GENE OLOT
****.****@*****.***
ATLANTA, GA 30328 Atlanta
Phone: 404-***-****
SUMMARY:
Results-driven Scrum Master with extensive experience in Agile methodologies, cloud engineering, and DevOps/UAT testing. Adept at aligning business goals with technology solutions to optimize efficiency and enhance product delivery. Proven expertise in cloud engineering, data analytics, SAFe, and system automation within the financial, healthcare, and technology sectors. Strong leader in orchestrating cross-functional teams and fostering a culture of innovation.
Skill Set
Team Scrum development; project turnaround; sprint planning and backlog refinement; facilitation; business backlog management; VersionOne; Jira/Confluence; Aha!; AWS; Google Communication Suite; Azure Pipelines (formerly VSTS); MS ADF; Databricks; Google Kubernetes Engine; Miro; multi-cloud; Looker Studio; Google Analytics; BigQuery; Java; hybrid and multi-cloud deployments; network topologies.
●Hybrid and multi-cloud patterns and practices
●Hybrid and multi-cloud architecture patterns
●Hybrid and multi-cloud network topologies / ADF / Databricks / Google BigQuery / project team recovery methods
●Full cadence facilitation as a Scrum Lead: planning, refinement, design, rework, daily sync-ups, and retrospectives
●Analytics: Snowflake, Jira, Java, Confluence, Ansible, DevOps, OGG (Oracle GoldenGate)
●RAG LLM, Epic AI story development
●SQL Server, DB2 SQL, UDB, synthesis architecture, web services, Spring Boot, Hadoop 3, Java
●ADO Azure DevOps / Azure Kubernetes Service (AKS), Kerberos, Java, Spring Boot, Pega, NiFi, Solr, analytics, predictive analytics, JQL, BDL, Jira reports, prescriptive analytics, automated real-time visualization
●SAFe 6.0 configuration; ETL; Oracle backend; FAA clearance; Databricks; AWS Tower; API management; scaled Agile web-services development; Maven; TestNG; SoapUI Pro v5.0; Java 8; MongoDB; Groovy; JBehave; JUnit 4.1; Oracle Exadata 12c RDBMS; IntelliJ IDEA; Selenium Grid; Jira; HP QTP/UFT test suite
●Python; micro- and local automation framework in C#; MS TFS; MS SharePoint; Oracle; SAP; PeopleSoft; CircuitCAM; Aegis; TSO; Mainframe; CICS; image-recognition audit in Java; diagnostics; StreamSets Data Collector/DataHub; automated real-time visualization; SAFe configuration; Agile release trains and suppliers; Abarca; CVS ADT file analytics in pharmaceutical sales, prescription, hospital process, and medical history AI development
●IBM DB2 SQL; CheckFree, Inc. (GA) (now Fiserv)
●IBM CICS/TSO SQL CICS Developer at DST Systems
Experience
AI & Machine Learning Corp (Founder) – 04/2019–Present (Corp2Corp)
Federal Government Agency – Scrum Master (Contractor) 03/2025–Present
Project Delivered: United States National Threat Assessment and Investigations
●Aligned teams to major features in SAP/AWS/Azure DevOps toolset for an Investigation and Assessment project.
●Administered project roadmap, API management systems, and designed value stream feature sets in Jira Align.
●Built Data Fabric pipeline epics for analytics threat assessment using Copilot.
●Prioritized backlog for acceptance sessions with advanced visualization customization.
●Led and monitored team’ sprint success helping new team members thru Cadence
●Orchestrated end-to-end release management across multi-account AWS environments.
●Standardized aggressive workflows across dev, QA, staging, and production accounts; managing deployment sequencing; implementing automated approvals; coordinating IAM roles for cross-account artifact access; and governing all releases through CI/CD orchestration systems such as AWS CodePipeline or GitHub Actions.
●Coordinated system integration activities across security services, infrastructure, and microservices - reflectively including subject to a daily Syncup conversations
●Maintained an integration calendar, running interface-readiness checkpoints, validating API contracts, synchronizing deployment windows for dependent services, and managing integration testing environments that mirror production.
