Post Job Free
Sign in

Cloud Architect

Location:
Riverview, FL
Salary:
120,000-150,000
Posted:
June 12, 2025

Contact this candidate

Resume:

MUFG

As a Cloud Security Engineer with over * years of experience in system engineering and administration, I am passionate about driving cutting-edge solutions within aggressive timelines. I thrive in dynamic team environments, where collaboration and creativity are essential, and I constantly seek innovative ways to solve problems. My desire to curiosity fuels my commitment to learning new technologies, and I enjoy sharing my knowledge with the team. With a strong background in RedHat Linux, VMware, Oracle Enterprise Linux/UNIX, and Windows environments, I possess a diverse skill set covering installation, configuration, backup recovery, and security policy implementation. In the field of AWS Cloud Services, I excel in designing highly scalable and fault-tolerant services. My proficiency extends to Cloud Security, DevSecOps integration, and risk control frameworks, utilizing AWS tools such as CloudTrails, GuardDuty, Lambda, AWS Config, and Inspector. I also have hands-on experience with open-source SIEM tools like Splunk and Nagios. Working with various AWS services, including CloudFormation, AMIs, EC2, S3, RDS, VPC, and more

WORK HISTORY

MUFG Bank [Mitsubishi UFJ Financial Group] Jan '2021 - Present

Cloud Security Engineer Washington, DC

•Designed, implemented, and ran security solutions to detect security incidents; vulnerabilities and misconfigurations at various layers of cloud infrastructure (virtual machines; containers; network, cloud environment).

•Drove forward existing cloud security stack & security automation stack - including maintenance of existing environment, developing new solutions architectures and implementing them to improve capabilities.

•Maintained constant contact with vendors to identify the best practices and escalate potential configuration issues.

•Researched & developed proof of concepts on new security technologies relevant to the department.

•Run and/or participate in RFPs for security technology selection.

•I was responsible for the design, development, implementation, and maintenance of innovative security architectures for protecting systems and data deployed into different types of cloud and cloud/hybrid systems.

•Worked with development teams to ensure that applications follow secure development practices and are built to be robust and easily monitored (Python, Java, Angular).

•Worked with customer's IT security team to ensure that the AWS cloud infrastructure has robust monitoring and assistance with triage of incoming reports.

•Built VPCs from scratch,creating private and public sub-nets, creating security groups and network access lists, configuring internet gateways, OpenVPN, creating AMI, understanding of user access management/role based access/multi factor authentication and API access, configuration of auto scaling and elastic load balancer for scaling services if a configured threshold has been exceeded, configuration of SNS to send notifications and Cloud Watch to collect logs and metrics, spinning both Windows and Linux EC2 instances as needed.

•Ensured availability, performance, security, and scalability of the customer's AWS environment.

•Deployed, automated, managed, and maintained AWS cloud-based sandbox, integration, and production environments.

•Defined and deployed systems for metrics, logging, and monitoring of AWS environments.

•Worked alongside developers and product owners to support new infrastructure and operational needs.

•Managed continuous deployment pipeline to fully automate the deployment of mission-critical applications within the enterprise environment.

•Designed, managed, and maintained tools to automate operational processes.

•Troubleshooted and resolved problems across various application domains and platforms.

•Customized in-development software to clients' current hardware environments, designing applications to span multiple systems.

•Assisted with and designed security oversight of next-generation firewalls, intrusion prevention systems, DDoS solutions, SSL-terminating load balancers, WAF, security groups and NACL.

•Communicated software architecture strategies to senior leadership and third-party business leaders.

•Encrypted extremely sensitive data such as personally identifiable information (PII) using customer-controlled keys.

•Has in-depth understanding of IAM related processes, internal controls, external factors, risk management, and industry standards.

•Worked with stakeholders to gather and analyze requirements for developmental programs.

•Proven experience in systems and cloud network design and development.

•Performed security monitoring, security event triage, and incident response; coordinated with other team members and management to document and report incidents.

