ASHLEY ASONA
Lead AWS Cloud / DevSecOps Architect
Email: *************@*****.***; Phone: 940-***-**** GitHub: https://github.com/ashleypearl-web?tab=repositories PROFILE SUMMARY
AWS & Multi-Cloud Expert, Cloud Solutions Architect and experienced DevOps Engineer with 11+ years of spe- cialized experience and over 12 years in the IT sector. Adept at driving cloud migrations, hybrid cloud strategies, and enterprise-wide digital transformation, delivering scalable, resilient, highly available, and cost-efficient cloud-na- tive solutions across AWS, Azure, and other environments. Possesses a strong portfolio of expertise in AWS, complemented by a deep understanding of DevOps practices and tools. Renowned for leveraging a diverse array of AWS services, Platform as a Service (PaaS), Infrastructure as Code (IaC), serverless computing, containerization, and sophisticated monitoring solutions to create resilient, effi- cient, and secure IT environments.
Successfully led cloud-native application modernization initiatives by transitioning from monolithic architectures to serverless and containerized microservices, significantly improving scalability and operational agility. Devel- oped self-healing, auto-scaling infrastructure to handle unpredictable workloads, reducing downtime and operational overhead.
Key Highlights:
• Cloud Engineering & Architecture: Expert in AWS services such as EC2, S3, Lambda, API Gateway, ELB, RDS, DynamoDB, VPC, CloudFormation, Route 53, IAM, and Auto Scaling Groups. Skilled at designing cloud infrastruc- tures that are highly available, fault-tolerant, and cost-optimized. Experience in hybrid and multi-cloud strategies, integrating AWS with on-premises and Azure workloads.
• DevOps & Automation: Extensive experience with Git, Jenkins, GitHub Actions, CodePipeline, Ansible, Terraform, and CloudFormation for infrastructure automation. Proficient in building CI/CD pipelines, infrastructure as code
(IaC), and immutable infrastructure to accelerate deployment and improve software delivery cycles.
• Observability & Reliability Engineering: Proficient in AWS monitoring tools like CloudWatch, CloudTrail, X-Ray, and Config, as well as third-party solutions like Datadog, Prometheus, Splunk, and New Relic. Strong advocate of Site Reliability Engineering (SRE) principles, ensuring fault tolerance, performance optimization, and proactive in- cident management.
• Security, Compliance & Governance: Deep knowledge of AWS security best practices, utilizing AWS IAM, KMS, GuardDuty, Inspector, AWS Security Hub, AWS WAF, and AWS Shield for compliance, governance, and threat detection. Expertise in PKI, Certificate Authorities, encryption, and secure data transmission. Expert in IAM, net- working, private endpoints, and container security.
• Scripting & Automation: Strong proficiency in Python, Bash, and Groovy, using scripting for infrastructure auto- mation, serverless computing (AWS Lambda), and operational efficiency.
• Containerization & Orchestration: Advanced expertise in Docker, ECS, EKS (Kubernetes on AWS), and Fargate to efficiently orchestrate and scale containerized workloads.
