Post Job Free
Sign in

Senior Devops Cloud Infrastructure

Location:
Glendale Heights, IL, 60139
Posted:
March 18, 2025

Contact this candidate

Resume:

Mohammed Abdur Razzaq Kashif

*****.*******@*****.***

908-***-****

PROFESSIONAL SUMMARY:

A seasoned Senior DevOps Automation Engineer with extensive experience in cloud infrastructure, networking, automation, and security. Skilled in AWS, Azure, DevSecOps, and automation tools such as Terraform, Ansible, and PowerShell. Strong background in Windows Server OS, Atlassian tools (Jira, Confluence), and cloud networking & security (including CASB, DLP, and Palo Alto Firewalls). Proven ability to lead cloud infrastructure initiatives, mentor teams, and serve as a key escalation point for IT support teams. Passionate about working with cutting-edge technologies to improve security posture and system resilience.

Having extensive experience with serverless and PaaS technologies, including API Gateway, Lambda, DynamoDB, and S3, in-depth knowledge of AWS cloud services, such as EC2, S3, RDS, VPC, CloudFront, Route53, CloudWatch, OpsWorks, IAM, SQS, SNS, and SES. Additionally, I am well-versed in virtualization with VMware, DevOps tools like Jenkins, Chef, Ansible, Docker, Kubernetes, and monitoring tools such as Prometheus, Grafana, and Nagios.

In my recent role as a Senior DevOps Engineer at Ahead, have orchestrated Jenkins pipelines, automated routine operational tasks with AWS Systems Manager, and designed scalable solutions for ElastiCache and MongoDB clusters. My expertise includes developing CI/CD pipelines, managing infrastructure as code, and implementing monitoring solutions for Redis and Elasticsearch clusters.

Skilled in leveraging various cloud platforms, including AWS, Microsoft Azure, GCP, and PCF, to build and manage scalable and secure infrastructure. Technical proficiency, combined with the ability to lead and implement complex projects.

Technical Skills:

Cloud Platforms: AWS (Systems Manager, GuardDuty, Workspaces, VPCs, Transit Gateways), Azure, GCP

Networking & Security: Cloud networking (CASB, DLP, Palo Alto Firewalls), VPNs, IAM policies, Security Groups

Automation & Scripting: Python, PowerShell, Terraform, Ansible

Operating Systems: Windows Server OS (Active Directory, Group Policy, IIS), Linux (Red Hat, Ubuntu)

Atlassian Administration: Jira, Confluence (user management, workflow automation, integrations)

CI/CD & DevOps Tools: Jenkins, Git, GitHub, Docker, Kubernetes, ArgoCD

Monitoring & Logging: Splunk, CloudWatch, Prometheus, Dynatrace

Professional Experience:

Client: Ahead, Rochester Hills, MI

Role: Senior DevOps Engineer / SRE Sept 2021 – Till now

Responsibilities:

Led cloud infrastructure initiatives, optimizing AWS environments with security best practices including large-scale migrations and security enhancement.

Implemented AWS Systems Manager, GuardDuty, and Transit Gateways to improve infrastructure security and Managemnet

Implemented security solutions including CASB, DLP, and Palo Alto Firewalls to enhance cloud security posture

I prioritize security by leveraging IAM, VPC Service Controls, and Secret Manager to enforce least privilege access and ensure compliance with industry standards.

Developed reusable AWS CDK stacks for provisioning VPCs, IAM roles, Lambda functions, and API Gateway, enhancing modularity and scalability.

Automated infrastructure tasks using Python and PowerShell, improving efficiency and compliance.

I leverage GCP’s Cloud Build and Cloud Deploy to implement efficient CI/CD pipelines, ensuring fast and reliable application delivery with minimal manual intervention.

Managed Atlassian tools (Jira, Confluence) for streamlined project management and collaboration. Provided mentorship and acted as a key escalation point for IT support teams.

Created the Kubernetes Clusters under Pod networks to group the Docker containers. Used Kubernetes and Docker to maintain the runtime environment for the CI/CD system to build, test and deploy the applications across different environments.

