Post Job Free
Sign in

Senior Cloud DevOps Engineer with AWS/Azure Expertise

Location:
Fort Worth, TX
Posted:
February 11, 2026

Contact this candidate

Resume:

VENKATESH GALI

Sr. Cloud DevOps Engineer

Tel: 603-***-****

Email: **********@*****.***

PROFESSIONAL SUMMARY:

Accomplished DevOps Engineer with over 10+ years of experience driving automation, cloud adoption, and platform reliability. Hands-on expertise in AWS, Azure, Docker, Kubernetes, Terraform, Jenkins, GitHub Actions, Argo CD, Ansible, Prometheus, and Grafana. Proven track record of optimizing software delivery pipelines, enhancing system observability, and scaling multi-cloud solutions for large enterprises.

Architected, automated, and deployed cloud infrastructure across AWS and Microsoft Azure with a focus on scalability, security, and cost efficiency.

Amazon certification “validation number WHTRFKMC12B1QRKY, validate at

http://aws.amazon.com/verification"

Designed and maintained AWS infrastructure is highly available, scalable, secured, monitored and alerting network infrastructure.

Managed AWS services such as EC2, EKS, Lambda, VPC, ELB, RDS, S3, CloudFront, SNS, SQS, and CloudFormation for infrastructure automation.

Configured AWS CloudTrail and CloudWatch for compliance, auditing, and proactive security alerting.

Worked with Azure IaaS/PaaS/SaaS components including Virtual Networks, VM Scale Sets, Application Gateways, Traffic Manager, Azure Active Directory, and Key Vault.

Designed and implemented Azure Resource Manager (ARM) templates, Terraform (v1.x), and Bicep scripts for Infrastructure as Code (IaC) provisioning.

Implemented Azure Monitor, Log Analytics, and Application Insights for cloud resource monitoring, alerting, and performance optimization.

Enabled automated testing and deployment workflows through Kubernetes, Helm, and Terraform, promoting full lifecycle automation.

Orchestrated application deployments across hybrid environments using CI/CD pipelines integrated with EKS and AKS.

Ensured cluster compliance and security through managed updates, vulnerability scans, and container policy enforcement.

Developed custom Helm charts and managed declarative deployments for microservices across dev, staging, and prod environments.

Used Terraform and CloudFormation for repeatable, auditable, and scalable infrastructure provisioning.

Performed Continuous Delivery in a microservice infrastructure with Amazon cloud, Docker and Kubernetes and Amazon ECS.

Experienced in scaling Amazon RDS, MySQL, MongoDB, DynamoDB instances vertically and horizontally for high availability.

Experience in routing production traffic for high availability multi-site using Route 53 using failover and weighted Routing policies.

Managed user access to AWS resources through AWS CLI, AWS Console or AWS SDK using AWS IAM services.

Hands-on Experience on GitLab and Bitbucket to help manage and document all the changes to Application code and Configuration management code and have strong experience on source control concepts like Branches, Masters and Tags.

Handling, deploying, maintaining various servers, including application, Database, Web, Mail, Virtual, Configure and ensure connection to RDS database running on MYSQL engines.

Build infrastructure with custom Terraform templates and maintain them as a part of Disaster Recovery.

Experience in Cloud Administrator on Microsoft Azure, involved in configuring virtual machines, storage accounts, resource groups, Function applications, Application Insights, Service Bus, VM scale set with custom script, App Service deployment, and Azure SQL Server.

Knowledge on IaaS / PaaS / SaaS. Keeping up to date with new offers from Azure.

Experience in managing infrastructure using Terraform.

Experience in Microsoft Enterprise Environments for multiple infrastructure upgrades, including Azure Cloud.

Azure Cloud Skills: ARM templates, Azure Web App / API, Azure Search, Azure Function, Azure Service Backup Vault and Recovery Service Vault and Backup/Restore, SQL DB, Azure Data Factory, Azure Data Lake Storage, monitor and optimize databases, Terraform, Datadog, and Cloud IaaS, PaaS, and SaaS, etc.

Experience in Linux Administration (Installation, Configuration, Tuning, and Upgrades of Linux – Red Hat and Oracle).