•Deployed and managed applications to monitor cloud infrastructure security and intrusions.

•Cut disaster recovery time by 70% in tests.

•Reduced average development environment build time from 3 months to only minutes.

•Stayed abreast of broad technical knowledge of existing and emerging technologies, including public cloud offerings from Amazon Web Services, Microsoft Azure, and Google Cloud.

•Performing health check monitoring on all CyberArk servers to ensure consistent availability of the system to end-users

•Knowledge of CPM and PSM connector customization

Citibank Jan '2019 - Jan '2021

Cloud System Engineer Arlington, VA

•Provided direct application and user support for any technical issues triggered on RHEL 6, 7 servers.

•Proficiently managed documentation on Confluence while implementing patching and upgrading with RedHat Support.

•Tuned, analyzed and monitored the performances of ESXi hosts for virtual machines.

•Engineered Infrastructure automation eliminated time consuming manual process deployment and configurations using Ansible.

•Install, configure, and manage Ansible Galaxy for automation.

•Experience in integrating version control systems like Git Lab with Ansible Tower for continuous delivery of playbooks.

•Managed and inspected docker repositories, images, registries, and docker files.

•Improved developer workflow by Dockerizing monolithic apps into micro services with Docker-compose.

•Used Terraform to build and launch AWS resources EC2, S3 storages, Route53.

•Integrated and Configured Terraform Atlantis with GitHub Enterprise.

•Collaborated with teams on Cloud migration project with the goal to minimize the cost of bare metal resources.

•Worked with Cloud Watch to monitor AWS resources including EC2 instances by setting metrics and alerts.

•Experienced in Python scrips to read and write from CSV files, make API calls to retrieve data from servers like AD, SQL and generate reports.

•Used protocols like SCP, SFTP and FTP for transferring files over the network.

•Installed and configured Nagios to constantly monitor network bandwidth, memory usage, and hard drive status.

•Deploying, configuring, and troubleshooting DHCP, FTP, TFTP, Apache, SSH, and NFS.

•Handled full fledge lifecycles of server deployment, provisioning, troubleshooting, and decommissioning.

•Managed file systems and SAN by creating Logical Volumes, resizing logical volumes and volume groups.

•Extensive performance analysis of the system using top, sar, vmstat, netstat and iostat to check the CPU utilization, bottlenecks of I/O devices, memory usage and network traffic.

Suncoast Credit Union Sep '2017 - Dec '2018

SOC Analyst Tampa, FL

•Real-time monitoring of logs in SOC from various devices, including Firewalls, IDS, IPS, Windows/Linux OS, Proxy/Networking devices, Databases, and Web Servers.

•Prevents over 1500 vulnerabilities monthly by monitoring security events and alerts from various sources such as SIEM, firewalls, and other security tools to detect and respond to security incidents in a timely and effective manner.

•Investigate security incidents, determining the scope, severity, and impact of attacks.

•Prioritize, and differentiate between potential intrusion attempts and false alarms True/False Positives.

•Investigate endpoints using SEPM and successfully terminated and deleted over 1600 possible malicious files and processes.

•Research and test new security tools/products and make recommendations of tools to be implemented in the SOC environment.

•Investigate VPN alerts and reach out to users to confirm the legitimacy of such activity.

•Utilize the MITRE attack framework for confirmed incidents analysis.

•Excellent working knowledge of security platforms and tools, such as firewall, CASB, proxy, SIEM, and SOAR.

•Monitor the health of security devices and syslog instances and respond to anomalies as defined in the SOP.

•Perform email-based investigation and successfully contain over 1800 phishing emails daily and potential email account takeovers.

•Conduct investigation of security incidents, including phishing alerts, to assess the extent and gravity of threats. Analyze phishing alerts and follow through until containment and elimination.

•Perform threat intelligence including open-source investigations to identify current attacks that may target the clients/industry.