I leverage ArgoCD to implement a declarative GitOps approach, ensuring automated and consistent application deployments across Kubernetes clusters. This helps maintain version control and enhances deployment reliability.

Integrated AWS CDK into CI/CD pipelines using GitHub Actions and Jenkins to automate infrastructure deployments alongside application releases.

Developed a secure, scalable Azure cloud infrastructure to support critical healthcare applications, utilizing Azure VMs, Azure Functions and Azure SQL Database, ensuring compliance with HIPAA regulations for patient data protection.

Hands-on expertise on Terraform modules that had version conflicts to utilize Cloud formation templates during deployments, worked with Terraform to create stacks in AWS and Azure cloud services, and updated the Terraform scripts based on the requirement on regular basis.

I utilize ArgoCD’s built-in UI, logs, and integrations with Prometheus and Grafana to monitor application deployment health, troubleshoot issues, and optimize performance in real-time.

Assisting with the migration of DISA Enterprise DevSecOps tools, including GitLab, Jira, Confluence, Artifactory, SonarQube, Docker, Chef, and various Windows-based testing tools, from a local instance to the AWS GovCloud environment.

I rely on Datadog to gain full visibility into our infrastructure, applications, and logs in real time. It helps me proactively monitor system performance, detect anomalies, and ensure our services remain highly available

Leveraged AWS CDK constructs to ensure consistent infrastructure provisioning across development, staging, and production environments.

I enforce policies using ArgoCD’s RBAC and security best practices, ensuring only authorized changes are deployed while maintaining compliance and governance across environments.

Experience in DevSecOps strategy for security auditing, continuous monitoring of the entire infrastructure and applied Web Application Firewall (WAF) rules for blocking the attacks through SQL injection and patterns.

Enforced end-to-end security for SNS by implementing server-side encryption (SSE) with AWS KMS and IAM-based access control policies.

Hands-on expertise with build technologies like as Hudson/Jenkins, Argo CD, Concourse, VMware vCenter GitHub, ANT, Maven, and other products like Bamboo, JIRA, and Bitbucket for creating deployable artifacts.

Working with the framework of JAFAN 6/3, JSIG, NIST 800-53, DISA STIGs, and other rules. Using frameworks like HIPAA, PCI-DSS, and DISA STIGS.

Implemented Security Scans like Static and Dynamic Application testing at each layer of DevOps life cycle and converted the existing DevOps methodologies/workflows to DevSecOps model.

Set up comprehensive monitoring and logging solutions with Azure Monitor, Azure Log Analytics and Splunk, providing deep visibility into system performance and application health for critical healthcare systems.

Designed and implemented secure network architectures using Azure Virtual Network (VNet), Azure Bastion and Azure Firewall, safeguarding sensitive healthcare data and meeting industry security standards.

I use Datadog’s alerting and anomaly detection features to quickly identify and respond to issues before they impact users. By integrating with PagerDuty and Slack, I ensure that incidents are escalated to the right teams without delay

Create complete security assessment plans that contain the Rules of Engagement (ROE) requirements for identified security controls based on NIST SP 800-53, FedRAMP, and agency-specific guidelines.

Experience with monitoring tools like Prometheus, Dynatrace. And worked with Apache Kafka and Zookeeper.

I manage and deploy applications across multiple Kubernetes clusters using ArgoCD, ensuring high availability, security, and efficient resource utilization in complex cloud-native environments

Managed patching automation across hybrid and AWS environments using Systems Manager Patch Manager, ensuring compliance with security policies and minimizing vulnerabilities.

Conduct FedRAMP Readiness Assessments and Review ATO packages for FedRAMP Cloud settings.

Strong understanding of AWS SDK (Boto3), AWS API, AWS CLI, AWS CloudFormation python scripts integrating Boto3 to supplement automation provided by Ansible and Terraform for tasks such as encrypting EBS volumes backing AMI's and scheduling lambda functions for routine AWS tasks.

