Post Job Free
Sign in

Senior Cloud / DevOps Architect

Location:
Levindale, MD, 21215
Posted:
March 12, 2025

Contact this candidate

Resume:

DHARAN REDDY

DevOps Engineer Cloud Expert

301-***-****

**************@*****.***

www.linkedin.com/in/dharaneeswar-reddy-a6308233b

PROFILE SUMMARY

AWS Certified Security Professional; Cloud & DevOps Engineer with 10+ years in IT & 8+ years of experience in DevOps.

Skilled in containerized microservices, platform engineering, and cloud migration across AWS and Azure.

Deep experience in Data Engineering, ETL pipeline optimization, and cloud security frameworks.

Apt in securing distributed systems, compliance, and workload optimization to enhance reliability and cost efficiency.

Deft in infrastructure provisioning, stateful applications, and policy-driven automation using DevOps methodologies. CORE COMPETENCIES

Multi-Cloud Orchestration

CI/CD Pipeline Optimization

Observability & Log Analytics

Infrastructure Drift Detection

Kubernetes Policy Enforcement

Microservices Scalability

Role-Based Access Controls

Predictive Auto-Healing

Chaos Engineering Practices

Real-Time Performance Tuning

Secure API Gateway Configurations

Automated Compliance Auditing

AI-Powered Cloud Monitoring

Event-Driven Serverless Workflows

Edge Computing Integration

Proactive Threat Mitigation

Cloud-Native Storage Strategies

High-Throughput Data Processing

TECHNICAL SKILLS

Cloud Technologies

Platforms: AWS (S3, Lambda, EC2, RDS, VPC, Route 53, CloudTrail, CloudWatch, IAM, Auto Scaling, WAF, Shield, CloudFormation, Security Hub, Organizations, Inspector, SSM), GCP (BigQuery, DataFlow, DataProc, Cloud Composer), Azure

(AKS, Virtual Machines, Azure AD, Functions, Bicep, Azure DevOps). CDN & Networking: Cloudflare (DNS, Page Rules, Cache Rules, Argo, Load Balancers, WAF, Rate Limiting).

DevOps & Containerization

CI/CD: Jenkins, AWS CodePipeline, GitHub Actions, GitLab CI/CD, Azure Pipelines, TeamCity, CircleCI, Bamboo. Containerization: Kubernetes (EKS, AKS, OpenShift, Istio), Docker, ECS, ECR, Podman. IaC: Terraform, CloudFormation, Pulumi, ARM Templates, Bicep, Packer. Configuration Management: Ansible, Chef, Puppet, SaltStack, Rundeck.

Database & Data Processing

SQL: Microsoft SQL Server, MySQL, PostgreSQL, Amazon RDS, MariaDB, CockroachDB, Oracle, Amazon Aurora. NoSQL: MongoDB, Cassandra, DynamoDB, Firebase, Couchbase. Data Warehouses: Amazon Redshift, BigQuery.

Streaming & Caching: Apache Kafka, Kinesis, Flink, Spark Streaming, Redis, Memcached.

Programming & Scripting

Proficient In: Python, Java, PHP, JavaScript, Scala, TypeScript, Clojure (Script). Familiar With: Kotlin, Go, Rust, HTML, CSS, C++, SQL, Perl, Bash, PowerShell, Groovy, YAML, JSON, Terraform HCL, TCL.

Software Development & Security

Version Control: Git, GitHub, Bitbucket, Perforce, SVN. Monitoring & Logging: ELK Stack, Splunk, Dynatrace, Prometheus, Grafana, Nagios, CloudWatch Logs, SolarWinds. Build & Testing: Maven, Gradle, Bazel, SonarQube, Veracode, Cucumber, Selenium. Security & Compliance: AWS KMS, HashiCorp Vault, AWS Secrets Manager, Prisma Cloud, Zero Trust Security, SASE.

Networking & Infrastructure

Networking Protocols: TCP/IP, FTP, SSH, SNMP, DNS, DHCP. Networking Tools: Cisco Routers/Switches, WAN, LAN, NAS, SAN, Load Balancers (AWS ALB/NLB, F5, HAProxy, SDN, VPN).

