Pawan Mainali
Lebanon, TN **************@*****.*** 571-***-**** LinkedIn: https://www.linkedin.com/in/pawan-mainali-859b60223/
Open to Relocation GC - EAD
Professional Summary
DevOps and Cloud Engineer with over 7 years of experience designing, automating, and optimizing infrastructure in AWS and Azure environments. Skilled in CI/CD pipeline development, containerization with Docker and Kubernetes, and configuration management using Ansible. Strong background in version control, build automation, monitoring platforms (ELK, Splunk, Grafana), and Infrastructure-as-Code with Terraform and CloudFormation. Experienced in managing end-to-end deployments, supporting large-scale distributed systems, and driving operational efficiency through scripting and automation.
Technical Skills
Amazon Web Services: EC2, ELB, VPC, RDS, IAM, Cloud formation, S3, Cloud Watch, Cloud Trail, SNS, SQS, SWF, EBS,
EMR, Dynamo DB, Elastic Beanstalk, Route53, Aurora.
Azure: Azure Key Vault, App Services, ARM Templates, Storage Blobs, VSTS, VPN gateway.
SCM Tools: Subversion, Bit Bucket, GIT, Clear Case
Build Tools: Ant, Maven, Gradle
Continuous Management Tools: Chef, Ansible, Puppet
IAC Tools: Terraform, CloudFormation
Containers: Docker, Kubernetes
Virtualization: Oracle VirtualBox, VMware
Scripting: Shell scripting, Python, NodeJS, Bash, Java
Databases: Oracle, MS SQL Server, MySQL, NoSQL, PostgreSQL
Operating System: Linux (Red hat, Centos, Ubuntu), Windows
Monitoring Tools: Splunk, Nagios, ELK, Prometheus, Grafana, AWS CloudWatch,
Professional Experience
Lexis Nexis Risk Solutions, San Jose, California
Senior System Engineer Duration: Sept 2023 – Present
●Planned and executed system upgrade and platform modernization initiatives by defining schedules, managing dependencies, coordinating resources, and mitigating delivery risks across infrastructure and application teams.
●Owned end-to-end execution of infrastructure programs, providing clear status updates, risk assessments, and milestone tracking to leadership and non-technical stakeholders through dashboards and written reports
●Designed, built, and operated CI/CD pipelines using Jenkins, GitHub Actions, and ArgoCD (GitOps), ensuring reliable automated builds, testing, deployments, and environment promotions.
●Led automation strategy using Ansible playbooks and roles to standardize system configuration, reduce manual intervention, and improve consistency across development, staging, and production environments.
●Integrated Ansible Tower (AWX) with CI/CD workflows to manage inventories, enforce RBAC, schedule jobs, and provide auditable system change management processes.
●Administered Kubernetes platforms via Rancher, overseeing cluster lifecycle management, scaling strategies, secure Helm deployments, and service integrations across multiple environments.
●Managed enterprise server provisioning using Foreman, handling OS lifecycle management, provisioning templates, firmware updates, and compliance controls for on-prem and hybrid systems.
●Developed and supported containerized workloads using Docker, Helm, and Kubernetes, improving deployment reliability and reducing release timelines for critical systems.
●Supported and troubleshot Kafka-based data streaming platforms, including topic configuration, partition tuning, access control enforcement, consumer lag analysis, and production incident resolution.
●Coordinated Snowflake data pipeline integrations for analytics and reporting use cases, supporting ingestion workflows, ETL orchestration, and cross-platform data movement.
●Implemented system observability and reliability practices using CloudWatch, Splunk, Prometheus, Grafana, and custom alerts to proactively detect issues and reduce MTTR.
●Owned production system stability by implementing resilience patterns such as timeouts, retries, circuit breakers, and capacity safeguards for backend services and APIs.
