Keerthi Kokkula
Cloud Infrastructure Engineer/ DevOps/ SRE/ Platform/ Systems Engineer
*******.*****@*****.*** +1-818-***-****
https://www.linkedin.com/in/keerthik0429/
Professional Summary
Over 11 years of expertise as Cloud Engineer, Cloud Security Engineer, Platform Engineer, DevOps & SRE with services and Tech Stack on Public and Private Clouds.
•Good knowledge of Cloud services on all the major cloud providers AWS, GCP, OCI and Azure as Infrastructure as a Service (IaaS), Platform as a Services (PaaS), Software as a Service (SaaS), Infrastructure as Code (IaC), Cloud Monitoring as a Service, and so forth.
•Strong knowledge in cloud compute services like IaaS, PaaS, and SaaS and implementation using EC2 machine, Windows Azure, Rackspace, Compute Engine, AWS elastic beanstalk, Apache, OpenStack, Salesforce.
•Experience setting up the enterprise infrastructure on Amazon Web Services like EC2 Instance, ELB, EBS, S3 Bucket, Security Groups, Auto Scaling, AMI, RDS, IAM Cloud Formation & VPC services.
•Highly motivated and committed DevOps Engineer experienced in Automating, Configuring, and deploying instances on AWS, Azure & Rackspace Cloud environments and familiar with EC2, Cloud Watch, Elastic IP's and Managing security groups on AWS.
•Architected and implemented automated cloud infrastructure using Chef and Puppet on multi platforms on AWS Cloud Servers.
•Worked on container-based technologies like Docker, Kubernetes and OpenShift.
•Knowledge on Elastic Kubernetes Services EKS, Design, build, and operation of Kubernetes infrastructure and Architecture Configuration.
•Automated Integration and deployment process and Kubernetes for deploying pods and maintaining each pod on Kubernetes dashboard and load balancing.
•Experience in automating day-to-day activities by using Windows PowerShell and Azure CL.
•Experience filtering network traffic with a Network Security Group and route network traffic with a route table using the Azure portal.
•Experience in Setting up Application Tier, Build Controllers, Build Agents in Azure DevOps Services Azure DevOps Server 2019 TFS 2018 TFS 2017 TFS 2015 TFS 2013.
•Set up different kinds of Build triggers including – Gated –Checking, Continuous Integration, and Rolling Builds in Azure DevOps Server and VSTS
•Designed Cloud Formation templates to create custom sized VPC, subnets, NAT to ensure successful deployment of Web applications and database templates.
•Strong in preparing the Release documents to QA & Production Environments
•Implemented a complete automated build-release solution using a combination of technologies like Maven, TFS, Jenkins
•Experience in setting up CICD pipeline integrating various tools with Jenkins to build and run Terraform jobs to create infrastructure in Azure.
•Proficiency in using Docker Hub, Docker Engine, Docker images, Docker Weave, Docker Compose, Docker Swarm, and Docker Registry and used containerization to make applications platform when moved into different environments.
•Proficient in creating Docker images using Docker File, worked on Docker container snapshots, removing images, and managing Docker volumes and implemented Docker automation solution for CI/CD model.
•Involvement in developing APIs using Kubernetes to manage and specify the copies of the containers to run the actual servers in the cloud environment.
•Scheduled, deployed, and managed container replicas onto a node cluster using Kubernetes and deployed Docker containers through Kubernetes to manage the microservices using its Nodes, Pods, ConfigMaps, Selectors, Services.
•Ability to quickly adapt to different project environments, work in teams and accomplish difficult tasks independently within time frame.
•A good team player with excellent written and verbal communication skills.
•Excellent problem-solving skills with a strong technical background and good interpersonal skills.
Certification/Training
AWS Certified Developer – Associate (DVA-C02)
AWS Certified Security – Specialty (SCS-C01)
Terraform Associate (003)
Azure Fundamentals (AZ-900)
Education:
Bachelor of Technology in computer science - JNTU 2009, India.