•Identifying over 1500 malicious network activities and threats impacting network operations and developing appropriate countermeasures, eliminating these threats and vulnerabilities.

•Collaborate with other security professionals (incident response teams, threat intelligence analysts, and penetration testers) to provide timely and effective incident responses.

•Security risk assessments, vulnerability management, and penetration testing activities to identify and remediate vulnerabilities.

•Maintain documentation related to security incidents and breaches, including incident reports, playbooks, and other security-related documentation.

•Staying up to date with the latest security threats and trends and implementing the best security practices to mitigate risks.

•Develop SOPs (Standard Operating Procedures) and playbooks for different incidents. Improve incident response times, analysis of incidents, and overall, SOC functions.

•Ensure continuous improvement by suggesting and engaging in problem-solving activities to support teamwork.

•Ensures company-wide security the best practices and protocols to mitigate risk of data breach.

•Handle security incidents by collecting, analyzing, and preserving digital evidence, while ensuring incidents are properly tracked and recorded according to organizational SOC requirements.

•Train new analysts on how to perform network/host-based investigations and safely handle phishing emails.

TECHNICAL SKILLS

AWS, Azure, Google Cloud, BCP & DRP, PKI, Cisco Umbrella, Scripting. Database Querying Languages; MySQL, NOSQL/DynamoDB, Python, Windows Shell, Palo Alto Prisma, Cortex. Strong verbal comm. Palo BPA, Prisma. AWS Firewall, Control Tower concepts, Security Hub, Security Guardrails etc.

Gradle, Git, Docker, Ansible, Kubernetes, Bamboo, Slack, Nagios, Jenkins, Puppet.

Amazon Web Services (EC2, EBS, S3, IAM, AMI, VPC, VPC Peering, NACL, Security Groups, Route53, Auto Scaling Group, ELB, SNS, CloudWatch, Elastic Beanstalk, Cloud Formation) AWS CodeDeploy, AWS CodeCommit, AWS CodeBuild, AWS CodePipeline, Cloud Passage, F5, Barracuda Guardian Angel, Jira, Aviatrix, F5, Arista CVP / vEOS. Expedition, Guardrails Configuration

Operating Systems: Unix, RHEL (Red Hat Enterprise Linux) 6, 7, 8, Oracle Linux 5, 6, 7, 8, CentOS 6, 7, X86_X64 platform, MacOS, Windows-based systems, Google Cloud Platform (GCP), Microsoft Azure: Azure services, AWS (Amazon Web Services)

Database Management: Oracle Database 18c, Microsoft SQL Server 2000/05/08 Administration, Oracle Database: 9i/10g/11g/12C, 12C OEM, RAC, ASM,

Data Guard

Container Security: Kubernetes Security (EKS, AKS), Docker, Aqua Security, Prisma Cloud, Falco

Infrastructure as Code (IaC): Terraform, Cloud Formation, ARM Template

Networking: TCP/IP, UDP, HTTP, DHCP, SMTP, Linux Configuration, Firewall Setup, Gateway Configuration, Troubleshooting Network Connectivity, System

Security and Monitoring, LDAP, Active Directory

Security and Compliance: NIST 800 Series, FISMA, FIPS, Firewall Configuration, TCP/IP, VPN, SOC 2, PCI DSS, Nessus Vulnerability Scanning, LogRhythm, IBM

QRadar, AlienVault IDS/IPS

Monitoring and Analysis Tools: Splunk, Nagios

Web Technologies : Apache, Nginx, Tomcat, LDAP, NFS, DNS, HTTPS

Scripting: UNIX Shell (bash, sh)

Identity and Access Management: OKTA (AWS) SSO, RBAC, Least Privilege Access, MFA

EDUCATION AND CERTIFICATION.

University Of Yaoundé 2 Soa

Bachelor’s degree in computer science

CompTIA Security+

CERTIFICATION

AWS Solutions Architect – Associate

AWS Solutions Architect – Professional

Terraform Associate



Contact this candidate