●Supported hybrid and multi-cloud environments across AWS (EC2, S3, IAM, VPC, EKS, ECS, Load Balancers, CloudTrail) and Azure (VMs, Storage, Networking, Monitor, Azure AD).
●Delivered infrastructure using Infrastructure-as-Code practices with Terraform, CloudFormation, and ARM templates to ensure repeatable, version-controlled system builds.
●Enforced security, identity, and network controls using IAM, Azure AD, security groups, policies, SCPs, and enterprise guardrails in collaboration with security teams.
●Participated in on-call rotations through PagerDuty, leading incident triage, root cause analysis, system recovery, and post-incident reviews.
●Managed source control workflows using Git/Bitbucket, enforcing branching strategies, peer reviews, and automated validations to support high-quality system releases.
●Partnered with application, security, and network teams to review architecture designs, prioritize system initiatives, and drive automation and platform reliability improvements.
ExxonMobil, Clinton, New Jersey
AWS DevOps/Cloud Engineer March 2022 – August 2023
●Designed and implemented scalable, highly available AWS cloud infrastructure; automated deployments with Ansible, Jenkins, and managed key AWS services (EC2, S3) while ensuring security, reliability, and ease of management.
●Established comprehensive monitoring using Prometheus and Grafana; continuously monitored system performance, troubleshot issues, and implemented global security controls.
●Built and managed containerized environments using Docker, creating images from scratch, writing Dockerfiles, automating builds on Docker Hub, and configuring Kubernetes for orchestration.
●Administered Kubernetes clusters across OpenShift and Amazon EKS, optimizing performance, improving resource utilization by 25%, and reducing downtime by 30% through high-availability microservice orchestration.
●Implemented automated CI/CD pipelines integrated with EKS, reducing manual intervention by 40% and maintaining secure, scalable deployment workflows; supported test environments for Docker and Kubernetes.
●Used Ansible to manage environment configuration, service restarts, and dependency management for distributed Java microservices, ensuring consistency across development, staging, and production.
●Maintained reusable Ansible roles and inventories, collaborated with DevOps teams to troubleshoot playbook failures, and supported secure secrets handling via vault integrations.
●Maintained standardization, centralization, and automation practices; developed Bash/Python scripts; supported incident triage by analyzing performance, interoperability, and system factors to improve resilience.
●Collaborated closely with system administrators, providing technical guidance for operational readiness, contributing to HPC service strategies via ServiceNow, and ensuring maintainability of new features.
Bank of America, North Carolina
AWS DevOps/Cloud Engineer Aug 2019 - March 2022
●Deployed and monitored scalable infrastructure on Amazon Web Services (AWS)& configuration management using Puppet and Ansible.
●Provisioned task-based roles on Ansible playbooks for parallel deployment on multiple servers and provisioning of infrastructure with custom-built plugins and modules
●Worked with projects using the OpenShift client for Jenkins builds for various configurations.
●Provisioned AWS resources like EC2, VPC, EBS, AMI, S3 buckets, creation of subnets, and all other operational tasks using Ansible.
●Provisioned the entire on-premises infrastructure on AWS cloud using CloudFormation scripts for high availability and fault tolerance.
●Set up a Continuous Delivery pipeline using Ansible playbooks, which consists of Sonar Server and Jenkins, the Infrastructure to run these packages, and various software components like Maven.
●Developed and supported the RHEL-based infrastructure in the cloud environment.
●Migrated on-premises Oracle database to AWS RDS using S3 and AWS VPC Peering.
●Supported AWS cloud instance, including management and configuration of various AWS services.
●Worked on creating EC2 instances, updating security groups, and IAM policies.
●Created APIs that access AWS or other web services, as well as data stored in the AWS Cloud.
●Configured the entire existing stack in service-oriented architecture using Red Hat OpenShift’ s Kubernetes platform.
●Worked with Docker images, Docker Hub, Docker registries, and Kubernetes for container-based deployments.
