Post Job Free
Sign in

Devops Engineer Infrastructure

Location:
Oviedo, FL
Posted:
June 18, 2025

Contact this candidate

Resume:

Minal Yawale

DevOps Engineer Cloud Engineer AWS Engineer

Phone: 407-***-**** Email: *****.*******@*****.*** Work Authorization: GC EAD Career Objective:

Overall, 6+ years of experience offering outstanding services in IT industry with strong background in Linux Administration, Build & Release, DevOps & AWS Cloud Infrastructure, and knowledge of different practices including but not limited to Configuration Management, Git, Mavens, Ansible, Chef, Puppet, Containerization, Continuous Integration and Continuous Delivery, Change Automation and Orchestration. Professional Summary:

Strong expertise in system administration and implementing DevOps tools like Ansible and Puppet for CI/CD workflows using Jenkins, Bamboo,Gitlab,Github actions and Maven on cloud infrastructures

(AWS, Azure) and VMware-based on-prem environments.

Proficient in administering and managing Red Hat Linux distributions and VMware vSphere ESXi/vCenter virtualization platforms.

Automated application deployment using Ansible and Jenkins, and built scalable, elastic cloud infrastructure on AWS/Azure.

Experienced with Kubernetes orchestration and Helm charts for managing reproducible builds and deployments.

Developed and deployed Kubernetes manifest files and Helm release pipelines for application lifecycle management.

Skilled in DevOps and Agile methodologies, including unit testing, build/release automation, and incident/change management.

Built Jenkins pipelines to automate microservices builds and deployments to Docker and Kubernetes environments.

Performed scalability benchmarking with MongoDB and other NoSQL databases.

Built CI/CD pipelines using Atlassian tools like Bitbucket, JIRA, Bamboo, and integrated collaboration with Confluence and Fisheye.

Managed AWS IAM policies to define user groups, roles, and enforce role-based access across cloud services.

Proficient in AWS services such as EC2, ECS, ECR, EBS, IAM, S3, ELB, RDS, VPC, Route 53, CloudFront, CloudWatch, Kinesis, KMS, Lambda, and CloudFormation.

Implemented application monitoring and alerting using Prometheus, Grafana, CloudWatch, and Log Insight.

Supported CI/CD automation for multiple scrum teams working with Java, AEM, Jenkins, Ant, Maven, Git, and SonarQube.

Created and managed AWS RDS instances with automated S3 backups to ensure high availability and fault tolerance.

Assigned RBAC policies for group/user level access and implemented automation solutions across services including Automation Accounts, Scheduler, Notification Hub, IoT Hubs, and Batch Services.

Used Git, GitHub, and GitLab in collaborative development environments. Assisted teams in branching strategy, naming conventions, and SVN-to-Git migrations.

Troubleshot and resolved Ansible playbook execution issues and configuration errors.

Used Chocolatey to package and deploy Windows applications, and managed deployment logic using Puppet Hiera with YAML modules.

Established end-to-end automation for build and deployment workflows using Jenkins and Bamboo, including cloud SDK integrations.

Ensured security and compliance by implementing controls aligned with ISO 27001, PCI-DSS, and HIPAA frameworks.

Strong communication, analytical, and mentoring skills with a continuous learning mindset and self- motivation.

Technical Skills:

Cloud Computing AWS (EC2, ECS, ECR, IAM, Elastic Beanstalk, and Elastic load balancer (ELB), S3, RDS, Glacier, Route 53, VPC, etc.), Azure DevOps Source Control Tool Git, GitHub, GitLab, Bitbucket, Subversion CI/CD Tools Jenkins, Bamboo, Ansible, Chef, Puppet, Docker, Terraform Repositories Nexus, Artifactory, Docker Hub

Languages Python Scripting, Perl Scripting, Shell Scripting, Java, Bash, Ruby Web Servers WebLogic, WebSphere, Apache Tomcat

Virtualization VMware, vSphere 5.0, 5.5

Tracking Tools Jira, Remedy, ServiceNow

Build Tools ANT, MAVEN, GRADLE

Databases Oracle, MS SQL Server, MySQL, MariaDB, Mongo DB, PostgreSQL Monitoring Tools Nagios, Cloud Watch, Splunk, Prometheus and Grafana, NewRelic Networking/Protocols DNS, TCP/IP/ FTP, HTTP, SSH, SFTP, SCP, SSL, ARP, DHCP, LDAP Operating Systems

Sun Solaris 7, 8, 9 & 10 Linux (Red Hat 5.x, 6.x,7. X, SUSE Linux 10), AIX VMware ESX, Windows NT/2000/2003/2012, Centos, Ubuntu. Certifications:

AWS Certified DevOps Engineer - Professional

CKA: Certified Kubernetes Administrator

Certified SAFe® 5 Scrum Master

PMI-Agile Certified Practitioner (PMI-ACP)

Oracle Database Administration 2019 Certified Professional (19c)

Oracle Cloud Infrastructure 2022 Foundations Associate Professional Experience:

Client: Examroom.AI, Lake Mary, FL Dec 2023 – Till now Role: Senior DevOps Engineer

Designed and deployed secure, scalable AWS and Azure infrastructure using Terraform, reducing provisioning time by 60%.

