Post Job Free
Sign in

Devops Engineer Senior

Location:
Overland Park, KS
Posted:
October 14, 2025

Contact this candidate

Resume:

HARSHITHA NELLORE

Senior DevOps Engineer

Mobile: 913-***-****

Mail: ******************@*****.***

LinkedIn: www.linkedin.com/in/harshitha-nellore-2ba173203

PROFESSIONAL SUMMARY:

Versatile Senior DevOps Engineer with 12+ years of experience designing, implementing, and automating cloud-native and hybrid infrastructures across AWS, Azure, and GCP. Expert in managing scalable systems, CI/CD pipelines, container orchestration, and Infrastructure as Code (IaC) using Terraform, CloudFormation, and ARM templates. I am skilled in Kubernetes, Docker, Jenkins, GitHub Actions, Ansible, and monitoring tools such as CloudWatch, Prometheus, and Grafana.

Built scalable, resilient, and cost-effective architecture using AWS (EC2, S3, RDS, Lambda) and Azure (VMs, AKS, App Services).

Created reusable Terraform modules and integrated into CI/CD pipelines to automate infrastructure provisioning across multi-cloud environments; migrated legacy infra definitions for maintainability and collaboration.

Designed CI/CD pipelines using Jenkins, Azure DevOps, and GitHub Actions, integrating SonarQube, Nexus, Aqua Security for secure, high-quality releases.

Built and deployed infrastructure and applications across GCP (GKE, Cloud Functions, Deployment Manager) as part of hybrid-cloud initiatives.

Enhanced IaC practices with Terraform remote backends, workspaces, and multi-environment isolation for dev, test, and prod.

Developed cloud-native reference architectures and automation frameworks for IaaS and PaaS services across AWS, Azure, GCP, ensuring consistency and scalability.

Built and maintained CI/CD pipelines supporting 200+ microservices, integrating validation, rollback, and security scanning.

Managed containerized microservices with Docker, Kubernetes (EKS/AKS/OpenShift) and Helm, including staging and production clusters.

Automated infrastructure provisioning and configuration using Python, Ansible, Terraform, Bash across multi-cloud environments.

Enforced cloud security best practices by integrating IAM, RBAC, SAML, Vault-based secrets management across environments.

Implemented SRE principles including SLAs, SLOs, error budgets, and runbooks to reduce MTTR and improve uptime.

Established observability frameworks and SRE dashboards using Prometheus, Grafana, Splunk, Datadog, Dynatrace, Vector.dev to monitor distributed systems and optimize performance.

Improved system reliability, reduced deployment times, and enabled faster incident resolution through proactive automation and observability.

Implemented cloud cost optimization strategies with AWS Cost Explorer and Azure Cost Management, achieving up to 25% savings.

Acted as the primary DevOps escalation point during on-call rotations, leading triage, RCA, and resolution of high-severity incidents.

Mentored DevOps and development teams on Vault best practices, secret rotation, and CI/CD integration.

Contributed to the design and implementation of ML/GenAI-driven automation workflows and security analytics.

Designed secure networking architectures including VPCs, subnets, route tables, VNets, VPN gateways, private endpoints to support hybrid and cloud-native apps.

Managed asset and service account provisioning and lifecycle using IAM, Azure AD, and Secrets Manager, ensuring compliance with internal access policies.

Embedded DevSecOps practices across SDLC by integrating static code analysis, vulnerability scanning, and policy-as-code to meet compliance (HIPAA, PCI-DSS).

Led blue/green and canary deployments across containerized environments to ensure zero-downtime rollouts and fast rollback during release cycles.

EDUCATION:

Completed Bachelor’s at Jawaharlal Nehru Technological University of Hyderabad, CSE 2009-2013

CERTIFICATIONS:

Certified in Microsoft Certified Azure Administrator.

Certified in Kubernetes Administrator.

Certified in AWS Developer – Associate.

Certified in Terraform Associate.