Web & Application Servers

Servers: Nginx, Apache Tomcat, JBoss, Apache2, WebLogic, WebSphere, HAProxy, Caddy. WORK EXPERIENCE

UNDER ARMOUR, Baltimore, Maryland Sep 2023 – Present Lead DevOps Engineer

Project Summary: As a Lead DevOps Engineer with Under Armour, I played a pivotal role in designing and implementing scalable, cloud-native microservices leveraging AWS Lambda, API Gateway, and PHP. This innovative strategy utilized a wide array of AWS services, significantly enhancing the user experience while adhering to rigorous DevSecOps principles.

Deployed cloud-native microservices using AWS Lambda, API Gateway, and PHP, optimizing performance and reducing operational overhead.

Automated infrastructure provisioning with Terraform and AWS CloudFormation, ensuring high availability, fault tolerance, and scalability.

Designed and implemented DevSecOps pipelines using GitLab CI/CD, Jenkins, and Veracode, integrating security scanning, compliance validation, and automated testing.

Developed and maintained containerized applications using Kubernetes (EKS, AKS), enhancing workload orchestration and resource efficiency.

Implemented Infrastructure as Code (IaC) governance frameworks to standardize cloud deployments across AWS and Azure environments.

Configured and managed AWS security services, including IAM policies, Shield, WAF, Security Hub, and Secret Manager, to strengthen application security posture. Also integrated Azure Active Directory (AAD) with AWS IAM.

Established centralized logging and monitoring using Elasticsearch, Kibana, Logstash (ELK), Prometheus, Grafana, and Dynatrace for real-time observability.

Enhanced API security and reliability by configuring AWS API Gateway with custom authorizers, throttling, and WAF-based protection.

Led Azure DevOps automation initiatives, optimizing Azure Functions, API Management, and Security Center for cross- cloud integration.

Spearheaded automated compliance reporting and anomaly detection using AWS CloudTrail, AWS Config, and Sumo Logic.

Developed Python and Bash scripts for automated deployments, log aggregation, and real-time security monitoring.

Migrated legacy workloads to containerized microservices architecture on Kubernetes, reducing deployment times by 40%.

Collaborated with cross-functional teams in Agile/Scrum environments to ensure seamless CI/CD adoption and cloud- native best practices.

Major Achievements

Reduced deployment time (60%) automating CI/CD pipelines with GitLab, Terraform, & Ansible, enhancing release cycles.

Improved system resilience by implementing AWS WAF and Shield, mitigating DDoS threats and security compliance.

Achieved 99.99% uptime by designing fault-tolerant, auto-scaling cloud architectures across AWS and Azure. Technical Environment: AWS (Lambda, API Gateway, EC2, S3, IAM, CloudFormation, Route 53, VPC, RDS, Shield, WAF, NACL, Secret Manager, CloudTrail, CloudWatch), Azure (Functions, API Management, Security Center, DevOps), PHP, Java, Spring Boot, Spring Security, Kubernetes, GitLab CI/CD, Terraform, Ansible, Jenkins, Elasticsearch, Kibana, Logstash, Grafana, Prometheus, Sumo Logic, Dynatrace, Veracode, Linux, Microsoft platforms, DevSecOps, Agile, Scrum

SIGNATURE BANK, New York City, NY Feb 2022 – Aug 2023 AWS DevOps Engineer

Project Summary: As an AWS DevOps Engineer with Signature Bank, I was responsible for orchestrating the provisioning and management of AWS resources to ensure scalable, reliable deployments for critical applications. By leveraging advanced technologies such as EC2, ECS clusters, and PHP, I focused on enhancing operational efficiency and scalability.

Designed and deployed highly available AWS infrastructure using EC2, ECS clusters, and VPC, optimizing performance and scalability.

Automated infrastructure provisioning with Terraform and AWS CloudFormation, ensuring consistent deployments across environments.

