less experienced engineers, and client personnel
Designing for high availability and business continuity using self-healing-based architectures, fail-over routing policies, multi-AZ deployment of EC2 instances, ELB health checks, Auto Scaling, and other disaster recovery models.
Leveraged AWS Control Tower, AWS Organization, etc., to set up and govern a secure, multi-account AWS environment based on the company’s requirements.
Implemented and managed Ansible Tower to scale automation and handle complex deployments.
Monitoring and optimize the environment to ensure costs and performance scale on demand.
Designed and deployed multitude of cloud services on AWS stack such as EC2, Route53, S3, RDS, Dynamo DB, SNS, SQS, IAM, while focusing on high-availability, fault tolerance, and auto-scaling.
Create Identity Access Management roles for various resources like EC2, RDS and S3 to communicate with each other.
AWS security Architect/Cloud Engineer: January 2017– January 2019
Teesnap (Golf course) Las Vegas
Worked with clients to understand their workflows including strengths and weaknesses, to identify new tech/solutions/improvements to make processes more efficient.
Worked closely with customers, internal staff, and other stakeholders to determine planning, implementation, and integration of system-oriented projects.
Designed/developed aspects of migration journey - assess, mobilize, and migrate phase including leveraging CART, ADS, Migration Evaluator, DMS, Cloud Endure.
Implemented security best practices in AWS including access key rotation, multi-factor authentication,
role-based permissions, enforced strong password policy, configure security groups and NACLs, S3 bucket policies.
Built high-performing, available, resilient, and efficient 3-tier architecture for customer applications, and performed reviews for architecture and infrastructure builds, following AWS best practices.
Provisioned and managed AWS infrastructures using Terraform.
Optimized cost through reserved instances, selection and changing of EC2 instance types based on the resource need, S3 storage class and S3 lifecycle policies, leveraging Autoscaling.
VPC peering with other accounts allowing access and routing to service and users of separate account to communicate.
Responsible for installation, configuration, management, and maintenance over Linux systems, including managing users.
Automatically remediated Trusted Advisor findings using Amazon CloudWatch Events and AWS Lambda
Designed for high availability and business continuity using self-healing-based architectures, fail-over routing policies, multi-AZ deployment of EC2 instances, ELB health checks, Auto Scaling, and other disaster recovery models
Leveraged EC2 Life Cycle Manager to create snapshots of EBS Volumes at scheduled intervals for backup and define a retention period as a cost-saving measure
Optimized cost through reserved instances, selection and changing of EC2 instance types based on resource need, S3 storage classes, and lifecycle policies
Leveraged different design principles for security in the cloud and implemented various AWS services to improve our security posture for Authentication, Authorization, Monitoring, Auditing, Encryption, and Data path security.
Assisted with migration using - assess, mobilize, and migrate phase including leveraging CART, MRA, DMS, and Cloud Endure
Developed terraform modules and CloudFormation templates to provision infrastructures in the cloud
Implemented security best practices in AWS including Automation, multi-factor authentication, access key rotation, role-based permissions, enforced strong password policy, configured security groups and NACLs, S3 bucket policies, and ACLs.
Implemented entry point security using tools Aws Secrets Manager, Aws Single Sign-On, and Security Token Service
Implemented Detective Point Control Security using tools like Aws Guard Duty, Trusted Advisor, Config, and Security
Implemented Infrastructure protection using tools like Aws Firewall Manager, Aws Direct Connect, Cloud formation (Automation of different environments), and Amazon Inspector
For Data security I leveraged Encryption both in transit and at Rest using Kms.
Configured CloudWatch alarm rules for operational and performance metrics for our AWS resources and applications
Designed infrastructure for high availability using Elastic load balancer and auto-scaling for Web servers which Scale in and Scale-out automatically, also the isolated environment by having security groups and NACL across subnets for EC2 instances and group.
CERTIFICATIONS/EDUCATION.
BSc. (Hons) Computer science University of Buea, Cameroon July 2013.
AWS Certified Solutions Architect – Associate, May 2022.
LANGUAGES: English