Rohit Kudumulla
*******@*****.*** 512-***-****
www.linkedin.com/in/rohitkudumulla
Professional Summary:
A Sr. DevOps Engineer with more than 10+ Years of experience and expertise in DevOps/Cloud Engineer operations in designing and implementing cloud and microservice deployments. Expertise in Automation, Build and Release Management, and Software Configuration Management with best practices of Software Development Life Cycle (SDLC) and exposure to Agile, Scrum, and waterfall methodologies.
• Proficient with the principles and best practices of Software development life cycle (SDLC) including requirement analysis, design specification, coding, and testing of applications with industry-standard methodologies such as Agile, Scrum, Kanban, and Waterfall on server-side deployments and middleware layers.
• Expertise in building and supporting major cloud platforms (AWS, Azure, and GCP) using cloud technologies such as Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS).
• Astute in designing, deploying, and managing complex AWS infrastructures using services such as EC2, IAM, VPC, CloudFormation, ELB, S3, Lambda, RDS, EBS, Elastic Beanstalk, EKS, ECS, SNS, SQS, and Route53.
• Experienced in managing Identity and Access Management (IAM) policies management for organizations in AWS to define groups, create users, assign roles, and define rules for role-based access to AWS resources.
• Hands-on experience with AWS DevOps tools including CodePipeline, CodeBuild, CodeDeploy, and CodeCommit for CI/CD. Also, created alarms and trigger points in Cloud Watch based on thresholds and monitored logs via metric filters.
• Expertise in Architecting and Implementing Azure Service Offering, such as Azure VMs, Azure Storage Account, Azure IAM, ARM, AKS, MySQL Database, App Services, ADF, Front Door, Key Vaults, Cloudflare, App Gateway and Eventhubs.
• Experience in Application registration using Azure Active Directory to create Service Principal connections between Azure DevOps and Azure Cloud for linking the web app services to make deployments.
• Meticulously worked on Google Cloud Platform (GCP) Services like Compute Engine, Cloud Functions, Container Security, App Engine, Knative, Cloud storage, Persistent Disk, Google Kubernetes Engine(GKE), Container Registry, etc.
• Experience in migrating the Legacy application into the GCP platform and managing the GCP services such as Compute Engine, cloud storage, BigQuery, VPC, Stack Driver, Cloud Datastore, Load Balancing, and IAM.
• Developed and maintained Terraform modules and configurations to provision, configure, and deploy infrastructure resources in cloud environments like Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
• Worked on Application Containerization technology Docker, creating Docker images, Containers, Docker Registry to store images, cloud-based registry Docker Hub, and Docker Swarm to manage containers.
• Experience in using Docker and Kubernetes to deploy basic containers using Docker images, Docker Hub, and stored images in Docker registries, and Kubernetes to orchestrate Docker containers by creating pods and clusters.
• Developed and implemented Kubernetes manifests, and helm charts for deployment of microservices into k8s clusters.
• Proficiency in creating Ansible Playbooks and encrypted the data using Ansible Vault and maintained role-based access control by using Ansible Tower to manage web applications, Environment’s configuration files.
• Proficient in deploying and configuring Chef Server, including bootstrapping Chef Client nodes for provisioning, creating roles, recipes, cookbooks, and configuring the server database for optimal server performance.
• Created Chef roles for application deployment and management, implemented Chef for application and infrastructure monitoring and alerting, and Used Chef for automating network device configuration and management.
• Experience with Puppet environments and roles for managing configuration profiles. Worked with Puppet for infrastructure testing and validation using tools such as Puppet Labs' Beaker.
• Proficient in using various CI/CD tools in a DevOps environment, such as Jenkins, Github Actions, GitLab CI/CD, Travis CI, CircleCI, Bamboo, Azure DevOps, Flux CD, Octopus Deploy, UDeploy, and TeamCity.