SKILL SET:

Cloud Platforms

AWS, Azure, GCP

Configuration Management Tools

Terraform, ARM templates, ServiceNow, Ansible, Chef, AEM, Puppet.

CI /CD Tools

Jenkins, Azure DevOps Pipelines, Argo CD, AWS Code Pipeline, GitLab CI/CD, GitHub Actions, Bamboo, Travis CI, Jira, OpenShift, VSTS, Circle CI.

Build Tools

Maven, ANT, Gradle.

Containerization Tools

Docker, Docker Swarm, Kubernetes, AKS, Helm, Mesos, OpenShift, AWS ECS.

Version Control Tools

GIT, GitHub, GitLab, Bitbucket, SVN, IBM RAD, BMC Helix

Logging & Monitoring Tools

CloudWatch, Azure Monitor, Gray log, Prometheus, Grafana, New Relic, Nagios, Splunk, ELK Stack, Datadog, New Relic, Dynatrace, Kibana.

Vulnerability Scanner Tools

SonarQube, Veracode, X-Ray.

Scripting & Programming Languages

Shell Scripting, PowerShell, YAML, XML, perl, Ruby, Java, Golang, Python, Groovy, .Net, Node.js.

Databases

My SQL, MS SQL, PostgreSQL, Oracle, MongoDB, DynamoDB, and Aurora Global DB.

Application/Web Servers

Web logic, Web sphere, Apache Tomcat, JBoss, Nginx, Apache Kafka.

Operating Systems

UNIX, Linux, Windows, Solaris, Support On-Call CentOS, UBUNTU and RHEL.

Virtualization Platforms

VMware Workstation, Vagrant, VMware vSphere Esi 5.x/4.X, ESX /3.x, Hyper-V.

Bug Tracking Tools

JIRA, ServiceNow, Bugzilla, Mingle.

Registry

JFrog Artifactory, GitHub, Nexus.

Key Vault’s

AWS Key Management Service, Azure Key Vault, Hashi Corp Key Vault.

Deployment Strategies

Canary, Bicep Blue/Green.

Web Technologies

HTML5, CSS, JavaScript, jQuery, Bootstrap, XSD, XSL, XPATH, WordPress.

PROFESSIONAL EXPERIENCE:

Discover Chicago, Illinois Feb 2024 - Present

Sr. DevOps Engineer

Project Description:

A large financial enterprise modernized its on-prem data center by adopting a hybrid cloud strategy using AWS and Azure. AWS was utilized for container orchestration, automation, and CI/CD, while Azure supported PaaS workloads to improve scalability, reliability, and cost-efficiency.

Responsibilities:

Designed and implemented secure multi-cloud infrastructure (AWS, Azure) using Terraform and CloudFormation to deploy VPCs, EC2, RDS, Lambda, S3, API Gateway, and GKE clusters for critical financial workloads.

Developed product solutions for public and private cloud (GCP/Azure) and MEC environments, focusing on redundancy, scalability, and integration with OpenShift & Kubernetes.

Designed and maintained end-to-end CI/CD pipelines using Azure DevOps (ADO) and Jenkins, automating build, test, and deployment for .NET and TypeScript-based microservices across multi-cloud environments (AWS + Azure).

Migrated legacy ADO pipelines and Git repositories to GitHub Enterprise, enabling centralized SCM, GitHub Actions workflows, and improved governance through organization-level templates and reusable actions.

Developed and enhanced custom ADO build/release tasks using TypeScript, integrating secure client-side rollback logic for OCD (On-Client Deployment) requirements.

Implemented infrastructure provisioning using AWS CloudFormation and Terraform, automating EC2, ECS, Lambda, and networking components for hybrid workloads.

Integrated Python automation scripts to orchestrate pipeline stages, artifact versioning, and post-deployment validations, reducing manual QA effort by 30%.

Applied shift-left security and compliance scanning within pipelines (Checkov, SonarQube, DependencyCheck) to meet PCI-DSS standards for payments infrastructure.