Technical Skills:
Public & Private Cloud Technologies
Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP)
Containerization Tools
Docker, Docker Swarm, Kubernetes, AWS ECS, Apache Mesos, OpenShift
Configuration Management
Chef, Ansible, Puppet, Salt Stack, Terraform
CI/CD Tools
Azure DevOps Services Azure DevOps Server 2019 TFS 2018 TFS 2017 TFS 2015 TFS 2013, Jenkins, Bamboo, GitLab CI, Travis CI, Tekton, Gitlab Runner, ArgoCD, AWSX CodePipeline, Azure DevOps, MLOps
Build & Testing Tools
Maven, Ant, Gradle, Bamboo
Monitoring Tools
Splunk, DataDog, ELK (ElasticSearch, LogStash, Kibana), Prometheus, Grafana, Dynatrace, CloudWatch, AppDynamics
Version Control Tools
Git, Gitlab, BitBucket, GitHub, TFVC (Team Foundation Version Control), SVN Tortoise, Rational ClearCase
Performing/Monitoring & Bug Tracking Tools
ELK, Nagios, CloudWatch, Azure Monitor, New Relic, Splunk, Grafana, Prometheus, Confluence, Jira, VMware ESXI, Vagrant, KVM, Windows Hyper V, Power VM, vSphere 5Citrix
Web Servers
Apache Tomcat, Nginx, WebSphere, WebLogic, JBoss, Samba
Databases
Dynamo DB, MySQL, RDBMS, NoSQL, Cassandra, PostgreSQL, Mongo DB, Oracle DB
IDE Tools
MS Visual Studio, NetBeans, Eclipse, IntelliJ IDEA, PyCharm, Oracle SQL Developer
Networking/Protocols
DNS, DHCP, FTP/TFTP, NFS, SMTP, TCP/IP, NIS, HTTP/HTTPS, WAN, LAN, Palo Alto, Cisco Routers/Switches
Scripting/Programming Languages
Java, Kotlin, Groovy, Scala, GoLang, Python, YAML, Bash, PowerShell, TypeScript, C#
Operating Systems
Windows, UNIX, Linux, RHEL 6/7/8/9, CentOS
Experience:
Client: Deutsche Bank (Remote) Jan 2022 – Present
Role: Sr. Cloud Engineer/ SRE/ DevOps/ Platform Engineer
Responsibilities:
Created and deployed VMs on AWS Cloud, Virtual Networks to connect all the servers.
Provisioned the infrastructure using Terraform on AWS Cloud.
Develop kubectl YAML and facilitate the deployment of EKS clusters, node groups, and fundamental services like autoscaler, spot terminator, csi drivers, etc.
Leveraged AWS Control Tower to set up and govern a secure, multi-account AWS environment.
Design and deploy new Kubernetes clusters and maintain existing clusters with regular patches and code upgrades.
Configured monitoring & alerting rules using Dynatrace dashboards to ensure the application performance and infrastructure health and continuous observability.
Configured Dynatrace Analytics tools to identify performance bottlenecks, anomaly detection, capacity forecast to accommodate & analyze application’s performance.
Leveraged ML models on the applications & services that are ingested as part of a unified release process and also provisioned infrastructure through declarative configuration files.
Implemented security frameworks to find DAST, SAST and SCA related Security Vulnerabilities in app development using Veracode and Fortify.
Written Java Spring Boot applications and deployed to PCF environments as Micro Services.
Managed On-site OS/Applications/Services/Packages using Chef as well as AWS for EC2/S3/Route53/VPC and ELB with Terraform.
Created S3 buckets and maintained and utilized the policy management of S3 buckets and Glacier for storage and backup on AWS.
Monitored end-to-end infrastructure using DataDog, CloudWatch, ELK Stack and configured alerting on the events.
Provisioned and managed EC2 Dedicated hosts and BareMetal Instances to run workloads.
Provisioned MSK cluster and configured the data to be Produced & Consumed. And Implemented monitoring of the cluster using metrics.
As part of Disaster Recovery plan objectives implemented disaster risks assessment, backup of off-site storage procedures, and so forth.
Used GoLang in Monitoring side of things in conjunction with Prometheus, Grafana and ELK stack.
Used Prometheus to collect the data based on the metrics and Grafana dashboards to visualize that data as a monitoring solution.
Leveraged Grafana to Query the data and alerting on any anomalies.
Experience in designing, configuring, and managing public cloud infrastructures utilizing Amazon Web Services (AWS) including EC2, Auto-Scaling, High-Availability, fault tolerance, in launching EC2 instances, AWS Elastic Load Balancer, CodeBuild, CodeDeploy, CodePipeline, Elastic Beanstalk, S3, Lambda, Glacier, CloudFront, RDS, VPC, DirectConnect, Route53, CloudWatch, CloudFormation, IAM, SNS.
Used GoLang in Monitoring side of things in conjunction with Prometheus, Grafana and ELK stack.
Written Bash scripts to kick of AWS SSM Documents through Lamda functions using Boto3 APIs.