●Defined and enforced release governance aligned with AWS security and compliance baselines by creating release policies, introducing mandatory security checkpoints (e.g., static analysis, dependency scanning), implementing change-control approval layers, and embedding compliance rules through AWS Config, Security Hub, and IAM detective controls
●Oversaw CI/CD pipelines for secure code delivery (CodePipeline, GitHub Actions, Jenkins).
●Designed pipeline stages, adding automated code quality gates, configuring least-privilege IAM access for pipelines, maintaining build runners, and ensuring each stage outputs traceable artifacts.
●Validated cross-team integration readiness through dependency matrices and interface control documents: Documented all upstream/downstream API contracts, confirming version compatibility, reviewing schema change impact, and requiring integration owners to complete readiness checklists before merging.
●Led release readiness reviews (code quality, regression coverage, infra changes) by reviewing unit/regression test coverage, lint results, performance test outcomes, infrastructure diffs (Terraform/CFN), DR readiness, rollback procedures, and gathering sign-off from Dev, QA, and Security.
●Participated in AWS Well-Architected reviews for deployment reliability by evaluating workloads across pillars (operational excellence, reliability, security), recommending improvements (e.g., auto-scaling, logging enhancements), documenting risks, and tracking remediation
●Ensured deployments aligned with Security Hub, GuardDuty, and IAM alerting standards
●Integrated Security Hub controls into pre-deployment checks, verifying IAM policies via automated scanners, ensuring threats detected by GuardDuty do not block production, and maintaining notification pipelines
●Designed automated release gating systems with Lambda, EventBridge, CodePipeline by writing Lambda functions that validate environment readiness, connecting them to EventBridge triggers, enforcing gating steps prior to promotion, and blocking releases based on drift detection or critical findings as discussed at the Sprint Planning Action Plan
●Coordinated blue-green, canary, and rolling deployment strategies by configuring deployment preferences in CodeDeploy/EKS, defining weighted traffic shifts via ALB or API Gateway, monitoring health metrics, and implementing automated rollback rules based on CloudWatch alarms.
●Integrated release workflows with SOC teams for continuous auditability by ensuring all deployments generate immutable logs (CloudTrail, GitHub audit logs), mapping changes to tickets, maintaining traceability, and enabling SOC to view deployment metadata in real time.
●Executed failover and rollback strategies for critical apps: defined rollback snapshots, maintaining versioned artifacts, validating that RDS/ElastiCache replicas are ready, testing Route53 failover routing, and confirming restore scripts
●Ensured cross-regional deployment consistency through IaC templates that enforce identical resource provisioning, automated replication (Lambda@Edge/S3/Aurora Global), region-specific environment variables, and validation scripts comparing resource parity
●Oversaw integration testing environments and synchronization cycles maintaining representative datasets, scheduling test resets, aligning patching windows, and validating infra parity across environments using drift-detection checks
●Maintained configuration management and disciplined version control by enforcing trunk-based branching, tagging releases, tracking config maps in Git repos, versioning IaC modules, and reviewing merge requests with strict quality gates
●Verified encryption, logging, and key rotation readiness before release approval
●Performed by scanning S3 bucket policies, validating CMK rotation status, confirming CloudWatch log retention, verifying TLS cert validity, and checking audit logs for pipeline stages.
●Collaborated with engineering teams to implement immutable infrastructure: located workloads to AMI-based or container-based deployment models, disabling in-place updates, and enforcing rebuild-on-change policies using Terraform/CloudFormation
●Ensured IaC templates adhered to organizational standards running static analysis tools (Checkov, cfn-nag), enforcing tagging standards, validating variable usage, and reviewing all templates through controlled pull-request pipelines
●Managed release communication plans and risk matrices; drafted release timelines, mapping risks to likelihood and impact, identifying mitigation steps, coordinating with business stakeholders, and preparing rollback communication scripts
Blue Shield of California 01/2024–03/2025 – Pharmacy Innovation Project
Scrum Master
●Defined business epics and delivered critical features with Python engineering for Tableau data presentations.
