Post Job Free
Sign in

Reliability Engineer Site

Location:
Louisville, KY
Salary:
60/ hour
Posted:
June 28, 2025

Contact this candidate

Resume:

Harish Adunuri

Phone: +1-502-***-****

Email: *************@*****.***

LinkedIn: https://www.linkedin.com/in/harish-adunuri-b025a716a

DEVELOPER

PROFESSIONAL SUMMARY:

Nearly 10 years of experience as a Site Reliability Engineer and DevOps Consultant across healthcare, telecom, insurance, and technology sectors.

Proven ability to architect, automate, and optimize resilient cloud-native infrastructures across AWS, Azure, and GCP.

Expert in Kubernetes orchestration, managing 900+ microservices across production and staging environments in multi-cloud setups.

Led enterprise-wide observability migration from BigPanda to Splunk ITSI, enhancing incident correlation and executive visibility.

Strong background in building high-impact CI/CD pipelines using Jenkins, Git, Ansible, Terraform, and Nexus.

Developed real-time monitoring, auto-remediation, and root cause analysis workflows by integrating ServiceNow with Dynatrace, Splunk, and Datadog.

Automated infrastructure provisioning using Infrastructure as Code (IaC) tools like Terraform and CloudFormation, reducing setup time significantly.

Designed self-healing and auto-scaling Kubernetes environments, enhancing uptime and reducing manual interventions.

Integrated Dynatrace into CI/CD workflows for real-time deployment health monitoring and automated rollback mechanisms.

Built centralized observability using ELK Stack, CloudWatch Logs, and Grafana dashboards to streamline auditing and anomaly detection.

Migrated applications into AWS Control Tower with Service Control Policies, ensuring centralized governance and compliance.

Created custom Azure Workbooks and Policy definitions to enforce organizational compliance standards and visualize enforcement status.

Developed and enforced GitOps branching strategies and release management policies, improving team collaboration and deployment reliability.

Applied DevSecOps practices to CI/CD pipelines, integrating SonarQube, Nexus, and Test Kitchen for secure, traceable releases.

Delivered infrastructure transformation at Apple by aligning DevOps initiatives with modernization and compliance goals.

Created reusable deployment templates and self-service toolkits to empower developers and reduce dependency on SRE teams.

Engineered AMI rehydration pipelines in AWS to maintain patch compliance and reduce system vulnerabilities.

Performed 24/7 on-call rotations, led post-incident reviews, and implemented SRE practices (SLIs, SLOs, SLAs) to enhance system reliability.

Strong grasp of cloud security with IAM, SCPs, RBAC, and least-privilege principles across AWS, Azure, and Kubernetes.

Designed hybrid deployment strategies enabling cost-efficient operations across public and private cloud environments.

Mentored junior DevOps engineers in CI/CD best practices, containerization, observability, and automation workflows.

Reduced deployment times by up to 60% by redesigning end-to-end CI/CD pipelines and removing manual release bottlenecks.

Collaborated with business and IT stakeholders to align DevOps and SRE initiatives with organizational KPIs and compliance mandates.

Integrated Dynatrace PurePath and distributed tracing for end-to-end API performance diagnostics, reducing MTTR.

Implemented custom alerting logic, dashboards, and KPIs to support proactive incident detection and capacity planning.

Ensured audit readiness and traceability through automated compliance reporting and secure delivery pipelines.

AWS Certified Solutions Architect – Associate and Dynatrace Certified Associate with a strong foundation in cloud architecture, governance, and monitoring.

TECHNICAL SKILLS:

Cloud Platforms

AWS (EC2, VPC, RDS, Route 53, Lambda, Control Tower), Azure, GCP (GKE)

Infrastructure as Code

Terraform, AWS CloudFormation, Ansible

Containerization

Docker, Kubernetes (AKS, EKS, GKE), Helm

CI/CD & Automation

Jenkins, Git, Nexus, SonarQube, GitHub Actions, Shell, Python, Ruby

Monitoring & Observability

Dynatrace, Splunk ITSI, Datadog, Prometheus, Grafana, ELK Stack, AWS CloudWatch

DevOps & Configuration

Ansible, Chef, Puppet, Nginx, Nexus, Artifactory

Version Control

Git, GitHub, Bitbucket, GitLab

Security & Compliance

IAM, SCPs, RBAC, Azure Policy, DevSecOps

Ticketing & ITSM

ServiceNow (automation, RCA, CMDB integration)

