Post Job Free
Sign in

Senior Linux SysAdmin & Cloud DevOps Engineer

Location:
Queens, NY, 11427
Salary:
$145
Posted:
April 15, 2026

Contact this candidate

Resume:

Name: Adeel Sheikh

Linux Systems Administrator/ Sr. DevOps Cloud Engineer

Email: ********.*********@*****.***

Phone 845-***-****

Professional Summary:

DevOps Cloud Engineer with 9 years of experience in Linux system administration, cloud infrastructure, and automation across physical, on-premises, and cloud environments. Experienced in managing and supporting enterprise systems running on RHEL and CentOS, with strong expertise in server installation, configuration, maintenance, troubleshooting, performance tuning, patching, backups, and security management.

I am proficient in designing and managing scalable cloud infrastructure using AWS services such as EC2, S3, VPC, IAM, and ELB. Skilled in infrastructure automation and configuration management using Ansible, along with containerization and orchestration technologies including Docker and Kubernetes. Experienced with virtualization platforms such as VMware and implementing DevOps best practices to streamline deployments and improve operational efficiency.

Strong background in incident management, change management, and system monitoring, with a focus on reliability, scalability, and high availability. Passionate about leveraging automation, cloud technologies, and modern DevOps practices to build resilient infrastructure and optimize application delivery.

Core Qualification:

Platform:

Red Hat 6, 7, 8, 9 CentOS 6, 7,9 Ubuntu

and Windows OS.

Network Installer:

PXE boot,

Kickstart for automatic provisioning.

Work Tracking Tools:

Jira, BMC Remedy, ServiceNow,

Pager Duty.

Network:

DHCP, DNS, TCP/IP, UDP, FTP, HTTP,

Switches, Routers, PDUs, Telnet, Wire Shark, TCP DUMP.

Enhancement:

Kernel and Performance Tuning.

Documentation:

Confluence, Microsoft Excel, Microsoft Word, Notepad and Note pad +.

Infrastructure Server:

NFS, SSH, FTP, Apache, AWS,

HTTP, DHCP, TFTP, DNS, Free

IPA-Server, IPAM.

File System:

EXT, EXT2, EXT3, EXT4, XFS. MBR and GPT.

Management Tool:

Ultra DNS, Route53, F5.

Cloud:

AWS, EC2, S3, VPC, IAM, ELB,

PVC Cloud watch, Glacier.

Virtualization:

VMWare, ESXI, VCenter, KVM, Hyper-V, vSphere Client, Clustering, Snapshots, Clones.

Certificate and Key Management:

Venafi, Key tool and JWT.IO.

Configuration Management:

Ansible, Ansible automation tool, Chef, GitLab, GitHub, Bash Scripting, JFrog Artifactory.

Package Management:

YUM, DNF and RPM.

Infrastructure Server:

SSH, FTP, Apache, HTTP, DHCP, TFTP, DNS, Free IPA-Server, IPAM.

Management:

LVM, RAID Levels, NFS.

Storage:

NAS, SAN, NFS, LVM, FC, ISCSI, EXT3, EXT4, XFS.

DevOps:

EBS, Docker, Kubernetes, Terraform, Postman,

Packer.

Education:

Associate’s in computer science from CUNY, New York, New York in 2001.

Certifications:

Red Hat Certified System Administrator 2025 (RHEL9)

Red Hat Certified Engineer 2025 (RHCE)

AWS Cloud Practitioner 2023

Professional Experience:

Early Warning Services – Scottsdale, Arizona Sr. DevOps Cloud Engineer May 2022 – Present

Designed and implemented AWS cloud infrastructure to support deployment of mission-critical TAK Server workloads in a highly available architecture.

Built scalable AWS environments capable of supporting thousands of concurrent users, ensuring high performance for real-time situational awareness data streaming.

Architected secure VPC network topologies including private/public subnets, NAT gateways, routing tables, and security groups to enforce strong network segmentation.

Developed reusable PowerShell scripts for user management, system configuration, and log analysis in Windows environments.

Use Terraform to set up GCP infrastructure like VPC, subnets, GCP storage buckets, GCP Composer, Secret manager, GKE, etc.