●Spearheaded the design and deployment of a robust AWS cloud infrastructure to support data pipelines for pharmacy and Medicaid add-on sales insurance products.
●Collaborated with cross-functional teams to develop scalable data models and correspond pipelines using Java and Python, ensuring seamless data transfer between vendors.
●Implemented secure, reliable, and cost-effective cloud solutions on AWS, enhancing the overall efficiency of the data integration process.
●Created and managed business epics and user stories to drive the development of data pipeline features and functionalities.
●Orchestrated the migration of legacy data systems to AWS, reducing latency and improving data accessibility using Ansible.
●Led the development of automated testing frameworks to ensure data integrity and accuracy across cloud-based platforms.
●Coordinated with stakeholders to gather requirements and define business epics, translating them into actionable development tasks.
●Deployed monitoring and logging solutions on AWS to track data pipeline performance and ensure compliance with industry standards.
●Documented and communicated project progress, business epics, and technical details to stakeholders, fostering alignment and transparency throughout the project lifecycle.
●Led API strategy and lifecycle management for healthcare solutions, ensuring HIPAA/GDPR compliance.
●Collaborated with legal, regulatory, IT, and product teams to gather requirements and prioritize features.
●Architected cloud infrastructure for secure healthcare data exchange.
●Implemented real-time API monitoring tools for insurance services.
●Reinforced scrum cadence
TSYS/Global Payments – Metro Atlanta, GA 01/2020–01/2024
Senior Technical Scrum Master
●Delivered modernization projects using Jira and Confluence across three technical teams.
●Achieved acceptance of 100% of tech stories, averaging 86–96 story points per sprint.
●Coached teams to meet iteration goals with 100% commitment and 90% test coverage.
●Directed migration of debit authorization product development to the cloud using Miro/Confluence and Jira administration.
●Built visual product roadmaps with Jira Advanced Roadmaps/Jira Align and maintained epics for strategic initiatives.
●Executed Scrum of Scrums sessions and DevOps AWX/AWS configuration management.
●Constructed and monitored Scrum cadence
●Developed and maintained Epics to represent key product initiatives and strategic features to migrate legacy functionality to the cloud and to Modularize Terraform Code;
Built and updated visual product roadmaps using Jira Advanced Roadmaps and/or Jira Align to track timelines, milestones, and dependencies for guardrails to apply mandatory and strongly AWS recommended policies for security and compliance.
●Created and linked user stories with the snowflake and DynamoDB scripts, tasks, and sub-tasks to Epics for clear traceability and progress tracking.
●Conducted regular reviews and roadmap updates to ensure alignment with evolving business objectives and stakeholder expectations
●Implemented artifact lifecycle with CodeArtifact / Artifactory as I defined repositories, version retention rules, signing policies, dependency proxying rules, and integrating them into CI/CD
●Managed SIEM readiness and log ingestion by validating structured log formats, ensuring CloudTrail + VPC Flow Logs ingestion, mapping logs to detection rules, and testing alert paths
●Oversaw vulnerability scanning and patch verification: I wrote Epics for integrating scanners (Snyk, Twistlock), validating CVE severity, confirming patching in AMIs/containers, and blocking releases with unpatched criticals
●Coordinated release sign-off across cross-functional teams as I was getting all approvals from Security, Infra, Dev, PMO; documenting the sign-off chain; and ensuring metadata is stored for audit
●Ensured integration changes met FedRAMP/NIST requirements as we checked control evidence, ensuring encryption and logging requirements are met, enforcing configuration baselines, and tracking deviations
●Supervised data migrations (RDS, DynamoDB, Redshift, S3) - tested and stressed migration runbooks, testing data copy scripts, validating schema diffs, performing checksum validation, and planning cutover windows
●Ensured DR simulations for cloud-system integrations by testing failover from primary to secondary regions, validating replication lag, confirming DNS failover, and documenting results
●Integrated API versioning and backward compatibility versioning API Gateway stages, maintaining migration paths, testing compatibility in integration environments, and ensuring consumer teams validate upstream impacts
●Built automated pre-flight checks (IAM, drift, compliance) via Lambda or CLI scripts that validate infra drift, confirm IAM integrity, test network access, and approve or block deployments
