CHAITANYA JONNALAGADDA
SR. DEVOPS & CLOUD ENGINEER
Email: **********************@*****.***
LinkedIn: https://www.linkedin.com/in/chaitanya-jonnalagadda-98769598/
Phone Number: 614-***-****
TECHNICAL SKILLS:
Cloud Platforms:
AWS, Azure, GCP, Openstack
DevOps Tools:
Jenkins, Terraform, Kubernetes, Docker, Git, CI/CD pipelines
Infrastructure Automation:
Terraform, Ansible, CloudFormation, Chef, Puppet
Monitoring & Logging:
Prometheus, Grafana, ELK Stack (Elasticsearch, Logstash, Kibana), Splunk
Version Control:
Git, GitHub, Bitbucket, TFS
Scripting Languages:
Bash, Python, Shell scripting, Groovy, Power Shell
Databases:
MySQL, PostgreSQL, DynamoDB, MongoDB, Couchbase
Operating Systems:
Linux, Windows Server
Web & Application servers
Web Sphere, Web logic, Apache Tomcat,JBOSS, Jetty
Bug Tracking
JIRA, Remedy, BitBucket
Networking
DNS, DHCP, TCP/IP, SMTP, LDAP, SFTP, TELNET
Build Tools
MAVEN, Gradle and ANT, Puppet
Virtualization
Oracle VM Virtual Box, Vagrant, Vmware, Docker
Cloud Platforms:
AWS, Azure, GCP, Openstack
DevOps Tools:
Jenkins, Terraform, Kubernetes, Docker, Git, CI/CD pipelines
Infrastructure Automation:
Terraform, Ansible, CloudFormation, Chef, Puppet
Monitoring & Logging:
Prometheus, Grafana, ELK Stack (Elasticsearch, Logstash, Kibana), Splunk
CERTIFICATIONS:
Microsoft Certified Azure Developer
AWS Certified Solutions Architect
PROFESSIONAL SUMMARY:
Experienced DevOps Engineer with 10+ years of expertise in automating, optimizing, and supporting mission-critical deployments in both on-premise and cloud environments.
Skilled in designing and implementing CI/CD pipelines using tools such as Jenkins, GitLab, Harness, and ArgoCD, enabling automated build, test, and deployment cycles.
Proficient in Infrastructure as Code (IaC) using Terraform, CloudFormation, and Ansible, ensuring scalable, repeatable, and secure cloud infrastructure.
Extensive experience in container orchestration with Docker, Kubernetes (EKS, AKS, GKE), and OpenShift, optimizing microservice deployment and auto-scaling.
Managed critical AWS services like EC2, S3, RDS, IAM, Route 53, CloudWatch, Lambda, and CloudTrail, ensuring high availability and fault tolerance.
Led multiple cloud migration projects, reducing operational costs by up to 35% and improving infrastructure scalability and resilience.
Developed serverless applications using AWS Lambda and Azure Functions, enabling cost-efficient, event-driven architectures.
Proficient in using Prometheus, Grafana, Splunk, and Dynatrace for real-time monitoring, alerting, and incident response.
Automated operational tasks and infrastructure management with Python, Bash, PowerShell, and Groovy, increasing efficiency and reducing manual errors.
Implemented advanced deployment strategies including blue-green deployments and canary releases, improving system uptime and reducing deployment risks.
Expertise in securing cloud environments through IAM roles, VPC peering, network ACLs, VPNs, and secrets management tools like Vault.
Collaborated with cross-functional teams to enforce security policies, perform infrastructure optimization, and reduce security incidents by 20%.
Managed and maintained monitoring tools such as Nagios, New Relic, and Splunk to ensure system reliability and performance tuning..
EDUCATION:
Bachelor In Mechanical Engineer - AVNIET 2013 .
Masters in Information Technology – Franklin University 2017.