Built parameterized Jenkins shared libraries to standardize build templates across teams and enable faster onboarding of new services.

Coordinated with development and release teams to implement blue-green deployment and canary strategies across AWS ECS and EKS clusters, minimizing downtime during release cycles.

Provided documentation and CI/CD operational runbooks for GitHub Actions and Jenkins pipelines supporting enterprise-wide adoption.

Designed and automated infrastructure deployments using Terraform, Ansible, and GitHub Actions, covering system configuration, updates, and continuous monitoring.

Implemented active and passive health monitoring across financial cloud platforms, integrating with Prometheus, Grafana, and Splunk, and provided data-driven troubleshooting recommendations.

Worked closely with internal security and compliance teams to enforce policy-as-code guardrails, IAM roles, and VPC Service Controls, ensuring PCI-DSS and SOX compliance.

Authored and maintained scripts, configs, and GitOps workflows, while documenting deployment architectures and updating IPAM systems (NetBox) for accurate cloud inventory.

Built and managed scalable containerized platforms with Kubernetes (EKS, GKE, OpenShift), leveraging Helm, Ingress controllers, and service meshes to support secure digital banking applications.

Developed end-to-end MLOps pipelines integrating GitHub Actions/Jenkins with AWS SageMaker, Azure ML, and GCP Vertex AI for fraud detection, risk scoring, and model drift monitoring.

Automated infrastructure provisioning and policy-as-code guardrails with Terraform, Ansible, OPA, and Sentinel, ensuring PCI-DSS, SOX, and financial compliance.

Configured and administered Kafka producers/consumers for real-time transaction processing, fraud detection, and microservices in Discover’s digital payments ecosystem.

Automated .NET Core application builds and deployments using GitHub Actions/Jenkins pipelines, ensuring consistent packaging (dotnet build, dotnet publish) and zero-downtime releases.

Integrated SonarQube & Aqua into .NET CI/CD pipelines to enforce code quality, vulnerability scanning, and PCI-DSS compliance.

Implemented observability dashboards using Prometheus, Datadog, Dynatrace, Stackdriver, and Open Telemetry to track SLAs, transaction latency, and reduce MTTR.

Built and optimized CI/CD pipelines with GitHub Actions, Jenkins, GitLab CI, and AWS Code Pipeline for 200+ microservices, integrating rollback, image scanning (Trivy, Aqua), and compliance checks.

Migrated legacy financial applications into AWS-native microservices and serverless (Lambda, Step Functions), improving resilience and customer experience.

Implemented blue/green & canary deployments for .NET services using Kubernetes and GitOps workflows, reducing rollback times during release cycles.

Established DevSecOps practices with IAM hardening, KMS-based encryption, vulnerability scanning, and Hashi Corp Vault for secrets management.

Containerized ASP.NET microservices with Docker and deployed them to EKS/GKE/OpenShift, integrating Helm charts and service meshes for secure banking workloads.

Led greenfield Kubernetes builds and decommissions of legacy clusters using Terraform and Helm, standardizing environments across global business units.

Integrated Databricks and Spark into ML pipelines for large-scale feature engineering and real-time fraud detection analytics.

Orchestrated multi-stage automation workflows with Ansible, Puppet, and GitHub Actions to streamline deployments and reduce manual interventions.

Designed and tested Disaster Recovery (DR) and Business Continuity Plans (BCP) for mission-critical cardholder and payment systems, ensuring high availability and regulatory compliance.

Developed executive dashboards (Power BI, QuickSight) for real-time decision-making in fraud monitoring, payments, and financial risk management.

Optimized performance monitoring for .NET APIs with Prometheus, Datadog, and Dynatrace, improving SLA adherence and reducing MTTR in production systems.

Administered GitHub Enterprise & Jira, configuring repositories, branch protections, compliance automations, and Agile workflows for developer efficiency.

Partnered with cross-functional teams (cloud, security, DevOps, risk) to deliver automation at scale across hybrid multi-cloud financial ecosystems.

