Uploaded File
Software Engineer (Azure DevOps)
8 years experience C2C
Average rating
Profile views

Certified Kubernetes Application Developer, AWS DevOps Engineer Professional and Azure Associate. Experience in designing, deploy and managing mission critical applications and monitoring applications in cloud. Implemented DevOps principles in Windows, UNIX and Red Hat Linux platforms and designed CI/CD.

  • Configured and worked extensively on AWS services like EC2, ELB, S3, Route53, IAM, VPC, RDS, DynamoDB, CloudTrail, CloudWatch, Elastic Cache, SNS, SQS, CloudFormation Template, CloudFront, Lambda, EMR and EBS.
  • Hands on experience on Azure web application like Azure App and Cloud Services, Azure Data Factory, Azure SQL Data Warehouse, Azure Blob Storage, Web API, VM creation, ARM Templates, Key vault, Lift and Shift, Azure storage, Fabric controller, Azure AD, Azure search, and Notification hub.
  • Integrated Terraform and Ansible across geographically separated hosting zones in AWS.
  • Managed K8's charts using Helm and created reproducible builds of the Kubernetes applications.
  • Expertise in creating Kubernetes HA clusters with multi zones in single region.
  • Implemented a production ready, load balanced, highly available and fault tole rant K8's infrastructure.
  • Deployed Python scripts via Terraform and AWS CloudFormation template to provision and manage on AWS.
  • Worked with Terraform key features such as IAC, Execution plans, Resource Graphs, Change Automation and extensively used Auto scaling for launching Cloud instances while deploying microservices.
  • Supported production environments and mission-critical tools administration in a zero-downtime framework.
  • Migrated On-premises and Azure Classic instances to Azure ARM subscription with Azure Site Recovery.
  • Experienced in branching, tagging, and maintaining the version across the environments using SCM tools like Git, GitLab, GitHub and Subversion (SVN) on Linux and Windows platforms.
  • Composed and implemented Subversion and GIT metadata including elements, labels, attributes, triggers, and hyperlinks.
  • Automated the front-ends platform into highly scalable, consistent, repeatable infrastructure using high degree of automation using Chef, Ansible, Vagrant, Jenkins, and CloudFormation Template.
  • Designed and implemented CI/CD processes using CloudFormation and Terraform Templates.
  • Developed CD pipelines in Azure DevOps and Jenkins and managed the IAC for all the application.
  • Expertise in CI/CD DevOps pipeline to automate the infrastructure for services like Kubernetes, ingress, Cosmos DB, SQL server, AppInsights.
  • Expertise in Tomcat, JBOSS, Samba, Web logic and Web Sphere application servers for deployments.
  • Worked with Ansible playbooks for virtual instance provisioning, configuration management, patching and software deployment through automated tools, Ansible/Jenkins custom pipeline.
  • Experience in Ansible setup, managed host file using YAML, authored various custom Ansible playbooks.
  • Used repository management tools like Sonatype, Nexus, JForg and Artifactory to deploy and manage Artifacts.
  • Extensive knowledge on Junit, automation testing across different environments as per the Agile methodology.
  • Expertise in configuring the monitoring and alerting tools to setting up alerts and deployed multiple dashboards for individual applications in Kubernetes.
  • Experience in root caused analysis of post-production performance-related issues through Splunk.
  • Monitored the Splunk infrastructure for capacity planning, scalability, and optimization.
  • Expertise in configuring log monitoring tools like ELK (Elastic Search, Logstash and Kibana), Nagios, Splunk, Filebeat and Grafana to monitor applications and logging tools like Dynatrace, Splunk and New Relic to monitor network services and host resources.
  • Involved in Ticketing & Bug tracking tools like JIRA, Confluence and used SonarQube for automated code review.
  • Work with compliance and information security teams to understand reported vulnerability and planned remediation.
  • Good understanding of network and web related protocols like TCP/IP, UDP, HTTP, HTTPS, FTP, SMTP, DNS.
  • Knowledge on NIST framework and implemented 3 Tier backend web application with PCI compliance.
  • Hands on experience in using Hadoop ecosystem components like Hadoop, Hive, Sqoop, Cassandra, Spark, Spark Streaming, Spark SQL, Kafka, and Yarn.
  • Experience in configuring Spark Streaming to receive real time data from the Apache Kafka and store the stream data to HDFS using Scala and integrated Hadoop with Kafka to upload stream data from Kafka to HDFS.

