Anil Deva
DevOps/AWS Engineer
**********@*****.***
https://www.linkedin.com/in/anil-deva-750b96118/
Professional Summery
10+ years of IT experience as a DevOps Engineer/Linux and windows Systems Admin with experience in Continuous Integration, Continuous Delivery (CI/CD) with diversified exposure in software processes, designing & building web applications using different open source technologies. “AWS Certified Solutions Architect - Associate”.
As a DevOps Engineer which includes Software Configuration Management (SCM), Infrastructure as Code Build/Release Management, Continuous Integration and Continuous Delivery using different tools.
Experienced in Configuring and Deploying infrastructure and applications into cloud using AWS resources such as EC2 instances, S3, RDS, EBS, VPC, IAM policies, Route 53, Auto scaling, Cloud Front, Cloud Watch, Security Groups emphasis on fault tolerance and high availability.
Hands-on Experience in working with different build automation tools like Jenkins and Maven to achieve End-to-End Automation. Experience with Devops tools like Chef, Puppet, Ansible, Docker, Jenkins, Prometheus, Grafana, Dynatrace and AWS.
Orchestrated canary and blue/green deployments using Kubernetes and AWS CodeDeploy, reducing risk of production incidents by 75% and enabling zero-downtime releases.
Built GitOps pipelines with Flux to manage Kubernetes manifests in Git; enforced pull-request flows and automated drift detection, improving configuration consistency across environments.
Authored infrastructure testing suites in Terratest and Open Policy Agent (OPA), catching 90% of IaC misconfigurations before deployment and ensuring compliance with security baselines.
Implemented centralized logging & monitoring using Prometheus, Grafana, and the ELK Stack (Elasticsearch, Logstash, Kibana); defined SLO-driven alerts that lowered MTTD by 50%.
Led on-call rotations & incident response for production systems; reduced average incident resolution time from 2 hours to 30 minutes through runbook automation and proactive alert tuning.
Optimized cloud costs by rightsizing EC2 instances, implementing spot instances for batch jobs, and automating S3 lifecycle policies—achieving 30% reduction in monthly AWS spend.
Developed Helm charts and custom Kubernetes operators to parameterize application deployments, cutting new-service provisioning time from days to under one hour.
Mentored junior engineers in DevOps best practices, conducted brown-bag sessions on Terraform modules and CI/CD patterns, improving team productivity and code quality.
energetic Build/Release/Deployment/Operations(DevOps) Engineer with involvement in all periods of software development life cycle SDLC Methodologies like Agile, Waterfall, RAD such as Analysis, Planning, Developing, Testing and implementing and Post-production analysis of the projects.
Comprehensive experience in the design and implementation of Continuous Integration, Continuous Deployment, Continuous Delivery and DevOps Operations for Agile projects, working with technologies and platforms including UNIX/Linux, Java, Subversion, Git, Ant, Maven, Jenkins, AWS, Openstack, Terraform, kubernetes, Docker, Service Now, SonarQube, Qualys, Veracode, Artifactory(JFrog), Twistlock, across the Health care, Finance, and Service Sector.
Technical Skills
Operating Systems
RedHat Linux (RHEL), Ubuntu, Windows XP/7/8/10, CentOS, Windows 2000/2003/2008/2008 R2/2012, Sun Solaris
Build and Config
Management Tools
Ant, Maven, Ansible, Terraform, CloudFormation, Docker, Vagrant, Chef,
Puppet, SaltStack, Harness, Rancher.
SCM Tools
GIT, GITLAB, SVN and CVS
Web application server
Node.js, IBM WebSphere, IBM HTTP, Apache Tomcat, MS-IIS
Continuous Integration Tools
Jenkins, Hudson, Bamboo.
Cloud Technologies
Aws, Azure, OpenStack
Databases
MySQL, DynamoDB
Languages
Java, .Net, C#,C++, C, SQL, PL/SQL
Web Languages
HTML, DHTML, XML
Scripting Languages
Bash, Perl, Shell, Python, Ruby, Groovy, Bash, Power shell, Python, Ruby, Javascript.
Protocols
TCP/IP, HTTP, HTTPS, FTP, SNMP, SMTP, Telnet, DNS, SSH, DHCP.
Security tools
LDAP Server, SSL Certificates, Veracode and Qualys.
Monitoring tools
Splunk, Zabbix, Factfinder, Cloudwatch, Nagios and Dynatrace.
Virtualization
VMware, Oracle Virtual box, VSphere, Hyper-V, Citrix.