• Experienced in implementing and managing Jenkins-based CI/CD pipelines for cloud infrastructure, including AWS, Azure, and Google Cloud, enabling efficient and reliable deployment and management of cloud-based infrastructure.
• Proficiency in developing the Pom.xml, Gradle.xml, and Build.xml files for Maven, Gradle, and ANT projects by integrating with the CI dashboard and managing the Nexus and JFrog artifactory for build artifacts.
• Experienced in branching, tagging, merging, and maintaining the version across the environments using SCM tools like Subversion (SVN), CVS, Mercurial, ClearCase, Perforce, Team Foundation Server (TFS), and GIT Windows environment.
• Experienced Site Reliability Engineer (SRE) specializing in cloud security, compliance automation, and policy enforcement across Azure and Prisma Cloud, Proficient in identifying and remediating misconfigurations using Prisma Cloud Security Posture Management (CSPM) and Azure Policy, reducing security vulnerabilities.
• Development trends, adapting Copilot updates and new features to continuously improve workflow efficiency.
• Integrated Copilot into CI/CD pipelines, ensuring automated code reviews, pull request optimizations, and seamless deployment cycles.
• Worked with several monitoring tools such as Nagios, Prometheus, Prisma Security, SolarWinds, AppDynamics, Dynatrace, New Relic, Splunk, Cloudwatch, and ELK Stack, which includes configuring, troubleshooting, and analyzing the performance of various systems and applications to ensure their availability and reliability.
• Demonstrated expertise in cloud security and cost optimization by interpreting CloudGuru test results and implementing remediation strategies based on detailed CLI output. Conducted automated cloud resource audits using CloudGuru.
• Hands-on experience in installing, configuring, managing, upgrading, migrating, monitoring, and troubleshooting MySQL, SQL Server, and Oracle databases. Also, experience migrating Oracle, and SQL Server instances to AWS Cloud.
• Skilled with Python, Bash/Shell, PowerShell, Ruby, Perl, Go Lang, JSON, YAML, and Groovy. Developed Shell and Python Scripts to automate day-to-day administrative tasks & automation of the build and release.
• Expertise in server installation, configuration, application deployment, and maintenance for various servers including BEA WebLogic 9, 10, 11, JBOSS, Apache Tomcat server, and Apache HTTP server.
• Experienced in using Bug tracking tools like Jira, Bugzilla, Remedy, Azure Boards, and ServiceNow to track all issues related to the software development lifecycle.
Technical skills:
AWS Cloud Services EC2, VPC, S3, Route53, SNS, IAM, CloudFront, EBS, ELB, ECS, EKS, Lambda, CloudFormation, CloudFront, CloudWatch, Redshift, RDS, Elastic Beanstalk. Microsoft Azure Active Directory, ARM, App Service, AKS, ACR, Storage Account, Azure SQL, Bicep Azure monitor, Azure Functions, Cosmos DB, VNET, Frontdoor App gateway etc. Google Cloud Platform Compute Engine, Cloud Functions, BigQuery, GCR, GKE, Data Proc, DataFlow, App Engine, Knative, Cloud storage, Cloud Datastore, etc. CI/CD Tools Jenkins, Github Actions, Bamboo, Teamcity, GitLab CI, Travis CI, CircleCI, Azure DevOps, Flux CD, Octopus Deploy, UDeploy.
Artifact Repository Management Tools JFrog, Nexus, Azure Artifacts, GitHub Packages. Build Automation Tools Maven, ANT, Gradle, CodeBuild Code coverage and security SonarQube, Jacoco, Veracode Configuration Management Tools Chef, Puppet, Ansible. Containerization and Orchestration Tools Docker, Kubernetes, EKS, GKE, AKS, LXC. Bug Tracking Tools JIRA, Azure Boards, ClearQuest, CodeQuest. Monitoring Tools Splunk, Kafka messaging tool, Nagios, CloudWatch, Dynatrace, New Re Prometheus, Grafana, Datadog.