Worked on DevOps essential tools like Terraform, Docker, Kubernetes, Vagrant, OpenStack, Open Shift, Git, GitHub, SVN, Ant, Maven, Junit, Selenium, N Units, Jenkins, Hudson, Chef, Ansible, Puppet, Nagios, Sensu, New Relic, Splunk and ELK.

I utilize Terraform and GCP’s Deployment Manager to manage infrastructure as code, enabling repeatable, consistent, and automated provisioning of cloud resources.

Developed SNS-based push notification systems for real-time alerts and updates, integrating with Firebase, Apple Push Notification Service (APNS), and Google Cloud Messaging (GCM).

Developed multi cloud strategies in better using GCP (for its PAAS) and Azure (for its SAAS).

Hands-on experience utilizing Argo CD to initiate completely automated builds from GitHub for apps that require frequent build releases. Used GITOPS to automate the build and release processes, with Bitbucket serving as the version control system.

I leverage Datadog’s metrics and forecasting tools to analyze resource usage trends and make data-driven decisions for scaling infrastructure. By setting up dashboards and automated reports, I ensure that our systems remain resilient under increasing workloads.

Developed and updated security authorization packages for information systems and cloud systems in accordance with the directive, and compliance with FISMA and FedRAMP.

Configured security features in Elasticsearch such as role-based access control (RBAC), SSL/TLS encryption, and audit logging, ensuring data integrity and compliance with security standards (e.g., PCI-DSS, GDPR).

Integrated Sage Maker with other AWS services like S3, Lambda, and CloudWatch for seamless workflows.

Hands on experience in GCP services like EC2, S3, ELB, RDS, SQS, EBS, VPC, EBS, AMI, SNS, RDS, EBS, Cloud Watch, Cloud Trail, Cloud Formation GCP Config, Autoscaling, Cloud Front, IAM, R53.

I leverage New Relic APM to analyze distributed traces across microservices running in AWS and Azure. By integrating New Relic with Azure Monitor, I gain deep visibility into Azure Functions, App Services, and AKS, allowing me to proactively address slow transactions, dependency failures, and database performance bottlenecks.

Administration of DevOps tools suite: Jenkins, GitHub, JIRA, Confluence, Puppet and ELK stack, used Run deck for deployment and orchestration.

Used Gardener to provision and manage Kubernetes clusters across multiple cloud providers (AWS, Azure, GCP), ensuring consistency and scalability.

Working on implementing new OCR solution; Spring Boot, OpenShift, microservices. Member of group developing containerized applications; Docker, Spring Boot, Kubernetes, OpenShift.

Proficient in AWS services like VPC, EC2, S3, ELB, Autoscaling Groups (ASG), EBS, RDS, IAM, CloudFormation, Route 53, CloudWatch, CloudFront, CloudTrail.

Consulted functional departments and leadership on policies and standards for FedRAMP, ISO 27001, and SOC 2 framework implementation.

Deployed Microservices to IBM Bluemix Cloud Foundry and later migrated to OpenShift’s.

Experience with installation and configuration of Dynatrace monitoring tool. And created email alerts and threshold values using Dynatrace for our environment.

I used Twist lock, Encore, SonarQube, and other tools to scan container images. I configured the STIGs and SRG. I selected the appropriate security controls for the information systems. I worked with AWS GOV cloud.

Integrated Gardener with Prometheus, Grafana, and Loki for real-time monitoring, alerting, and log aggregation across managed Kubernetes environments.

Integrated AWS Lambda with SQS to enable event-driven processing, automating background tasks, and reducing system latency.

Experience in Configuration Management, Change/Release/Build Management, Support and Maintenance under Unix/Linux Platforms (REDHAT and CENTOS).

Deployed application which is containerized using Docker onto a Kubernetes cluster which is managed by Amazon Elastic Container Service for Kubernetes (EKS).

Involved in managing and maintaining the CI/CD pipeline using DevOps Toolset which includes Continuous Integration of GitHub, Jenkins, Jfrog Artifactory and deploying through Ansible and Ansible Tower.

