JEAN MARIE NANA
**** *** ******* ****, *** HICKORY,APT C206 TENNESSEE 37138
Tel: 202-***-**** Email: **********@*****.***
Summary of Qualifications:
I am an experienced and dedicated AWS Solutions Architect/DevOps Engineer skilled in working under pressure and adapting to new situations and challenges. I have 7+ years’ experience in AWS, Linux, DevOps and MuleSoft environments with proficiency in cloud orchestration, security, identity & access management, monitoring, event management, governance & compliance, patch management in AWS DevOps and MuleSoft. I have an excellent reputation for resolving problems and improving client satisfaction and a desire to learn emerging technologies while adapting to changing environments through exceeding expectations and company objectives. Technical Skills:
AWS Security:
AWS Security Hub, AWS Guard Duty, AWS Shield, AWS Firewall Manager, AWS Inspector, IAM, Security Groups, NACL, etc. Monitoring & Event Management: AWS CloudWatch (Events & Logs), AWS SNS. Identity & Access Management: AWS Organization, AWS IAM, AWS AD Connector, AWS Workspaces, AWS Secrets Manager, etc.
Governance & Compliance: AWS Config Rules, AWS Organization, AWS Control Tower, AWS Trusted Advisor, AWS Budgets, AWS License Manager, etc.
Programming Languages: JSON YML. Python.
Cloud Orchestration &
Automation:
AWS CloudFormation, AWS Lambda, AWS Systems Manager, AWS SSM Parameter Store, Ansible, Docker, Terraform.
Network: VPC, VGW, TGW, IGW, NGW, etc.
Application Delivery: Jira, Jenkins, Bitbucket, AWS Code Pipeline, AWS Code Commit, Blue/Green deployment, Elastic Beanstalk.
AWS Platform: AWS CloudFormation, AWS Lambda, AWS Systems Manager, S3, VPC, EC2, ELB, RDS, SNS, SQS, Route53, CloudFront, Service Catalog, AWS Auto Scaling, Trusted Advisor, CloudTrail CloudWatch and other CI/CD tools such as Git, Jira, GitLab, Jenkins.
Data Protection: AWS Certificate Manager, AWS KMS, Snapshot Lifecyle Manager, AWS Cloud HSM.
Self Service: Service Catalog
Image & Patch:
Integration:
AWS SSM Patch Manager, AWS Golden AMI Pipeline.
MuleSoft
Professional Experience
CREDIT ONE 07/2020 – Present AWS
DEVOPS ENGINEER
• Developed and elaborate data classification, management, and disaster recovery strategy.
• Developed and efficient patching with SSM.
• Leveraged control Tower for multi-account management.
• Migration using cloud Endure, AWS server migration servers, and AWS database migration service.
• Developed a sound and efficient security strategy for the environment.
• EKS/ECS pilot implementation in the DEV environment.
• Configured CI/CD Pipelines using Jenkins connected to GitHub and build environments (Dev, Stage, & Prod).
• Setup Ansible control master-slave nodes and developed playbooks to automation configuration of servers across environments.
• Provisioned the environment with CloudFormation and Terraform.
• Worked with MULESOFT for integration.
• Worked on a POC for real time data streaming with Apache Kafka. COACH 12/2018 – 06/2020
AWS Solutions Architect
• Developed and leveraged baseline and custom guardrails, policies, centralized policy enforcement, tagging policies and a well architected multi account environment.
• Implemented Machine Image Pipeline and integrated Patch Management.
• Migrated legacy applications to AWS cloud environment.
• Leveraged Docker to build, test and deploy applications in different environments.
• Developed LLDs for migrating various applications including network sizing, Instance types, names, tags etc.
• Developed required and optional tagging reference document for automation, compliance, and consolidated billing.
• Developed baseline VPC and Network design including leveraging VPN connectivity and Direct Connect.
• Developed baseline AWS account security, implemented/integrated end-point protection, vulnerability scanning and intelligent threat detection.
• Built serverless architecture with Lambda integrated with SNS, Cloud watch logs and other AWS services.
• Leveraged automated DevOps tools deployment and Blue-green deployment patterns and strategies.