Containers, Clusters:
Docker, Kubernetes, Openshift.
Education
Bachelors of Technology in Information Technology – JBIET- JNTU.
Certificates
AWS solution architect associate.
CCNA Switches and routers.
Microsoft System Administrator.
Professional Experience
Solution Architect /DevOps Engineer
JPMorganChase – Plano Texas December 2024 to present
Designed and implemented a secure hybrid-cloud ingress by configuring Route 53 records, a public Network Load Balancer, and an ECS Ingress Gateway with NAT Gateway egress—enabling on-prem clients to access AWS services over HTTPS while maintaining a locked-down VPC boundary.
Built a self-service App Mesh platform with Terraform modules (module-ecs-cluster, module-ecs-application) that automatically generate Virtual Gateways, Nodes, Services, and Routes—standardizing traffic control, retries, and circuit-breaking policies across all microservices.
Built End-to-End MLOps Pipelines: Designed and implemented fully automated machine learning pipelines using AWS SageMaker Pipelines, AWS Step Functions, and AWS CodePipeline to orchestrate data preprocessing, training, evaluation, and deployment—reducing time-to-production for new models from weeks to hours.
Infrastructure-as-Code for ML Workloads: Developed reusable Terraform and AWS CDK modules to provision SageMaker training jobs, model endpoints, Feature Store resources, and CI/CD infrastructure; enforced versioning and drift detection via GitOps on EKS.
Architected a hybrid-cloud integration between on-prem to data-center services (DPS Proxy/Apps, SiteMinder Policy Server, Oracle PDB) and AWS by deploying DPS workloads into VPCs behind ALBs, AWS WAF/Shield and VPC Endpoints—exposing APIs securely through Apigee API Gateway and leveraging Golden Gate for real-time data replication.
Secured and optimized web-facing applications (Chase.com, mobile) with CloudFront/Ion CDN, AWS Shield, WAF, and ALB in multi-account VPCs; enforced authentication via SiteMinder, managed secrets in AWS Secrets Manager, and instrumented end-to-end monitoring using Splunk & Dynatrace.
Automated CI/CD pipelines using AWS CodeDeploy/CodePipeline to deploy DPS Proxy and Applications across accounts, ensuring zero-downtime releases and consistent configuration of HA-Proxy, NGINX, NAT Gateways, and API endpoints via Terraform and CloudFormation.
Monitored and optimized network flow logs, API Gateway metrics (latency, 5XX rates) and WAF logs in CloudWatch/Datadog to detect anomalies, tune WAF rules, and scale NLB/ALB capacity proactively.
Standardized network architecture across environments—public/private subnets, security groups scoped to the mesh, NAT Gateways, and VPC endpoints—via reusable Terraform modules, reducing spin-up time for new accounts by 70%.
Implemented pipeline testing frameworks (using Spinnaker’s Orka/Nebular) to validate pipelines in staging before production, cutting post-release defects by 30%.
Integrated Spinnaker with Jules to trigger pipelines on successful CI builds, reducing manual deployment steps by over 90% and accelerating release cycles.
Optimized cost and performance by selecting Fargate for stateless front-end services and EC2 ASGs for stateful back-ends, tuning autoscaling policies based on real-time App Mesh metrics to maintain 99.9% availability at 30% lower compute spend.
Cost-Optimized ML Environments: Implemented spot training jobs and auto-shutdown of idle SageMaker Studio notebooks via Lambda functions; employed S3 lifecycle policies and rightsized instances to cut ML infrastructure costs by 40%.
Cross-Functional Collaboration: Partnered with data scientists to define feature engineering standards, version control of notebooks (DVC), and implemented self-service MLOps frameworks that empowered teams to spin up experiments securely in isolated AWS accounts.
Designed and managed AWS Route 53 private hosted zones and alias records to route custom domains through NLB/ALB into VPC-only API Gateways, ensuring low-latency, private DNS resolution.
Configured AWS WAF web ACLs with custom rate-limits, IP sets and managed rule groups to protect API Gateway and ALB endpoints against OWASP attacks and common exploits.
Provisioned and automated SSL/TLS certificates via AWS Certificate Manager (ACM) and integrated them with NLB/ALB listeners, achieving end-to-end encryption and zero-downtime certificate rotation.
Data Orchestration & Monitoring: Built data ingestion pipelines using AWS Glue and Amazon Kinesis Data Firehose into S3/Redshift, and set up end-to-end monitoring with Amazon CloudWatch, Grafana, and Datadog to alert on data drift and model performance degradation.