Worked hands-on with ArgoCD to manage GitOps workflows, including rolling out applications across multiple clusters without downtime.

Set up and maintained multi-cluster deployment strategies in ArgoCD, making it easier to manage environments like dev, staging, and production in a consistent way.

Built and maintained Terraform modules to provision AWS infrastructure, keeping everything reusable and clean instead of one-off scripts.

Regularly worked with core AWS services like EC2, EKS, RDS, IAM, ACM, and PrivateLink to design secure and scalable systems.

Designed VPC architectures from scratch, including subnetting, routing, and security controls to properly isolate workloads.

Used IAM policies and roles carefully to enforce least privileged access, especially for services interacting across accounts.

Maintained version controls best practices within GitLab repositories, ensuring traceability of all changes.

Implemented Single Sign-On (SSO) solutions across applications using industry-standard protocols like OIDC and SAML.

Integrated applications with identity providers such as Okta and Keycloak to centralize authentication.

Configured OIDC-based authentication flows for modern applications, enabling secure and seamless user login experiences.

Implemented alerting rules in Prometheus and integrated them with notification systems to catch issues early.

Set up Datadog for monitoring cloud infrastructure and applications, including EC2, containers, and managed services.

Configured Datadog dashboards and monitors to track system health and application performance in real time.

Used Grafana alerts to proactively monitor system health and reduce downtime during peak usage.

Centralized logs using Loki, making it easier to search and analyze logs without relying on multiple tools.

Configured Prometheus exporters (node, kube-state, and custom app metrics) to capture detailed infrastructure and service-level data.

Helped implement VPC Lattice and PrivateLink integrations to securely connect internal services without exposing them publicly.

Wrote Bash and Python scripts to automate routine operational tasks, cutting down a lot of manual effort during deployments.

Built deployment pipelines using GitLab CI/CD, handling everything from build to deployment with proper checks in place.

Integrated Terraform workflows into CI/CD pipelines so infrastructure changes could be reviewed and applied safely.

Containerized applications using Docker and ensured they ran consistently across environments.

Deployed and managed microservices on Kubernetes, handling service exposure, scaling, and updates.

Set up ArgoCD to handle deployments across multiple Kubernetes clusters, making it easier to manage dev, staging, and production from a single place.

Used Helm charts to package and deploy applications, simplifying repeated deployments across clusters.

Tuned Kubernetes resources (CPU/memory) to avoid over-provisioning while keeping performance stable.

Configured auto-scaling for Kubernetes workloads to handle traffic spikes without manual intervention.

Managed rolling updates and zero-downtime deployments using Kubernetes deployment strategies.

Implemented monitoring using Prometheus and Grafana to get real-time visibility into cluster and application health.

Worked with logging tools like Loki to centralize logs and make troubleshooting faster.

Set up alerting systems so issues could be identified and resolved before impacting users.

Integrated Terraform workflows into GitLab pipelines, enabling automated infrastructure provisioning with proper plan and approval stages.

Troubleshot production issues across Kubernetes, networking, and AWS services, are often under time pressure.

Collaborated with developers to debug application issues that were tied to infrastructure or deployment setups.

Built secure networking layers for Kubernetes using ingress controllers, network policies, and TLS via ACM.

Ensured all services followed proper security practices, including encrypted communication and secrets handling.

Managed secrets securely using AWS Secrets Manager and Kubernetes secrets.

Automated application delivery pipelines by connecting ArgoCD with Git repositories, reducing manual deployment steps.

Contributed to implementing SSO integrations using OIDC-based providers where required.

Supported integrations involving identity providers like Okta/Keycloak in secure environments.

I played a key role in FedRAMP-aligned environments, making sure infrastructure followed compliance standards.

Participated in architecture discussions to improve system reliability and remove single points of failure.

Designed multi-AZ deployments to improve availability and reduce service disruptions.

Worked with RDS deployments, including setup, scaling, and performance tuning.

Automated backup and recovery strategies for critical systems.

Help migrate legacy workloads into containerized environments to modernize the platform.

Built internal tools/scripts using Python (including Boto3) to interact with AWS services programmatically.