●Conducted deployment capacity planning analyzing historical traffic patterns, checking auto-scaling thresholds, coordinating with infra teams, and validating performance test results
●Managed containerized workload deployments (ECS/EKS) defining task definitions, validating helm charts, ensuring readiness/liveness probes, and monitoring deployment health
●Verified WAF rules, firewalls, endpoint restrictions with testing rule matches, validating block/allow lists, simulating attack patterns, and coordinating with security operations
●Ensured secure hybrid connectivity (Direct Connect, VPN) validating BGP stability, reviewing routing policies, testing failover, scanning for open attack paths, and coordinating with network teams
●Coordinated schema migrations with versioning and rollback using Flyway/Liquibase, testing backward-compatible changes, validating rollback scripts, and running canary migrations pre-release
●Monitored integration events via CloudWatch, X-Ray, OpenTelemetry instrumenting services, defining traces, validating log correlation IDs, and debugging latency across distributed systems
●Delivered low-risk deployments ensuring security, uptime, resilience
●Accelerated 100% of Cadence Scrum participation
●Prepared Jira-Align business Epics to link with Jira Features and stats reports: per Sprint, and per iteration. Designed and socialized a multitude of publicly shared ‘Filters’ to construct a dashboard full of charts and real time Atlassian Jira reports, some stories reflected Terraform scripts to define AWS accounts, VPCs, IAM roles.
●Planned RTE activities with Atlassian Jira Administration of a Jira-Align Modernisation product with six teams. Created epics to drive improvements to product vision, features and back end TransportationManagement system to add visibility using Azure Devops and control throughout the whole transportation network.
●Spearheaded team' acceptance of the Iteration Goals and 100% Commitment.
●Coached teams to Partner up with the App Train and QA Team to stress 90% of the Snowflake warehouse Epics and Features while driving sprints and dev cycle to complete Data warehouse projects: retro, planning, refinements and DSU.
●Executed SOS - Scrum of Scrums sessions: Socialized Features with the PMO to finalize Epics to be delivered; Sprint planning and configuration management DevOps AWX/AWS technologies. Optimized cloud resources for performance and cost, achieving a 20% reduction in operational expenses.
●Assigned and shared filters by Story completed, status and team assigned, Assignee and “The latest Comment” to make search more efficient.
●Helped team stakeholders to use other Jira field sets in a Banking backlog refinement,
●retrospectives, and daily standups -DSU to Sync Up process in validating ISO / TSO
●messages. (VSAM/DB2/CICS/Java code base onto Google and AWS cloud).
●Approved 100% of the team member' ADP hours entered and submitted
BNY Mellon – New York, NY 03/2019–01/2020
Senior Scrum Master – API Platform and Infra Teams support
●Supported six scrum teams using AWS full DevOps services to rebuild applications.
●Implemented AI bots and full automation for critical capital market and asset management services.
●Managed two scrum teams as Agile Release Manager executing Ansible playbooks
●Led post-release retrospectives and improvement cycles by gathering metrics, identifying root causes of delays, improving automation scripts, documenting process updates, and ensuring follow-up actions are tracked
●Developed deployment dashboards for KPIs and MTTR connecting CI/CD pipeline events to CloudWatch/Datadog dashboards, building Grafana visualizations, and tracking SLA compliance for deployments
●Implemented automated compliance checks with AWS Config and custom rules as we defined Config rules for encryption, IAM, and VPC settings; applying remediation actions; and integrating compliance reports into release gates
●Ensured release traceability from commit to production by tagging commits, enforcing artifact checksums, embedding metadata in Lambda/container images, and generating automated release notes
●Coordinated third-party security integration via secure APIs validating vendor security posture, configuring IAM assume-role delegation, setting API Gateway usage plans, and testing encrypted communication paths
●Maintained runbooks and deployment documentation keeping SOPs version-controlled, documenting fallback procedures, updating diagrams, and linking runbooks to alerts and CI/CD stages
●Oversaw service-to-service authentication via IAM, STS, OIDC implementing IAM roles for workloads, rotating identity providers, testing STS temporary credentials, and validating OIDC federation flows.