Using Terraform as IoC to provision and manage infrastructure resources on Cloud and Docker containers.
Environment: Java 1.13, Spring Boot, Micro Services Architecture, PCF, AWS, Python 3, EC2, S3, CloudFront, CloudTrail, Veracode, Fortify, SonarQube, CloudWatch, ELB, CloudFormation, Ansible, Puppet, Chef, Golang, EC2 Dedicated Hosts, BareMetal Hypervisors, AWS Glue, AWS MSK, OpenShift, DataDog, Splunk, ELK, AWS CloudWatch, Azure Monitor, VMWare, Azure Security Center, Azure Key Vault, AWS Trusted Advisor, VMWare ESXi, vSphere, DataDog, Dynatrace, Splunk, Kafka, Prometheus, Grafana, Jenkins, Bash Scripting, Linux OS, RHEL 8, Docker, Postgres, Step Functions, API Gateway, Lambda, Kubernetes (EKS), RDS, VPC, Route53, YAML, Terraform, PowerShell scripting, Git, Docker.
Client: JPMorgan Chase, Plano, TX Nov 2020 – Dec 2021
Role: Cloud Security Engineer/ DevSecOps/ SRE/ Cloud Engineer
Responsibilities:
Worked on configuring Windows Azure IaaS - Virtual Networks, Virtual Machines, Cloud Services, Resource Groups, Express Route, Traffic Manager, VPN, Load Balancing, Application Gateways, and Auto-Scaling.
Design and deploy new Kubernetes clusters and maintain existing clusters with regular patches and code upgrades.
Managed On-site OS/Applications/Services/Packages using Chef as well as AWS for EC2/S3/Route53/VPC and ELB with Terraform.
Created S3 buckets and maintained and utilized the policy management of S3 buckets and Glacier for storage and backup on AWS.
Using Terraform as a tool to provision and manage infrastructure resources on Cloud and Docker containers.
Configured RDS instances and map more complex dependencies and identify network issues using Terraform.
Implemented Terraform modules for deployments of various applications on AWS cloud provider.
Worked with terraform to create AWS resources like EC2, EKS, VPC, ELB, Security Groups, S3 for terraform state management, and so forth.
Implement security best practices in AWS including multi-factor authentication, access key rotation, role-based permissions, enforced strong password policy, configured security groups and NACLs, S3 bucket policies and ACLs.
Used security groups, network ACLs, Internet Gateways, NAT instances and Route tables to ensure a secure zone for organizations in AWS public cloud.
Experience implementing Copado for deploying the code from sandbox to Production.
Environment: Java, AWS, PCF, Python, Java, Groovy, Jenkins, Tekton, EKS, Chef, Puppet, Terraform, Maven, Ansible, Bash, Kubernetes, Azure Key Vault, DataDog, Prometheus, Grafana, Linux, RHEL, ELK, Elastic BeanStack, Splunk, Grafana, Prometheus, EKS, VPC, Ruby, XML, Shell Scripting, PowerShell, Nexus, JFrog, Artifactory, Jenkins, Git, Jira, GitHub, Docker.
Client: AT&T Aug 2019 – Oct 2020
Role: SRE/ Cloud Engineer/ DevOps Engineer/ Security Engineer
Responsibilities:
•Worked in highly collaborative operations team to streamline the process of implementing security Confidential Azure cloud environment and introduced best practices for remediation.
•Gathering the requirements from the clients about the existing applications to apply the security measures.
•Implemented Configuration Management, Change Management policies and procedures.
•Maintained configuration files for each application for builds and installed on different environments.
•Deploy single Docker container environments, and then we perform Blue/Green deployments to go from staging to production.
•Presented reports to the Project manager about the progress and issues tracking key project Milestones, plans and resources.
•Modify the application config files using JSON variables and substitute the config file secrets with Azure Key Vault secrets with in the VSTS release pipeline.
•Configure azure cognitive search API’s and importing the searchable data and metadata from an external Azure data source.
•Designed and created Dockers images using Docker files. Hand-on experience with Docker container snapshots and managed Docker volumes.
Environment: AWS, Azure, Terraform, Maven, Jenkins, Ansible, Azure ARM, Azure AD, Azure Site Recovery, Kubernetes, Python, Ruby, Java, GCP, XML, Shell Scripting, PowerShell, Nexus, JFrog Artifactory, Jenkins, Git, Jira, GitHub, Ansible, Docker, Windows Server, TFS, VSTS, LDAP.