Sr DevSecOps Engineer
Toyota Financial Services – Plano Texas July 2021 to November 2024
Responsibilities:
Orchestrated containerized deployments on Kubernetes—configuring nodes, ConfigMaps, selectors, Services, and pod definitions—to standardize microservice delivery across environments.
Collaborated with development teams using Java (Maven, Gradle, Ant), Python, Node.js, React, Angular, and .NET; provisioned and upgraded Kubernetes worker nodes per version requirements to streamline microservice rollouts.
Integrated MongoDB with AWS Lambda using Python within Jenkins pipelines, managing environment variables and sandbox configurations; maintained 100% success rates for SonarQube quality and Veracode security scans.
Authored Terraform IaC modules to automate provisioning of AWS, Azure, and GCP resources—VPCs, subnets, NAT/Internet Gateways, IAM roles, and security groups—enabling repeatable, multi-cloud infrastructure deployments.
Managed environment segregation with Terraform workspaces for dev, staging, and prod, ensuring isolated state files and parameterized configurations for each lifecycle stage.
Developed ML orchestration pipelines with AWS Step Functions and SageMaker to automate model training, testing, and deployment—reducing manual intervention and accelerating iteration cycles.
Configured RBAC policies for Jenkins and Kubernetes; administered user access via Active Directory groups and AWS IAM to enforce least-privilege security.
Implemented cloud security best practices using Prisma Cloud for runtime protection, risk prevention, and secrets management; integrated AWS WAF and Azure Application Gateway with custom OWASP rule sets.
Built CI/CD workflows in Jenkins and GitHub Actions—integrating SonarQube quality gates, JUnit coverage reports, Gradle/Docker/OpenShift builds, and automated artifact promotion through Artifactory (Maven, Docker, NPM, Bower).
Deployed serverless APIs with AWS API Gateway and Lambda, secured by Amazon Cognito, supporting CRUD operations on DynamoDB, RDS, and S3 with optimized latency and throughput.
Integrated Apache Kafka ecosystem (ZooKeeper, NiFi, Elasticsearch, Logstash, Kibana) for real-time data ingestion and processing; authored Elasticsearch Watcher alerts and Kibana visualizations to monitor system health.
Implemented Okta SSO for 5,000+ users, integrating 30+ enterprise applications (Office 365, Salesforce, Workday, custom apps) and automating user lifecycle management via custom API connectors—cutting helpdesk tickets by 40%.
Automated certificate and secret rotation with AWS Certificate Manager, Secrets Manager, and Azure Key Vault in CI/CD pipelines to achieve zero-downtime updates.
Administered JFrog Artifactory, overseeing backups and repository creation to streamline binary management and secure vulnerability scanning with JFrog Xray and Qualys.
Developed and maintained Jenkins pipelines using the Groovy DSL to automate CI/CD workflows, reducing manual deployment time by 40%.
Created custom Groovy scripts and functions to orchestrate build, test, and release processes across multiple environments.
Environment: AWS/GCP, Jenkins, Docker, K8, JFrog, Veracode, SonaeQube, Centrify, kafka, Harness, Rancher PipelinemanagerCLI, Terraform, Maven, gradle, Python, Prisma Cloud.
SRE/AWS & Azure Engineer
LVMH (Louis Vuitton Moët Hennessy) – Australia/New Jersey October, 2018 to June 2021
Responsibilities:
Spin up resources like cloud virtual networks, Compute Engines in public and private subnets along with AutoScaler in Amazon web services.
Maintained physical and Cloud infrastructure running Redhat/CentOS/Ubuntu/Solaris on AWS Cloud and on- prem.
Managing tech Openshift cluster data includes scaling up and down tech AWS app nodes.
Leveraged shell and python scripts to automate repetitive tasks like backup, disk Cleanup etc.
Worked on Kubernetes configuration, concepts and management.
Knowledge on setting up containers in a cloud environment, which includes being knowledgeable in Docker, Kubernetes and other container tools.
Experienced in configuring Cloud platform such as Virtual Networks Multi-site, Cross-site, VMs, Azure AD, Load Balancers, Azure SQL, Cloud Services, etc.
Established connection from Azure to On-premise datacenter using Azure Express Route for Single and Multi-subscription connectivity.
Designed and implemented multi-region AWS infrastructure using Terraform and CloudFormation, provisioning VPCs, subnets, NAT Gateways, Transit Gateways, and IAM roles to achieve 99.99% uptime.