Scripting Languages

Shell Scripting (Bash), Python, Ruby

Databases & Messaging

MySQL, Redis, RabbitMQ

Operating Systems

Linux (RedHat, CentOS), Windows Server

EDUCATION:

Bachelor's degree in Computer Science, October 2013

Jawaharlal Nehru Technological University-Hyderabad, Telangana

TRAINING & CERTIFICATION:

AWS Certified Solutions Architect – Associate

Dynatrace Associate Certification

PROFESSIONAL EXPERIENCE:

Client: Humana Inc, Louisville July 2024 – Present

Role: Site Reliability Engineer

Responsibilities:

Led cross-functional efforts to modernize legacy monolithic applications into microservices using Kubernetes and containerization.

Designed and implemented reusable architecture components for hybrid cloud deployments across AWS, Azure, and GCP.

Engineered scalable CI/CD pipelines using Jenkins, Git, and Terraform to standardize deployment workflows across business units.

Spearheaded the enterprise-wide migration from BigPanda to Splunk ITSI, designing correlation searches, KPIs, and health score dashboards.

Created custom Dynatrace dashboards and Smartscape topology views to visualize real-time dependencies and service health.

Automated incident management by integrating ServiceNow with Dynatrace, Datadog, Splunk, and Jenkins for real-time ticket generation and RCA enrichment.

Configured Dynatrace alerting rules, problem thresholds, custom tags, and synthetic monitors to reduce false positives.

Built automated RCA pipelines and post-incident workflows to improve incident response times and root cause documentation.

Integrated SLIs, SLOs, and SLAs into service monitoring to support SRE best practices and measure service reliability.

Developed cloud-agnostic Terraform modules for provisioning compute, networking, and storage across AWS, Azure, and GCP.

Managed over 900+ microservices in hybrid cloud environments using Kubernetes clusters on EKS, AKS, and GKE.

Worked closely with application teams to define standardized release workflows and GitOps branching strategies.

Automated service provisioning and deployment using Ansible for config management and repeatable environment setup.

Implemented container security and role-based access control (RBAC) within Kubernetes clusters.

Optimized cloud resource utilization by applying autoscaling policies and tagging strategies for cost management.

Collaborated with ITSM, security, and compliance teams to align DevOps processes with governance and regulatory controls.

Led creation of self-healing scripts and automation tools for restarting unhealthy pods, services, and nodes.

Established observability baselines by integrating Prometheus and Grafana for low-latency metric ingestion and visualization.

Implemented alert aggregation and noise reduction strategies to streamline on-call experiences.

Supported enterprise readiness by conducting disaster recovery (DR) simulations and implementing HA architecture designs.

Integrated quality gates (SonarQube, security scans) in CI pipelines to enforce code quality and reduce vulnerabilities.

Maintained and extended custom Jenkins libraries to reduce pipeline duplication and promote reusable templates.

Participated in 24/7 on-call rotations and led post-incident review meetings to promote blameless culture and action tracking.

Built audit-ready logging pipelines to ensure compliance with internal security and external regulatory frameworks.

Mentored junior SRE and DevOps engineers on observability tools, deployment strategies, and best practices.

Collaborated with business stakeholders and architects to translate uptime requirements into actionable SLOs.

Deployed synthetic and real-user monitoring (RUM) tools to improve performance tracking and user experience metrics.

Conducted capacity planning and performance benchmarking for high-traffic services, ensuring scalability and resilience.

Delivered continuous service improvements by analyzing trends, incident history, and automating recurring root causes.

Environment: AWS (EKS, EC2, IAM, Route 53), Azure (AKS, Monitor), GCP (GKE),Kubernetes, Docker, Helm, Jenkins, Git, Terraform, Ansible, Dynatrace, Splunk ITSI, Datadog, Prometheus, Grafana, CloudWatch, ServiceNow, SonarQube, Nexus, Shell, Python, Linux (RHEL, Ubuntu)

Client: Apple – Cognizant July 2023 — April 2024

Role: Senior Consultant

Responsibilities:

Designed and built robust, scalable CI/CD pipelines using Jenkins, Terraform, and Ansible to streamline deployment processes.

Reduced deployment times by 60% by automating end-to-end software release workflows across hybrid cloud environments.

Led the provisioning of infrastructure using Infrastructure as Code (IaC) practices across AWS and Azure environments.