Expertise in configuring the monitoring and alerting tools according to the requirements like Prometheus and Grafana, setting up alerts and deploying multiple EKS dashboards for various microservices in Kubernetes.

Configured alerting integrations with PagerDuty, Slack, and ServiceNow for proactive issue response.

Implemented IAM, RBAC, and MFA policies across AWS and Azure for secure user access and role segregation.

Closely worked with development, QA and other teams to ensure automated test efforts are tightly integrated with the build system and in fixing the error while doing the deployment and building.

Installed, configured and Managed Monitoring Tools such as Splunk, Nagios for Resource Monitoring, Network Monitoring, Log Trace Monitoring.

Practiced Agile/Scrum, Waterfall, and DevSecOps methodologies for collaborative software delivery.

Used JIRA, Confluence, and Azure Boards for sprint planning, backlog tracking, and release coordination.

Prepared system requirement specifications, functional designs, and deployment documentation

TECHNICAL SKILLS:

Application & Web Servers

Apache, Tomcat, WebLogic, Nginx, IBM WebSphere, OpenShift Routes/Ingress

Programming & Scripting Languages

Java (Spring Boot, Servlets, JDBC), Python, Groovy, Shell/Bash, PowerShell, JavaScript, YAML, JSON

Cloud Platforms

AWS (EC2, S3, EBS, RDS, ELB, ECS, EKS, CloudFormation, IAM, CloudFront, SNS, Route53, CloudWatch), Azure (VMs, AKS, Blob, DevOps, Terraform),

Infrastructure as Code (IaC)

Terraform, Ansible, AWS CloudFormation, Helm, ArgoCD, Spinnaker

CI/CD & Automation

Jenkins, Azure DevOps (YAML pipelines), GitLab CI, GitHub Actions, Maven, Gradle, Ant, Nexus, Artifactory, DockerHub, ECR

Containers & Orchestration

Docker, Kubernetes (EKS, AKS, GKE), OpenShift, Helm

Monitoring & Logging

Splunk, Prometheus, Grafana, ELK/EFK Stack, Datadog, AppDynamics, Dynatrace, Nagios, CloudWatch

Security & Compliance

HashiCorp Vault, SonarQube, Prisma Cloud, Qualys, RBAC, IAM,

Databases & Storage

SQL Server PostgreSQL, MySQL, DB2, MongoDB, Cassandra, DynamoDB, Redis

Build & Repository Management

Maven, Gradle, Ant, Nexus, Artifactory, Bitbucket Pipelines, GitHub Packages, JFrog

Version Control Systems (SCM)

Git, GitHub, GitLab, Bitbucket, SVN, TFS, Subversion, Azure Repos, Tortoise SVN

Bug & Project Tracking Tools

JIRA, Confluence, ServiceNow, Remedy

Operating Systems

UNIX, IBM AIX (4.3.3–7.2), Solaris, HP-UX, Linux (RHEL, CentOS, Ubuntu, Fedora, Debian, SUSE), Windows (NT–Server 2022), MacOS

Networking & Load Balancing

LAN/WAN/VPN, Firewalls, Load Balancers (HAProxy, ALB/NLB), CDN (CloudFront, Akamai), VPC/Subnet, DNS, Network Security Groups

PROFESSIONAL EXPERIENCE:

Client: Verizon

Location: Irving, TX Feb'24 to Present

Role: Sr AWS DevOps Engineer

Responsibilities:

Worked on core AWS services such as setting up EC2, configuring Security Groups, and setting up Elastic IPs and configuring Elastic Load Balancers (ELB) with EC2 Auto Scaling groups.

Created branching and tagging strategies to maintain the source code in Bitbucket repositories and coordinated with developers by establishing and applying appropriate branching and naming conventions using Git source control.

Worked on GitLab CI/CD pipelines, configuring and triggering build and deployment pipelines for automated testing, artifact creation, and environment deployments.

Configured and automated Jenkins Build jobs for Continuous Integration and Continuous Deployment (CI/CD) workflows.

Created Docker images using Docker files, worked on Docker container snapshots, removing images, managing Docker volumes, and used Kubernetes for orchestration.

Worked with scheduling, deploying, and managing container replicas onto node clusters using Kubernetes.