PROFESSIONAL EXPERIENCE
Client:Capitalone, Mclean, VA. Jan 2023- Till date
Role: Senior Cloud Engineer & Architect
Led end-to-end migration of legacy systems to AWS, Azure, and GCP using Terraform and Kubernetes, reducing operational costs by 35%. Designed scalable IaC templates and optimized multi-cloud architectures for high availability, integrating VPC peering and Direct Connect for secure hybrid environments. Achieved zero downtime during cutovers and enhanced resilience through auto-scaling, load balancing, and disaster recovery strategies.
Responsibilities:
Designed, configured, and deployed AWS infrastructure for various applications using services such as EC2, Route53, RDS, CloudFormation, CloudWatch, and IAM, ensuring high availability, fault tolerance, and auto-scaling.
Experienced across all phases of the Software Development Life Cycle (SDLC)—analysis, design, development, testing, and deployment—within Agile environments.
Worked extensively in AWS cloud environments, supporting migration efforts and ensuring that non-functional requirements such as latency, throughput, memory, and CPU usage were consistently met.
Launched and configured EC2 instances (Linux/Ubuntu) and utilized CloudFormation Templates to provision scalable and consistent infrastructure across environments.
Deployed applications to EC2, configured storage using S3 and EBS, and enhanced system reliability through block-level storage and automated instance deployment.
Used Terraform (0.12–1.x) to provision and manage infrastructure across AWS, Azure, and GCP
Applied Terraform Cloud/Enterprise for policy as code using Sentinel.
Designed and implemented least-privilege IAM policies for users, roles, and services across multiple AWS accounts using Terraform.
Leveraged Amazon S3 for snapshot management and implemented S3 lifecycle policies for log retention, archiving, and deletion; utilized Elastic Load Balancers (ELB) for traffic distribution across availability zones.
Implemented Infrastructure as Code (IaC) using Terraform and ARM templates in Azure to automate the provisioning of resources like Azure VMs, Virtual Networks, Load Balancers, and Storage Accounts, supporting high availability and disaster recovery.
Administered Route53 for DNS management and applied various routing policies for optimized traffic flow.
Proficient in Infrastructure as Code (IaC) using Terraform, including authoring reusable modules and managing infrastructure through Terraform Enterprise (TFE).
Configured Virtual Private Networks (VPNs) with strict Network ACLs, and led efforts in migrating on-premises architectures to AWS.
Coordinated with networking teams to implement AWS Direct Connect and defined secure IAM roles and policies for controlled access.
Built and maintained Kubernetes and OpenShift clusters on AWS, supporting multi-tenant and multi-project environments using the Enterprise OpenShift Container Platform.
Developed CI/CD pipelines leveraging Docker, Kubernetes, and Amazon Pipelines, enabling seamless build, test, and deployment automation.
Deployed C++ and CMake applications in Dockerized environments, with source code managed in GIT and integrated with internal Amazon tools.
Created automation scripts in Bash, Groovy, Python, and PowerShell, streamlining administrative and deployment tasks.
Managed and maintained Docker/Kubernetes clusters on Linux platforms, applying best practices in container orchestration.
Monitored infrastructure health and performance using Amazon CloudWatch, covering metrics for EC2, ELB, EBS, and S3 services.
Provided on-call support, led troubleshooting efforts, and utilized Amazon's native tools for cost optimization and failure diagnostics.
Maintained and configured Virtual Private Cloud (VPC) components, including Route53, NAT Gateways, Endpoints, and Endpoint Services, for secure and efficient service routing.
Created and applied custom IAM policies for granular access control to AWS resources and implemented cross-account configurations tailored to organizational requirements.
Contributed to the development of program scripts, DLLs, and reusable functions to enhance system capabilities.
Designed complex CloudFormation templates in JSON and YAML for deploying multi-region web applications and databases.
Managed CI/CD pipelines across multiple projects, enhancing them with custom stages and functionality to meet evolving business and technical demands.
