DHARAN REDDY
DevOps Engineer Cloud Expert
**************@*****.***
www.linkedin.com/in/dharaneeswar-reddy-a6308233b
PROFILE SUMMARY
AWS Certified Security Professional; Cloud & DevOps Engineer with 10+ years in IT & 8+ years of experience in DevOps.
Skilled in containerized microservices, platform engineering, and cloud migration across AWS and Azure.
Deep experience in Data Engineering, ETL pipeline optimization, and cloud security frameworks.
Apt in securing distributed systems, compliance, and workload optimization to enhance reliability and cost efficiency.
Deft in infrastructure provisioning, stateful applications, and policy-driven automation using DevOps methodologies. CORE COMPETENCIES
Multi-Cloud Orchestration
CI/CD Pipeline Optimization
Observability & Log Analytics
Infrastructure Drift Detection
Kubernetes Policy Enforcement
Microservices Scalability
Role-Based Access Controls
Predictive Auto-Healing
Chaos Engineering Practices
Real-Time Performance Tuning
Secure API Gateway Configurations
Automated Compliance Auditing
AI-Powered Cloud Monitoring
Event-Driven Serverless Workflows
Edge Computing Integration
Proactive Threat Mitigation
Cloud-Native Storage Strategies
High-Throughput Data Processing
TECHNICAL SKILLS
Cloud Technologies
Platforms: AWS (S3, Lambda, EC2, RDS, VPC, Route 53, CloudTrail, CloudWatch, IAM, Auto Scaling, WAF, Shield, CloudFormation, Security Hub, Organizations, Inspector, SSM), GCP (BigQuery, DataFlow, DataProc, Cloud Composer), Azure
(AKS, Virtual Machines, Azure AD, Functions, Bicep, Azure DevOps). CDN & Networking: Cloudflare (DNS, Page Rules, Cache Rules, Argo, Load Balancers, WAF, Rate Limiting).
DevOps & Containerization
CI/CD: Jenkins, AWS CodePipeline, GitHub Actions, GitLab CI/CD, Azure Pipelines, TeamCity, CircleCI, Bamboo. Containerization: Kubernetes (EKS, AKS, OpenShift, Istio), Docker, ECS, ECR, Podman. IaC: Terraform, CloudFormation, Pulumi, ARM Templates, Bicep, Packer. Configuration Management: Ansible, Chef, Puppet, SaltStack, Rundeck.
Database & Data Processing
SQL: Microsoft SQL Server, MySQL, PostgreSQL, Amazon RDS, MariaDB, CockroachDB, Oracle, Amazon Aurora. NoSQL: MongoDB, Cassandra, DynamoDB, Firebase, Couchbase. Data Warehouses: Amazon Redshift, BigQuery.
Streaming & Caching: Apache Kafka, Kinesis, Flink, Spark Streaming, Redis, Memcached.
Programming & Scripting
Proficient In: Python, Java, PHP, JavaScript, Scala, TypeScript, Clojure (Script). Familiar With: Kotlin, Go, Rust, HTML, CSS, C++, SQL, Perl, Bash, PowerShell, Groovy, YAML, JSON, Terraform HCL, TCL.
Software Development & Security
Version Control: Git, GitHub, Bitbucket, Perforce, SVN. Monitoring & Logging: ELK Stack, Splunk, Dynatrace, Prometheus, Grafana, Nagios, CloudWatch Logs, SolarWinds. Build & Testing: Maven, Gradle, Bazel, SonarQube, Veracode, Cucumber, Selenium. Security & Compliance: AWS KMS, HashiCorp Vault, AWS Secrets Manager, Prisma Cloud, Zero Trust Security, SASE.
Networking & Infrastructure
Networking Protocols: TCP/IP, FTP, SSH, SNMP, DNS, DHCP. Networking Tools: Cisco Routers/Switches, WAN, LAN, NAS, SAN, Load Balancers (AWS ALB/NLB, F5, HAProxy, SDN, VPN).