I implement auto-scaling, committed use discounts, and cost monitoring tools like GCP’s Recommender to optimize cloud spend without compromising performance

Optimized SQS performance by fine-tuning message visibility timeout, long polling, and delay queues, reducing unnecessary API calls and operational costs.

Maintaining cloud infrastructure using AWS EC2, S3, Cloud watch, Cloud Formation, Route 53 and Created monitors, alarms and notifications for EC2 hosts using Cloud Watch.

Created Production/TEST/Development Environments in AWS using services VPC, EC2, S3, ELB, Elastic Beanstalk, Autoscaling, ECS, API gateway, Lambda, RDS instances, Redshift, CloudFormation, cloud watch, cloud trail.

I rely on Cloud Operations (formerly Stackdriver) for end-to-end observability, ensuring proactive monitoring, logging, and tracing to maintain system reliability and performance.

Experience working with different SRE logging and monitoring tools such as Splunk, New Relic and CloudWatch.

Responsible for the building and deploying the artifacts into DEV, IST, E2E and PROD Environments.

Created and configured integrated dashboards for alerts, notifications, and events in New Relic, Datadog, Grafana, and Splunk with Helm Charts and Cross Plane to detect and inform application performance (APM) and infrastructure concerns via PagerDuty and Slack.

Built with and maintained aptitude with web back end & full-stack frameworks: MVC (C#), Django (python), Flask (python), Symfony (PHP), Express.js (JavaScript), Spring Framework (Java), Rocket (Rust), and Actix (Rust).

Responsible for estimating the cluster size, monitoring, and troubleshooting of the Spark data bricks cluster

Managed Continues delivery by configuring Helm charts in Argo CD with CI/CD configurations and cross plane; after the PR is merged, Argo CD will automatically deploy the modifications.

As well as handling day-to-day firewall implementation requests. DISA STIGS Security Technical Implementation Guide: STIG Compliance

Proficient in AWS services like VPC, EC2, S3, ELB, Autoscaling Groups (ASG), EBS, RDS, IAM, ECR, ECS, AWS Lambda, ElastiCache, API Gateway, Cognito, Kinesis Streams, SNS, CloudWatch, DynamoDB, SES.

Used Dynatrace as a monitoring tool to identify and resolve infrastructure problems before they affect critical processes. And created email alerts and threshold values using Dynatrace for our tools.

Over 40 systems had their FedRAMP security assessment and authorization (SA&A) tests facilitated. Lead the evaluation, update, and technical analysis of cybersecurity artifacts (SSP, PIA, PTA, CP, ASA, MOU, and so on) for corporate systems.

I use New Relic’s AWS integrations (e.g., CloudWatch, Lambda, EC2, RDS, and EKS) to monitor cloud resources in real time. With Kubernetes observability, I track pod health, node performance, and auto-scaling behavior in Amazon EKS, ensuring efficient resource allocation and high availability

Client: Epicor, Chicago, IL

Role: Senior DevOps Engineer Jun 2019 – Aug 2021

Responsibilities:

Architected and managed AWS-based cloud infrastructure with VPCs, IAM policies, and security tools.

Automated Windows Server management tasks using PowerShell DSC and Ansible.

Enhanced DevOps pipelines using Jenkins and Terraform, reducing deployment times by 40%.

Improved security compliance by implementing cloud security best practices and conducting audits.

Worked on Amazon EC2 setting up instances, security groups, and virtual private cloud (VPCS) and created AWS

Used AWS CDK with TypeScript/Python to define cloud infrastructure programmatically, improving deployment automation and maintainability.

I use New Relic to collect and analyze telemetry data across my entire stack, from infrastructure to applications. With distributed tracing, I can track requests across microservices, pinpoint latency issues, and optimize service performance.

Configured ArgoCD RBAC for secure and role-based access control in multi-tenant environments.

Security groups are managed on AWS focusing on fault-tolerance, high-availability, and auto Scaling using

Terraform templates, Along with Continuous Integration and Continuous Deployment with AWS Lambda and code pipeline

I integrate ArgoCD with CI/CD pipelines using tools like GitLab CI/CD, Jenkins, and CircleCI, enabling seamless, automated deployments and rollbacks based on Git repository changes.