Environment: AWS (EC2, S3, RDS, ELB, Route 53, IAM, CloudFormation, CloudWatch, EBS, NAT Gateway, VPC, Endpoint Services, Direct Connect), Azure,Terraform, Terraform Enterprise, Kubernetes, OpenShift, Docker, Jenkins, Git, GitHub, C++, CMake, Bash, Groovy, Python, PowerShell, Amazon Pipelines, JSON, YAML, Agile SDLC, VPN, Network ACLs, Linux (Ubuntu, CentOS), CI/CD, IAM Policies
Client: Sotera Health, Broadview Heights, OH. Sept 2019 – Dec 2022
Role: Senior DevOps Engineer
Enterprise CI/CD Pipeline Automation
Built robust CI/CD pipelines using Jenkins, GitLab, and ArgoCD to automate build, test, and deployment workflows for microservices. Integrated Docker containers, Kubernetes clusters (EKS/AKS), and security scanning tools to reduce deployment cycles by 40% and ensure 99.9% uptime. Implemented blue-green and canary deployments to minimize risk, alongside custom Groovy/Python scripts for pipeline optimization.
Responsibilities:
Led DevOps initiatives to modernize infrastructure and applications, significantly improving system uptime, performance, and deployment reliability.
Designed and implemented multi-cloud infrastructure across AWS, Azure, and GCP, achieving a 35% reduction in operational costs.
Built and managed CI/CD pipelines using Jenkins, GitLab, Harness, ArgoCD, integrating automated testing, security scanning, and advanced deployment strategies like canary and blue-green deployments.
Automated infrastructure provisioning using Terraform, CloudFormation, and Ansible, ensuring scalable and repeatable deployments across environments.
Managed Kubernetes and OpenShift clusters (EKS, AKS, GKE), deploying and scaling microservices efficiently.
Spearheaded cloud migration projects, transitioning critical workloads with minimal downtime and seamless application cutovers.
Implemented proactive monitoring and alerting solutions using Prometheus, Grafana, Splunk, Dynatrace, ELK stack, and CloudWatch, improving incident response by 30%.
Performed performance tuning and system optimization to reduce latency, increase throughput, and strengthen infrastructure security.
Developed and maintained Python, Shell, and PowerShell scripts for automation and operational tasks across Linux and Windows environments.
Managed containerized environments using Docker, deployed microservices via Kubernetes, and created custom Docker images integrated with CI pipelines.
Worked extensively with AWS services including EC2, S3, Lambda, Route 53, RDS, ELB, CloudTrail, IAM, Control Tower, and CloudFormation.
Orchestrated deployments using Harness, Jenkins Pipelines, and integrated Terraform Enterprise for complete Infrastructure as Code (IaC) lifecycle.
Configured Ansible playbooks and roles to automate application deployments, database installations (SQL, MongoDB), and system configurations.
Integrated monitoring tools and dashboards using CloudWatch, Dynatrace, Grafana, and Splunk, including log ingestion and visualization.
Collaborated with security and infrastructure teams to enforce IAM policies, implement secrets management, and reduce security incidents by 20%.
Migrated and integrated legacy infrastructure into AWS public cloud, utilizing Direct Connect, VPC peering, and network ACLs for secure connectivity.
Supported and maintained Jenkins, Artifactory, SonarQube, and Nagios, ensuring continuous integration and monitoring across multiple environments.
Utilized Azure DevOps, TFS, GitHub, and ServiceNow for source control, project tracking, and IT service management.
Used Chef Infra to manage server configurations on AWS EC2 and on-premises VMs.
Integrated Terraform with Bitbucket Pipelines / Jenkins for CI/CD automation.