Client: Synchrony Dec 2015 – Jul 2019
Role: SRE/ DevOps/ Azure Cloud Engineer
Responsibilities:
Built good rapport by communicating well with Global Azure Customer and Microsoft Partners.
Migrated moderate workloads from on premise to Azure.
Experience sharing Product knowledge and updates with multiple teams across the world.
Experience using ARM templates to deploy resources in Azure and troubleshooting the customer’s Templates.
Experienced with deployments, Maintenance and troubleshooting applications on Microsoft Cloud infrastructure Azure.
Troubleshoot and resolved bugs in .NET applications to ensure optimal development environment.
Implemented Security in Web Applications using Azure and Deployed Web Applications to Azure.
Experience creating and managing resources in PaaS environment as well as troubleshooting and fixing PaaS technical issues.
Hands on experience in using Azure Functions and Web jobs.
Detailed documentation on Azure product related bugs and forwarded them to Azure engineering team for permanent bug fixes.
Diagnosed different technical issues in Web Apps developed using different languages like C#, java, php etc.
Experience on monitoring logs of application using Kusto queries.
Planning and implementing Disaster Recovery solutions, capacity planning, data archiving, backup/recovery strategies, Performance Analysis, and optimization.
Executing builds and troubleshooting builds, Interaction with development and QA teams.
Worked on Microsoft Azure Storage - Storage accounts, blob storage, managed and unmanaged storages.
Experience in troubleshooting the portal issues and suggesting workarounds until the issue is fixed.
Resolved Azure portal related issues by collecting Network Traces and analyzing them.
Environment: AWS, Azure, Nexus, Ansible, Kubernetes, Terraform, YAML, Json, CloudFormation, Terraform, SonarQube, Java, EJB, Spring, Python, Bash, NodeJS, Java, Ansible, Chef, Puppet, Splunk, Prometheus, Grafana, CICD, Jenkins, Python, Java, PCF, VMware, VMware ESXi, VMWare vSphere, IAM, LDAP. SAML, SOA, Microservices Architecture, Observability.
Client: Syntel, Inc Apr 2012 – Nov 2015
Role: Platform Engineer/ DevOps/ Azure Cloud Engineer
Responsibilities:
Implemented and managed highly available and fault-tolerant Linux-based infrastructures on AWS.
Skilled in designing and implementing secure networking architectures on Linux, including VPN, firewalls, and network segmentation.
Proficient in defining and managing AWS resources using Terraform modules and state files.
Extensive experience in writing and maintaining Terraform templates for infrastructure provisioning on AWS.
Worked on different infrastructure resources, like physical machines, VMs and even Docker containers using Terraform and created automated build procedures to ensure code is always ready for deployment in AWS.
Designed and deployed an EKS cluster with Terraform, including the implementation of policies, security groups, and node groups, resulting in a highly scalable and resilient infrastructure.
Troubleshot and resolved EKS cluster issues, such as node unresponsiveness, pod evictions, and networking problems.
Utilized Terraform modules to streamline the creation of alerts in Slack and Microsoft Teams, saving significant time and effort.
Orchestrate applications using Amazon Elastic Kubernetes Service EKS, deployed EKS cluster for containerization of multiple apps.
Architect and rollout initial foundation over CI/CD for the new Hybrid Infrastructure (AWS & On-Prem several Data Centers) which will host current production services and new microservices orchestrated by Kubernetes (EKS & bare-metal).
Environment: AWS, Azure, Java, Jenkins, Python, Groovy, CloudFormation, CloudWatch, CloudTrail, JFrog, Linux, Bash Scripting, Eclipse, GitHub, Kubernetes, CI/CD, Nexus, SonarQube, API, Lambda, JavaScript, NodeJS, Splunk, CloudWatch, Jenkins, Python, PCF, Java, IAM, LDAP.
Client: Southern California Edison (SCE) Feb 2011 – Mar 2012
Role: DevOps/ DevOps Engineer
Responsibilities:
Built good rapport by communicating well with Global Azure Customer and Microsoft Partners.
Migrated moderate workloads from on premise to Azure.
Experience sharing Product knowledge and updates with multiple teams across the world.
Experience using ARM templates to deploy resources in Azure and troubleshooting the customer’s Templates.
Environment: AWS, Azure, Terraform, Maven, Jenkins, Ansible, Azure ARM, Azure AD, Azure Site Recovery, Kubernetes, Python, Ruby, XML, Shell Scripting, PowerShell, Nexus, JFrog Artifactory, Jenkins, Git, Jira, GitHub, Ansible, Docker, Windows Server, TFS, VSTS, LDAP.