Built and maintained Azure environments with ARM templates and Azure DevOps, deploying Virtual Networks, AKS clusters, App Services, and Functions for developer self-service.
Configured hybrid-cloud connectivity via AWS Direct Connect and Azure ExpressRoute, route-based VPNs, private DNS zones, and network segmentation with Security Groups and NSGs.
Enforced CIS Benchmark compliance using AWS Config rules and Azure Policy, automating drift detection and remediation with Lambda and Azure Functions—reducing violations by 85%.
Managed identity and access with AWS IAM and Azure AD: defined least-privilege RBAC, cross-account assume-role workflows, MFA, and conditional access policies.
Automated certificate and secret lifecycle using AWS Certificate Manager, Secrets Manager, and Azure Key Vault integrated into CI/CD pipelines for zero-downtime rotation.
Deployed AWS WAF, Azure Front Door, and Application Gateway with custom OWASP rule sets and rate-limiting to block malicious traffic at the edge.
Centralized observability with Amazon CloudWatch, AWS X-Ray, Azure Monitor, Prometheus, and Grafana—defining SLO-driven alerts that cut MTTD/MTTR by 40%.
Designed and configured Grafana dashboards to monitor system performance, network traffic, and application metrics. Such as InfluxDB, Elasticsearch, AWS CloudWatch, and MySQL for data visualization and alerting. To monitor containerized environments, including Kubernetes and Docker, tracking metrics such as pod health
Deployed and configured the ELK Stack (Elasticsearch, Logstash, Kibana) for centralized logging, monitoring, and analytics across multiple environments.
Implemented AWS solutions using EC2, S3, RDS, EBS, Elastic Load Balancer, Auto scaling groups, Route 53.
Defined AWS Security Groups which acted as virtual firewalls that controlled the traffic allowed reaching one or more AWS EC2 instances.
Environment: API, Java, OpenShift, Maven, SVN, Linux/Red Hat, AWS, Shell/Groovy/Python/Ruby Scripts, GITLAB, Jenkins, Docker, Kubernetes, Ansible, Tomcat, Jira, AWS, Nexus, MYSQL, Mongo DB, SQL, JSON, JBoss
DevOps/AWS Engineer
ADIT (After Dark Technology Pty Ltd) – Brisbane – Australia March, 2016 to September, 2018
Responsibilities:
Architectural and automation level expertise with AWS, versed with handling all its critical. services like CloudFormation, BOTO SDK, VPC, EC2, EC2 Container Services, EBS, RDS, S3, DynamoDB, ELB, Auto Scaling, CloudFront, Route 53, CloudWatch, CloudTrail, IAM, SQS, SNS etc.
Templated AWS infrastructure as a code using Terraform to build staging and production environments and worked with Terraform for automating VPCs, ELBs, security groups, SQS queues, S3 buckets, and continuing to replace the rest of our infrastructure.
Expertise Knowledge of the principles and best practices of Software Configuration Management (SCM)in Agile, scrum, and Waterfall methodologies
Created REST clients to consume data from other partner applications and involved in creating POC's using MEAN stack and enhancing existing REST API's developed using Node-JS, Express-JS and Mongo-db.
Design, deploy and manage a Continuous Integration System which includes automated testing and automated notification of results using technologies like Ansible, Terraform, Packer, Cloud formation, Docker and Server spec.
Used Ansible server and workstation to manage deployments. Experience in writing Ansible Playbooks in YAML.
Expertise in working with Puppet Enterprise and Puppet Open Source. Installed, configured, managed and upgraded Puppet Master, Agents & Databases. Involved in headmost Automation Deployment Team by working with puppet. Created snapshots and Amazon machine images (AMIs) of the instances for backup and creating clone instances.
Provide SME in all areas of Cloud (IaaS, PaaS, SaaS) to existing and perspective clients on multiple cloud platforms vSphere/vCloud/CloudStack/Azure/AWS and various PaaS platforms (Cloud Foundry/OpenShift).
Installed/Configured and Managed JFrog Art factory Repository Manager and all the Repositories.
Exposed to all aspects of software development life cycle (SDLC) such as Analysis, Planning, Developing, Testing and Implementing and Post-production analysis of the projects.
Developed Bash and Python scripts to automate various stages of build and release process in Jenkins. Defined various CI/CD workflows using Jenkins file groovy DSL
Build Data Sync job on Windows Azure to synchronize data from SQL 2012 to SQL Azure.