• Azure & Multi-Cloud: Familiar with Azure DevOps, Azure Kubernetes Service (AKS), Azure Virtual Machines, and Azure Functions, ensuring seamless interoperability between AWS and Azure in hybrid cloud environments. TECHNICAL SKILLS
• Cloud Orchestration & Automation: Infrastructure as Code (IaC), AWS CloudFormation, AWS Systems Man- ager (SSM), AWS SSM Parameter Store, AWS OpsWorks, AWS Service Catalog, Ansible, Terraform, Puppet, Chef
• Monitoring & Event Management: AWS CloudWatch (Events, Logs, Metrics, Alarms), AWS SNS, AWS SQS, AWS S3, AWS X-Ray, AWS CloudTrail, AWS Config, AWS EventBridge, ELK Stack (Elasticsearch, Logstash, Kibana)
• Identity & Access Management (IAM): AWS Organizations, AWS IAM, AWS Secrets Manager, AWS Identity Center (SSO), AWS Cognito, AWS Resource Access Manager (RAM), IAM Policies & VPC Configurations, Nginx, ARM (Azure Resource Manager) templates
• Governance & Compliance: AWS Config Rules, AWS Organizations, AWS Control Tower, AWS Trusted Advi- sor, AWS Security Hub, AWS Audit Manager, AWS License Manager
• Programming Languages & Scripting: JSON, YAML, Terraform, Python, AWS CDK, AWS SDK (Boto3), Bash Scripting for Automation, PowerShell/Batch scripting, Java, HTML, JavaScript, XML, jQuery
• Application Delivery & GitOps Pipelines: AWS CodePipeline, AWS CodeCommit, AWS CodeBuild, AWS Cod- eDeploy, AWS CodeArtifact, Jenkins, GitHub, GitLab, Bitbucket, AWS CI/CD, AWS DevOps Guru, Perl Scripting, WLST (WebLogic Scripting Tool), ClearCase, Subversion (SVN), Maven
• Data Protection & Security: AWS Certificate Manager (ACM), AWS KMS, AWS CloudHSM, AWS Secrets Man- ager, AWS WAF, AWS Shield, AWS Macie, AWS GuardDuty, AWS Inspector, AWS Private Certificate Authority
(PCA)
• Networking & Hybrid Connectivity: AWS VPC, Virtual Private Gateway (VGW), Transit Gateway (TGW), Cus- tomer Gateway (CGW), Internet Gateway (IGW), NAT Gateway (NGW), AWS Direct Connect, AWS Global Accel- erator, AWS PrivateLink, AWS Route 53, DNS, HTTP, LDAP, SMTP, SNMP
• Storage & Backup: Amazon S3 (Standard, IA, Glacier), Amazon EFS, Amazon FSx, AWS Backup, AWS Storage Gateway, AWS DataSync, Nexus Repository, WLST
• Image & Patch Management: AWS SSM Patch Manager, AWS Golden AMI, AWS Elastic Beanstalk, AWS Im- age Builder, AWS EC2 Auto Scaling, AWS Launch Templates, VMware & SAN Storage Management
• Containerization & Serverless: AWS ECS, AWS EKS (Kubernetes), AWS Fargate, AWS Lambda, AWS App Runner, AWS Step Functions, AWS SAM, Docker, Kubernetes
• DevOps & CI/CD Tools: Terraform, Ansible, Python, Jenkins, Maven, Nexus, SonarQube, AWS Artifact
• Observability & Logging: AWS OpenSearch (Elasticsearch), AWS CloudWatch Logs Insights, AWS Kinesis, AWS Fluent Bit, AWS Firehose
• Source Code Management: GitHub, GitLab, Bitbucket, AWS CodeCommit
• IaC & Multi-Cloud: Azure DevOps, Azure Kubernetes Service (AKS), Azure Virtual Machines, Azure Functions, Azure Storage, Azure ExpressRoute
• Operating Systems: Linux, Unix, Windows, macOS, Windows Server WORK EXPERIENCE
Kinder Morgan Inc., Houston, TX December 2023 – Present DevSecOps/Infrastructure Architect
As a DevSecOps/Infrastructure Architect at Kinder Morgan (Energy Industry), I designed and implemented robust se- curity measures, including Lambda services for cloud security and automated deployment processes using Ansible. I collaborated with development teams to enhance database scalability while ensuring security throughout the develop- ment lifecycle. Additionally, I led the migration of Unix-based systems to AWS, executed performance testing for criti- cal applications, managed Kubernetes clusters, and deployed microservices architectures—all while upholding strin- gent security standards across multi-cloud environments.
• Designed and implemented AWS Lambda services to enhance cloud security, performing code vulnerability assessments and embedding AWS security practices throughout the development lifecycle.
• Architected microservices using AWS ECS, AWS Fargate, and AWS API Gateway, facilitating efficient and secure deployment of containerized applications.
• Set up and maintained robust DevOps CI/CD pipelines using AWS CodePipeline, CodeBuild, and Jenkins to automate software build, testing, and deployment.
• Collaborated with development teams to design database scalability strategies using Amazon RDS and Aurora, ensuring robust security measures throughout the process.
• Automated continuous deployment processes using Ansible, creating YAML playbooks and leveraging Ansible Tower for efficient scheduling and execution.
• Ensured secure DevSecOps infrastructure configurations by enforcing AWS IAM least privilege access policies and conducting regular security audits with AWS Config.
