Raviteja Marella
Senior DevOps Engineer
Email: ***************@*****.***
Phone: +1-512-***-****
LinkedIn: www.linkedin.com/in/tejama
SUMMARY:
Senior DevOps Engineer with 12+ years of experience building secure, scalable, and automated cloud environments across AWS and Azure. Expert in Terraform-based IaC, Azure DevOps CI/CD pipelines, Kubernetes, and multi-account AWS architectures.
Strong background automating AWS AI/ML services including SageMaker, Bedrock, LLM endpoints, and data-processing pipelines. Adept at enforcing cloud security, IAM governance, VPC isolation, encryption, observability, and cost control for GenAI and enterprise workloads..
Skilled in defining DevOps roadmaps, collaborating with cross-functional stakeholders, and delivering 24x7x365 operational excellence. Adept at building enterprise engineering systems, reusable deployment interfaces, and automating tools that simplify complexity while enhancing quality and speed.
Passionate about staying on top of DevOps trends, integrating feedback into strategic initiatives, and aligning platform capabilities with long-term business goals.ust, scalable, and secure cloud foundations.
Designed enterprise-wide CI/CD strategies with reusable pipeline frameworks, empowering distributed teams to scale with agility.
Partnered with engineering leads to institutionalize best DevOps practices and built a 3-year engineering system roadmap aligned with business goals.
Built self-service deployment solutions and reusable integration interfaces, enabling product teams to focus on innovation.
Championed developer experience by simplifying onboarding, enforcing best practices, and centralizing documentation.
Spearheaded initiatives to improve developer productivity, incident resolution, and system resiliency using observability platforms like Datadog and New Relic.
Led cross-team working groups to define DevOps KPIs, prioritize engineering investments, and align delivery with LOB strategies.
Immersed in product strategy and business objectives, ensuring technical initiatives serve both user needs and long-term scalability.
Created reusable job templates in Jenkins for streamlined build, test, and deploy cycles of Mainframe applications.
Hands-on experience developing AWS full-stack applications using ReactJS, NodeJS, and AWS services.
Built micro-frontend architectures with Single-Spa for modular and scalable UI deployments.
Designed and deployed NodeJS REST APIs on AWS Lambda with API Gateway.
Secured applications using AWS Cognito for role-based authorization and Single Sign-On (SSO).
Automated business processes in AWS using Step Functions, EventBridge, and Lambda to reduce manual effort.
Gained hands-on exposure to Mainframe-based SCM concepts, version control tools, and DevOps best practices.
Worked closely with internal and client-side development teams to ensure smooth pipeline onboarding.
Automated configuration management tasks using Ansible and supported infrastructure provisioning using Terraform.
Proactively participated in client meetings to share updates, blockers, and coordinate cross-functional tasks.
Supported cloud-native workloads integrating AI/ML services and modern APIs, collaborating with data teams on automation and platform reliability.
Worked with infrastructure-as-code using Terraform and CloudFormation; familiar with AWS CDK concepts and patterns.
Experience supporting configuration management and automation tooling alongside Ansible in heterogeneous environments.
Integrated SonarQube for static code analysis of migrated COBOL code to maintain code quality standards.
Designed Git workflows to accommodate legacy codebase branching strategies.
Participated in Agile ceremonies and used Jira for sprint planning, backlog grooming, and story tracking.
Facilitated knowledge transfer sessions and created training materials for junior engineers and cross-functional teams.
Built dashboards in Grafana to monitor migration pipeline performance and identify bottlenecks.
Migrated source code from Endevor to GitHub Enterprise for streamlined SCM practices.
Supported implementation of GitLab-based CI/CD for legacy systems alongside Jenkins jobs.
Utilized ANT and MAVEN scripts for building applications (EAR, WAR, JAR) and deployed/undeployed applications using Shell scripts.
Implemented New Relic for application performance monitoring (APM) and end-to-end visibility into distributed systems. Configured Datadog integrations to collect metrics, traces, and logs from AWS, Azure, GCP, and container orchestration platforms.