Supported ML-related infrastructure using SageMaker, including environment setup and deployment workflows.

Assisted in implementing blue/green and canary deployments to reduce risk during releases.

Maintained Git repositories for infrastructure and application code with clear version control practices.

Took initiative to research and test new tools like Argo Workflows for improving automation.

Worked closely with cross-functional teams and explained technical issues in a way that non-engineers could understand.

Designed secure networking for ECS services using Amazon VPC, private subnets, security groups, and IAM roles.

Automated ECS infrastructure provisioning using AWS CloudFormation and AWS CDK to ensure consistent and repeatable deployments.

Cisco, San Jose, California DevOps Cloud Engineer August 2019 – March 2022

Engineered AWS GovCloud infrastructure to host TAK Server workloads while meeting strict security and compliance standards required for regulated environments.

Architected cloud environments capable of supporting large-scale concurrent user connectivity, ensuring stable performance for real-time situational awareness platforms.

Established FedRAMP continuous monitoring (ConMon) program including vulnerability scanning and reporting

Designed segmented VPC architectures using multiple subnet tiers, route tables, NAT gateways, and network ACLs to isolate application, control plane, and data layers.

Configured Keycloak realms, clients, roles, and user federation for centralized identity management.

Managed Okta applications, groups, and policies to support enterprise authentication requirements.

Implemented private networking models where backend services operated entirely within private subnets while ingress traffic was managed through secure load balancers.

Developed advanced traffic routing and load distribution strategies using Application Load Balancers and internal service endpoints.

Built infrastructure-as-code templates using AWS CloudFormation and AWS CDK to automate provisioning of ECS clusters and AWS Fargate services.

Implemented centralized logging and monitoring for AWS Fargate containers using Amazon CloudWatch, improving incident detection and troubleshooting.

Used GitLab runners (shared and self-hosted) to execute jobs efficiently based on workload requirements.

Created automated solution using Windows PowerShell to manage the backup of the primary file server and programmatically notify the administrator via email of the backup’s success or failure.

Optimized container resource allocation (CPU/Memory) in AWS Fargate tasks to improve cost efficiency and application performance.

Built infrastructure automation using Terraform workspaces and modular architecture to support independent deployments across development, staging, and production environments.

Troubleshot sync failures, drift issues, and deployment inconsistencies within ArgoCD-managed environments.

Monitored ArgoCD application health and sync status to ensure systems stayed aligned with desired state.

Worked in a product-based environment supporting SaaS applications used by many concurrent users, focusing on uptime and performance.

Enforced least privilege access and IAM policies aligned with FedRAMP and Zero Trust principles

Implemented remote Terraform state management using encrypted S3 backends with DynamoDB locking to support safe collaboration between engineering teams.

Troubleshooting Windows OS, VMware ESX 3.5/4.0 and application issues. Provide 1st and 2nd level support for critical IT business emergencies and issues.

Integrated SSO with Kubernetes-based applications using ingress controllers and authentication proxies.

Deployed and managed APIs using AWS API Gateway, enabling secure and scalable communication between services.

Implemented asynchronous processing using AWS SQS and SNS to decouple services and improve system resilience.

Used AWS SES for email notifications and system alerts tied to application workflows.

Implemented scalable model hosting using Amazon SageMaker Endpoints to support real-time prediction services with high availability and auto-scaling capabilities.

Integrated IaC workflows with policy-as-code tools (Sentinel, OPA, Azure Policy) to enforce compliance during deployment.

Created reusable Terraform modules for network infrastructure, compute services, IAM policies, storage layers, and container orchestration platforms.

Containerized applications using Docker and deployed them to Azure Kubernetes Service clusters for improved scalability and deployment consistency.

Implemented CI/CD pipelines using Azure DevOps to automate container build, testing, and deployment processes for Azure Kubernetes Service workloads.

Designed and implemented secure GCP networking architectures, including VPCs, subnets, routing, firewall rules, and private connectivity.

Automated AWS infrastructure provisioning using CloudFormation stacks integrated with CI/CD pipelines for controlled infrastructure lifecycle management.