• Led the migration of Unix-based systems to AWS, implementing security protocols via AWS CloudFormation templates, AWS Systems Manager, and Ansible roles to ensure a smooth and secure transition.
• Worked with Git, Jenkins, GitHub Actions, CodePipeline, Ansible, Terraform, and CloudFormation for in-frastructure automation.
• Executed performance testing and failover simulations for PCF applications interfacing with Amazon RDS Multi-AZ instances, optimizing system reliability for critical operations.
• Utilized Docker, Jenkins, and Maven for build automation and artifact management, securely managing scripts and artifacts through AWS CodeArtifact, Nexus, and JFrog Artifactory.
• Developed secure Ansible Playbooks and Puppet Manifests for server and application provisioning, integrating with Jenkins to establish automated deployment pipelines.
• Utilized Terraform and AWS CloudFormation to define and manage infrastructure as code (IaC) for scalable and secure cloud deployments.
• Implemented log monitoring and alerting with AWS CloudWatch Logs, AWS CloudTrail, and AWS SNS for performance optimization and incident response.
• Architected and managed Elastic Load Balancers (ALB/NLB) and EC2 Auto Scaling groups, closely monitoring AWS CloudWatch alerts for security and performance.
• Customized Jenkins and Bamboo environments, integrating with AWS CodeCommit and Maven for continuous integration and ensuring secure development practices.
• Administered Kubernetes clusters using Amazon EKS, ensuring secure deployment and management of containerized applications across multi-cloud environments, including Azure Kubernetes Service (AKS).
• Automated AWS server provisioning with Ansible roles and AWS Systems Manager, managing multiple instances across environments with an emphasis on security and operational efficiency.
• Automated compliance checks within the DevSecOps framework using AWS Security Hub and AWS Trusted Advisor to meet regulatory standards.
• Orchestrated Puppet configurations, managing installations, upgrades, and configurations to meet stringent AWS security requirements.
• Led the management and optimization of Kubernetes clusters, utilizing Ansible playbooks and AWS EKS to implement best security practices for containerized environments in energy operations.
• Employed Chef, Puppet, and SaltStack for DevOps-focused configuration management, automating and maintaining consistent application settings across AWS and Azure environments.
• Conducted threat modeling and risk assessments within the DevSecOps pipeline using AWS Inspector and GuardDuty to proactively address vulnerabilities.
• Automated software development processes using Ansible Tower and developed Terraform templates for secure provisioning of AWS VPCs and virtual networks.
Environment: DevSecOps, Infrastructure Architect, AWS Lambda, Cloud Security, Ansible, CI/CD Pipelines, AWS CodePipeline, AWS CodeBuild, Jenkins, Amazon RDS, Aurora, YAML, Ansible Tower, AWS IAM, AWS Config, AWS CloudFormation, AWS Systems Manager, Docker, Maven, AWS CodeArtifact, Nexus, JFrog Artifactory, Puppet, Terraform, AWS CloudWatch, AWS CloudTrail, AWS SNS, Elastic Load Balancers, EC2 Auto Scaling, Bamboo, AWS CodeCommit, Kubernetes, Amazon EKS, Azure Kubernetes Service (AKS), AWS Security Hub, AWS Trusted Advisor, Chef, SaltStack, AWS Inspector, AWS GuardDuty, Threat Modeling, Risk Assessments, AWS VPC, Virtual Networks, Microservices, AWS ECS, AWS Fargate, Python, Bash, AWS API Gateway, Performance Testing, Failover Simulations, PCF Applications, Multi-AZ Instances, Log Monitoring, Alerting, Compliance Automation, Configuration Management, Server Provisioning, Security Audits, Database Scalability, Unix Migration, Containerized Applications, Multi-Cloud Environments, Energy Industry.
Bristol Myers Squibb, New York City, NY Aug 2022 – Nov 2023 DevSecOps Architect
As a DevSecOps Architect at Bristol Myers Squibb (Pharma Industry), I led the integration of DevOps practices across multiple IT systems, deploying secure CI/CD pipelines and migrating on-premises applications to AWS. I implemented security best practices, automated infrastructure deployment using Terraform and Ansible, and managed Docker/Ku- bernetes environments, ensuring scalability, fault tolerance, and compliance across cloud operations. Additionally, I optimized monitoring with AWS CloudWatch, Prometheus, and Splunk, enhancing real-time threat detection and sys- tem performance.