•Employed PowerShell scripts and ARM templates in conjunction with Ansible for Azure automation, ensuring streamlined cloud provisioning and effective configuration management.
•Utilized VMware Converter and Azure Migrate for seamless migration of Linux-based machines to virtual machines, ensuring efficient resource utilization and improved scalability.
SKILL STACK:
Cloud Technologies
Amazon Web Services (EC2, S3, EBS, RDS, ELB, Route 53, Auto scaling, Security Groups, VPC, CFT, SQS, SNS, Glacier, GuardDuty, Lambda)
Azure (Virtual networks, VM, ACR, AppService, AppInsights)
GCP: Compute Engine, GKE, IAM, VPC, Cloud Monitoring, Cloud Storage
Configuration Management
Ansible, Puppet, Chef, Ansible Tower
CI /CD
Jenkins, GitHub Actions, GitLab, Azure DevOps Pipelines, Spinnaker
Artifactory & Container management
Jfrog, Azure Artifacts, Nexus, AWS CodeArtifact, Docker, Kubernetes (EKS, AKS, GKE), OpenShift (OCP/ROSA – hands-on exposure), Helm Charts
Application & Web Services
Apache Tomcat, NGINX, IIS, Node.js, Spring Boot, Django
Infrastructure as code
Terraform, AWS CloudFormations, ARM Templates, Azure Bicep
Monitoring tools
Splunk, Dynatrace, Prometheus, Nagios, Grafana, ELK, Azure Monitor, AWS CloudWatch, Datadog, New Relic
SCM Tools
GIT, SVN, Git, GitHub, Bitbucket
Scripting/ Programming Languages
Python, Shell Scripting, Bash, YAML, JSON, Java, Powershell, Groovy, .NET, HTML, Go, ReactJS, Single-Spa
Testing/ Code Quality
SonarQube, Selenium, JUnit, Trivy, Veracode, Twistlock
Project Management Tools
Jira, Azure DevOps Boards, Trello
Database
Oracle 11g, My SQL, AWS DynamoDB, MongoDB, PostgreSQL
Operating systems
Linux/Unix, Windows, Ubuntu Server
PROFESSIONAL EXPERIENCE:
Client: American Express, New York Apr 2022 - Present
Senior DevOps Engineer
Responsibilities:
Designed and administered AWS S3 buckets, implementing policies and utilizing S3 and Glacier for robust storage and backup solutions within the AWS ecosystem.
Leveraged AWS Identity and Access Management (IAM) to enable fine-grained permissions management and resource allocation, proficiently managing user roles and permissions.
Architected and executed end-to-end server build management, monitoring, and deployment automation using Ansible, fostering efficiency and consistency.
Developed micro-frontend solutions using ReactJS and Single-Spa to modularize UI components and enable independent deployments.
Designed and deployed serverless NodeJS APIs with AWS Lambda and API Gateway for secure, scalable backend services.
Integrated AWS Cognito for authentication, authorization, and enterprise SSO.
Led migration of on-prem applications to AWS cloud, modernizing legacy systems and aligning with enterprise cloud-first strategy.
Supported GCP workloads for containerized applications using GKE and Terraform as part of a multi-cloud DevOps environment.
Supported end-to-end CI/CD pipelines for large-scale enterprise applications (Guidewire-like platforms) using Jenkins and GitLab CI with automated testing, packaging, and deployments.
Diagnosed and resolved CI/CD, infrastructure, and application issues with rapid root cause analysis, maintaining 99.9% uptime for production systems.
Utilized Helm charts and Karpenter for Kubernetes resource provisioning and cost optimization, reducing over-provisioning and enhancing cluster efficiency.
Defined and institutionalized enterprise DevOps practices, enabling reusable GitHub Actions workflows (YAML-based) for build/test/lint, security scans (Veracode, Trivy), and CD to AWS EKS.
Automated provisioning and configuration of AWS AI/ML services including SageMaker notebook instances, model endpoints, and training jobs using Terraform and AWS SDK.