Developed and maintained Docker images for a tech stack including Cassandra, Kafka, Apache, and several in house written Java services running in Google Cloud Platform (GCP) on Kubernetes

Responsible for managing the Google Cloud Platform (GCP) services like App Engine, Compute Engine, Cloud Storage, Load Balancing, VPC, Big Query, Firewalls, and Stack Driver.

I leverage New Relic’s Kubernetes observability to monitor containerized workloads, node health, and resource utilization. By setting up dashboards with live performance data, I can quickly identify pod failures, memory leaks, and scaling inefficiencies.

Leveraged AWS CDK constructs to ensure consistent infrastructure provisioning across development, staging, and production environments.

Integrated ArgoCD with Helm, Kustomize, and Terraform for enhanced deployment flexibility.

Deployed and maintained ArgoCD Application sets to dynamically manage multiple Kubernetes clusters.

Set-up databases in GCP using RDS, storage using S3 bucket and configuring instance backups to S3 bucket. prototype CI/CD system with GitLab on GKE utilizing kubernetes and Docker for the runtime environment for the CI/CD systems to build and test and deploy.

Cloud formation templates, Chef, and other configuration management tools are used to deploy consistent infrastructure code across multiple environments

Google Kubernetes Engine (GKE) allows me to manage containerized applications effortlessly, with auto-scaling, self-healing, and seamless rollouts that align with DevOps best practices

Implementing a Continuous Delivery framework in a Linux environment using Bamboo, Jira, SVN, Maven, and Nexus

Utilized Gardener extensions and controllers to deploy custom networking, security policies, and storage solutions tailored to workload requirements.

Jenkins, Bamboo, and Team City were used for continuous integration and end-to-end automation of all builds and deployments

Using Terraform and AWS Cloud Formation, AWS infrastructure was created, updated, and versioned.

Bitbucket was Integrated with JIRA for transition JIRA issues from within Bitbucket Server and monitored the JIRA issues in Bitbucket Server.

Cl/CD framework was implemented using Maven and artifactories in Linux environment and integration of Maven, Git and JIRA.

Managed and built a highly available monitoring infrastructure to monitor different application servers like Apache Tomcat, JBoss and its components using Nagios.

using Python script in Chef, Nagios services was automated for webserver, database server, application-server, networks, file sizes, RAM utilization, Disk performances etc.

Python Scripts was written to Monitor variety of Services and Perl Scripts with Hash/Arrays to Insert/Modify content in multiple servers.

Written PowerShell scripts for administrative tasks and server infrastructure management.

Amazon EC2, Chef, and custom Ruby/Bash Scripts were used to implement rapid provisioning and life-cycle management for Linux

Developed continuous integration scripts and automation scripts and performed database deployments,

Configured and managed Apache Web Server on Linux for web-based applications using REST/SOAP, Apache, and WebLogic.

Build release of Cloud based products containing Linux and Windows environments, using Python Scripting.

Building/Maintaining Docker container clusters managed by Kubernetes, Linux, Bash, GIT, Docker, on AWS. Utilized Kubernetes and Docker for the runtime environment of the CI/CD system to build, test deploy.

Implemented AWS Systems Manager Compliance documents to monitor and enforce compliance policies (e.g., CIS benchmarks, GDPR) across infrastructure resources, ensuring adherence to regulatory requirements.

Google Cloud hybrid networking using connectivity through service providers to connect GCP infrastructure to on-premises and setting up VPNs as a backup.

Played a pivot role in implementing DevSecOps Model across the organization, platform and implemented vulnerability checks at different phases

Proficient in using Amazon Web Services (AWS). Extensive experience focusing on services like EC2, Elastic Beanstalk, CloudWatch, CloudFront, CloudFormation, IAM, S3, RDS, ElastiCache, SNS, SQS, AMI.

Implement a standard DEVSECOPS pipeline cross multiple application development teams.

Developing Web Applications with Groovy Grails AJAX, jQuery. JIRA development with Java and Groovy scripting.