Version Control Tools GIT, Subversion, GitHub, GitLab, CodeCommit, Bitbucket. IaC Tools Terraform, CloudFormation, Deployment Manager, ARM Scripting & Programming Languages PowerShell, Python, JavaScript, Shell, Angular, Groovy, GO, Ruby, Yaml, Java. Web Servers Tomcat, WebLogic, Nginx, WebSphere, Solaris Operating systems Windows, Linux OS, Unix, Android, Ubuntu, macOS Databases MySQL, SQL, PostgreSQL, MongoDB, Cassandra. Work Experience
Sr. DevOps Engineer/SRE
Optum, Eden Prairie, MN. August 2023 – Present
Serving as a Sr. DevOps Engineer in Optum, focused on streamlining the deployment lifecycle by designing and implementing robust CI/CD pipelines using Terraform, GitHub Actions, and Ansible. Automated infrastructure provisioning and application deployments across AWS and Azure cloud to enhance productivity, ensure security, and improve operational efficiency for engineering teams. By collaborating closely with data engineering teams, I ensure infrastructure and tool align with the project requirements, promoting a seamless and productive development experience. Responsibilities:
• Designed and implemented Azure infrastructure solutions using Terraform templates and configured Azure resources such as VNETs, subnets, NSG, VMs, Route tables, Storage Accounts, MySQL Flexible and load balancers.
• Developed Infrastructure on AWS for various environments like dev, uat, non-prod and prod from scratch using resources like VPC, Route Tables, Private and Public Subnets, NACL, Security Groups, Route 53.
• Worked with AWS security tools and services: AWS Security Model, IAM (Identity Access Management), ACM
(Amazon Certificate Manager), Security Groups, Network ACLs, Encryption, MFA (Multifactor Authentication) to improve manageability, provisioning, information security and privacy.
• Developed reusable, parameterized Terraform modules (hosted in a central GitHub repository) for consistent provisioning of Azure resources such as App Services, Storage Accounts, Key Vaults, ADF, Application Gateways, AKS, and Databricks, supporting both non-prod, and prod environments via environment-specific variable files.
• Enabled DevOps and Github Actions workflows by integrating Terraform with CI/CD pipelines, using GitHub as the source of truth for infrastructure modules and configuration, and automating infrastructure changes with PR and approvals. Adopted Azure Policy and Defender for Cloud to enforce compliance across all deployed resources.
• Automated deployment and management of AKS clusters using Terraform, implementing AAD RBAC, MI, and secure networking. Integrated AKS with Log Analytics, and ACR for scalable, secure, and compliant container orchestration.
• Wrote Terraform Templates and Modules for various resources on AWS and stored the state files on AWS S3 buckets and used HashiCorp Vault to store the credentials of various environments.
• Automated deployment of containerized applications by integrating Docker images with Azure App Services, leveraging ACR for secure image storage and seamless CI/CD workflows using Terraform-based IAC.
• Configured managed private endpoints and virtual network integration in Azure Data Factory to ensure secure, private connectivity to Azure resources such as Storage Accounts, Key Vaults, and Databricks.
• Deployed containerized applications using Docker onto Kubernetes clusters which are managed by AWS Elastic Kubernetes Service (EKS), and used Kubectl to manage Kubernetes infrastructure.
• Worked with Docker to pull images from AWS ECS, run containers based on an image, create Docker files to manage customized containers, expose a container with port redirect, container volume management, docker inspect, docker commit to capture the file changes into a new image, and push the image to ECS.
• Conducted compliance audits using Prisma Cloud and Azure Policy with the team, Identified and remediated misconfigurations in cloud environments, reducing security vulnerabilities and improving compliance posture.
• Developed and maintained Ansible playbooks and roles for application deployment, patch management, and system hardening, ensuring compliance with organizational and security standards.
• Used Ansible Tower, which provides an easy-to-use dashboard and role-based access control, so that it's easier to allow individual teams access to use Ansible for their deployments.