Environment: AWS, IAM, CloudWatch, CloudFormation, AWS Secret Manager, AWS Code Pipeline, Elastic Container Registry (ECR), Elastic Kubernetes Service (EKS), Migration, Cost Explorer, Cloud Check, Terraform, Chef, Ansible, Docker, Jenkins, GitLab, GitHub, GIT, SonarQube, Nexus, OpenShift, Nagios XI, Apache Tomcat, ELK Stack, Prometheus, Grafana, Datadog, ServiceNow, Python, JIRA.

Optum Dallas, Texas - Remote Sept 2022 – Jan 2024

Sr. DevOps Engineer Kubernetes/RedHat

Project Description:

Optum initiated a hybrid-cloud modernization to migrate healthcare platforms across AWS and Azure, including claims, telemedicine, and provider systems. The focus was on HIPAA/HITECH compliance, real-time monitoring, infrastructure automation, and scalable CI/CD delivery.

Responsibilities:

Architected and provisioned secure hybrid cloud infrastructure (AWS + Azure) using Terraform, CloudFormation, and ARM templates, delivering scalable, HIPAA-compliant healthcare platforms.

Configured VPCs, VPNs, subnets, and peering across multi-cloud environments to enable secure, low-latency data exchange for healthcare claims and patient records.

Developed, optimized, and maintained multi-stage Azure DevOps pipelines for .NET and Python services hosted on AWS (Lambda, EC2, S3), ensuring reliable deployments to QA, Staging, and Production environments.

Automated build and packaging of .NET Core and TypeScript applications with YAML-based pipelines, integrating npm, MSBuild, and NuGet task runners.

Enhanced ADO extensions using TypeScript for custom task functionality, allowing reusable pipeline components and controlled rollbacks during client-side deployments.

Created AWS CloudFormation templates to automate environment setup (IAM roles, VPCs, Security Groups, ECS clusters), enabling consistent infrastructure as code (IaC) across teams.

Designed Python-based automation tools for monitoring, post-deployment validation, and log aggregation via AWS CloudWatch and Elasticsearch.

Supported repository migration and branching strategy redesign from ADO Git to GitHub, aligning with enterprise SCM modernization initiatives.

Implemented pipeline caching, artifact retention policies, and secret management using AWS Secrets Manager and ADO Library for optimized build performance.

Ensured audit readiness and HIPAA compliance by embedding policy checks, approval gates, and artifact traceability in CI/CD workflows.

Collaborated closely with developers and SREs to debug build failures, enhance deployment stability, and establish error-resilient rollback mechanisms across AWS and Azure environments.

Engineered redundant MEC and hybrid-cloud solutions with Azure, OpenShift, and OpenStack, optimizing resource utilization and ensuring high availability for healthcare applications.

Automated CI/CD pipelines with Azure DevOps & GitLab, integrating image scanning, IaC validations, and containerized deployments (Docker, AKS, OpenShift) for healthcare platforms.

Implemented health monitoring and proactive troubleshooting system using Dynatrace, ELK, and Azure Monitor, delivering actionable insights that reduced downtime by 40%.

Collaborated with cross-functional teams to deliver secure and scalable healthcare infrastructure, ensuring compliance with HIPAA regulatory requirements.

Created detailed documentation, automation scripts, and configuration repositories to streamline deployments and ensure consistency across lab and production environments.

Built and automated CI/CD pipelines (GitHub Actions, Jenkins, Azure DevOps, GitLab CI) for healthcare workloads, embedding SonarQube, Trivy, Prisma Cloud, and Aqua for image scanning, rollback, and compliance gates.

Automated infrastructure provisioning with Terraform, Ansible, and Python; implemented Terraform Cloud/Enterprise + Sentinel to enforce HIPAA guardrails and governance policies.

Migrated legacy healthcare applications into cloud-native (AKS/EKS, serverless, microservices), improving scalability, resilience, and compliance with HITRUST/PCI-DSS frameworks.