Working knowledge of AD, ADFS, Azure AD, IIS, Network Administration/Load Balancing, Azure Services such as Policy/Security (including the context of DISA STIGS), JSON/XML/YAML, Cloud Architectures use cases (Monolithic, SOA, Microservices), Visual Studio/VSCode, ARM Templates, DSC, Agile/Scrum, novice-level SQL, and much more.

Configured Amazon SNS topics to enable real-time notifications and messaging, integrating seamlessly with AWS services like Lambda, SQS, and CloudWatch..

Developed and implemented a Python boto3 Lambda function that acted as a Login service taking encrypted user credentials and providing back AWS Cognito tokens (Access, Refresh and Identity).

DISA IASE STIGS and SCAP, as well as STIG Viewer, are used to harden and assess operating systems, databases, web servers, web applications, and other IT technologies.

Component systems and FedRAMP Cloud Service Providers (CSPs), resulting in FedRAMP-approved cloud service providers.

Worked with various services of AWS: EC2, VPC, ELB, DMS, Security Groups, Autoscaling, Route53, EBS, S3, Lambda, ECR, SNS, EKS, IAM, etc.

Leveraged Azure Boards to manage sprints, track work items, and collaborate across teams. Made use of Azure Virtual Machines to host applications and utilized Azure Storage for secure and scalable data management. Integrated Azure Test Plans to automate and manage manual testing processes.

Actively manage, improve, and monitor cloud infrastructure on Azure, Virtual Machines, AKS, Storage accounts, Azure Functions, Logic apps, App services, Event Hubs, Service Bus including backups, security, and scaling

Work with Senior AWS Infrastructure Architect to implement AWS architecture design leveraging Infrastructure as Code (IaC) including Terraform.

Supports FedRAMP Cloud Service Providers (CSPs) for the Confidential, including Agency ATO initiatives, managing POA&Ms, and creating/reviewing ATO package documentation according to FedRAMP guidance. Creates, maintains, and updates relevant ATO package security documentation for Confidential.

Deploy applications on AWS by using Elastic Beanstalk Migrated applications to the AWS cloud. Build and configure a virtual data centre in the Amazon Web Services cloud to support Enterprise Data Warehouse hosting including Virtual Private Cloud (VPC), Public and Private Subnets, Security Groups, Route Tables, NACLs, Elastic Load Balancer and Route53.

Working with Devops teams to put up a GCP environment for apps that use Google Kubernetes Engine Clusters in the east and west regions, respectively, behind an HTTP load balancer. This covers GCP networking within clusters.

Configure, Manage and Monitor Palo Alto firewall models (Specifically the PA-5050 and the PA-5260).

Extensive experience in Amazon Web Services (IaaS) migrating like creating AWS VMs, storage accounts, VHDs, storage pools, migrating on premise servers to AWS Cloud and creating availability sets in AWS.

Experience in architecting and Configuring public/private cloud infrastructures utilizing Amazon Web Services (AWS) including EC2, Elastic Load - balancers, Elastic Container Service (Docker Containers), S3, CloudFront, RDS, DynamoDB, VPC, Direct-Connect, Route53, CloudWatch, CloudFormation, IAM.

Implemented Dynatrace on different cloud technologies like AWS, Worked on Dynatrace APM End to End implementation.

Integrated EKS with CI/CD pipelines for automated containerized application deployment.

Developed and managed cloud VMs with AWS EC2 command line clients and management console implemented DNS service through Route 53 on ELBs to achieve secured connection via https.

Handled file uploads using Django's File Handling system with Boto3 and stored images into Amazon S3 Buckets, and monitored requests using Amazon CloudWatch.

Container management using Docker by writing Docker files and set up the automated build on Docker HUB and installed and configured Kubernetes.

Client: FINITAS Pharma, Piscataway, NJ

Role: DevOps Engineer – AWS Jan 2017– May 2019

Responsibilities:

Deployed and managed AWS cloud environments, ensuring high availability and security.

Automated infrastructure provisioning using Terraform and CloudFormation.