Environment: AWS, Azure, GCP, Terraform, CloudFormation, Ansible, Jenkins, GitLab, Harness, ArgoCD, Docker, Kubernetes, OpenShift, Prometheus, Grafana, ELK Stack, CloudWatch, Splunk, Dynatrace, Bash, Shell, Python, PowerShell, Git, GitHub, SonarQube, Artifactory, ServiceNow, SQL Server, MongoDB, Vault, TFS
Client: Geico. Chevy Chase, Bethesda, Maryland Jan 2018 – Aug 2019
Role: Cloud DevOps Engineer
Cloud Monitoring & Security Framework Implementation
Deployed centralized monitoring using Prometheus, Grafana, and Splunk for real-time visibility into AWS/Azure infrastructure, reducing incident response time by 30%. Secured cloud environments via IAM roles, Vault for secrets management, and network ACLs, cutting security incidents by 20%. Automated alerts, log aggregation, and compliance reporting to streamline audits and enforce SOC2/ISO27001 standards.
Responsibilities:
Worked with multiple AWS services including EC2, ELB, S3, Route 53, IAM, RDS, Lambda, CloudFront, CloudWatch, CloudTrail, and CloudFormation for infrastructure deployment and management.
Deployed and managed Azure IaaS VMs, PaaS services, VNets, and Key Vault, and automated deployments using VSTS and PowerShell.
Built serverless solutions using Azure Functions, enabling auto-scaling and modular problem-solving.
Automated infrastructure using Terraform, Ansible, and Jenkins, provisioning servers and configuring applications with Ansible playbooks.
Managed Ansible Tower and dynamic inventories across AWS, Docker, and OpenStack environments.
Enabled cluster autoscaler, ALB ingress controller, and logging via CloudWatch
Automated Docker image builds and pushed to ECR using Jenkins Pipelines.
Containerized applications with Docker and orchestrated deployments using Kubernetes and OpenShift, including setting up EKS and ECS clusters.
Administered MongoDB clusters using Ops Manager, configured SSL/Kerberos, and automated backup/restore operations.
Provided support for MySQL, PostgreSQL, and Cassandra, and integrated Kafka and Zookeeper for distributed messaging systems.
Created and maintained CI/CD pipelines using Jenkins, integrated with Git, Maven, Artifactory, and custom scripts in Python and Bash.
Maintained Jenkins servers, performed regular security updates, and configured build processes for .NET and Java applications.
Monitored infrastructure using Splunk, Nagios, and New Relic, creating dashboards, custom queries, and automating alerts.
Ensured infrastructure as code principles were followed across deployments, improving scalability, reproducibility, and operational efficiency.
Managed deployments and monitoring across Linux environments (CentOS, RHEL, Ubuntu), and worked with middleware like WebSphere, JBoss, and Tomcat.
Environment: AWS, Azure, Terraform, Ansible, Jenkins, Ansible Tower, Docker, Kubernetes, OpenShift, EKS, ECS, VSTS, Git, Maven, Artifactory, Python, Bash, Azure Functions, MongoDB, MySQL, PostgreSQL, Cassandra, Kafka, Zookeeper, CloudFormation, CloudWatch, CloudTrail, Nagios, Splunk, New Relic, WebSphere, JBoss, Tomcat, CentOS, RHEL, Ubuntu
Client:. Udyog Software, HYD. Sept 2014 – June 2016
Role: DevOps Engineer
Kubernetes-Driven Cloud Migration for Nokia
Migrated 150+ legacy workloads to AWS/GCP using Terraform, Kubernetes, and Docker, achieving 35% cost savings. Built EKS/GKE clusters with automated scaling and self-healing capabilities, ensuring zero downtime. Integrated Prometheus/Grafana for monitoring and AWS KMS for encryption, achieving PCI-DSS compliance and 99.95% uptime.
Responsibilities:
Led the migration of legacy applications to cloud platforms (AWS, Azure, GCP), achieving a 35% reduction in operational costs and significantly enhancing infrastructure scalability and resilience.
Designed and deployed infrastructure using Terraform and CloudFormation, enabling automated, consistent, and repeatable provisioning of cloud resources across AWS and GCP.