• Automated pre- and post-deployment tasks (e.g., resource lock management, compliance checks, and notifications) using custom GitHub Actions jobs and Azure CLI scripts, ensuring governance and operational consistency.
• Created a Python process hosted on Elastic Beanstalk to load the AWS Redshift database daily from several source systems, including FTP and SFTP servers and an Oracle database.
• Automated Kubernetes resource provisioning and updates by integrating Flux with Azure Repos and GitHub, reducing manual intervention and deployment errors. Monitored and troubleshooted Flux controllers and AKS cluster health.
• Implemented branch protection rules, pull request workflows, and code review processes in GitHub to enforce code quality, peer review, and compliance before merging changes to main branches.
• Integrated Azure resources with Splunk for centralized logging by configuring diagnostic settings to stream logs and metrics from AKS, Databricks, ACR, Web apps, Function apps, MySQL flex servers, and Storage Accounts to Azure Event Hub, enabling real-time ingestion into Splunk for advanced analytics and monitoring.
• Developed and maintained alerting policies and escalation procedures to ensure timely incident response and utilized Grafana features like annotations and overlays to correlate metrics with application deployments.
• Created and maintained best practices for AI-assisted coding, defining code style conventions, security protocols, and documentation standards to improve adoption using GitHub copilot.
• Led problem solving efforts to troubleshoot cloud security vulnerabilities, enforcing Azure Policy, AWS IAM, and Prisma Cloud best practices to ensure compliance.
• Automated deployment and configuration of MySQL and MySQL Flexible Servers on Azure using IAC, implementing best practices for security, high availability, backup retention, and SSL enforcement across Prod and Non-Prod.
• Implemented RBAC role assignments and managed identities for Web Apps and Function Apps, enabling secure access to Azure resources such as Key Vaults and Storage Accounts, and enforcing least-privilege access across environments.
• Automated deployment and configuration of Application Gateway using Terraform, Integrated autoscaling and zone redundancy for App gateway, ensuring high availability, and cost optimization based on dynamic traffic patterns.
• Automated end-to-end workflows such as database dumps, file compression, and uploads to cloud storage using a combination of Python scripting and shell commands within containerized environments.
• Developed automation scripts in Python and Bash to orchestrate cloud resource provisioning, database backup/restore, and data movement tasks, improving operational efficiency and reducing manual intervention.
• Collaborated with engineering teams to refine Copilot’s accuracy, leveraging machine learning insights, NLP techniques, and performance monitoring for model optimization.
• Collaborated with global teams across time zones, leveraging tools like Microsoft Teams, Slack, and GitHub to maintain seamless communication and project momentum.
• Monitored and remediated compliance violations using Microsoft Defender for Cloud and Prisma Cloud alerts, proactively addressing security gaps and enhancing cloud security posture.
• Optimized Azure Policy definitions and Prisma Cloud configurations to enforce compliance, strengthen access controls, and mitigate vulnerabilities across cloud environments.
• Created and managed detailed user stories, tasks, plan estimation, tags and acceptance criteria in Rally, ensuring traceability to features and initiatives for better stakeholder visibility.
• Leveraged GitHub Copilot to accelerate DevOps automation by generating, reviewing, and optimizing scripts and workflows for CI/CD pipelines, infrastructure as code, and cloud operations, resulting in increased productivity, reduced manual errors, and faster delivery of robust automation solutions. Environment: AWS, Azure, Terraform, Docker, Kubernetes, Azure defender, Prisma cloud, App services, Storage accounts, MySQL Database servers, AWS Redshift, Helm, Ansible, Github Actions, Copilot, Git, Python, Java, .Net, JavaScript, Kafka, PowerShell, Maven, Golang, SQL, VM, VLAN, Firewall, Linux Servers, RHEL, SonarQube, Nexus, Rally, ServiceNow etc. Sr. Cloud DevOps Engineer
Bank of the West, San Ramon, CA. February 2022 – August 2023 Bank of the West is now part of the BMO family. BMO offers a broad range of financial services to help customers achieve real financial progress. As a DevOps Cloud engineer being a part of the Investments Services team, I am responsible to provide and support the cloud architecture for various Microservices in the application. So, the customers can get seamless and uninterrupted services.
