Post Job Free

Resume

Sign in

aws/devops engineer

Location:
Nashville, TN
Posted:
April 12, 2023

Contact this candidate

Resume:

JEAN MARIE NANA

**** *** ******* ****, *** HICKORY,APT C206 TENNESSEE 37138

Tel: 202-***-**** Email: adwh64@r.postjobfree.com

Summary of Qualifications:

I am an experienced and dedicated AWS Solutions Architect/DevOps Engineer skilled in working under pressure and adapting to new situations and challenges. I have 7+ years’ experience in AWS, Linux, DevOps and MuleSoft environments with proficiency in cloud orchestration, security, identity & access management, monitoring, event management, governance & compliance, patch management in AWS DevOps and MuleSoft. I have an excellent reputation for resolving problems and improving client satisfaction and a desire to learn emerging technologies while adapting to changing environments through exceeding expectations and company objectives. Technical Skills:

AWS Security:

AWS Security Hub, AWS Guard Duty, AWS Shield, AWS Firewall Manager, AWS Inspector, IAM, Security Groups, NACL, etc. Monitoring & Event Management: AWS CloudWatch (Events & Logs), AWS SNS. Identity & Access Management: AWS Organization, AWS IAM, AWS AD Connector, AWS Workspaces, AWS Secrets Manager, etc.

Governance & Compliance: AWS Config Rules, AWS Organization, AWS Control Tower, AWS Trusted Advisor, AWS Budgets, AWS License Manager, etc.

Programming Languages: JSON YML. Python.

Cloud Orchestration &

Automation:

AWS CloudFormation, AWS Lambda, AWS Systems Manager, AWS SSM Parameter Store, Ansible, Docker, Terraform.

Network: VPC, VGW, TGW, IGW, NGW, etc.

Application Delivery: Jira, Jenkins, Bitbucket, AWS Code Pipeline, AWS Code Commit, Blue/Green deployment, Elastic Beanstalk.

AWS Platform: AWS CloudFormation, AWS Lambda, AWS Systems Manager, S3, VPC, EC2, ELB, RDS, SNS, SQS, Route53, CloudFront, Service Catalog, AWS Auto Scaling, Trusted Advisor, CloudTrail CloudWatch and other CI/CD tools such as Git, Jira, GitLab, Jenkins.

Data Protection: AWS Certificate Manager, AWS KMS, Snapshot Lifecyle Manager, AWS Cloud HSM.

Self Service: Service Catalog

Image & Patch:

Integration:

AWS SSM Patch Manager, AWS Golden AMI Pipeline.

MuleSoft

Professional Experience

CREDIT ONE 07/2020 – Present AWS

DEVOPS ENGINEER

• Developed and elaborate data classification, management, and disaster recovery strategy.

• Developed and efficient patching with SSM.

• Leveraged control Tower for multi-account management.

• Migration using cloud Endure, AWS server migration servers, and AWS database migration service.

• Developed a sound and efficient security strategy for the environment.

• EKS/ECS pilot implementation in the DEV environment.

• Configured CI/CD Pipelines using Jenkins connected to GitHub and build environments (Dev, Stage, & Prod).

• Setup Ansible control master-slave nodes and developed playbooks to automation configuration of servers across environments.

• Provisioned the environment with CloudFormation and Terraform.

• Worked with MULESOFT for integration.

• Worked on a POC for real time data streaming with Apache Kafka. COACH 12/2018 – 06/2020

AWS Solutions Architect

• Developed and leveraged baseline and custom guardrails, policies, centralized policy enforcement, tagging policies and a well architected multi account environment.

• Implemented Machine Image Pipeline and integrated Patch Management.

• Migrated legacy applications to AWS cloud environment.

• Leveraged Docker to build, test and deploy applications in different environments.

• Developed LLDs for migrating various applications including network sizing, Instance types, names, tags etc.

• Developed required and optional tagging reference document for automation, compliance, and consolidated billing.

• Developed baseline VPC and Network design including leveraging VPN connectivity and Direct Connect.

• Developed baseline AWS account security, implemented/integrated end-point protection, vulnerability scanning and intelligent threat detection.

• Built serverless architecture with Lambda integrated with SNS, Cloud watch logs and other AWS services.