Designed and managed ML pipelines (AWS SageMaker, Azure ML, GCP Vertex AI) for predictive analytics, fraud detection, and clinical risk scoring, integrating Kubeflow for ML lifecycle orchestration.

Deployed LLM/GenAI workloads (Azure OpenAI, Vertex AI, Hugging Face) for healthcare NLP (claims automation, prior authorization, chatbot assistants), ensuring PHI masking and data governance.

Created data pipelines (AWS Glue, EMR, Databricks, PySpark) for ingesting, processing, and transforming structured/unstructured healthcare datasets, enabling FHIR-compliant APIs.

Implemented event-driven streaming with Kafka & Confluent for real-time claims, eligibility checks, and EHR integration.

Built and automated CI/CD pipelines (Azure DevOps, GitHub Actions, Jenkins) for .NET healthcare applications, embedding rollback strategies, SonarQube, and security scans.

Migrated legacy .NET Framework apps to cloud-native .NET Core microservices on AKS/EKS, improving scalability and HIPAA compliance.

Enabled containerization of .NET workloads with Docker, integrating Prisma Cloud and Trivy for image scanning and regulatory checks.

Orchestrated Kubernetes (AKS/GKE/EKS) deployments with Istio/Linkerd service mesh, zero-trust networking, and OPA/Gatekeeper for policy-as-code.

Enabled observability with Prometheus, Grafana, ELK/EFK, Splunk, and Open Telemetry, extending metrics to detect model drift, anomalies, and SLA breaches.

Strengthened secrets & identity management with AWS Secrets Manager, Azure Key Vault, Hashi Corp Vault, and Azure AD RBAC for PHI data protection.

Orchestrated deployment of .NET APIs across Kubernetes clusters with Istio/Linkerd service mesh for secure, low-latency communication in healthcare claims platforms.

Integrated Application Insights and Splunk with .NET applications to monitor performance, detect anomalies, and support compliance audits.

Conducted Disaster Recovery (DR) and BCP drills using cross-region replication and AWS Elastic Disaster Recovery (AWS DRS) to ensure zero data loss and rapid recovery.

Integrated FinOps and cost optimization tools (Cloud Health, Azure Cost Management, Kubecost) to reduce spending on large-scale healthcare workloads.

Authored operational runbooks, compliance docs, and HIPAA audit evidence for internal and external regulators.

Provided training & mentoring to DevOps and healthcare engineering teams on secure CI/CD, MLOps best practices, and regulatory alignment.

Environment: AWS, IAM, CloudWatch, CloudFormation, AWS Secret Manager, AWS Code Pipeline, Elastic Container Registry (ECR), Elastic Kubernetes Service (EKS), Migration, Cost Explorer, Cloud Check, Terraform, Chef, Ansible, Docker, Jenkins, GitLab, GitHub, GIT, SonarQube, Nexus, OpenShift, Nagios XI, Apache Tomcat, ELK Stack, Prometheus, Grafana, Datadog, ServiceNow, Python, JIRA.

State Of Michigan - (MDHHS) Lansing, Michigan Jan 2019-Aug 2022 DevOps Engineer SRE and Support

Project Description:

Modernized the State of Michigan’s legacy on-prem systems by migrating Medicaid and financial platforms to Microsoft Azure. Delivered Infrastructure as Code, CI/CD pipelines, and monitoring frameworks to improve scalability, security, and compliance with HIPAA and state regulations.

Responsibilities:

Managed end-to-end CI/CD pipelines using Azure DevOps, GitLab CI, and Jenkins, incorporating YAML templates, rollback strategies, security scans, and validation gates for secure deployments.

Designed and implemented reusable Terraform modules for Azure VNets, NSGs, Application Gateways, and VMs, while leveraging Azure backend with state locking and workspaces for multi-environment consistency.

Automated infrastructure provisioning across Azure with Terraform, Bicep, ARM templates, Ansible, and Azure Automation, enabling consistent IaaS and PaaS deployments across environments.