Engineered and automated the deployment of EKS and GKE Kubernetes clusters using Terraform, incorporating IAM roles, VPC networking, workload identity, and cluster logging to CloudWatch and S3 for centralized monitoring and compliance.
Provisioned and managed core AWS infrastructure services including VPC, EC2, S3, IAM, EBS, RDS, Lambda, Auto Scaling, and Route 53 using Terraform, enhancing operational agility and reducing manual configuration errors.
Managed and optimized cloud services such as IAM, EKS, SNS, SQS, DynamoDB, Lambda, KMS, and S3 SSE, ensuring secure and scalable environments across multi-cloud ecosystems.
Migrated and refactored over 165 Puppet modules, and upgraded infrastructure from Puppet 3.25 to 3.75, updating acceptance tests and Ruby automation scripts to align with platform changes and improve configuration management best practices.
Upgraded and maintained Terraform modules for GCP, streamlining infrastructure provisioning, increasing module reusability, and adhering to security best practices.
Developed Lambda functions for metrics calculation and created Terraform-based Jenkins jobs, facilitating efficient CI/CD operations and observability.
Built and maintained CI/CD pipelines using Jenkins, GitLab, and Artifactory, automating builds, tests, and deployments of microservices-based applications from Dev to Prod environments.
Deployed containerized applications using Docker into Kubernetes clusters managed by EKS and GKE, enabling automated scaling, load balancing, and self-healing of services.
Configured and used Kubectl and Spinnaker pipelines to monitor Docker image artifacts in ECR and manage their production deployment workflows.
Created secure storage and identity mechanisms using Amazon KMS, HSM, and multi-factor authentication (MFA), and implemented HTTPS endpoints for encrypted data transfer and S3 bucket storage.
Utilized PostgreSQL with Liquibase schemas for data persistence in ODS environments, deploying changes across environments using Jenkins automation.
Implemented robust monitoring solutions using Prometheus, Grafana, and Splunk, including AWS Config ingestion, enabling real-time insights into resource usage and compliance monitoring.
Documented Terraform rollback procedures, defining clear policies and processes per resource type, ensuring safe and predictable infrastructure changes.
Integrated AWS DynamoDB with Lambda, storing and backing up stream data for real-time, serverless data processing.
Successfully led large-scale cloud migrations, including secure data transfers with AWS DataSync, maintaining data integrity and minimizing downtime.
Environment AWS, Azure, Kubernetes, Docker, Terraform, Jenkins, CloudFormation, Prometheus, Grafana, CI/CD, Artifactory, GIT, Jira
Client: TRC Tech, Hyderabad, India. June 2013 – Aug 2014
Role: System Administrator
Responsibilities:
Managed and supported both Windows and Linux servers to ensure reliable and secure operation of core banking applications with minimal downtime.
Regularly monitored system health, performance, and network availability, staying ahead of potential issues and ensuring compliance with financial industry standards.
Handled user account management, Group Policies, and access control through Active Directory, supporting internal security and user efficiency.
Automated daily admin tasks using PowerShell and shell scripting, helping streamline operations and reduce manual errors.
Maintained robust backup and disaster recovery strategies, ensuring quick recovery of critical data and systems during outages or incidents.
Provided technical support for escalated issues, resolving server and network problems quickly to keep banking operations running smoothly.
Assisted in deployment and maintenance of firewalls and endpoint protection tools to safeguard sensitive financial data from threats.
Collaborated with development and database teams during application rollouts and troubleshooting to maintain system performance and integration
Environment: Windows Server, Linux (CentOS, RHEL, Ubuntu), Active Directory, Group Policy, PowerShell, Shell Scripting, VMware, Hyper-V, Firewalls (Cisco ASA, Fortinet), Endpoint Protection (Symantec, CrowdStrike), Backup & Recovery (Veeam, Acronis), Monitoring Tools (Nagios, SolarWinds), Networking (DNS, DHCP, TCP/IP), Core Banking Applications, SQL Server, MySQL