Integrated AWS Bedrock and custom LLM endpoints into secure AWS VPC architectures with IAM, KMS encryption, and API Gateway.
Developed CI/CD automation in Azure DevOps for deploying ML pipelines, containerized inference services, and data-processing workloads.
Built automated workflows for ingesting and processing documents using AWS Textract, Comprehend, and Lambda-based orchestration.
Implemented observability for GenAI workloads by integrating Datadog, CloudWatch, and X-Ray for model performance, latency, and cost monitoring.
Collaborated with Data Science and ML Engineering teams to streamline model deployment, versioning, and promotion across Dev/QA/Prod environments.
Automated nightly AMI and EBS snapshots using AWS CLI and Lambda functions, improving backup reliability and disaster recovery readiness.
Established security and compliance controls for AI/ML workloads including IAM least-privilege roles, VPC endpoint isolation, encryption policies, logging, tagging, and cost governance.
Implemented “Infrastructure as Code” for mainframe modernization projects using UrbanCode Deploy, Ansible, and Jenkins to automate deployment on z/OS systems.
Supported containerized application deployments on Red Hat OpenShift as part of an enterprise Kubernetes platform, assisting with application onboarding, Helm-based deployments, and environment standardization.
Worked with OpenShift clusters alongside EKS-based platforms, supporting CI/CD integrations, container image management, and secure namespace configurations.
Managed Terraform-based infrastructure across multi-account AWS environments with centralized IAM, networking, and logging controls. Skillfully designed, deployed, and orchestrated containerized applications leveraging Docker, while ensuring high availability and scalability with Kubernetes.
Utilized Terraform for Infrastructure as Code (IAC), proficiently scripting EC2 instances, Elastic Load Balancers, and S3 buckets, ensuring infrastructure consistency and reliability.
Effectively managed AWS infrastructure provisioning via CloudFormation and Terraform, automating resource lifecycle management and maintaining resource state in Terraform state files.
Experienced working with on-premises network, application, server monitoring tools like Nagios, Splunk, and on Azure with Azure Monitor.
Streamlined tasks by writing multiple Python and PowerShell scripts for various activities.
Implemented a Continuous Delivery framework using Azure DevOps, Ansible, and Maven in Linux. Automated incident reports in production using Azure Logic Apps for log analytics, saving over 20 hours of manual work weekly.
Environment: Microsoft Azure, Azure Virtual Machines (VMs), Azure SQL Database, Azure App Service, Azure DevOps (VSTS), Azure Pipelines, Azure Resource Manager (ARM), Azure Monitor, Azure Log Analytics, Azure CDN, Azure Cache for Redis, Azure Service Bus, Azure Functions, Azure Active Directory (AAD), Azure DNS, Maven, Nexus, .NET, Terraform, Jenkins CI/CD, Nagios, Jira, PowerShell, Python, Virtual Network (VNet), Autoscaling, Azure Bicep, Nginx, Tomcat, Git, Docker, Kubernetes, Google Cloud Platform (GCP), ServiceNow.
Client: Western Alliance Bank, Texas Oct 2020 – Mar 2022
AWS DevOps Engineer
Responsibilities:
Hands-on experience in provisioning and managing AWS services, including EC2, S3, Glacier, ELB, RDS, SNS, SWF, and EBS to support scalable cloud infrastructure.
Launched and configured Linux and Windows servers on AWS from scratch, ensuring environment consistency for application deployment.
Built micro-frontend components in ReactJS and orchestrated them using Single-Spa for modular releases.
Created serverless backend APIs with AWS Lambda, API Gateway, and DynamoDB.
Implemented AWS Cognito for secure user authentication, role-based access control, and SSO.
Leveraged AWS Step Functions and CloudWatch Events for business process automation, streamlining operational workflows.
Installed, configured, and managed Jenkins on Linux servers to automate CI/CD pipelines across development and production environments.
Developed Ansible playbooks and roles to automate server provisioning, configuration management, and application deployments.
Implemented S3 bucket versioning and lifecycle policies, enabling cost-effective storage and archival in Glacier for backup and retention.