Deployed and managed AKS clusters and containerized workloads using Docker, Helm, Ingress Nginx, and Istio, supporting secure microservices and service mesh governance.

Implemented cloud migration strategies with Azure Migrate, Site Recovery, ExpressRoute, and Hybrid Connections, successfully moving legacy workloads to Azure Cloud.

Built DevSecOps pipelines with Aqua Security, SonarQube, and Azure Security Center, enforcing image scanning, static analysis, and compliance checks within CI/CD workflows.

Enabled secrets management with Azure Key Vault, AWS Secrets Manager, and AAD RBAC, securing application credentials, API keys, and PHI data across multi-cloud workloads.

Developed observability pipelines using Azure Monitor, Log Analytics, Prometheus, Grafana, Dynatrace, Datadog, and ELK, improving alerting, diagnostics, and performance monitoring.

Executed resilience and DR testing across multi-region Azure and AWS deployments, delivering HA and BCDR-ready architectures for government workloads.

Delivered automation for Azure Databricks and Data Factory, enabling secure data ingestion, ETL pipelines, and scalable machine learning workflows across analytics platforms.

Environment: Azure DevOps, Azure Services, ARM templates, Azure SQL, Azure Active Directory, Cosmos DB, Terraform, Ansible, Jenkins, GIT, Bitbucket, Python, Docker, Azure DevOps, Migration, SonarQube, Azure Databricks, Red Hat OpenShift Container Platform, Azure Kubernetes Service (AKS), Azure Container Registry (ACR), ISTIO, ELK stack, Azure Log Analytics, Zookeeper, Dynatrace, Azure Key Vault, Azure Pipelines, Nginx, Prometheus & Grafana, Bicep, Jira, Confluence.

US Bank Dallas, Texas Sept 2016 – Dec 2018

DevOps Engineer Cloud Platform Engineer

Project Description:

A global bank modernized its legacy VMware/WebSphere applications by migrating to AWS and Azure, refactoring them into microservices, and adopting Kubernetes for containerization. DevSecOps automation was implemented to enable secure, rapid releases, enhance agility, reduce technical debt, and ensure regulatory compliance.

Responsibilities:

Collaborated with development and system analysis teams to define build schedules, deployment guidelines, and resolve build system failures.

Migrated projects to Jenkins, optimized Maven POM files for Artifactory, and documented CI/CD processes for Jenkins, Git, and pipelines.

Used Eclipse and IBM RAD for Java application development and integration with WebSphere environments.

Migrated legacy apps to AWS & Azure; automated CI/CD with Jenkins, GitLab CI/CD.

Managed AKS infrastructure with Terraform, embedded security into DevOps workflows.

Deployed and monitored Kubernetes applications using Prometheus, Grafana, Splunk.

Created, configured, and managed Azure Kubernetes Service (AKS) clusters, node pools, and load balancing, and maintained access policies and workflows.

Integrated Git with Jenkins for automated builds, managed branching/merging, and embedded container security into DevSecOps pipelines.

Installed OpenShift logging and OADP operators for application monitoring and project backup to S3.

Migrated encryption processes to Hashi Corp Vault, implemented and maintained Chef across AWS and VMware, supported serverless Azure Functions with App Insights.

Ensured WebSphere environments were current with patches and security updates.

Configured Azure security using RBAC, Azure Security Center, and Azure Monitor automated infrastructure deployment with Terraform for AKS, ACR, and VMs.

Designed Jenkins CI/CD pipelines for environment scheduling across AWS accounts; implemented CI/CD workflows using Jenkins, Puppet, Shell scripts, SonarQube and Selenium.

Managed Docker containers and Kubernetes for efficient deployment automated Kafka deployments using Ansible, Terraform, and Kubernetes.

Monitored cloud environments using Prometheus, Grafana, Dynatrace, New Relic, Nagios XI, and Splunk for security and performance insights.

Maintained artifact repositories (Nexus, JFrog), automated JIRA integrations, executed DB migrations via Travis CI, and ensured infrastructure stability through scripting and backups.