●Conducted validation against zero-trust architecture enforcing least-privilege policies, minimizing trusted networks, validating identity boundaries, and requiring explicit authorization per request
●Ensured secure propagation of secrets via Secrets Manager / SSM enforcing encryption-at-rest, rotating secrets automatically, implementing environment-injection mechanisms, and validating revocation paths
●Managed integration of serverless applications creating Lambda IAM boundaries, validating Step Functions orchestration paths, mapping retries and DLQs, and monitoring API Gateway latency
●Performed impact analyses for changes across interconnected systems mapping dependency diagrams, simulating changes in staging, reviewing database schema compatibility, and coordinating with upstream/downstream teams
●Executed automated release packaging with Maven, Gradle, npm building scripts, scanning dependencies, generating SBOMs, versioning artifacts, and pushing signed packages to artifact repositories
●Coordinated feature flag rollouts and telemetry monitoring integrating LaunchDarkly/AppConfig, monitoring performance in real time, enabling incremental feature exposure, and defining automated rollback conditions
●Validated network integrations (VPC peering, TGW, SGs) checking route tables, validating CIDR overlap, enforcing SG least privilege, verifying cross-VPC DNS, and testing traffic flows
●Ensured release pipelines adhere to least-privilege IAM via policy scanning, IAM Access Analyzer, role boundary controls, and requiring pipeline roles to only access specific actions and buckets
Equifax 2/2011 - 3/2019
TPO/Scrum Master
●Delivered a Credit LifeLock project application in e-commerce for potential 600,000,000
clients 'Real Time Alerts' BI Solution for major Equifax Partner: LifeLock to serve 600+ million consumers and 81 Million businesses worldwide.
●Provided help to PO/BA team in PI Planning/& SoS facilitating for 136 teammates partnering up with Lifelock and other e-commerce Banking partners.
●Motivated 7 Java developers in Costa Rica to deliver top quality code and exceed sprint
●Designed Epics and Stories for a LifeLock project to be implemented deployed for 600,000,000 consumers
●Implemented APIs strict endpoint rules following new feature regulations and business Epics
Education
●M.S., Lviv State Polytechnic University, Ukraine, 1990
●B.S. in Data Processing, Lviv State Polytechnic University, Ukraine, 1988
Certifications
●Federal Security Investigations Service Center “Sensitive” Clearance
●Release Train Engineer Certified SAFe® 6, Scaled Agile, Inc., 2022 (Credential ID 406*****-****)
●Certified SAFe® POPM, Scaled Agile, 2019 (Certificate ID 549*****-****)
●AWS Solutions Architect (Validation No. 890RXFTKFFE11B5L)
●Certified SAFe® DevOps Practitioner, Scaled Agile, 2018
●Certified Scrum Master (CSM), Agile Scrum Alliance, 2017 (Certificate ID 246791)
●Certified Scrum Product Owner (CSPO), Agile Scrum Alliance, 2013
Other Relevant Projects
●Scrum Master – Contract, OMGEO (2012–2019)
●IT Scrum Master (Contract), Fiserv (2011–2012)
●Roadmap Designer for Security-Financial (Mortgage Zillow, Amex) services products; TEPCO/Japan Security Installment Project – SQL Server 2011(Fiserv)
●DBA, Capital Access Networks (2009–2011)
●Senior QA Tester Scrum Consultant, FOREX.com (2009)
●QA Lead, Department of Education, State of GA (2008–2009)
●Business Analyst/QA, Metavante (now FIS) (2006–2008)
●IBM DB2 SQL QA, CheckFree, Inc. (now Fiserv) (2000–2006)
●IBM CICS/TSO SQL CICS Developer, DST Systems (1996–2000)
●IBM Cobol-2/SDSF SQL Cobol/JCL Developer at DST Systems (June 1995 – June 1996)