Built and managed data pipelines using AWS services like S3, Lambda, and CloudWatch Events to support real-time analytics.

Developed and optimized CI/CD pipelines using Jenkins, AWS CodeCommit, CodeDeploy, and Git to automate application releases.

Secured cloud environments with IAM policies, VPC security groups, AWS Shield, and encryption techniques for compliance with industry regulations.

Implemented centralized logging and monitoring using AWS CloudWatch, CloudTrail, and ELK Stack for proactive security and performance insights.

Managed Docker containerized applications on AWS ECS, Kubernetes, and Elastic Beanstalk, improving microservices orchestration.

Configured and optimized AWS Load Balancers (ALB, NLB) to ensure high availability, fault tolerance, and traffic distribution.

Developed Python and Bash scripts for automation of cloud resource management, log analysis, and data transformations.

Architected distributed data processing frameworks, integrating AWS Lambda, S3, and DynamoDB for scalable cloud storage and retrieval.

Enhanced data security and compliance by implementing AWS Key Management Service (KMS), Secrets Manager, and automated security scans.

Collaborated in Kanban-driven DevOps workflows, enabling faster development cycles, automated deployments, and cross-team cloud integrations.

Major Achievements

Reduced deployment time by 65% by automating CI/CD pipelines with Terraform, Jenkins, and AWS CodeDeploy.

Enhanced data security and compliance by implementing AWS KMS, Secrets Manager, and real-time security monitoring.

Optimized cloud costs by 30% through efficient AWS resource provisioning, auto-scaling policies, and performance tuning.

Technical Environment: AWS (EC2, ECS, Lambda, VPC, CloudWatch, CloudTrail, CodeCommit, CodeDeploy, Elastic Beanstalk, CloudFormation), PHP, Python, Bash, Docker, Kubernetes, Jenkins, Git, Docker Registry, Ansible, Terraform, AWS CloudWatch Events, load balancers, distributed architectures, Kanban, DevOps

PINTEREST, San Francisco, California Jan 2021 – Jan 2022 Senior DevOps Engineer

Project Summary: As a Senior DevOps Engineer at Pinterest, I led the design and implementation of a highly scalable, fault- tolerant AWS infrastructure to support the platform’s real-time content recommendation and image processing systems. My efforts improved operational efficiency, reduced deployment times, and maintained high availability.

Designed and deployed a highly scalable, fault-tolerant AWS infrastructure, optimizing performance for real-time content recommendation systems.

Automated infrastructure provisioning and deployments using Terraform, CloudFormation, and Ansible, ensuring consistency and reducing manual effort.

Developed and maintained CI/CD pipelines with Jenkins and GitHub Actions, accelerating code deployments and reducing errors.

Managed containerized workloads using Docker and Kubernetes (ECS, EKS) to enhance application scalability and resilience.

Implemented real-time monitoring and observability using Prometheus, Grafana, and ELK Stack, enabling proactive issue resolution.

Optimized AWS networking and security by configuring VPC, Route 53, IAM policies, and Elastic Load Balancers for high availability.

Automated log aggregation and analysis using Elasticsearch, Logstash, and Kibana (ELK) to improve system visibility and troubleshooting.

Developed Python and Bash scripts to automate infrastructure management, log parsing, and performance tuning tasks.

Improved database performance and availability by optimizing AWS RDS configurations and implementing automated backups.

Led Agile DevOps transformations, collaborating with cross-functional teams to implement best practices for cloud- native development.

Major Achievements

Reduced deployment time by 50% by automating CI/CD workflows with Terraform, Jenkins, and GitHub Actions.

Increased system reliability to 99.99% uptime by implementing auto-scaling, proactive monitoring, and fault-tolerant AWS architectures.