Web & Application Servers
Servers: Nginx, Apache Tomcat, JBoss, Apache2, WebLogic, WebSphere, HAProxy, Caddy. WORK EXPERIENCE
UNDER ARMOUR, Baltimore, Maryland Sep 2023 – Present Lead DevOps Engineer
Project Summary: As a Lead DevOps Engineer with Under Armour, I played a pivotal role in designing and implementing scalable, cloud-native microservices leveraging AWS Lambda, API Gateway, and PHP. This innovative strategy utilized a wide array of AWS services, significantly enhancing the user experience while adhering to rigorous DevSecOps principles.
Deployed cloud-native microservices using AWS Lambda, API Gateway, and PHP, optimizing performance and reducing operational overhead.
Automated infrastructure provisioning with Terraform and AWS CloudFormation, ensuring high availability, fault tolerance, and scalability.
Designed and implemented DevSecOps pipelines using GitLab CI/CD, Jenkins, and Veracode, integrating security scanning, compliance validation, and automated testing.
Developed and maintained containerized applications using Kubernetes (EKS, AKS), enhancing workload orchestration and resource efficiency.
Implemented Infrastructure as Code (IaC) governance frameworks to standardize cloud deployments across AWS and Azure environments.
Configured and managed AWS security services, including IAM policies, Shield, WAF, Security Hub, and Secret Manager, to strengthen application security posture. Also integrated Azure Active Directory (AAD) with AWS IAM.
Established centralized logging and monitoring using Elasticsearch, Kibana, Logstash (ELK), Prometheus, Grafana, and Dynatrace for real-time observability.
Enhanced API security and reliability by configuring AWS API Gateway with custom authorizers, throttling, and WAF-based protection.
Led Azure DevOps automation initiatives, optimizing Azure Functions, API Management, and Security Center for cross- cloud integration.
Spearheaded automated compliance reporting and anomaly detection using AWS CloudTrail, AWS Config, and Sumo Logic.
Developed Python and Bash scripts for automated deployments, log aggregation, and real-time security monitoring.
Migrated legacy workloads to containerized microservices architecture on Kubernetes, reducing deployment times by 40%.
Collaborated with cross-functional teams in Agile/Scrum environments to ensure seamless CI/CD adoption and cloud- native best practices.
Major Achievements
Reduced deployment time (60%) automating CI/CD pipelines with GitLab, Terraform, & Ansible, enhancing release cycles.
Improved system resilience by implementing AWS WAF and Shield, mitigating DDoS threats and security compliance.
Achieved 99.99% uptime by designing fault-tolerant, auto-scaling cloud architectures across AWS and Azure. Technical Environment: AWS (Lambda, API Gateway, EC2, S3, IAM, CloudFormation, Route 53, VPC, RDS, Shield, WAF, NACL, Secret Manager, CloudTrail, CloudWatch), Azure (Functions, API Management, Security Center, DevOps), PHP, Java, Spring Boot, Spring Security, Kubernetes, GitLab CI/CD, Terraform, Ansible, Jenkins, Elasticsearch, Kibana, Logstash, Grafana, Prometheus, Sumo Logic, Dynatrace, Veracode, Linux, Microsoft platforms, DevSecOps, Agile, Scrum
SIGNATURE BANK, New York City, NY Feb 2022 – Aug 2023 AWS DevOps Engineer
Project Summary: As an AWS DevOps Engineer with Signature Bank, I was responsible for orchestrating the provisioning and management of AWS resources to ensure scalable, reliable deployments for critical applications. By leveraging advanced technologies such as EC2, ECS clusters, and PHP, I focused on enhancing operational efficiency and scalability.
Designed and deployed highly available AWS infrastructure using EC2, ECS clusters, and VPC, optimizing performance and scalability.
Automated infrastructure provisioning with Terraform and AWS CloudFormation, ensuring consistent deployments across environments.
Built and managed data pipelines using AWS services like S3, Lambda, and CloudWatch Events to support real-time analytics.