Environment: Jenkins, Maven, Artifactory, GIT, Docker, Azure, Azure DevOps, Puppet, CloudWatch, Chef, VMware, AWS, SonarQube, Selenium, WebSphere, Hashi Corp Key Vault, Bicep, Travis CI, Dynatrace, Nexus, Jfrog, Kubernetes, OpenShift, Nagios XI, Nagios Plugin, Splunk, New Relic, Bash Shell Scripting, JIRA.

Reliance, India July2014 – Sept2015

DevOps Automation Engineer

Responsibilities:

Designed and implemented CI/CD pipelines using Jenkins, Argo CD, Docker, Git, and Bamboo, documented tool configurations and orchestrated deployments.

Dockerized CI/CD tools like Jenkins and GitLab; created and managed Docker files and images for middleware and application testing.

Participated in DevOps-focused university clubs, collaborated on projects, and engaged in hands-on learning workshops.

Completed DevOps courses on platforms like Udacity and Coursera, demonstrating adaptability to new technologies.

Gained exposure to IT infrastructure and worked cross-functionally to support automation initiatives.

Collaborated on open-source automation and infrastructure projects hosted on GitHub.

Deployed and provisioned Amazon EC2 instances, implemented security groups, and administered VPCs in AWS.

WS services like S3, Glacier, EC2, RDS, CloudFormation, SQS, SNS, SES, and VPC.

Implemented dynamic Docker provisioning for building slaves and containerized multiple services.

Developed and maintained Jenkins/Maven-based CI pipelines across various environments for safe, repeatable deployments.

Familiar with Kubernetes basics, container orchestration, and monitoring tools such as Prometheus, Grafana, and ELK Stack.

Built an automated deployment solution integrating Jenkins, Git, and Docker, improving reliability and speed.

Environment: Jenkins, Git, Docker, Kubernetes, Argo CD, Bamboo, GitLab, Maven, Prometheus, Grafana, ELK Stack, AWS (EC2, S3, RDS, VPC, CloudFormation, SQS, SNS, SES), Ansible, Linux, Python, Terraform, GitHub, CI/CD.

WNS Global Services, India Sept 2013 – July 2014

Linux System Administrator

Responsibilities:

Implemented firewall rules to enable secure communication with applications on new servers, ensuring robust security and proper access controls.

Implemented secure access with SSH, enabling password-less login using ssh-keygen.

Worked on RPM and YUM package management, installing and updating.

Installed and configured Apache/Tomcat web server on UNIX and Linux platforms, enabling seamless hosting of web applications.

Proficient in installing and managing various services, including LDAP, NFS, DHCP, HTTP, FTP, SSH, and DNS.

Developed Shell scripts using bash, Perl, and Python to automate system administration tasks.

Automated RHEL/CENTOS installations with PXE boot and Kickstart, streamlining OS deployment and developed Shell scripts and used SCP for file transfer across servers on cloud and Windows platforms.

Conducted regular reviews of system logs for errors and set up Cron jobs for automated backups and process monitoring.

Performed performance monitoring and tuning using tools like top, prstat, SAR, vmstat, ps, and lostat and utilized Logical Volume Manager for effective volume management, including the creation of physical and logical volumes.

Configured and managed virtual machines for efficient virtualization infrastructure, including Sphere VM ESX 3.x/2. x.

Administered and maintained Red Hat 3.0 and 4.0 AS/ES servers, troubleshooting hardware, OS, application, and network issues, and applying performance optimizations and patches.

Managed disk space efficiently with Logical Volume Manager (LVM) and maintained user accounts, groups, directories, and file permissions on Red Hat Linux.

Environment: Bash, Perl, Python, Cron jobs, Red Hat Enterprise, CentOS, Sphere VM, GIT, ssh-keygen, SSH, Apache Tomcat, LDAP, DNS, iptables, Troubleshooting, PXE boot, Kickstart, Logical Volume Manager, User Management.



Contact this candidate