• Integrated DevOps practices across multiple IT systems, deploying secure AWS-native CI/CD pipelines using AWS CodePipeline, AWS CodeBuild, AWS CodeDeploy, and Jenkins to streamline software delivery.
• Enforced secure coding standards within the DevSecOps framework, embedding AWS security best practices into the application development lifecycle.
• Designed and deployed AWS solutions for high availability, fault tolerance, and auto-scaling using EC2, Route 53, S3, RDS, DynamoDB, CloudFormation, CloudWatch, SQS, SNS, EFS, and IAM.
• Led the migration of on-premises applications to AWS, ensuring data security with AWS Key Management Service
(KMS), AWS Secrets Manager, AWS WAF, and AWS Shield. Implemented ELBs and Auto Scaling for enhanced availability.
• Developed AWS CloudFormation Templates (CFT) and Terraform scripts to provision AWS infrastructure, adhering to AWS Well-Architected Framework best practices for security, encryption, and IAM policies.
• Deployed DevSecOps monitoring tools like AWS GuardDuty, AWS Security Hub, AWS Config, and Azure Security Center to detect and respond to incidents proactively.
• Managed Docker and Kubernetes environments, securing container images with AWS ECR scanning, vulnerability assessments, and integration with AWS Secrets Manager for credential management.
• Implemented advanced DevOps monitoring solutions using AWS CloudWatch, AWS X-Ray, Prometheus, Grafana, Splunk, and ELK Stack for centralized logging, metrics collection, and performance tuning.
• Analyzed logs and AWS CloudTrail events to detect anomalies and optimize system performance, using AWS Athena and AWS Glue for advanced log analytics.
• Automated security configurations and compliance checks using Ansible playbooks, AWS Config Rules, and AWS Lambda functions for infrastructure automation.
• Deployed Spring Boot and Node.js microservices to AWS ECS (Fargate), AWS Lambda, and AWS API Gateway, integrating with AWS Step Functions for event-driven workflows.
• Developed Terraform modules to deploy multi-cloud applications across AWS and Azure, automating AWS infra- structure provisioning via Jenkins pipelines and GitHub Actions.
• Performed threat modeling and risk assessments within the DevSecOps pipeline, leveraging AWS Inspector, AWS Macie, and AWS Detective to proactively address vulnerabilities.
• Managed Git repositories, code merging, production deployments, and build automation scripts using AWS Co- deCommit, Bitbucket, and GitHub Actions.
• Applied CI/CD tools like Jenkins, AWS CodeDeploy, and ArgoCD to automate deployment processes, leveraging Blue-Green and Canary deployment strategies to minimize production downtime.
• Integrated SonarQube with Jenkins and AWS DevOps tools for continuous security scanning, static code analysis, and compliance enforcement.
• Utilized Amazon EKS for deploying, scaling, and managing Kubernetes workloads, integrating AWS App Mesh for microservices networking and AWS ALB Ingress Controller for load balancing.
• Built and managed private cloud environments using Kubernetes and AWS Outposts, supporting development, testing, and production environments with automated deployments via Helm and Kustomize.
• Worked with Splunk, Datadog, and AWS CloudWatch Logs Insights to design production-quality dashboards, mon- itoring application traffic, logs, and resource utilization across hybrid cloud environments.
• Architected and optimized AWS Fargate-based microservices, integrating with AWS Step Functions, AWS Event- Bridge, and AWS SQS for event-driven architectures.
• Documented system configurations, backup procedures, and troubleshooting guides, maintaining AWS Systems Manager documentation and automating compliance reporting with AWS Audit Manager.