Developed and optimized CI/CD pipelines using Jenkins, AWS CodeCommit, CodeDeploy, and Git to automate application releases.
Secured cloud environments with IAM policies, VPC security groups, AWS Shield, and encryption techniques for compliance with industry regulations.
Implemented centralized logging and monitoring using AWS CloudWatch, CloudTrail, and ELK Stack for proactive security and performance insights.
Managed Docker containerized applications on AWS ECS, Kubernetes, and Elastic Beanstalk, improving microservices orchestration.
Configured and optimized AWS Load Balancers (ALB, NLB) to ensure high availability, fault tolerance, and traffic distribution.
Developed Python and Bash scripts for automation of cloud resource management, log analysis, and data transformations.
Architected distributed data processing frameworks, integrating AWS Lambda, S3, and DynamoDB for scalable cloud storage and retrieval.
Enhanced data security and compliance by implementing AWS Key Management Service (KMS), Secrets Manager, and automated security scans.
Collaborated in Kanban-driven DevOps workflows, enabling faster development cycles, automated deployments, and cross-team cloud integrations.
Major Achievements
Reduced deployment time by 65% by automating CI/CD pipelines with Terraform, Jenkins, and AWS CodeDeploy.
Enhanced data security and compliance by implementing AWS KMS, Secrets Manager, and real-time security monitoring.
Optimized cloud costs by 30% through efficient AWS resource provisioning, auto-scaling policies, and performance tuning.
Technical Environment: AWS (EC2, ECS, Lambda, VPC, CloudWatch, CloudTrail, CodeCommit, CodeDeploy, Elastic Beanstalk, CloudFormation), PHP, Python, Bash, Docker, Kubernetes, Jenkins, Git, Docker Registry, Ansible, Terraform, AWS CloudWatch Events, load balancers, distributed architectures, Kanban, DevOps
PINTEREST, San Francisco, California Jan 2021 – Jan 2022 Senior DevOps Engineer
Project Summary: As a Senior DevOps Engineer at Pinterest, I led the design and implementation of a highly scalable, fault- tolerant AWS infrastructure to support the platform’s real-time content recommendation and image processing systems. My efforts improved operational efficiency, reduced deployment times, and maintained high availability.
Designed and deployed a highly scalable, fault-tolerant AWS infrastructure, optimizing performance for real-time content recommendation systems.
Automated infrastructure provisioning and deployments using Terraform, CloudFormation, and Ansible, ensuring consistency and reducing manual effort.
Developed and maintained CI/CD pipelines with Jenkins and GitHub Actions, accelerating code deployments and reducing errors.
Managed containerized workloads using Docker and Kubernetes (ECS, EKS) to enhance application scalability and resilience.
Implemented real-time monitoring and observability using Prometheus, Grafana, and ELK Stack, enabling proactive issue resolution.
Optimized AWS networking and security by configuring VPC, Route 53, IAM policies, and Elastic Load Balancers for high availability.
Automated log aggregation and analysis using Elasticsearch, Logstash, and Kibana (ELK) to improve system visibility and troubleshooting.
Developed Python and Bash scripts to automate infrastructure management, log parsing, and performance tuning tasks.
Improved database performance and availability by optimizing AWS RDS configurations and implementing automated backups.
Led Agile DevOps transformations, collaborating with cross-functional teams to implement best practices for cloud- native development.
Major Achievements
Reduced deployment time by 50% by automating CI/CD workflows with Terraform, Jenkins, and GitHub Actions.
Increased system reliability to 99.99% uptime by implementing auto-scaling, proactive monitoring, and fault-tolerant AWS architectures.