Follow highly technical documentation and knowledge on Windows Cluster technology for all current versions of the Windows Server Operating System.

Implemented Ansible automation playbooks for server configuration, dependency installation, and automated application bootstrap.

Containerized TAK Server services and supporting middleware using Docker multi-stage builds to produce secure and lightweight container images.

Published container images to secure container registries and enforced image versioning and vulnerability scanning policies.

Automating Weekly reports using PowerShell to assist in account cleanup efforts and stale object cleanup.

Designed and deployed Amazon EKS clusters to orchestrate container workloads and support high availability application deployments.

Configured Kubernetes control plane integrations with AWS IAM roles using IRSA to securely grant service-level permissions.

Implemented Kubernetes horizontal pod autoscaling and cluster autoscaler policies to dynamically scale workloads based on CPU, memory, and traffic metrics.

Optimized model training workloads by leveraging Amazon SageMaker Training Jobs with distributed training and managed compute resources to reduce training time and infrastructure overhead.

Using Wise for Windows installer to add and manage user and sever installation.

Managed Kubernetes cluster networking using CNI plugins, internal service discovery, and ingress controllers.

Tuned Kubernetes resource requests and limits to optimize container density while preventing node resource contention.

Configured automated secrets management workflows to securely inject runtime credentials into deployment environments.

Implemented advanced monitoring solutions using CloudWatch metrics, container insights, and custom log streams.

Forwarded operational and security logs to centralized SIEM platforms for real-time threat monitoring and analysis.

Designed operational dashboards in Grafana to monitor Kubernetes node health, pod performance, and system resource utilization.

Configured automated alerting thresholds for system anomalies including latency spikes, resource exhaustion, and service failures.

Managed Linux-based container host environments including kernel updates, system hardening, and runtime configuration tuning.

Automated infrastructure maintenance tasks using Bash and Python scripts integrated with operational workflows.

Collaborated with security teams to remediate vulnerabilities discovered through infrastructure scanning and compliance audits.

Produced technical documentation covering infrastructure architecture, cluster design, CI/CD workflows, and disaster recovery procedures.

Participated in incident response and root-cause analysis for production issues affecting platform availability.

Continuously refined infrastructure automation strategies to improve platform scalability, security posture, and deployment reliability.

CLS Group– Iselin, New Jersey Linux Systems Administrator July 2017 - June 2019

Created users and added USER to GROUPS.

Managed user permissions and maintained user and file systems on Linux servers.

Handled multiple users using scripts, such as creating and deleting users.

Troubleshoot SSH errors and keyless entry issues.

Implemented observability frameworks using Prometheus, Grafana, and CloudWatch to monitor infrastructure supporting AI workloads.

Monitored Kafka clusters using Prometheus and Grafana, proactively identifying broker lag, under-replicated partitions, and consumer bottlenecks.

Ensure secure access to remote servers by using SSH.

Further, creating keys and ensuring password-less access to local and remote servers.

Managed multiple RAID levels such as 0, 1, 5, 6, and 10.

Connected local and remote servers using the SSH service daily.

Generated SSH authentication keys to secure the environment.

Interacted with the ticketing system SNOW, SNOW assigned tasks to the departments concerned, and emailed all parties involved.

Monitored the overall health of our servers and took necessary actions.

Exceptional written and linguistic communication skills.

Upgraded and configured system software that supports infrastructure applications.

Miracle Technologies Inc, New York Linux Support Operator September 2015 – May 2017

Developed and executed hardware strategies, capacity planning, and system configuration changes while managing user accounts and access using scripts.

Provided tier 2 and 3 technical supports for hardware, software, and network issues, including troubleshooting, performance monitoring, and log analysis.

Installed, upgraded, and managed software dependencies using Yum and RPM utilities, collaborating with developers and Linux engineers to implement IT support strategies.

Support and documentation of necessary operating procedures for problem-solving over the phone.

Upgraded and configured system software that supports infrastructure applications.

Assisted in developing long-term strategies and capacity planning for meeting future hardware and organizational hardware needs.

Handled multiple users using scripts such as creating and deleting users.

Carry out assessments to determine the need for changes in hardware/software configurations.



Contact this candidate