Responsibilities:
• Configured and managed various AWS IaaS offerings including EC2 instance creations using AMIs in a VPC, RDS, S3 buckets, Glacier, CloudWatch, CloudTrail, CloudFormation, Auto scaling, ELB, CloudFront, SQS, SNS, and Route 53.
• Designed roles and policies for new users using AWS Identity and Access Management (IAM) and utilized special Security groups, IAM roles, and edited policies for Developer and Production users to manage access to resources.
• Developed Terraform modules for various AWS services and maintained them in GitHub as a source control repository for IaaS automation.
• Worked in the Billing and Payments team to set up live alert systems using messaging queue tools such as Kafka, as well as providing streams API for real-time and Connectors API for easy integration within AWS.
• Manage Azure Infrastructure with Web roles, Worker roles, VM, Azure SQL, Azure Storage, Azure AD Licenses, VM Backup, and recovery from recovery services vault using Azure PowerShell and Azure portal.
• Create, validate, and review solutions and effort estimates of converting existing workloads from classic to Azure ARM-based Cloud Environment. Design the data model and creation the schema on SQL Azure.
• Automated role assignments for Azure Storage accounts, including Contributor, Storage Blob Data Owner, and Storage Account Contributor roles, ensuring proper access control.
• Configured Azure VNets, subnets, DHCP address blocks, network settings, DNS, security policies, routing and deployed Azure IaaS VMs and cloud services (PaaS role instances) into secure VNets and subnets.
• Automated previously manually launched instances using Terraform scripts. Also wrote terraform scripts from scratch for building Dev, Staging, UAT, Prod, and DR environments.
• Extensively used Docker for containerization, running, shipping, and deploying the application securely to speed up the build and release processes and automated Docker image builds by creating Dockerfiles.
• Built and Maintained Docker container clusters using Kubernetes, Linux, Bash, GIT, and Docker, using Kubespray. Utilized Kubernetes and Docker for the runtime environment of the CI/CD system to build, and test deploy.
• Designed and implemented automated process of build and deployment for various .Net and Java applications using various tools as per the needs of projects which includes TFS, Jenkins and Anthillpro.
• Created and maintained Kubernetes objects such as Deployments, Services, and ConfigMaps, ensuring efficient, reliable application deployment and management and also manage Kubernetes upgrades.
• Developed and Managed Kubernetes charts using Helm, Created reproducible builds of the Kubernetes applications, managed Kubernetes deployment and service files, and managed releases of Helm packages.
• Used Ansible for configuration management of servers, applications, and services. This includes defining and maintaining the desired state of the system and ensuring that configurations are consistent across all environments.
• Designed, implemented, and maintained CI/CD pipelines to automate the build, test, debug, and deployment process of software applications using tools like Jenkins and maintained and updated existing Jenkins plugins.
• Integrated Jenkins with GitHub and various plugins like SonarQube for source code analysis and Maven for building the applications to .jar and .war files, pushed and maintained the built artifacts in Nexus artifactory.
• Designed, built, maintained, and supported the Apigee infrastructure, also Implemented routing rules and validation policies in Apigee, and was involved in creating different Apigee API documents as part of the project requirements.
• Manage source code in Git, including creating branches, merging code, and resolving conflicts. Manage source code repositories, ensuring that code changes are tracked, versioned, and audited using tools like Git.
• Designed Splunk dashboards, reports, and alerts for real-time log monitoring and analytics. Configured Splunk with forwarder configuration, deployment, search heads, indexing, and data source configurations for log monitoring.