Technical Environment: AWS (EC2, ECS, Lambda, S3, RDS, CloudFormation, CloudWatch, IAM, VPC, Route 53, Elastic Load Balancer), Docker, Kubernetes, Jenkins, Terraform, GitHub Actions, Python, Bash, Prometheus, Grafana, ELK stack
(Elasticsearch, Logstash, Kibana), Ansible, Linux, DevOps, Agile
SUPERNUS PHARMACEUTICALS, Rockville, Maryland Sep 2018 – Dec 2020 Senior AWS Cloud Engineer
Project Summary: As a Senior AWS Cloud Engineer with Supernus Pharmaceuticals, I successfully designed and implemented a cloud-based Document Management System that utilized various AWS technologies, significantly enhancing document accessibility and organization. Additionally, I focused on automation of infrastructure processes and the implementation of robust data encryption protocols.
Designed and deployed a cloud-based Document Management System (DMS) leveraging AWS Lambda, S3, and DynamoDB, improving document accessibility and compliance.
Automated infrastructure provisioning and configuration management using Terraform, Ansible, and Puppet, ensuring consistency and reducing deployment times.
Implemented data encryption and security protocols using AWS KMS, IAM roles, and access policies, ensuring HIPAA and regulatory compliance.
Developed serverless data processing pipelines with AWS Glue and Lambda, optimizing document indexing and search capabilities.
Managed containerized applications on AWS ECS and Kubernetes, improving scalability and workload distribution.
Deployed centralized logging and monitoring with Elasticsearch, Logstash, Kibana (ELK), and AWS CloudWatch, enabling real-time system insights.
Automated CI/CD pipelines with GitLab CI, Jenkins, and Maven, improving software deployment efficiency and reducing human errors.
Optimized AWS cost management using AWS Cost Explorer and Trusted Advisor, leading to improved budget forecasting and cost reduction.
Enhanced high availability and auto-scaling by implementing Pacemaker clustering, Instance Groups, and Autohealing mechanisms for fault tolerance.
Configured and maintained web and API services using Apache, Nginx, and Varnish, improving load balancing and content caching.
Major Achievements
Reduced infrastructure deployment time by 70% by automating provisioning with Terraform and Ansible.
Achieved 99.98% uptime for the Document Management System by implementing high-availability architectures with AWS Autohealing and Auto Scaling.
Technical Environment: AWS (Lambda, S3, DynamoDB, Glue, KMS, ECS, CloudWatch, Cost Explorer, Trusted Advisor, Backup), Elasticsearch, Python, Java, Ansible, Ansible Tower, Terraform, Puppet, Git, GitLab CI, Jenkins, Maven, Docker, Kubernetes, ELK stack (Elasticsearch, Logstash, Kibana), Apache/Nginx, MySQL/PostgreSQL, Varnish, Pacemaker, Cassandra, Bash (Shell), Linux, HTTP Load Balancers, Instance Groups, Autoscalers, Autohealing
EXELON, Chicago, Illinois Mar 2017 – Aug 2018
Cloud & DevOps Engineer
Project Summary: As a Cloud & DevOps Engineer at Exelon, I focused on automating and optimizing AWS and Azure environments, ensuring scalable, cost-effective, and high-performance cloud architectures. I played a key role in infrastructure automation using Terraform and CloudFormation, integrating security solutions, and enhancing monitoring, backup, and disaster recovery strategies.
Automated AWS and Azure infrastructure provisioning using Terraform, CloudFormation, and ARM templates, ensuring consistent and scalable deployments.
Designed and deployed multi-tier cloud architectures across IaaS, PaaS, and SaaS models, optimizing performance and cost efficiency.
Managed containerized applications on AWS ECS and Azure Kubernetes Service (AKS), improving workload distribution and auto-scaling.
Implemented cloud security best practices by configuring IAM roles, SAML-based authentication, Azure AD integration, and cross-cloud security policies.
Monitored AWS and Azure performance using CloudWatch, ScienceLogic, and Azure Monitor, ensuring real-time observability and proactive issue resolution.
Led client onboarding and technical support, resolving 200+ support tickets through CDW ticketing system and Jira, improving cloud adoption.
Configured auto-scaling, elastic load balancing (AWS ALB/NLB, Azure Load Balancer), and fault-tolerant architectures, ensuring high availability.