Developed reusable Terraform modules to standardize provisioning of VPC, IAM, ECS, ALB, EKS, clusters, and security groups across dev, staging, and prod environments.

Strengthened cloud security across AWS and Azure by implementing IAM policies, RBAC, AWS Security Hub, GuardDuty, Inspector, and KMS encryption; integrated Azure Defender, Microsoft Sentinel, Key Vault, and Azure Policy for unified threat detection, access control, and compliance enforcement.

Built and maintained CI/CD pipelines using GitLab, Jenkins, and Azure DevOps, supporting blue-green and canary deployments.

Deployed containerized applications with Docker, ECS Fargate, EKS, AKS and Kubernetes.

Adopted serverless architecture patterns using AWS Lambda, API Gateway, and DynamoDB, improving agility and lowering infrastructure overhead.

Implemented high-availability architectures using EC2, ELB, and Auto Scaling for compute; EBS for storage; and VPC and CloudFront for network optimization.

Enabled infrastructure observability and performance monitoring using Prometheus, Grafana, New Relic, Splunk APM, SolarWinds, and BetterStack.

Integrated SonarQube, SAST, DAST, ReSharper, Gitleaks, and Nmap into GitLab CI pipelines for comprehensive DevSecOps enforcement.

Collaborated with security teams to implement OWASP and CIS-aligned configurations, code scanning, and secrets detection in AWS and Azure environments.

Managed Azure networking, virtual machines, and Application Gateway integration for hybrid cloud workloads.

Worked with penetration testing teams to identify and remediate application vulnerabilities across the SDLC.

Optimized AWS RDS (PostgreSQL & MSSQL) using Performance Insights for availability and utilization improvements.

Developed Ansible playbooks and roles for provisioning, system hardening, and configuration management.

Installed and managed Ansible Tower, configuring user access and automation workflows.

Created custom automation scripts using Shell, Bash, Python, Perl, and Ruby.

Managed Jira for sprint planning, release coordination, and issue tracking.

Oversaw Git branching strategies and source control practices using Git.

Participated in infrastructure design discussions for deployment, scaling, and monitoring alignment.

Migrated on-premises applications to AWS, focusing on performance, scalability, and security.

Managed Atlassian tools (Jira, Confluence, Bitbucket) across Dev,staging and Prod to support client DevOps environments.

Mentored junior DevOps engineers on Terraform, Git workflows, and CI/CD troubleshooting best practices.

Designed and managed fine-grained IAM roles and policies for AWS Glue and S3 access, enforcing least- privilege principles across ETL pipelines.

Integrated AWS Glue with Amazon S3, Athena, and Redshift Spectrum to enable federated query and reporting workflows.

Participated in disaster recovery planning and testing to ensure system resilience.

Improved deployment velocity and microservice observability using TrueFoundry. Environment: Linux (RHEL 6.x/7), AWS, Ansible, Kubernetes, Terraform, Azure, Jenkins, Maven, WebLogic 11/12, WebSphere 8.5.5, MongoDB, MySQL, Shell Scripting, Python, Git, Maven, Bamboo, VMware ESX 2.x & 3.x.

Client: Unisys, Blue bell, PA Jan 2021- Nov 2023

Role: Cloud DevOps Engineer

Responsibilities:

Created AWS Cloud Formation templates to create custom-sized VPC, Subnets, EC2 instances, ELB, Security Groups. Worked on tagging standard for proper identification and ownership of EC2 instances and other AWS Services like CloudFront, CloudWatch, RDS, ELB, EBS, S3, Route53, SNS, SQS, KMS, CloudTrail.

Created AWSRoute53 to route traffic between different regions and configure AWS IAM and Security Groups in Public and Private Subnets in VPC.

Building/Maintaining Docker container clusters managed by Kubernetes Linux, Bash, GIT, Docker, on AWS cloud.

Involved in end-to-end migration plan for migrating 1200 Linux/Windows servers and 25 applications into the AWS cloud using AWS Data Pipeline.

Utilized Kubernetes and Docker for the runtime environment of the CI/CD system to build, test and deploy.

Migrated several Java Batch Applications and Services from the On-premises infrastructure to AWS Cloud and Migrated the Java REST API built on the Drop Wizard framework to AWS cloud platform.

Designed User Defined Routes with custom route tables for specific cases to force tunneling to the Internet via On-premises network and control use of virtual appliances in the customer& Azure environment.

Used Kubernetes to deploy scale, load balance, scale and manage Docker containers with multiple namespace versions.