Integrated security tools like Palo Alto Firewalls and DLP solutions to protect cloud workloads.

Administered Atlassian tools (Jira, Confluence), improving issue tracking and project management efficiency.

Monitored and fine-tuning system and network performance for server environments running red hat Linux, Ubuntu, Solaris.

Worked on creating the Docker containers and Docker consoles for managing the application life cycle.

Automated OpenStack and AWS deployment using Cloud Formation, Ansible, Chef and Terraform.

Integrated static code analysis tools (e.g., ES Lint) into the CI/CD pipeline for enforcing coding standards in React codebases.

Containerized .NET applications using Docker, facilitating consistency in deployment across various environments.

Provisioned the servers (RHEL/Ubuntu) as per the request of the development and operations.

Developed microservice on boarding tools leveraging Python and Jenkins allowing for easy creation and maintenance of build jobs and Kubernetes deploy and services.

Expertise in Amazon AWS Cloud Services and administration which includeEC2, ELB, EKS, EBS, IAM, S3, Route53, Cloud Front, Lambda, Cloud Trail, Amazon CLI, AWS Code Commit, Amazon VPC.

Configured APP-ID feature in Palo Alto firewalls to reduce attack surface, regain visibility and control over traffic.

Experience in migration of On - Premises RHEL and Windows servers to cloud platforms including AWS EC2.

Setup/Managing Linux Servers on EC2, EBS, ELB, SSL, Security Groups, RDS, and IAM.

Installation, Configuration and Maintenance of Samba, Apache Tomcat, Web Sphere and J boss servers in AIX and Linux environment.

Securely implemented EDI setup for healthcare claims data with various insurance providers for efficient and quicker payments for our users. key member of a cross-organizational data warehouse team, working closely with the customer leaders, hospital technical staff, and Health Highway analytical and data warehouse staff supporting the analytical, technical, development, and maintenance aspects of a sophisticated corporate data warehouse.

Developed infrastructure as code with Terraform to deploy VMware and AWS infrastructure.

Designed and created multiple deployment strategies using CI/CD Pipelines using Jenkins. Installed multiple plugins to Jenkins, Configured Proxy to get auto updates.

Experienced in Building, Testing and Deploying the applications by adopting the DevOps tools like GIT,Chef, Ansible, Jenkins, Dockers, kubernetes .

Having good working experience in AWS with EKS by using CloudFormation.

Experience in using JFROG Artifactory Repository Managers for builds and storing of Docker images.

Automated Infrastructure provisioning using the Terraform, CloudFormation and ARM templates as Infrastructure as Code (IaC).

Designed and implemented Chef, including the internal best practices, automated cookbooks CI and Proficient in deploying and support applications on WebSphere, TOMCAT, WebLogic application servers.

Extensively worked with Scheduling, deploying, managing container replicas onto a node using Kubernetes and experienced in creating Kubernetes clusters work with Helm charts running on the same cluster resources.

Experience managing multiple Project Object Model (POM) files using Maven, in the multi-tier environment with parent and child POM dependencies.

Utilized tools such as MySQL Enterprise Monitor or Prometheus to monitor and analyse MySQL database performance.

Client: Trans Union, Chicago, IL

Role: Linux Administration Feb 2015– Dec 2016

Responsibilities:

Maintained and optimized Windows Server OS and Linux-based infrastructure.

Managed Palo Alto Firewalls and VPNs, ensuring secure and compliant network operations.

Developed Python scripts for system automation and security monitoring.

Installed, Configured and Maintained Debian/RedHat Servers at multiple Data Centres.

Configured Red Hat Kickstart for installing multiple production servers.

Installation of Red Hat Satellite 6 Server

Installation, Configuration and administration of DNS, LDAP, NFS, NIS, NIS and Send mail on RedHat Linux/Debian Servers.

Installed, Configured and Maintained Active Directory Windows Server 2008, Maintained OVM, Installed OEL

Networking Technologies (Ethernet, TCP/IP, BGP, OSPF, SNMP, MPLS, GRE/IPsec, STP) are maintained and supported on a local and



Contact this candidate