Upgraded Kubernetes cluster versions and monitored cluster health, node utilization, and workloads to ensure optimal performance and stability.

Managed and Maintained 20+ Kubernetes clusters across multiple environments, ensuring high availability, scalability and optimized resource utilization.

Created, configured, and maintained pods, nodes, and namespaces to support microservice-based applications and improve container lifecycle management.

Integrated and managed Kubernetes add-ons such as Cluster Autoscaler, Metrics Server, Ingress Controller (NGINX), CoreDNS, and Kube-State-Metrics to enhance scalability and observability.

Automated cluster setup, node provisioning, and workload deployments using Helm charts, Terraform, and ArgoCD, reducing deployment time by 40%.

Optimized EKS cluster configurations, achieving significant improvements in performance and cost efficiency.

Maintained user accounts (IAM), created cross-account roles, and attached the required policies to deploy services based on trusted entities within multiple AWS accounts.

Set up and built AWS infrastructure resources — VPC, EC2, S3, IAM, EBS, Security Groups, Auto Scaling, and RDS using CloudFormation and Terraform.

Developed Terraform templates and reusable modules for provisioning AWS resources such as VPCs, subnets, EC2, ELB, RDS, S3, MSK, OpenSearch, EKS clusters, and ECR repositories.

Configured Terraform remote state with S3 backend + DynamoDB for locking, enforced provider/module pinning, and integrated terraform plan in CI pipelines to require peer review before apply.

Managed environment separation using Terraform workspaces / per-environment state files and variable files for Dev, QA, Stage, and Prod environments.

Ensured tfstate security and encryption (S3 + KMS), avoided storing secrets in state by referencing Secrets Manager / SSM Parameter Store, and enforced IAM least privilege for state access

Developed YAML manifests and Helm templates for repeatable, version-controlled deployments across multiple environments.

Supported data management and migration between clusters, ensuring consistent backup, recovery, and replication strategies for critical services.

Performed Terraform drift detection and implemented automated remediation scripts to maintain consistency between declared and live infrastructure.

Provided highly durable and available data storage using AWS S3 with versioning, lifecycle policies, and created AMIs for mission-critical production servers for backup and recovery.

Built various containers using Docker Engine and Docker Machine environments to deploy microservice-oriented applications for scalability.

Automated infrastructure provisioning and configuration using Terraform ensuring consistent and repeatable OpenNet environment setups.

Used Prometheus and Grafana for monitoring Kubernetes clusters, setting up dashboards, and visualizing performance metrics.

Installed, configured, and administered Jenkins on Linux machines along with managing plugins such as Git, Maven, ANT, Nexus, Bitbucket, and Docker.

Involved in developing Python scripts to automate Cron jobs and system maintenance activities.

Created monitors, alarms, and notifications for AWS EC2 hosts using CloudWatch and Lambda for automation.

Deployed Java/J2EE applications to Application Servers in an Agile CI/CD environment, automating the deployment process end to end.

Used MySQL and MongoDB to perform basic database administration tasks.

In-depth knowledge of scripting languages such as Shell, Python, Ruby and JavaScript experienced in developing scripts for automation, data analysis, and reporting.

Worked on Argo CD and Spinnaker for automating Kubernetes deployments and managing GitOps-based workflows.

Managed PagerDuty alerts and participated in on-call rotations for production issue resolution and proactive incident management.

Migrated existing Linux workloads to AWS/RHEL, used auto-scaling for cost efficiency, and performed server patching and remediation.

Used JIRA for issue tracking and change management, and Confluence for documentation.

Environment: Java/J2EE, AWS (EC2, S3, IAM, ELB, CloudWatch, CloudFormation, MSK, OpenSearch, EKS, RDS, VPC, Route53, Security Hub, KMS, Backup), Jenkins, GitLab, Terraform, Bitbucket, Docker, Kubernetes, Argo CD, Spinnaker, Prometheus, Grafana, Nexus, Groovy, Bash, Python, Linux, Shell scripting, Apache Tomcat, JIRA, Confluence, Agile methodology

Client: Best Western Hotels

Location: Phoenix, AZ Nov'21 to Jan’24

Role: Azure DevOps Engineer

Responsibilities:

Worked extensively on Microsoft Azure Cloud for deploying, managing, and monitoring cloud infrastructure using services such as Azure Virtual Machines, Azure Kubernetes Service (AKS), Azure Storage Accounts, Azure Networking, and Azure Load Balancers.