• Installed VMware, vSphere Server and VMware vCenter server in rack servers and maintained VMware servers with multiple virtual machines, running a multi-VLAN physical, F5 load balancing, and VM environment.
• Supported large-scale web applications, indexed database queries using MySQL server by writing SQL queries and set- up MongoDB client and wrote queries to validate data against Mongo Collections, MySQL.
• Developed and maintained storage on Linux servers, including partition management and RAID configuration. Develop and maintain security on Linux servers including configuring firewalls and managing user access.
• Used PowerShell, JavaScript and Python to troubleshoot issues that arise in the environment, including diagnosing issues with application performance, system stability, and network connectivity.
• Worked on JIRA project configuration and customization using Issue Schemes, Workflow Schemes, Field Configuration Schemes, Screen Schemes, Permission Schemes, and Notification Schemes. Environment: AWS, Azure, Terraform, Docker, Kubernetes, Helm, Ansible, Jenkins, New Relic, Bitbucket, GitHub, Shell, Python, Java, .Net, JavaScript, Kafka, PowerShell, Maven, AppDynamics, Rabbit MQ, Golang, SQL, VM, VLAN, Firewall, Linux Servers, RHEL, SonarQube, Nexus, Jira, etc.
DevOps Engineer/ Site Reliability Engineer (SRE)
Deloitte, Mechanicsburg, PA. January 2021 – Feb 2022 Deloitte is a multinational professional services firm that provides consulting, audit, tax, and advisory services to a wide range of clients, including corporations, governments, and non-profit organizations. As a member of Cloud platform team, my responsibilities are on the Migration project of the entire on-premises infrastructure including Linux servers, MySQL databases, application servers, and other modules of software development to a cloud platform. Responsibilities:
• Migrated on-premises Infrastructure to Cloud using Rehost “lift and shift” methodology and developed Continuous Integration pipeline using Jenkins to deploy a multitude of applications utilizing the AWS services including VPC, EC2, S3, RDS, and IAM, Elastic load balancing, Auto Scaling.
• Configured and managed Google Cloud Platform (GCP) services including Compute Engine, Cloud Load Balancing, Cloud Storage, Cloud SQL, Cloud Functions, BigQuery, GCR, GKE, Cloud Operations Suite and etc.
• Leveraged GCP cloud services such as Compute, auto-scaling, and VPC to build secure, highly scalable, and flexible systems that handled expected and unexpected load bursts.
• Automated the infrastructure in Google Cloud by using Deployment Manager templates for various services in GCP.
• Set up GCP Firewall rules to allow or deny traffic to and from the VM's instances based on configuration and used GCP cloud CDN to deliver content from GCP cache locations, significantly improving user experience and latency.
• Designed AWS CloudFormation templates to create custom-sized VPCs, set up IAM policies, configure subnets, NAT, and security groups to ensure successful deployment of Web applications, database templates and Security groups.
• Worked on Docker Hub, created Docker images, and handled multiple images primarily for middleware installations and domain configuration. Created Linux containers in CoreOS and Docker and Automated system using Chef.
• Used Jenkins pipelines to drive all microservices builds out to the Docker registry and then deployed to Kubernetes, Created Pods and managed using Kubernetes. Deployed the pods in Kubernetes cluster in corresponding namespace.
• Experienced in Kubernetes to deploy scale, load balance and manage Docker containers with multiple name-spaced versions and Worked on OpenShift Platform in managing Docker Containers and Kubernetes Clusters.
• Development and Automation for Deploying Containers, Applications, and Provisioning Public Cloud Environments with Terraform, Docker, and Kubernetes.
• Developed Chef Recipes to configure, deploy and maintain software components of the existing infrastructure. Used existing cookbooks from Chef Marketplace and customized the recipes with respect to each VM.