Configured Amazon Route 53 to manage hosted DNS zones and map ELB endpoints with public domain names.
Designed and authored AWS CloudFormation templates to provision custom VPCs, subnets, internet/NAT gateways, and associated networking components.
Integrated Grafana with Prometheus and other monitoring data sources to provide real-time visualizations and actionable performance dashboards.
Implemented scalable GitHub Actions pipelines for CI/CD, including static code analysis, Docker builds, and Helm-based EKS deployments.
Built reusable GitHub workflow templates to accelerate adoption across product teams.
Led cross-functional initiatives to centralize secrets handling using GitHub Environments and OIDC for AWS integration.
Collaborated with engineering leads to define CI/CD performance KPIs and tracked delivery improvements.
Enabled secure, automated infrastructure provisioning with Terraform and CloudFormation.
Established GitOps conventions for multi-region Kubernetes deployments using Helm.
Developed auto-scaling rules based on Prometheus metrics and integrated with Kubernetes HPA.
Led DevSecOps assessments to ensure pipeline security posture aligned with NIST/OWASP guidelines.
Migrated legacy Jenkins pipelines to GitHub Actions, reducing tool overhead.
Created automated rollback strategies tied to health checks and deployment markers.
Optimized build cache strategies to reduce CI execution time by 45%.
Built documentation portals using MkDocs to onboard teams to CI/CD practices.
Proficient in scripting using Shell (Bash), PowerShell, and automation tasks on UNIX, Linux, and Windows systems.
Managed Kubernetes manifests, Helm charts, and reproducible application releases; implemented infrastructure as code (IaC) for containerized deployments.
Deployed and configured Prometheus for container monitoring, setting up alerts and metrics collection to ensure application health in Kubernetes clusters.
Designed Jenkins pipelines for microservices builds, automated Docker image creation and registry uploads, and orchestrated deployments to Kubernetes clusters.
Environment: Jenkins, AWS, GIT, Bash scripts, SVN, Tomcat, Nexus, AWS EC2, Jenkins CI, Dockers, Elastic Load Balancers (ELB), Elastic Beanstalk, CloudFront, Cloud Formation, Elastic Cache, Cloud Watch, Route 53, Red shift, Lambda and DynamoDB, ELK (Elasticsearch, Logstash, Kibana), Grafana, Prometheus.
Client: eBay, Louisville, KY Oct 2018 – Sep 2020
AWS Cloud Engineer
Responsibilities:
Worked on many different concepts of Chef like Roles, Environments, Data Bags, Knife, and Chef Server Admin/Organizations.
Written Chef Recipes to automate build/deployment process and data bags in Chef for better environment management.
Tested Chef Cookbook modifications on cloud instances in AWS and using Test Kitchen and Chef Spec
Written Chef Cookbooks for various DB configurations to modularize and optimize product configuration, converting production support scripts to Chef Recipes and AWS server provisioning using Chef Recipes.
Used SonarQube for continuous inspection of code quality and to perform automatic reviews of code to detect bugs.
Automated Nagios alerts and email notifications using Python script and executed them through Chef.
Contributed to migration of select Mainframe services to containerized platforms using Docker.
Assisted in configuring Git-based version control for legacy code migration.
Participated in proof-of-concept pipelines for Mainframe application deployments integrated with GitHub Actions.
Created documentation and guidelines for Mainframe to cloud-native transition strategies.
Automated application delivery pipelines via GitHub Actions and Jenkins, integrating SonarQube for quality gates.
Designed modular pipelines for microservices builds, reducing rework and enhancing velocity.
Maintained YAML-based GitHub Actions for full-stack deployment lifecycle and auto-rollback strategies.
Monitored application health and deployment status with integrated GitHub Actions and Prometheus alerts.
Provided dashboards to product owners showing release lead time and defect rate trends.
Defined branching strategies aligned with CI/CD pipelines using GitHub Flow.
Implemented dependency caching, test splitting, and matrix builds to speed up CI cycles.
Created secret management workflows using GitHub Actions + AWS Secrets Manager.