Created and managed Azure Resource Groups, Virtual Networks (VNet), Subnets, Network Security Groups (NSG), and Application Gateways for secure and optimized application deployments.

Implemented Infrastructure as Code (IaC) using Terraform, creating reusable modules to provision Azure resources such as VNets, Azure Kubernetes Clusters (AKS), Azure Container Registries (ACR), Virtual Machines, Azure SQL Databases, and Application Gateways.

Configured Terraform remote state management using Azure Storage Account and Azure Key Vault for secure storage and state locking.

Integrated Terraform with Azure DevOps pipelines and GitLab CI/CD for automated provisioning and environment setup across Dev, QA, and Production.

Created CI/CD pipelines in Azure DevOps and GitLab to automate the build, test, and deployment of microservices and applications into AKS clusters.

Worked on GitLab pipelines for automating image builds, artifact creation, Terraform deployments, and triggering environment rollouts.

Used Docker to containerize applications and created optimized Docker images using Dockerfiles.

Worked with Azure Kubernetes Service (AKS) for orchestrating and managing containerized applications. Configured pod autoscaling, node pools, namespaces, and RBAC for access control.

Performed Kubernetes cluster upgrades, applied security patches, monitored AKS cluster health, and optimized resource utilization for high availability.

Configured Azure Container Registry (ACR) for storing and managing private Docker images and integrated it with AKS clusters for seamless deployments.

Used Argo CD and Spinnaker for implementing GitOps-based automated deployment workflows into AKS environments.

Configured Prometheus for metrics collection and integrated Grafana dashboards for real-time visualization and alerting on application and cluster health.

Configured Azure Monitor, Application Insights, and Log Analytics for performance monitoring, centralized logging, and alerting.

Configured and managed Azure Active Directory (AAD) for authentication, role-based access control (RBAC), and secure access across multiple Azure subscriptions.

Configured and managed Azure Key Vault for securely storing secrets, API keys, and certificates used in CI/CD and infrastructure automation.

Automated server provisioning and application deployment using Terraform integrated with GitLab and Azure DevOps pipelines for seamless end-to-end delivery.

Implemented Blue-Green and Canary deployment strategies using Spinnaker and Argo CD to ensure zero downtime releases in production.

Configured and maintained Jenkins for CI/CD builds, integrated it with GitLab and Azure DevOps repositories for automated job execution.

Used Helm charts for Kubernetes resource templating and version-controlled deployments into AKS clusters.

Developed Shell, Python, and Groovy scripts to automate daily operations such as log rotation, environment validation, and resource cleanup.

Participated in on-call rotations using PagerDuty, actively monitored incidents, and performed proactive remediation to maintain SLA targets.

Implemented SonarQube integration with pipelines for code quality and static analysis checks.

Used JIRA for tracking issues and managing sprints and Confluence for documenting processes and configuration guides.

Environment: Azure (VMs, AKS, ACR, VNet, NSG, Load Balancer, App Gateway, Storage, SQL, Key Vault, Azure Monitor, Application Insights), Terraform, Azure DevOps, GitLab CI/CD, Jenkins, Docker, Kubernetes, Argo CD, Spinnaker, Prometheus, Grafana, Helm, Bitbucket, Nexus, Python, Shell, Groovy, Linux, JIRA, Confluence, Agile

Client: Western World

Location: Edison, NJ Sep'19 to Oct’21

Role: Azure DevOps Engineer

Responsibilities:

Designed, planned, and implemented on premises to Azure Cloud (ARM) migrations, leveraging Azure Compute, Web & Mobile, Blobs, ADF, Resource Groups, Azure Data Lake, HDInsight, Azure Data Factory, Azure SQL, and Cloud Services with strong automation focus.

Built Azure Automation Assets, graphical and PowerShell runbooks; deployed Azure AD Connect, configured AD FS authentication, and supported build, design, and deployment of Azure environments.

Hands-on experience with Azure IaaS including Virtual Networks, Virtual Machines, Cloud Services, ExpressRoute, Traffic Manager, VPN, Load Balancers, Application Gateways, and Auto Scaling.