• Managed release schedules, project milestones, and reporting using Jira, Confluence, and AWS CodeStar. Environment: DevSecOps, AWS, Azure, CI/CD, AWS CodePipeline, AWS CodeBuild, AWS CodeDeploy, Jenkins, Terraform, Ansible, Docker, Kubernetes, AWS ECR, AWS Lambda, AWS CloudFormation, AWS GuardDuty, AWS Se- curity Hub, AWS Config, AWS WAF, AWS Shield, AWS Key Management Service (KMS), AWS Secrets Manager, AWS CloudWatch, Prometheus, Grafana, Splunk, ELK Stack, AWS X-Ray, AWS CloudTrail, AWS Athena, AWS Glue, AWS ECS (Fargate), AWS API Gateway, AWS Step Functions, AWS CodeCommit, Bitbucket, GitHub Actions, ArgoCD, So- narQube, Amazon EKS, AWS App Mesh, AWS ALB Ingress Controller, Python, Bash, AWS Outposts, Helm, Kustomize, Datadog, AWS EventBridge, AWS SQS, AWS Systems Manager, AWS Audit Manager, AWS CodeStar, Jira, Conflu- ence.
Nat West Bank, Jersey City, NJ Apr 2020 – Jul 2022 Lead Cloud/Data Engineer
At NatWest Bank (Finance Industry), I led the design and deployment of AWS-based cloud solutions, utilizing services such as Kinesis, Lambda, and SQS to ensure reliable application performance. I managed multi-tier, multi-region architectures with AWS CloudFormation, optimizing scalability and availability, while enhancing cloud security through real-time monitoring with CloudWatch and CloudTrail. Additionally, I oversaw the migration of containerized environments from ECS to Kubernetes and implemented CI/CD pipelines to streamline software delivery and ensure regulatory data governance compliance.
• Utilized AWS services like Kinesis, Lambda, SQS, SNS, and SWF to troubleshoot and resolve application issues, ensuring high performance and reliability across cloud applications.
• Conducted DevOps cost analysis and implemented AWS Reserved Instances, Auto Scaling, and cost-monitoring tools to reduce expenses.
• Configured automated backup solutions in DevOps pipelines using AWS S3, Glacier, and AWS Backup to ensure data resilience.
• Managed AWS RDS and EC2-based databases, ensuring seamless cloud operations, data integrity, and optimized performance.
• Implemented and maintained GitHub repositories for efficient version control, collaboration, and source code management.
• Monitored system performance and security in real-time using AWS CloudWatch and CloudTrail, providing insights into system health and enhancing cloud security.
• Configured Elastic Load Balancers (ELBs) for auto-scaling and managed multi-tier, multi-region architectures with AWS CloudFormation to ensure high availability and scalability.
• Worked with Git, Jenkins, GitHub Actions, CodePipeline, Ansible, Terraform, and CloudFormation for in-frastructure automation.
• Integrated automated build pipelines with deployment workflows, streamlining upgrades, migrations, and integrations using tools like Jira, SVN, Artifactory, Jama, and Jenkins.
• Managed network settings (Route 53, DNS, ELB, IP address configurations) to optimize cloud performance, reduce downtime, and improve overall application functionality.
• Implemented data governance policies and security controls to ensure data integrity, confidentiality, and compliance with standards like GDPR, HIPAA, and PCI DSS.
• Led migration of containerized environments from ECS to Kubernetes for enhanced scalability and resource utilization.
• Provided secure storage solutions using AWS services such as S3, EBS, EFS, and Glacier, ensuring durability and compliance with security standards.
• Deployed applications using AWS Elastic Beanstalk, simplifying deployment processes and ensuring consistency across environments.
• Leveraged AWS DataSync to facilitate efficient data migration from on-premises systems to AWS Cloud, ensuring operational continuity.
• Defined and maintained development, QA, and production environments using Terraform variables, version- controlled Terraform code, and modules for Compute and Users to ensure consistency and scalability.
• Implemented data quality monitoring and validation processes to ensure accuracy, completeness, and consistency.
• Managed CI/CD pipelines to accelerate the delivery of software updates, improving time-to-market.
• Troubleshot and resolved Kubernetes cluster issues, ensuring smooth operation of containerized environments.
• Developed and deployed event-driven AWS Lambda functions to automate tasks, improving operational efficiency.
• Enhanced system performance and user experience through expertise in Web Services, API Gateways, and application integration.