• Configured CI/CD Pipelines using Jenkins connected to GitHub and build environments (Dev, Stage, & Prod).
• Implemented IAM best practices and role-based access control.
• Implemented AWS Organization to centrally manage multiple AWS accounts including consolidated billing and policy-based restrictions.
• Implemented Control Tower Preventive and Detective guardrails and leveraged Account Factory, integrated with Lambda for new AWS account creation and setup.
• Setup Ansible control master-slave nodes and developed playbooks to automation configuration of servers across environments.
NETFLIX 05/2016 – 12/2018
AWS Engineer
• Managed provisioning of AWS infrastructures using CloudFormation and Terraform.
• Design for high availability and business continuity using self-healing-based architectures, fail-over routing policies, multi-AZ deployment of EC2 instances, ELB health checks, Auto Scaling, and other disaster recovery models.
• Created patch management using Systems Manager automation for multi-region and multi account execution.
• Implemented preventive guardrails using Service Control Policies (SCPs).
• Implemented detective guardrails using AWS config and Cloud Custodian.
• Designed and implemented for elasticity and scalability using Elastic Cache, Cloud Front – Edge locations, RDS (read replicas, instance sizes) etc.
• Implemented security best practices in AWS including multi factor authentication, access key rotation, encryption using KMS, firewalls- security groups and NACLs, S3 bucket policies and ACLs, mitigating DDOS attacks etc.
• Implemented Jenkins, GitHub and Git for version control, code build, testing and release and CI/CD.
• Monitored end-to-end infrastructure using CloudWatch and SNS for notification.
• Used AWS system manager to automate operational tasks across AWS resources.
• Used System Manager to automate operational tasks across WK AWS infrastructure.
• Setup AWS Single Sign On (SSO) for on premise Active Director (AD).
• Developed and documented security guardrails for AWS Cloud environments.
• Built custom images through docker server, docker compose with multiple local containers and created production grade workflows and a continuous application workflow for multiple images.
• Implemented multiple container deployments to AWS and maintained sets of containers with deployments.
• Setup, Configured, and used Ad Hoc ansible Command.
• Designed secured, cost optimized, highly available and fault tolerant infrastructure in AWS.
• Architected and configured Dev/Stage/QA environments in AWS (VPC, subnets, security groups, EC2 instances, load balancer, RDS, Radis, route53, etc.).
• Implemented security best practices in AWS including multi factor authentication, access key rotation, role-based permissions, enforced strong password policy, configured security groups and NACLs, S3 bucket policies and ACLs, etc.
• Optimized cost through reserved instances, selection and changing of EC2 instance types based on resource need, S3 storage classes and S3 lifecycle policies, leveraging Auto scaling etc.
• Leveraged EC2 Create Snapshot API call to create snapshots of EBS Volumes on scheduled intervals.
• Configured CloudWatch alarm rules for operational and performance metrics for our AWS resources and applications.
• Monitoring from end-to-end view of runtime systems CPU, bandwidth, disk space, and log files using New Relic.
• Deployed and configured infrastructure using CloudFormation and Ansible.
• Architected and implemented continuous integration and deployment pipelines using Jenkins and other CI tools.
Techno-Communications - Yaoundé 12/2013 – 01/2016 LINUX SYSTEMS ADMINISTRATION
• Installation and administration of RHEL 4.0/5.0 and CentOS 5.
• Configured kickstart server and updating patches to the servers using proxy server.
• Did system upgrades, operating system, and periodical patch upgrades.
• Created Firewall rules for new servers to enable communication with applications.
• Offered ideas for appropriate support packages/patches to maintain system integrity.
• Performed capacity analysis and monitored and controlled disk space usage on systems.
• Set up user/group login ID's, printing parameters, network configuration, password, and permissions issues.
• Worked on support tickets independently and collaborated with team members to support infrastructure issues.
• Server patching, software upgrades and operational troubleshooting break/fix. Certifications
AWS Certified Solutions Architect – Professional
CompTIA Linux +
Mulesoft Developer level1
Education
Bachelor of Science in Computer Science 2016
University of BUEA
Yellow Tail Tech 2019
Post-Graduate Program in Cloud Computing 2021
University of Texas at Austin