Deployed Azure IaaS VMs and PaaS services within secure VNets and subnets, ensuring network isolation and compliance.

Led Azure IaaS migrations involving VM creation, storage accounts, VHDs, availability sets, on-prem server migrations, VM hardening, and disk encryption using KEK keys.

Implemented Docker and Azure Container Registry using Docker and Docker-Compose; built test environments and deployed containerized applications using Kubernetes.

Deployed Windows Kubernetes (K8s) clusters using Azure Container Service (ACS) via Azure CLI and utilized Docker and Kubernetes as CI/CD runtime environments with Octopus Deploy.

Developed Infrastructure as Code (IaC) using Terraform for staging and production environments; automated Azure IaaS VM provisioning using Terraform modules and deployed VM Scale Sets.

Integrated Azure Log Analytics for VM monitoring, centralized logging, and metrics tracking across cloud, VMware, and Docker-based environments.

Managed Azure infrastructure including Web Roles, Worker Roles, VM Roles, Azure SQL, Azure Storage, Azure AD licensing, and VM backup and recovery using Recovery Services Vault.

Integrated Jenkins CI/CD pipelines with Git version control; implemented GitHub webhooks for commit, push, merge, and pull requests, deploying images to Docker Registry and workloads to Kubernetes pods.

Designed and maintained Python-based automation for Git administration and CI/CD workflows, deploying applications to Tomcat servers via Jenkins shell scripts.

Managed servers on confidential Azure platforms using Ansible Configuration Management, creating playbooks, manifests, profiles, and role modules to automate system operations.

Implemented centralized configuration management using Ansible and Cobbler to manage existing servers and automate provisioning of new environments.

Designed and supported OpenShift and Kubernetes architectures, troubleshooting platform issues and implementing global and multi-regional deployment models on Cloud Foundry, OpenShift, and Kubernetes.

Installed and configured Docker and Kubernetes for orchestration; managed Kubernetes deployments using Helm charts, maintained manifest files, and handled Helm release management.

Built Jenkins Docker slave nodes using custom Docker images and worked extensively with Docker components including Daemon, Hub, Registry, Images, and Swarm.

Led application containerization initiatives, creating Docker images and containers, managing Docker Registry/Docker Hub, and orchestrating containers using Docker Swarm.

Supported Kubernetes debugging and production readiness, validating stability through testing of multiple application builds prior to release.

Provided high availability for IaaS VMs and PaaS role instances using Azure Internal Load Balancer.

Designed a future-state Ingestion Framework leveraging Azure Data Factory, Azure SQL Database, and Azure Data Warehouse.

Created and managed complex JIRA workflows, including project workflows, screen schemes, permission schemes, and notification schemes.

Environment: Azure, ARM, IaaS, PaaS, Azure Virtual Machines, Azure Virtual Networks, Azure Data Lake, HDInsight, Azure AD, Azure AD Connect, AD FS, Docker, Docker-Compose, Kubernetes, Helm, Azure Container Registry, OpenShift, Jenkins, Git, Terraform, Ansible, Cobbler, JIRA, Python, PowerShell, Shell Scripting, Linux (RHEL, Oracle Linux), Windows

Client: Purch

Location: Danvers, MA Nov'17 to Aug'19

Role: Azure DevOps Engineer

Responsibilities:

Designed and implemented Infrastructure as Code (IaC) using Terraform and Azure Resource Manager (ARM) templates for provisioning Azure Resource Groups, VNets, Subnets, NSGs, and Storage Accounts.

Migrated on-prem virtual machines and legacy workloads to Azure Kubernetes Service (AKS) with Terraform automation.

Built ephemeral CI environments that auto-destroy post-build to optimize Azure resource costs.

Deployed Active Directory domain controllers and managed Azure identity integration for authentication and policy enforcement.

Implemented Azure Policy as Code for compliance, enforcing governance and resource tagging standards across subscriptions.

Built end-to-end CI/CD pipelines using Azure DevOps and Jenkins declarative pipelines for .NET, Java, and Python applications.

Automated build, test, and deployment workflows with multi-stage pipelines integrating SonarCloud, Trivy, and JFrog Artifactory.