Technical Environment: AWS (EC2, ECS, Lambda, S3, RDS, CloudFormation, CloudWatch, IAM, VPC, Route 53, Elastic Load Balancer), Docker, Kubernetes, Jenkins, Terraform, GitHub Actions, Python, Bash, Prometheus, Grafana, ELK stack

(Elasticsearch, Logstash, Kibana), Ansible, Linux, DevOps, Agile

SUPERNUS PHARMACEUTICALS, Rockville, Maryland Sep 2018 – Dec 2020 Senior AWS Cloud Engineer

Project Summary: As a Senior AWS Cloud Engineer with Supernus Pharmaceuticals, I successfully designed and implemented a cloud-based Document Management System that utilized various AWS technologies, significantly enhancing document accessibility and organization. Additionally, I focused on automation of infrastructure processes and the implementation of robust data encryption protocols.

Designed and deployed a cloud-based Document Management System (DMS) leveraging AWS Lambda, S3, and DynamoDB, improving document accessibility and compliance.

Automated infrastructure provisioning and configuration management using Terraform, Ansible, and Puppet, ensuring consistency and reducing deployment times.

Implemented data encryption and security protocols using AWS KMS, IAM roles, and access policies, ensuring HIPAA and regulatory compliance.

Developed serverless data processing pipelines with AWS Glue and Lambda, optimizing document indexing and search capabilities.

Managed containerized applications on AWS ECS and Kubernetes, improving scalability and workload distribution.

Deployed centralized logging and monitoring with Elasticsearch, Logstash, Kibana (ELK), and AWS CloudWatch, enabling real-time system insights.

Automated CI/CD pipelines with GitLab CI, Jenkins, and Maven, improving software deployment efficiency and reducing human errors.

Optimized AWS cost management using AWS Cost Explorer and Trusted Advisor, leading to improved budget forecasting and cost reduction.

Enhanced high availability and auto-scaling by implementing Pacemaker clustering, Instance Groups, and Autohealing mechanisms for fault tolerance.

Configured and maintained web and API services using Apache, Nginx, and Varnish, improving load balancing and content caching.

Major Achievements

Reduced infrastructure deployment time by 70% by automating provisioning with Terraform and Ansible.

Achieved 99.98% uptime for the Document Management System by implementing high-availability architectures with AWS Autohealing and Auto Scaling.

Technical Environment: AWS (Lambda, S3, DynamoDB, Glue, KMS, ECS, CloudWatch, Cost Explorer, Trusted Advisor, Backup), Elasticsearch, Python, Java, Ansible, Ansible Tower, Terraform, Puppet, Git, GitLab CI, Jenkins, Maven, Docker, Kubernetes, ELK stack (Elasticsearch, Logstash, Kibana), Apache/Nginx, MySQL/PostgreSQL, Varnish, Pacemaker, Cassandra, Bash (Shell), Linux, HTTP Load Balancers, Instance Groups, Autoscalers, Autohealing

EXELON, Chicago, Illinois Mar 2017 – Aug 2018

Cloud & DevOps Engineer

Project Summary: As a Cloud & DevOps Engineer at Exelon, I focused on automating and optimizing AWS and Azure environments, ensuring scalable, cost-effective, and high-performance cloud architectures. I played a key role in infrastructure automation using Terraform and CloudFormation, integrating security solutions, and enhancing monitoring, backup, and disaster recovery strategies.

Automated AWS and Azure infrastructure provisioning using Terraform, CloudFormation, and ARM templates, ensuring consistent and scalable deployments.

Designed and deployed multi-tier cloud architectures across IaaS, PaaS, and SaaS models, optimizing performance and cost efficiency.

Managed containerized applications on AWS ECS and Azure Kubernetes Service (AKS), improving workload distribution and auto-scaling.

Implemented cloud security best practices by configuring IAM roles, SAML-based authentication, Azure AD integration, and cross-cloud security policies.

Monitored AWS and Azure performance using CloudWatch, ScienceLogic, and Azure Monitor, ensuring real-time observability and proactive issue resolution.

Led client onboarding and technical support, resolving 200+ support tickets through CDW ticketing system and Jira, improving cloud adoption.

Configured auto-scaling, elastic load balancing (AWS ALB/NLB, Azure Load Balancer), and fault-tolerant architectures, ensuring high availability.