Environment: AWS, DevOps, Cloud Engineering, Kinesis, AWS Lambda, SQS, SNS, SWF, AWS CloudFormation, AWS CloudWatch, AWS CloudTrail, Auto Scaling, AWS Reserved Instances, AWS Backup, AWS S3, Glacier, AWS RDS, EC2, GitHub, Python, Bash, Elastic Load Balancer (ELB), Route 53, DNS, CI/CD, Jenkins, Jira, SVN, Artifactory, Jama, Data Governance, GDPR, HIPAA, PCI DSS, ECS, Kubernetes, AWS EBS, AWS EFS, Docker, AWS Elastic Beanstalk, Terraform, AWS DataSync, Data Quality Monitoring, API Gateway, Containerization, Event-Driven Architecture.
Organon & Co., Jersey City, NJ Dec 2017 – Mar 2020 Sr. Cloud Data/Security Engineer
As a Senior Cloud Data/Security Engineer at Organon & Co. (Pharma Industry), I led the implementation of data encryption solutions using AWS Key Management Service (KMS) to protect sensitive information and ensure compliance with data security regulations. I developed a cloud-based Document Management System using AWS services like Lambda and Elasticsearch, and enhanced operational efficiency through Infrastructure-as-Code (IaC) practices with tools such as Terraform and Ansible. My role involved close collaboration with cross-functional teams to ensure robust system performance and seamless deployment of scalable applications.
• Implemented data encryption solutions using AWS Key Management Service (KMS) to secure sensitive data both at rest and in transit, ensuring compliance with data security and privacy regulations.
• Utilized AWS Glue for efficient schema evolution and versioning, enabling seamless updates to data structures without affecting downstream applications or analytics.
• Collaborated with Linux and AWS support teams to prepare for new product launches and embrace emerging technologies, fostering a culture of continuous learning and technological improvement.
• Provided architectural design expertise to clients and internal stakeholders, aligning technical solutions with business goals and objectives.
• Developed a cloud-based Document Management System using AWS Lambda, Elasticsearch, containers, Python, Java, S3, and DynamoDB, improving document organization and accessibility.
• Monitored and managed Linux systems within a complex, multi-server environment, ensuring system stability, security, and optimal performance critical to business operations.
• Automated DevOps workflows, including provisioning and application deployment, using AWS Lambda, AWS Systems Manager, and Jenkins.
• Managed containerized applications with Docker and deployed them on AWS ECS and EKS as part of the DevOps pipeline.
• Deployed web applications on AWS ECS containers, managing scalable and resilient applications with features like Instance Group, Autoscaler, HTTP Load Balancer, and Autohealing for high availability across various workloads.
• Fostered collaboration between teams and clients through effective communication via meetings, calls, emails, web portals, and intranet platforms.
• Ensured robustness and scalability of deployed solutions using core technologies such as Apache/Nginx, MySQL/PostgreSQL, Varnish, Pacemaker, Kubernetes, ELK stack (Elasticsearch, Logstash, Kibana), and Redis.
• Leveraged Ansible/Ansible Tower for configuration management, automating daily tasks, and enabling rapid deployment of critical applications.
• Managed AWS systems by deploying built artifacts to application servers using Maven, and integrated Maven builds with Jenkins for streamlined build and deployment processes.
• Applied Infrastructure-as-Code (IaC) principles using Puppet, Terraform, and Ansible, maintaining a codebase to ensure consistent, reproducible infrastructure deployments.
• Defined and maintained development, QA, and production environments using Terraform variables, version controlled Terraform code, and modules for Compute and Users to ensure consistency and scalability.
• Automated daily operations with Bash scripts, documented environmental changes and server configurations, and analyzed error and user logs to quickly identify and resolve issues, ensuring system stability.
• Worked with Git, Jenkins, GitHub Actions, CodePipeline, Ansible, Terraform, and CloudFormation for infrastructure automation.