Integrated Dynatrace into CI/CD pipelines to enable real-time health monitoring and automatic rollback on performance regression.

Leveraged Dynatrace PurePath and distributed tracing to diagnose and resolve API and service latency issues.

Built and managed centralized logging pipelines using ELK Stack and CloudWatch Logs to improve observability and root cause analysis.

Standardized branching and release strategies to ensure consistent delivery and minimize merge conflicts across dev and QA teams.

Developed and enforced secure deployment patterns, supporting regulatory compliance and internal security mandates.

Automated compliance checks and testing using SonarQube and integrated quality gates into CI/CD pipelines.

Collaborated with enterprise architects to implement reusable architectural components for containerized microservices.

Created self-service deployment libraries and tooling to enable development teams to deploy infrastructure independently.

Implemented role-based access controls (RBAC) across Jenkins, Git, and AWS to enforce secure pipeline usage.

Created custom Ansible playbooks and roles for automating infrastructure provisioning and configuration.

Supported secure rollout of infrastructure aligned with Apple’s internal compliance frameworks and risk policies.

Worked closely with Apple’s global vendors to ensure infrastructure availability and SLA adherence.

Developed Jenkins shared libraries to standardize job templates and enforce consistency across multiple CI/CD pipelines.

Enabled real-time incident detection by integrating monitoring tools with alerting platforms and ITSM systems.

Coordinated with InfoSec teams to implement DevSecOps practices and integrate security scans into build pipelines.

Participated in platform modernization efforts by migrating legacy applications to containerized environments.

Collaborated with QA teams to integrate automated testing into deployment workflows, improving release confidence.

Optimized cloud resource provisioning through Terraform modules and reusable templates.

Enforced version control policies and Git workflows to align with engineering governance and audit requirements.

Reduced manual errors by replacing legacy scripts with idempotent infrastructure automation tools.

Participated in capacity planning and resource optimization across production and staging environments.

Documented CI/CD processes, architecture diagrams, and SOPs to support internal knowledge sharing.

Delivered internal training sessions on CI/CD best practices, containerization, and observability tools.

Led integration efforts between Dynatrace, Jenkins, and ServiceNow to enable performance-driven deployment automation.

Ensured high availability and resilience of DevOps pipelines by implementing failover, retry logic, and monitoring hooks.

Environment: AWS (EC2, IAM, VPC), Azure, Jenkins, Git, Terraform, Ansible, Nexus, SonarQube, Docker, Kubernetes, ELK Stack, CloudWatch Logs, Dynatrace (PurePath, CI/CD Integration), ServiceNow, Python, Shell Scripting, Linux (Ubuntu, RHEL)

Client: Ernst & Young Global Limited July 2022 — May 2023

Role: Senior Technical Consultant

Responsibilities:

Architected and deployed highly available and cost-optimized AWS infrastructures using EC2, ELB, Auto Scaling, RDS, VPC, and Route 53.

Implemented Infrastructure as Code (IaC) using Terraform and CloudFormation, enabling version-controlled, consistent, and automated provisioning.

Designed and maintained multi-cloud Kubernetes clusters (AWS EKS & Azure AKS), orchestrating 900+ microservices across staging and production.

Deployed and managed containerized applications using Docker and Kubernetes, improving application portability and deployment efficiency.

Configured key Kubernetes components including config maps, secrets, ingress controllers, and node affinity rules for high availability and secure deployment.

Developed and enforced IAM roles, policies, and security groups to ensure least-privilege access and secure multi-tenant environments.

Implemented Auto Scaling policies and Elastic Load Balancers to dynamically adjust to workload changes and ensure zero-downtime deployments.

Enabled hybrid cloud deployments, optimizing cost while maintaining performance and regulatory compliance.

Integrated Prometheus and Grafana with Kubernetes clusters to create real-time dashboards for system metrics and alerts.

Streamlined application rollout cycles by building CI/CD workflows integrated with Kubernetes deployments.

Configured CloudWatch dashboards and alarms to monitor AWS services and trigger remediation pipelines.

Led Kubernetes cluster capacity planning and autoscaling strategies to optimize resource utilization.

Collaborated with security teams to implement DevSecOps practices across CI/CD workflows and containerized applications.

Managed S3 buckets with proper versioning, lifecycle policies, and encryption for compliance and data retention.

Implemented monitoring and alerting pipelines to support production-grade observability with Prometheus and CloudWatch.