Designed and automated backup and disaster recovery strategies using AWS EBS snapshots, S3 versioning, and Azure Backup, improving data protection.

Deployed Azure Functions and AWS Lambda to automate infrastructure tasks, reducing operational overhead.

Integrated Azure Security Center and AWS Security Hub to enhance security compliance and threat detection. Major Achievements

Resolved 200+ cloud support tickets related to security, networking, and automation, improving cloud adoption and operational efficiency.

Enhanced system resilience and uptime to 99.98% by implementing auto-scaling, load balancing, and disaster recovery strategies.

Technical Environment: AWS (EC2, Elastic Beanstalk, S3, ECS, Lambda, CloudWatch, CloudFormation, VPC, EBS, IAM), Terraform, ScienceLogic, CDW ticketing system, Jira, Scrum, Active Directory, SAML, auto-scaling, elastic load balancing

UPMC, Oakland, Pittsburgh, PA Jan 2015 – Feb 2017 AWS Cloud Engineer

Project Summary: As an AWS Cloud Engineer at UPMC, I led the design and deployment of mission-critical web applications on AWS, ensuring high availability, security, and compliance with industry regulations. I implemented secure cloud architectures, leveraging AWS Lambda, CloudFormation, and RDS, and automated infrastructure provisioning using Terraform and Ansible.

Designed and deployed scalable AWS architectures using EC2, Lambda, RDS, and VPC, ensuring fault tolerance and security compliance.

Automated CI/CD pipelines using GitLab, CircleCI, and Terraform, streamlining software deployments and reducing downtime.

Implemented data encryption and key management using AWS KMS, securing sensitive healthcare data in compliance with HIPAA.

Managed containerized applications using AWS ECS and Docker, optimizing workload orchestration and resource efficiency.

Configured centralized monitoring and observability using AWS CloudWatch, Prometheus, and Grafana, ensuring proactive incident detection.

Deployed and optimized Elasticsearch clusters on AWS, improving search performance and real-time data indexing.

Designed self-healing and auto-scaling infrastructure with Auto Scaling Groups and Elastic Load Balancers, enhancing application resilience.

Streamlined infrastructure automation and configuration management using Ansible, Pulumi, and SaltStack, reducing manual intervention.

Major Achievements

Reduced deployment time by 60% by automating AWS-based CI/CD pipelines using GitLab, Terraform, and Ansible.

Enhanced security compliance by implementing AWS KMS encryption, IAM policies, and HIPAA-aligned access controls. Technical Environment: AWS (Lambda, EC2, S3, RDS, CloudFormation, CloudWatch, CloudTrail, KMS, IAM, VPC, Route 53, Auto Scaling, ELB, ECS), Docker, Terraform, Ansible, CircleCI, GitLab, Elasticsearch, Prometheus, Grafana, PostgreSQL, Redis, Kafka, MongoDB, Bash, Linux, SaltStack, Pulumi, Apache, Nginx, HAProxy.

ECOPETROL, Houston, Tx Jan 2014 – Dec 2014

Linux Administrator

Designed and implemented business infrastructure architecture, employing automated scripts to streamline the build process for development and production environments, enhancing efficiency and reducing manual intervention.

Created and maintained Python, Shell, and Ruby scripts to automate system-level activities, execute API calls, and parse REST API call outputs, significantly improving process automation and responsiveness.

Transformed configuration and deployment tools into a scalable, auto-scaling system that optimized platform performance for varying workloads and user demands.

Demonstrated extensive knowledge of network protocols such as DNS, TCP/IP, NFS, HTTP, LDAP, SMTP, and SNMP, enabling effective system management and seamless network communication.

Built and supported a diverse range of servers, including Solaris, Linux, AIX, and HP-UX, ensuring reliable operation and performance across various project requirements.

EDUCATION

Bachelor of Technology - Computer Science and Engineering Master’s in Computer Science - California State University, Long Beach CERTIFICATIONS.

AWS Certified Security – Specialty

Microsoft Certified: DevOps Engineer Expert



Contact this candidate