●Creating and maintaining Docker container clusters on AWS using Kubernetes, Linux, Bash, GIT, and Docker. The CI/CD system used Kubernetes and Docker as the runtime environment for building and testing deployments.
●Supported the construction of a test environment for Docker containers and the Kubernetes configuration of Docker containers.
●Used Jenkins pipelines to drive all micro services builds out to the Docker registry and then deployed to Kubernetes, created pods, and managed using Kubernetes.
●Worked with Ansible and CloudFormation scripts to build the base infrastructure with all necessary AWS services like VPC and EC2 for master/infra and app nodes.
●Performed Shell and Perl scripting for automotive tasks in Linux and wrote scripts in Python.
●Created an S3 bucket and updated the bucket policies, versioning, and lifecycle. Set up static web content on S3 bucket.
●Used Jenkins to test the workflow of retrieving and running Puppet modules from GitHub onto different test slaves.
Wells Fargo, San Francisco, California
Linux System Administrator Jan 2017 - Aug 2019
●Set up and configured Red Hat Satellite/Kickstart Servers for Red Hat Enterprise Linux 5/6 installs and RHN Push Updates.
●Installed and configured several hundred Red Hat Enterprise Linux 5/6 Servers in both Physical Blade and VMware ESXi Virtual Environment residing on HP Blades as required for UAT/Production.
●Worked with Puppet Enterprise and Puppet Open Source. Installed, configured, upgraded, and managed Puppet Master, Agents & Databases.
●Worked on AWS cloud and its services like EC2, S3, RDS, Auto scaling, AMI, IAM, and Lambda.
●Updated and wrote custom modules and manifests using Puppet DSL to be deployed across various deployment architectures.
●Configured Hiera files and managed and created roles and profiles for various technology stacks in Puppet.
●Changed root password on all servers from the centralized Puppet master server.
●Assembled Puppet Master, Agent, and Database servers on multiple RHEL Platforms.
●Created profiles in Puppet and pushed them across all the servers in UNIX and Linux environments.
●Deployed and configured Red Hat Satellite Server 5.4, including creating and maintaining any customized kickstart configuration channels to deploy RHEL.
●Maintained and deployed High-End applications developed in JAVA using JBoss, Oracle WebLogic, and Tomcat Application Server.
●Provided support to the JAVA development team to help develop Java-based applications.
●Managed a large ESX farm using a Virtual Infrastructure client and used the said Virtual Infrastructure client to configure and support the ESX farm.
●Provided 24/7 support in an environment to maintain maximum uptime and ensure server reliability using monitoring products such as Nagios,
●Wrote and deployed Bash/Perl scripts using crontab to perform daily backups, audit collection, and push new changes out to manage and maintain consistency across Red Hat Enterprise Linux servers.
●Installed and updated packages using custom YUM Servers/repositories, Red Hat Satellite Server.
●Configured and Administered NFS, DNS, NIS, NIS+, and LDAP on the RHEL server environment.
●Configured and deployed patches, upgrades, and bug fixes on both physical and virtual Red Hat Linux servers using Satellite Server.
●Installed, Configured, and Administered VMware ESXi /Virtual Center, and VCenter Servers.
●Configured and installed VMware tools on the custom-built VM's.
Education
Bachelor's in Computer Science 20 01/2010 - 2014
Tribhuvan University
3.5 GPA
Certifications
AWS certified Solutions Architect, Nov 2022
Amazon Web Services
Credential ID: 72GK0ZGCZEBE1HCN
Microsoft Certified Azure Administrator Associate, May 2023
Microsoft
https://www.credly.com/badges/0f6672fa-d942-415a-b96e-88d6e0fe1af8/linked_in_profile
AWS certified Machine Learning Engineer -Associate, Dec 7,2025
Amazon Web Services
Credential ID: 2f565595d18f4fc3aca302e1dec6050d
PMP Project Management Professional - Professional, Jan 26,2029
Project Management Institute
Credential ID: 4290886