Used AWS Beanstalk for deploying and scaling web applications and services developed with Java, Python, Ruby.

Worked on Terraform for automating VPCs, EKS, ECS, ELBs, security groups, SQS queues, S3 buckets, CloudFront and continuing to replace the rest of our infrastructure. Using Terraform as a tool, managed different infrastructure resources Cloud, VMware, Bare Metal Servers, and Docker containers.

Written Terraform templates, Chef cookbooks pushed them onto Chef for configuring EC2 Instances and Solved Gateway time issue on ELB and moved all the logs to S3 Bucket by using Terraform.

Skilled in monitoring servers using CloudWatch, Prometheus and Grafana

Experienced is using Tomcat, WebLogic, and WebSphere Application servers for deployments.

Involved in integrating the GIT into the Puppet to ensure the integrity of applications by creating Production, Development, Test, and Release Branches.

Involved in writing Chef Cookbooks and Recipes to automate the deployment process and to integrating Chef Cookbooks into Jenkins jobs for CD framework.

Used Microservices architecture, with Spring Boot based services interacting through a combination of REST and Spring Boot.

Developed Perl and shell scripts for automation of the build and release process, developed Custom Scripts to monitor repositories, Server storage.

Environment: AWS (EC2, ECS, EKS, S3, ELB, Autoscaling Servers, SNS, SQS, Route53, CloudWatch, CloudFront, IAM), Azure, Kubernetes, Docker, Ansible Tower, Jenkins, ANT, MAVEN, Nagios, Ruby, YAML, Terraform, PowerShell, Git, GitLab, Subversion, JIRA, Artifactory, Oracle, MySQL, MSSQL Server, MongoDB Client: Anthem, Indianapolis, IN Feb 2019– Dec 2020 Role: AWS DevOps Engineer

Responsibilities:

Involved in Migration of on-premises data center applications to AWS.

Worked with Amazon IAM console to create custom users and groups. Launched Various AWS EC2 instances with different instance types on various Subnets and S3buckets CLI tools.

Experienced on Migration of on-premises data to AWS RDS - MS SQL server and database.

Experienced in configuring the CloudWatch service for monitoring various AWS services.

Set up the scripts for creation of new snapshots and deletion of old snapshots in AWS S3.

Adding bucket notification configuration that identifies the event in Amazon S3 to publish and lambda function to invoke.

Setup Docker to automate container deployment through Jenkins and Dealt with Docker Hub, making Docker Images and taking care of various Images essentially for middleware establishments.

Expert on setting up the new repos, managing the permissions for various Bitbucket branches.

Worked on creating the Python scripts for the Bitbucket Pre-push and SVN Commit hooks.

Worked on Nexus repository to maintain artifacts and used as a local repository.

Server level Configuration Management via Ansible.

Expertise in Configuration of Ansible Tower, which provides a dashboard and role-based access control, so that it's easier to allow individual teams access to use Ansible for their deployments.

Wrote Ansible Playbooks with YAML to automate infrastructure administration (infrastructure as code) and deployment automation. Created Playbooks to install and configure required packages to setup the environments.

Worked with Agile practices using CI/CD pipelines, with Jenkins (Continuous Integration), Nexus for Maven Repository, Maven Builds, Artifactory, Junit testing, Puppet module tests and deployments using multiple Jenkins plugins.

Developed CI/CD system with Jenkins on Google's Kubernetes container environment, utilizing Kubernetes and Docker for the runtime environment for the CI/CD system to build and test and deploy.

Involved in Configuring, automation and maintaining build and deployment CI/CD tools Git/GitLab, Jenkins, Bit Bucket, Docker registry/daemon, Kubernetes, Nexus, and JIRA for Multi-Environment.

Managed all the bugs and changes into a production environment using the Jira tracking tool. Environments: AWS resources (EC2, S3, IAM, RDS, DynamoDB, SQS, SNS code pipeline and code deploy) Bamboo, Bitbucket, Kubernetes, Chef, Artifactory, Ruby, Shell, Bash, Jira, AppDynamics. Key Achievements:

Led cost optimization efforts across all clients, saving up to 25% by leveraging reserved instances, S3 lifecycle policies, and right-sizing EC2 workloads.

Standardized Terraform and CI/CD pipelines across projects, reducing deployment times by 60% and improving environment consistency.

Strengthened cloud security posture with IAM/RBAC, Security Center, GuardDuty, and automated compliance checks (AWS Config, Azure Policy).

Mentored and upskilled junior DevOps engineers, improving team efficiency and reducing onboarding time with detailed runbooks and diagrams.

Improved MTTR by 35% through end-to-end observability solutions using Prometheus, Grafana, CloudWatch, Azure Monitor, and New Relic.

Delivered highly available, scalable microservices deployments using ECS, EKS, and AKS with automated rollouts and rollback strategies.

Education:

Bachelor in computer Science, Amravati University



Contact this candidate