Deployed serverless functions (AWS Lambda) to automate routine infrastructure tasks and event-driven actions.

Managed secrets and sensitive configuration using Kubernetes secrets and parameter stores securely.

Improved system resilience with blue-green and canary deployments across multiple environments.

Supported audit and compliance readiness through automated logging, tagging, and environment tracking.

Defined Kubernetes networking policies to enforce security boundaries between microservices.

Wrote Ansible playbooks for environment setup, application configuration, and cloud resource provisioning.

Created disaster recovery (DR) runbooks and failover strategies for critical infrastructure components.

Managed container lifecycle through image versioning, rollback policies, and automated health checks.

Collaborated with development and QA teams to establish deployment standards and testing environments.

Developed SOPs and internal documentation to streamline knowledge transfer and onboarding.

Participated in cross-functional meetings to align cloud solutions with business continuity, cost, and compliance goals.

Environment: AWS (EC2, VPC, RDS, ELB, Lambda, IAM, S3, Route 53, CloudWatch), Azure (AKS, Resource Manager), Kubernetes (EKS, AKS), Docker, Helm, Terraform, CloudFormation, Ansible, Prometheus, Grafana, AWS CloudWatch, Linux (RHEL, Ubuntu), Shell Scripting, Git

Client: T-Mobile telecommunication November 2020 — April 2022

Role: Senior DevOps Engineer

Responsibilities:

Migrated enterprise workloads into AWS Control Tower Organizations to establish centralized governance and security boundaries.

Implemented AWS Service Control Policies (SCPs) at org root, OU, and account levels to enforce cloud usage and security standards.

Automated AMI rehydration pipelines to maintain patched, compliant EC2 images across multiple accounts.

Designed cross-account access models using IAM roles and resource-based policies, enhancing secure collaboration.

Engineered end-to-end monitoring and logging solutions in Azure for real-time insights and proactive incident management.

Built custom Azure Workbooks to visualize compliance across Management Groups, Subscriptions, and Resource Groups.

Authored and deployed Azure Policy definitions to enforce mandatory tagging, encryption, SKU restrictions, and firewall settings.

Integrated AWS and Azure monitoring dashboards for unified observability across hybrid environments.

Implemented centralized logging using Azure Monitor and Log Analytics for compliance and audit readiness.

Developed Terraform modules for automated provisioning of secure, standardized infrastructure stacks in AWS and Azure.

Deployed governance automation to enforce naming conventions, tagging standards, and resource locks.

Collaborated with cybersecurity teams to conduct regular policy audits and vulnerability assessments.

Integrated Azure Policy compliance insights into DevOps workflows to block non-compliant deployments at pipeline level.

Developed automation scripts in Python and Shell to streamline reporting, backup, and cleanup operations.

Conducted DR simulations and implemented multi-region failover architecture for high availability.

Created and managed centralized network architecture using AWS VPC peering, Transit Gateway, and Route Tables.

Enabled cost tracking and forecasting through automated billing tags, budgets, and reports.

Configured IAM roles, groups, and permission boundaries aligned with least-privilege and zero-trust models.

Supported multi-account strategy for workload isolation, compliance enforcement, and access control.

Delivered onboarding workshops and internal documentation on AWS Control Tower and Azure governance practices.

Integrated CloudTrail, Config, and Azure Activity Logs for centralized audit logging and compliance monitoring.

Assisted in containerization strategy for legacy workloads preparing for cloud-native transformation.

Partnered with app teams to design secure, compliant CI/CD pipelines aligned with enterprise release standards.

Implemented cross-cloud monitoring alerts using CloudWatch and Azure Monitor for SLA-driven incident response.

Participated in architecture reviews, focusing on governance, availability, and scalability.

Collaborated with internal compliance auditors and external assessors to ensure FedRAMP and SOC 2 alignment.

Improved operational efficiency by automating repetitive governance tasks, reducing manual overhead by 40%.

Environment: AWS (Control Tower, EC2, IAM, VPC, S3, CloudTrail, Config), Azure (Policy, Monitor, Log Analytics), Terraform, Shell, Python, CloudWatch, Git, Linux (Amazon Linux, Ubuntu)

Client: Hyla insurance June 2019 — October 2020

Role: AWS DevOps Engineer

Responsibilities:

Developed and maintained Shell and Ruby scripts to automate repetitive infrastructure management tasks.