• Leveraged automated DevOps tools deployment and Blue-green deployment patterns and strategies.

• Configured CI/CD Pipelines using Jenkins connected to GitHub and build environments (Dev, Stage, & Prod).

• Implemented IAM best practices and role-based access control.

• Implemented AWS Organization to centrally manage multiple AWS accounts including consolidated billing and policy-based restrictions.

• Implemented Control Tower Preventive and Detective guardrails and leveraged Account Factory, integrated with Lambda for new AWS account creation and setup.

• Setup Ansible control master-slave nodes and developed playbooks to automation configuration of servers across environments.

NETFLIX 05/2016 – 12/2018

AWS Engineer

• Managed provisioning of AWS infrastructures using CloudFormation and Terraform.

• Design for high availability and business continuity using self-healing-based architectures, fail-over routing policies, multi-AZ deployment of EC2 instances, ELB health checks, Auto Scaling, and other disaster recovery models.

• Created patch management using Systems Manager automation for multi-region and multi account execution.

• Implemented preventive guardrails using Service Control Policies (SCPs).

• Implemented detective guardrails using AWS config and Cloud Custodian.

• Designed and implemented for elasticity and scalability using Elastic Cache, Cloud Front – Edge locations, RDS (read replicas, instance sizes) etc.

• Implemented security best practices in AWS including multi factor authentication, access key rotation, encryption using KMS, firewalls- security groups and NACLs, S3 bucket policies and ACLs, mitigating DDOS attacks etc.

• Implemented Jenkins, GitHub and Git for version control, code build, testing and release and CI/CD.

• Monitored end-to-end infrastructure using CloudWatch and SNS for notification.

• Used AWS system manager to automate operational tasks across AWS resources.

• Used System Manager to automate operational tasks across WK AWS infrastructure.

• Setup AWS Single Sign On (SSO) for on premise Active Director (AD).

• Developed and documented security guardrails for AWS Cloud environments.

• Built custom images through docker server, docker compose with multiple local containers and created production grade workflows and a continuous application workflow for multiple images.

• Implemented multiple container deployments to AWS and maintained sets of containers with deployments.

• Setup, Configured, and used Ad Hoc ansible Command.

• Designed secured, cost optimized, highly available and fault tolerant infrastructure in AWS.

• Architected and configured Dev/Stage/QA environments in AWS (VPC, subnets, security groups, EC2 instances, load balancer, RDS, Radis, route53, etc.).

• Implemented security best practices in AWS including multi factor authentication, access key rotation, role-based permissions, enforced strong password policy, configured security groups and NACLs, S3 bucket policies and ACLs, etc.

• Optimized cost through reserved instances, selection and changing of EC2 instance types based on resource need, S3 storage classes and S3 lifecycle policies, leveraging Auto scaling etc.

• Leveraged EC2 Create Snapshot API call to create snapshots of EBS Volumes on scheduled intervals.

• Configured CloudWatch alarm rules for operational and performance metrics for our AWS resources and applications.

• Monitoring from end-to-end view of runtime systems CPU, bandwidth, disk space, and log files using New Relic.

• Deployed and configured infrastructure using CloudFormation and Ansible.

• Architected and implemented continuous integration and deployment pipelines using Jenkins and other CI tools.

Techno-Communications - Yaoundé 12/2013 – 01/2016 LINUX SYSTEMS ADMINISTRATION

• Installation and administration of RHEL 4.0/5.0 and CentOS 5.

• Configured kickstart server and updating patches to the servers using proxy server.

• Did system upgrades, operating system, and periodical patch upgrades.

• Created Firewall rules for new servers to enable communication with applications.

• Offered ideas for appropriate support packages/patches to maintain system integrity.

• Performed capacity analysis and monitored and controlled disk space usage on systems.

• Set up user/group login ID's, printing parameters, network configuration, password, and permissions issues.

• Worked on support tickets independently and collaborated with team members to support infrastructure issues.

• Server patching, software upgrades and operational troubleshooting break/fix. Certifications

AWS Certified Solutions Architect – Professional

CompTIA Linux +

Mulesoft Developer level1

Education

Bachelor of Science in Computer Science 2016

University of BUEA

Yellow Tail Tech 2019

Post-Graduate Program in Cloud Computing 2021

University of Texas at Austin



Contact this candidate