Implemented Blue-Green and Rolling deployments in AKS to ensure zero downtime for production releases.

Managed Git repositories and branching policies using Azure Repos and Git hooks for automated version tagging.

Configured Slack and PagerDuty for real-time CI/CD notifications and status tracking.

Enabled matrix builds in Jenkins for multi-environment QA validation and automated regression testing.

Streamlined release orchestration processes and reduced deployment frequency from biweekly to daily using automated rollout pipelines.

Collaborated with QA, Development, and Product teams to manage release schedules and deployment readiness in Agile sprints.

Containerized legacy monoliths into microservices and deployed them to Azure Kubernetes Service (AKS).

Built multi-stage Docker pipelines, optimized image layers, and pushed images to Azure Container Registry (ACR).

Created Kubernetes manifests and Helm charts to standardize microservice deployments across environments.

Enabled auto-scaling using Horizontal Pod Autoscaler (HPA) and implemented readiness/liveness probes for self-healing workloads.

Implemented centralized logging using Elastic Stack (Elasticsearch, Logstash, Kibana) for audit trails and compliance.

Monitored application health and performance with Azure Monitor, AppInsights, and AppDynamics dashboards.

Developed Python scripts for log rotation, performance analytics, and proactive issue detection.

Integrated log pipelines with Azure Log Analytics for unified visibility and incident troubleshooting.

Integrated HashiCorp Vault and Azure Key Vault for secure storage, retrieval, and rotation of application secrets.

Enforced role-based access control (RBAC) and Managed Identities across Azure services.

Scanned every build for vulnerabilities using Trivy and static analysis through SonarCloud.

Applied Azure Policy as Code to enforce encryption, network isolation, and compliance guardrails.

Implemented secure API exposure via Azure Application Gateway and WAF (Web Application Firewall) for ingress protection.

Participated in Agile/Scrum ceremonies including sprint planning, backlog grooming, and retrospectives.

Conducted root cause analysis (RCA) and implemented preventive measures for recurring infrastructure issues.

Developed automation reports by querying Azure SQL databases for system performance metrics.

Environment: Terraform, Azure Resource Manager (ARM), Azure Kubernetes Service (AKS),, Active Directory, Azure Blob Storage, Azure Policy, Azure DevOps, Jenkins, SonarCloud Azure Repos, Slack,, Docker, Azure Container Registry (ACR), Kubernetes, Helm,, Redis, Kafka, Cosign, Elastic Stack (Elasticsearch, Logstash, Kibana HashiCorp Vault, Azure Key Vault, role-based access control (RBAC), Azure Application Gateway, WAF (Web Application Firewall).

Client: ZoHo Jan'2014 to Oct'2015

Location: Chennai, TN

Role: Linux System Admin

Responsibilities:

Responsible for solving any technical problems related to system support

Worked with various teams to ensure system configuration follow corporate policies and control standards.

Experience in working with the windows server platform and Unix/Linux platform.

Ability to use network analysis and managed tools.

Managing Active Directory Services and configuring user profiles.

Installation of Windows servers and configuration, implementation and maintenance.

Creating new file system, managing & checking data consistency of the file system.

Back up management for client’s machine on weekly basis on hard drives.

Experience in TCP/IP configuration, creating subnet scope in Domain Controller and IP reservation.

Worked and configured the networking and server utilities.

Configure CPU, memory, and disk partitions as required.

Assisted in physical installation of assets, including racking, cable connecting and testing.

Working knowledge of IT standards, concepts, best practices and procedures relies on knowledge, experience and judgement to plan and accomplish goals.

Experienced in networking with LAN, WAN, Routers, Gateways etc.

Managed patches configuration, version control, service pack and reviews connectivity issues regarding security problems

Involved in debugging the applications monitored on JIRA using agile methodology.

Involved in Agile Methodologies and SCRUM Process.

Worked on JIRA tracking and updating the JIRA tickets.

Environment: Red Hat Linux (RHEL 5/6), Centos, Networks, Configuration, IP, TCP, DNS, NFS, Global File System.

Education:

New England College, NH - Masters in CIS Final GPA: 3.7 out of 4.0



Contact this candidate