• Developed custom Jenkins pipelines with Bash scripts leveraging the AWS CLI to automate infrastructure provisioning. Initiated and troubleshot Continuous Delivery builds in Jenkins via JIRA tickets.
• Set up Continuous Integration with Jenkins and make use of a wide range of plugins available to set up smooth developer friendly workflows. Regular build jobs are initiated using the continuous integration tool with Jenkins.
• Set up and configured a Maven build environment that is consistent and repeatable across development, testing, and production environments. Integrating Maven with other tools in the DevOps toolchain such as source code.
• Integrate SCM Perforce tool for automated deployment, continuous integrations, and HPQC track change history lifecycle, release dashboard, and define in environments swim-lane for support multiple projects and releases.
• Used Elasticsearch for powering not only Search but using ELK stack for logging and monitoring our systems end to end Using Beats. Responsible for designing and deploying new ELK clusters (Elasticsearch, Kibana, Kafka, etc.)
• Configured Nagios for proactive infrastructure monitoring and automated issue resolution using event handlers and worked on Nagios Event handlers in case of automatic restart of failed applications and services.
• Migrated Oracle Databases from on-premises to AWS RDS - Oracle, Postgres, MySQL. Migrating existing on-premises applications to AWS from end to end - Web/app servers, databases, load balancer, etc.
• Worked on the deployment of applications on Apache Webserver, Nginx, and Application Servers such as Tomcat, and JBoss. Maintained and Support of production environments deployed on WebSphere and Tomcat Applications.
• Improve speed, efficiency, and scalability of the continuous integration environment, automating wherever possible using Python, Golang, Ruby, Shell, and PowerShell Scripts.
• Configured Jira to manage issue tracking, prioritize tasks, and integrate with Jenkins for automated updates and integrated Jira with Jenkins so that Jenkins will automatically update Jira issues with build and deployment information.
Environment: AWS, GCP, GKE, Docker, Kubernetes, Terraform, Chef, Jenkins, Nagios, Git, Perforce, Shell, Python, PowerShell, Maven, SQL, VM, VLAN, Firewall, Perforce, Linux, WebSphere, Tomcat, Golang, RHEL, SonarQube, Nexus, ServiceNow, Jira, etc.
DevOps Associate
Fossil Group Inc., Hyderabad, India Oct 2015 – Nov 2020 Fossil Group, Inc. is a global design, marketing, distribution, and innovation company. As a DevOps Associate, my responsibility was supporting the software development team by ensuring that the software development lifecycle runs smoothly and automating and managing the software build, test, and release processes. Responsibilities:
• Defined AWS Security Groups which acted as virtual firewalls that controlled the traffic allowed to reach one or more AWS EC2 instances. Worked on AWS cloud services like EC2, S3, RDS, ELB, EBS, VPC, and Route53.
• Written Templates for AWS infrastructure as a code using Terraform to build staging and production environments. Defined Terraform modules such as Compute, Network, Operations, and Users to reuse in different environments.
• Design and develop a continuous deployment pipeline integrating Vagrant, Git, and Jenkins across geographically separated hosting zones in AWS.
• Worked on Azure Cloud Services (PaaS & IaaS), Storage, Web Apps, Active Directory, Azure Container Service, AKS, API Management, VPN Gateway, Content Delivery Management, Traffic Manager, Azure Monitoring, OMS, Key Vault, Cognitive Services, and SQL Azure.
• Managed Azure Infrastructure Azure Web Roles, Worker Roles, VM, Azure SQL, Azure Storage, Azure AD Licenses, Virtual Machine Backup and Recover from a Recovery Services Vault using Azure PowerShell and Azure Portal.
• Experience with IaC tools like Azure Resource Manager templates and Terraform to manage infrastructure as code. Also Implemented Terraform modules for the deployment of applications across multiple cloud providers.
• Used Kubernetes to deploy, scale, load balance, and manage Docker containers. Also Worked on Kubernetes networking concepts, including network policies, services, endpoints, and load