Piloted container scanning in pipelines with Trivy and reported via GitHub Checks API.
Reduced manual effort by automating pipeline validation with pre-merge checks.
Conducted monthly pipeline health audits to ensure consistency and reliability.
Mentored junior DevOps engineers on pipeline development, YAML patterns, and container deployment.
Installed, Configured, and Managed Monitoring Tools such as Nagios for Resource Monitoring/ Network Monitoring.
Environment: AAD, Azure DevOps, Java, Terraform, AKS, Docker, Ansible, Chef, Prometheus, Grafana, Bash, Python, Linux, Jira, Bitbucket, Apache Tomcat, ARM, ELK (Elasticsearch, Logstash, Kibana), CRON, YAML, JSON, Splunk, Trivy, Veracode, SonarQube, Twistlock, Gradle, Github Actions, Azure AppService, New Relic., Nagios
Client: Ally Financial, NC Jan 2017 – Sep 2018
Site Reliability Engineer
Responsibilities:
Possess strong hands-on experience in building Docker containers by leveraging pre-existing Linux containers and Amazon Machine Images (AMIs), as well as creating new Docker containers from scratch for microservices and application deployment.
Automated deployments using Chef and Jenkins; converted legacy shell scripts into maintainable configuration code.
Implemented monitoring solutions for legacy systems using Prometheus and Grafana.
Used Git for SCM and collaborated with teams to enforce Git-based workflow.
Designed and developed custom Docker container images tailored to application-specific needs, pushed images to Docker Hub and private registries, and used Docker CLI and consoles for managing container lifecycle operations including build, tag, push, run, and clean-up tasks.
Proficient in using Terraform for Infrastructure as Code (IaC) to automate infrastructure provisioning and scaling. Utilized advanced Terraform features such as modules, workspaces, remote backends, plan/apply stages, and state management. Authored reusable Terraform templates to provision AWS resources including EC2 instances, ELBs, VPCs, and subnets with tagging, security policies, and dependency management.
Configured and managed AWS Identity and Access Management (IAM) roles, users, and policies. Designed secure and scalable network topologies with public/private subnets, route tables, and NAT gateways inside VPCs, ensuring secure communication and access control across environments.
Designed, deployed, and managed cloud-native applications using a wide range of AWS services such as EC2, S3, RDS, Route53, DynamoDB, SNS, SQS, and ELK stack. Focused on architecting for high availability (HA), fault tolerance, disaster recovery, and auto-scaling using CloudFormation templates.
Implemented configuration management solutions for containerized microservices using Docker, Kubernetes, and Ansible. Utilized Kubernetes for orchestration, load balancing, service discovery, and rolling updates of services running in containerized environments.
Managed private cloud environments using Ansible for configuration automation. Created reusable YAML playbooks and roles to automate tasks such as software provisioning, package updates, and infrastructure compliance checks across multiple environments.
Expert in managing Docker environments—performed container lifecycle operations including creating snapshots, running and debugging containers, managing persistent volumes, and handling image versioning and container networking.
Built and maintained Kubernetes clusters locally using Minikube and kubeadm. Deployed application containers in isolated namespaces and managed Dev, QA, and Production clusters. Used Helm charts for templating Kubernetes manifests and managing deployments.
Configured and maintained Jenkins CI/CD pipelines for automated code integration, build, test, and deployment across non-production and production environments. Integrated Jenkins with Git repositories to automate build triggers and post-build actions.
Integrated version control workflows using Git with Jenkins for automated code checkouts, build validation, and notification management. Employed Git hooks, branching strategies, and merge requests to streamline development collaboration.
Managed multiple Jenkins jobs for builds across environments, implementing pipeline-as-code using Jenkinsfiles with declarative and scripted syntax. Optimized pipeline performance with parallel stages, shared libraries, and artifact archiving strategies.
Environment: Infrastructure automation, CI/CD pipeline implementation, incident debugging, and root cause analysis, Ansible, Jenkins, Docker, Kubernetes, Splunk, Dynatrace, Prometheus, Grafana, VMware, CentOS, Hadoop, Hive, Apache Spark, Kafka, Elasticsearch, MongoDB.