Developed CI/CD system with Jenkins on Google's Kubernetes container environment, utilizing Kubernetes and Docker for the runtime environment for the CI/CD system to build and test and deploy.
Used Kubernetes to deploy scale, load balance, scale and manage Docker containers with multiple name spaced versions.
Environment: Aws, Azure, Ant, API, Puppet, Git, Terraform, Nginix, Nexus, JFrog, Kubernetes, Bamboo, Splunk, Bash, Python, Groovy, Jenkins, Maven, Ansible, Yaml, Linux, Windows, Nagios.
System and Network administrator and AWS Engineer
Queensland Health– Brisbane-Australia June, 2014 to March, 2016
Responsibilities:
Automated the cloud deployments using Chef, ruby and AWS Cloud Formation Templates.
AWS EC2, VPC, S3, Route53, IAM, Cloud Formation, ELB and Elastic Beanstalk based infrastructure automation through Chef, Vagrant, Bash Scripts.
Setting up the Ansible control machine (RHEL7) and configured the remote host inventories via SSH.
Providing a test-driven development for Ansible by using Server spec. Written spec tests for checking if servers are configured correctly.
Installed Configured and Maintained APACHE, TOMCAT and JBOSS servers in Red Hat LINUX environment.
Experience in core AWS services (S3, EC2, ELB, EBS, Route53, VPC, Auto scaling, etc.), Deployment services (Elastic Beanstalk, Lambda and Cloud Formation) and Security practices (IAM, CloudWatch, and CloudTrail).
Created network architecture on AWS VPC, subnets, Internet Gateway, Route Table and NAT Setup.
Setting up IAM Users/Roles/Groups/Policies.
Grafana, ensuring secure access to dashboards and sensitive performance data across multiple teams role-based access control (RBAC).
Experienced in Logical Volume Management on Linux with LVM Knowledgeable in HTTP, HTTPS, SMTP, FTP, SFTP, DHCP, DNS, SNMP TCP/IP, UDP, ICMP, VPN, POP3 protocols.
Worked on Installation/Configuration/Administrated VMware ESXi 5.1/5.5 & 6.0 and migrated existing servers into VMware Infrastructure and Troubleshoot server issues.
Environment: Chef, Ansible Apache Jenkins AWS, HTML, JavaScript, SOAP, Network Protocols, VMware EXSi, Linux, windows, Vagrant, Bash, RAID, Git, backup & recovery, Subversion (SVN).
Linux Administrator
CPSC- Brisbane April 2011 to February, 2014
Worked as User Administration setup, maintaining account, monitor system performance, performed performance tuning and troubleshooting.
Installed and Configured RHEL 2.1/3/4, Solaris 10 and Red Hat on Intel and AMD hardware.
Experience in system software installation and configuration of NFS shares, Auto-Mounter, DHCP and LDAP.
Installing and Managing HP MC/Service Guard cluster, HP-UX Virtual Partitions (vPar) and Node Partitions (nPar). Install and configure SSH to enable secure access to the servers.
Expertise in Kernel upgrades and applying errata as and when required.
Monitoring of Linux, Solaris servers using tools like vmstat, iostat, SAR etc.
Troubleshooting day-to-day server related issues and problems in terms of operating system, applications and network. Configure RAID mirroring on Linux platform.
Environment: Red hat, SLES 9, 10, Apache and Tomcat, Linux servers, NIS, DNS, NFS, Mailing List, Send mail, apache, ftp, ssh, Red hat Linux, Centos.
Linux Administrator
F9 Innovations, Hyderabad, India October, 2008 to February, 2009
Responsibilities:
Configured and administered Jenkins pipelines for automated builds and responsible for installing Jenkins master and slave nodes.
Build and Deployment of the java applications into different environments like Dev, INT, QA and PROD.
Manage deployment automation using Chef, Mcollective, Hiera and Ruby.
Designed the project workflows/pipelines using Jenkins as CI tool. Expert in User Management and Plugin Management for Jenkins
Built deployment process by setting up Jenkins, SVN and Git. Setup Dev and Test environments that are continuously deployed to with each successful build.
Administering, monitoring and troubleshooting tasks related to the support of Web Sphere Application Server, WebLogic and JBoss.
Environment: Windows, SUSE Linux, RHEL 3,4,5,6, HP/DELL Blade Servers, HP PROLIANT DL servers, DELL PowerEdge servers, Shell Scripting, Powershell, Cforce, Apache, Web Logic, Websphere, Tomcat, Xen & VMware Virtualization.