• Configured Elastic Load Balancers (ELBs) for auto-scaling and managed multi-tier, multi-region architectures with AWS CloudFormation to ensure high availability and scalability. Environment: AWS, Cloud Security, AWS Key Management Service (KMS), AWS Glue, AWS Lambda, AWS Systems Manager, Elasticsearch, Terraform, Ansible, Puppet, Docker, AWS ECS, AWS EKS, Linux Administration, Apache, Nginx, MySQL, PostgreSQL, Varnish, Pacemaker, Kubernetes, ELK Stack (Elasticsearch, Logstash, Kibana), Docker, Redis, Jenkins, Maven, CI/CD Pipelines, Infrastructure-as-Code (IaC), Auto Scaling, Instance Group, HTTP Load Balancer, Autohealing, Bash Scripting, Python, Java, S3, DynamoDB, DevOps Automation, Security Compliance
(GDPR, HIPAA, PCI DSS), CloudFormation.
Intel, Santa Clara, CA Jun 2015 – Nov 2017
DevOps Automation Engineer
As a DevOps Automation Engineer at Intel (Technology Company), I successfully deployed an ASP.NET application on AWS, optimizing IIS and application pools for smooth operations. I established an automated build and deployment pipeline using Jenkins, integrated CI/CD practices, and enhanced infrastructure scalability with Chef and Puppet. Additionally, I automated server provisioning, monitored environments with AWS CloudTrail, and utilized Bash scripts to streamline daily tasks, ensuring consistent performance and reliability across systems.
• Deployed an ASP.NET application on AWS, configuring IIS and application pools to ensure seamless operation and optimal performance.
• Built and automated a CI/CD pipeline using Jenkins, integrating with version control and deployment workflows to streamline development and release cycles.
• Designed and implemented automated server provisioning using Chef, ensuring scalable and consistent infrastructure deployment across environments.
• Managed Tomcat instances and deployments through Puppet manifests, enhancing application management and scalability.
• Promoted DevOps best practices, including CI/CD, testing, and monitoring, to foster collaboration between development and operations teams.
• Created a robust test environment with JUnit to improve code quality, automate testing, and streamline development cycles.
• Integrated build automation and deployment pipelines using Jenkins and SSH, enabling efficient and reliable software releases.
• Configured AWS CloudTrail to monitor user activity and ensure secure, compliant operations across AWS resources.
• Managed source code repositories and build processes, maintaining version control and consistency in software releases.
• Implemented DevOps monitoring solutions with AWS CloudWatch, CloudTrail, and ELK Stack to ensure the performance and security of applications.
• Integrated DevOps security measures, such as IAM policies, VPC configurations, and automated compliance checks, into the AWS environment.
• Leveraged AWS RDS for efficient data management and retrieval, optimizing database performance for application workloads.
• Maintained and updated the SCM database, ensuring data accuracy and integrity based on user requirements and system needs.
• Provided deployment support to development teams, ensuring smooth and efficient software rollouts across environments.
• Collaborated with the Release Manager to enhance build automation, patch management, and software release processes.
• Automated routine tasks using Bash scripts, documenting system changes, and analyzing logs to quickly identify and resolve issues, ensuring operational stability.
• Administered servers using SSH and optimized application performance with Nginx and Apache Tomcat for high availability and resilience.
•
Environment: AWS, DevOps, CI/CD, Jenkins, Chef, Puppet, Bash Scripting, ASP.NET, IIS, Application Pools, Python, Bash, Tomcat, AWS CloudTrail, Docker, AWS CloudWatch, ELK Stack (Elasticsearch, Logstash, Kibana), IAM, VPC, AWS RDS, JUnit, Source Code Management (SCM), SSH, Nginx, Apache Tomcat, Infrastructure Automation, CloudFormation, Build Automation, Release Management, Software Deployment, Patch Management. Walgreens Boot Alliance, Deerfield, Illinois Jan 2013 – May 2015 AWS Build & Release Engineer
As an AWS Build and Release Engineer at Walgreens Boot Alliance (Retail Industry), I led the planning and execution of Java application builds and deployments across various environments, including UAT, while optimizing workflows through Jenkins automation on Linux. I developed build scripts using Maven, Perl, and Bash, and refined the CI/CD pipeline. Additionally, I implemented Git branching strategies and enforced configuration and change management policies to enhance deployment efficiency.
• Led planning and execution of Java application builds and deployments across development, integration, and UAT environments, ensuring streamlined delivery at each stage.
• Configured Jenkins on Linux to establish primary and secondary build processes, enabling parallel execution and improving overall build efficiency.
• Developed automated build scripts using Maven, Perl, and Bash to streamline