Client: People Net – Hopkins, MN, Oct 2014 – Dec 2016
DevOps Engineer
Responsibilities:
Managed user account lifecycle on RHEL and CentOS servers, including provisioning, removal, and password resets to support developer access and security compliance.
Maintained and configured YUM and RPM repositories, streamlining package installation and system updates across multiple environments.
Monitored disk space and swap usage, implementing proactive management to ensure optimal server performance and availability.
Automated provisioning and installation of RHEL and CentOS servers using Kickstart and manual configurations on VMware vSphere virtualized environments.
Troubleshot and resolved Linux service and application issues, managed firewall configurations to enable secure communication between servers.
Deployed and managed virtual machines using VMware vSphere, utilizing templates and Kickstart files for rapid server provisioning and seamless VM migrations.
Collaborated with development teams to manage source code using Git, performing cloning, commits, and push operations to central repositories.
Containerized applications using Docker, orchestrating multi-container deployments with Docker Swarm and Kubernetes for scalability and high availability.
Built and configured Kubernetes clusters, implementing auto-scaling for nodes and pods to optimize resource utilization and system responsiveness.
Created and maintained Ansible playbooks, roles, and YAML scripts, automating application deployments and configuration management tasks.
Performed regular system updates and patch management, ensuring servers comply with security policies and remain stable in production.
Collaborated cross-functionally with network and hardware teams, maintaining seamless operations of multi-user Linux environments.
Investigated and resolved daily operational tickets through Jira, ensuring timely incident resolution and knowledge base updates.
Contributed to hardware and software procurement decisions, evaluating ROI and technical requirements to optimize IT spending.
Developed Bash scripts to automate routine tasks, improving efficiency and reducing manual errors in system administration.
Environment: AWS, Git, Jenkins, Keyvault, Log analytics, Linux, Ant, Nagios, New relic, Dynatrace, Datadog, Jira, Windows, SQL, Networking, Apache Tomcat, Putty, System Logs, Network Logs, Technical Support, DNS, NFS, DHCP, ACS, PowerShell, Python, Bash, Shell.
Client: BOBST, Pune, Maharashtra June 2012 - Aug 2014
Build & Release Engineer
Responsibilities:
•Engaged in various phases of Software Development Life Cycle (SDLC) including Requirements, Analysis, Design, Documentation, Testing and Implementation.
•Designed various branching strategies and executed Branching and merging operations
•Automated end-to-end build, test and delivering artifacts with Jenkins CI/CD pipeline jobs.
•Managed and created releases and builds for QA/Production server environments.
•Implemented Nexus as Maven repository Manager to provide centralized dependency management for third party artifacts and in house SNAPSHOTS and RELEASE artifacts.
•Extensively used Maven tool to do the builds, integrated Maven to Eclipse and did local builds.
•Integrated Maven with Jenkins for the builds as the Continuous Integration process. Setup the Jenkins jobs for Continuous integration process and to execute test cases.
•Converted applications from ANT build architecture to Maven build architecture.
•Collaborated closely with the QA team to perform PCI compliance security scans on QA servers to check the vulnerabilities.
•Managed GitHub administration, overseeing repository lifecycle, access controls. Implemented branching strategies, pull request approvals, and access policies, for effective version control.
•Implemented Puppet manifests to define and enforce the desired state of infrastructure components across the organization's servers
Environment: Agile Methodology, Java, Bash, Shell Scripting, GIT, Jenkins, Ant, Nexus, Maven, Puppet Rabbit MQ, Tomcat, Shell, Windows, and LINUX.
EDUCATION:
Bachelor’s Degree in Computer Science
Certifications
•AWS Certified SysOps Administrator Associate
•AWS Certified Solution Architect Administrator Associate
•Microsoft Certified: Azure Administrator Associate [AZ-104]
•Microsoft Certified: DevOps Engineer Expert [AZ-400]