Created and deployed Ansible playbooks and roles for provisioning, configuration, and application deployments.

Managed AWS VPC components including subnets, route tables, NAT gateways, and internet gateways for secure network design.

Automated provisioning of EC2, RDS, and S3 using a combination of Ansible and AWS CLI/API.

Integrated Jenkins with Git for automated builds, unit testing, and application deployments across multiple environments.

Designed and enforced Git branching strategies to streamline feature development, integration, and production releases.

Configured CI/CD pipelines with automated build triggers, rollback policies, and canary deployment strategies.

Developed custom Chef cookbooks and Puppet manifests for managing configuration across Linux servers.

Implemented infrastructure testing using Serverspec and Test Kitchen to ensure environment consistency.

Connected Jenkins with artifact repositories (Nexus, Artifactory) for version-controlled package management.

Monitored CI job health and performance metrics using Jenkins dashboards and alerting plugins.

Wrote custom webhooks and trigger scripts for auto-deployment on code push events.

Configured IAM roles, security groups, and S3 bucket policies to follow least-privilege and encryption best practices.

Improved pipeline reliability with automated error handling, logging, and rollback functions.

Streamlined build and deployment feedback using Slack and email alerts for DevOps visibility.

Maintained consistent environments across dev, staging, and prod using infrastructure automation.

Collaborated with QA teams to integrate automated testing tools into CI workflows.

Provisioned scalable AWS infrastructure for microservices using Ansible-driven automation.

Reduced manual deployment errors by implementing idempotent Ansible scripts.

Participated in environment troubleshooting and coordinated with teams during release cycles.

Managed configuration drift using version-controlled cookbooks and regular syncs.

Contributed to documentation of deployment workflows, server configurations, and disaster recovery plans.

Supported build environments running on Linux (Amazon Linux, RHEL, Ubuntu) platforms.

Ensured compliance with internal security policies by automating audits and change tracking in CI/CD.

Environment: AWS (EC2, VPC, IAM, RDS, S3, CLI/API), Jenkins, Git, Ansible, Chef, Puppet, Nexus, Artifactory, Shell, Ruby, Serverspec, Test Kitchen, Linux (Amazon Linux, RHEL, Ubuntu)

Client: Symantec October 2014 — June 2019

Role: DevOps Engineer

Responsibilities:

Gained foundational experience in Linux system administration, including user management, permissions, and cron jobs.

Performed routine server maintenance, log analysis, and system-level troubleshooting on RedHat/CentOS systems.

Managed virtual machines and environments used for development, testing, and staging.

Provisioned and managed AWS EC2 instances, setting up storage volumes, key pairs, and security groups.

Configured S3 buckets for static website hosting, data backups, versioning, and lifecycle management.

Created and maintained IAM users, roles, groups, and custom policies following least-privilege principles.

Supported early-stage adoption of CI/CD pipelines using Jenkins, automating builds, tests, and deployments.

Integrated Git with Jenkins to enable trigger-based build pipelines on code check-in.

Developed and maintained Shell scripts to automate deployment, backup, and monitoring tasks.

Assisted in configuring and managing infrastructure using AWS CloudFormation and Terraform.

Participated in environment setup and configuration for container-based testing using Docker.

Collaborated with developers during release cycles to debug and resolve deployment issues.

Helped configure Jenkins build agents and managed plugins to support evolving pipeline requirements.

Documented SOPs, installation procedures, and environment setup steps for knowledge sharing.

Monitored infrastructure health and performance using AWS CloudWatch and basic Splunk queries.

Assisted in defining security group rules, routing policies, and DNS settings within VPCs.

Supported IAM audits and access reviews as part of internal compliance initiatives.

Automated environment setup tasks using CloudFormation templates and Bash scripting.

Participated in Agile sprint planning and contributed to DevOps story grooming and delivery.

Developed lightweight tools for log parsing and data transformation using Shell and Python.

Set up Git hooks for automated linting and pre-deployment checks.

Assisted in setting up monitoring dashboards and alert rules in CloudWatch for production services.

Conducted internal DevOps knowledge-sharing sessions and onboarding for junior team members.

Completed internal training on AWS fundamentals, DevOps principles, and agile delivery methodologies.

Environment: AWS (EC2, S3, IAM, VPC, CloudFormation, CloudWatch), Jenkins, Git, Terraform, Docker, Shell, Python, Splunk, Linux (RedHat, CentOS)



Contact this candidate