Designed and automated backup and disaster recovery strategies using AWS EBS snapshots, S3 versioning, and Azure Backup, improving data protection.
Deployed Azure Functions and AWS Lambda to automate infrastructure tasks, reducing operational overhead.
Integrated Azure Security Center and AWS Security Hub to enhance security compliance and threat detection. Major Achievements
Resolved 200+ cloud support tickets related to security, networking, and automation, improving cloud adoption and operational efficiency.
Enhanced system resilience and uptime to 99.98% by implementing auto-scaling, load balancing, and disaster recovery strategies.
Technical Environment: AWS (EC2, Elastic Beanstalk, S3, ECS, Lambda, CloudWatch, CloudFormation, VPC, EBS, IAM), Terraform, ScienceLogic, CDW ticketing system, Jira, Scrum, Active Directory, SAML, auto-scaling, elastic load balancing
UPMC, Oakland, Pittsburgh, PA Jan 2015 – Feb 2017 AWS Cloud Engineer
Project Summary: As an AWS Cloud Engineer at UPMC, I led the design and deployment of mission-critical web applications on AWS, ensuring high availability, security, and compliance with industry regulations. I implemented secure cloud architectures, leveraging AWS Lambda, CloudFormation, and RDS, and automated infrastructure provisioning using Terraform and Ansible.
Designed and deployed scalable AWS architectures using EC2, Lambda, RDS, and VPC, ensuring fault tolerance and security compliance.
Automated CI/CD pipelines using GitLab, CircleCI, and Terraform, streamlining software deployments and reducing downtime.
Implemented data encryption and key management using AWS KMS, securing sensitive healthcare data in compliance with HIPAA.
Managed containerized applications using AWS ECS and Docker, optimizing workload orchestration and resource efficiency.
Configured centralized monitoring and observability using AWS CloudWatch, Prometheus, and Grafana, ensuring proactive incident detection.
Deployed and optimized Elasticsearch clusters on AWS, improving search performance and real-time data indexing.
Designed self-healing and auto-scaling infrastructure with Auto Scaling Groups and Elastic Load Balancers, enhancing application resilience.
Streamlined infrastructure automation and configuration management using Ansible, Pulumi, and SaltStack, reducing manual intervention.
Major Achievements
Reduced deployment time by 60% by automating AWS-based CI/CD pipelines using GitLab, Terraform, and Ansible.
Enhanced security compliance by implementing AWS KMS encryption, IAM policies, and HIPAA-aligned access controls. Technical Environment: AWS (Lambda, EC2, S3, RDS, CloudFormation, CloudWatch, CloudTrail, KMS, IAM, VPC, Route 53, Auto Scaling, ELB, ECS), Docker, Terraform, Ansible, CircleCI, GitLab, Elasticsearch, Prometheus, Grafana, PostgreSQL, Redis, Kafka, MongoDB, Bash, Linux, SaltStack, Pulumi, Apache, Nginx, HAProxy.
ECOPETROL, Houston, Tx Jan 2014 – Dec 2014
Linux Administrator
Designed and implemented business infrastructure architecture, employing automated scripts to streamline the build process for development and production environments, enhancing efficiency and reducing manual intervention.
Created and maintained Python, Shell, and Ruby scripts to automate system-level activities, execute API calls, and parse REST API call outputs, significantly improving process automation and responsiveness.
Transformed configuration and deployment tools into a scalable, auto-scaling system that optimized platform performance for varying workloads and user demands.
Demonstrated extensive knowledge of network protocols such as DNS, TCP/IP, NFS, HTTP, LDAP, SMTP, and SNMP, enabling effective system management and seamless network communication.
Built and supported a diverse range of servers, including Solaris, Linux, AIX, and HP-UX, ensuring reliable operation and performance across various project requirements.
EDUCATION
Bachelor of Technology - Computer Science and Engineering Master’s in Computer Science - California State University, Long Beach CERTIFICATIONS.
AWS Certified Security – Specialty
Microsoft Certified: DevOps Engineer Expert