Software Engineer (Azure DevOps)
Information Technology
Jun 2021 - present
No skills were added
Remove Skill
Information Technology
Mar 2021 - present
  • Created documentation to help new teams for smooth onboarding and implement Azure Kubernetes Services.
  • Architect the deployment of Kafka application and container-based applications using Azure Kubernetes Services (AKS).
  • Integration tools like Twistlock plugin and TwsictCLI in the Jenkins code pipeline for real-time application for vulnerability scanning, security scans and containers compliance policy enforcement.
  • Created reproducible builds of the Kubernetes applications, templatize Kubernetes manifests.
  • Written helm charts for micro-services and Kubernetes objects such as deployments, stateful sets, nginx ingress and Docker files to dockize the applications.
  • Leverage existing Kubernetes infrastructure to create jobs that run automated tasks on a regular basis across multiple K8s clusters corresponding to different services and environments.
  • Developed Continuous Integration and Continuous Deployment automation frameworks using Jenkins.
  • Migrated the DataStream Kafka connector application secrets to Azure Key vault from Jenkins.
  • Used Terraform to reliably version and create infrastructure on Azure and automated infrastructure management.
  • Set up the Infrastructure in IaaS and PaaS platforms using ARM and Terraform.
  • Worked on scripts to automate day-to-day manual tasks and used shell and python to clean the ACL subscriptions.
  • Configured and implemented storage blobs and Azure files
  • Created Storage accounts, Configured the Content Delivery Network (CDN), custom domain, Managing access and storage access key.
  • Worked on POC to migrate the dashboard from Datadog to New Relic to monitor Kafka broker metrics.
No skills were added
Remove Skill
Sr. DevOps Engineer
Information Technology
Feb 2020 - Feb 2021
  • Setup and built AWS infrastructure using various resources like VPC, EC2, S3, IAM, AMI'S, EBS, Security Group, Auto Scaling, EBS, SNS, Cloud Watch, Cloud Trail, Cloud Front, R53, RDS in CloudFormation templates.
  • Migrated On-premises applications to AWS Cloud with Terraform and provisioned highly available environments using Terraform and CloudFormation.
  • Worked with AWS S3 services for creating and configuring buckets with permissions, logging, versioning and tagging.
  • Created reusable infrastructure with Terraform modules and used versioning to support multiple environments.
  • Setup and upgraded Kafka producer and consumer components for real time data processing.
  • Created the Kubernetes Clusters under Pod networks to group the containers and automated application deployment in the Cloud using Docker and ECS scheduler.
  • Created EKS/ECS clusters using CloudFormation and worked on container deployments, replication controllers, services, labels, health checks and ingress and integrated Jenkins CI with Twistlock to scan Docker images for vulnerabilities.
  • Integrated Kubernetes with Hashicorp vault to inject configurations at runtime for each service using init, config sidecars and persistent volume sharing between app and config containers.
  • Used Amazon Elastic Beanstalk to automatically handles the deployment, from capacity provisioning, load balancing and auto-scaling along with SQS, SNS, SWF of the applications.
  • Implemented rolling updates with zero downtime and handled multiple images from Docker hub and deployed by ECS.
  • Configured Kubernetes services type load balancer and Cluster IP to expose UI based application and migrated cluster CNI from Flannel to Kube-router to support Kubernetes network policies.
  • Monitored Kubernetes clusters for efficient cluster visibility, proactive monitoring and triggering action using Splunk agents and AWS Cloud Watch monitoring.
  • Administration of Jenkins servers that consists of more than 180 jobs both on regular and sandbox environments and resolved issues related to Jenkins job failures, job permissions related issues and managed plugins upgrade.
  • Worked on Forking, Cloning of branches and access permissions on GitHub repository tool.
  • Create complex JIRA workflows including project workflows, screen schemes, permission scheme and notification schemes.
  • Integrated Datadog, Splunk dashboard with AWS and created dashboard in New Relic for performance monitoring.
No skills were added
Remove Skill
Sr. Azure DevOps Engineer
Information Technology
Sep 2018 - Dec 2019
  • Involved in administrative tasks that include Build, Design, Deploy of Azure environment.
  • Maintained and monitored Azure DevOps and wrote the automation script to set up build and release pipelines.
  • Managed Azure Infrastructure Azure Web, Worker Roles, VM Role, Azure SQL, Azure Storage, Azure AD Licenses, VM Backup and recover from a recovery services vault using Azure PowerShell and Azure Portal.
  • Worked on design, planning and implementation for existing On-Prem application services to Azure cloud using ARM.
  • Deployed Azure Kubernetes clusters using template-driven deployment options such as ARM.
  • Integrated Kubernetes with network, storage, and security to provide comprehensive infrastructure and orchestrated container.
  • Achieved CD by leveraging Kubernetes and maintained auto-scaling and load-balancing applications.
  • Adopted a microservices-based architecture and automated the Infrastructure for containerizing services using Docker.
  • Achieved Blue-green deployment by maintaining asset delivery, network load, fallback and edge servers with a CDN.
  • Deep familiarity with Azure Security Services such as Azure Active Directory, RBAC and Key Vault.
  • Encrypted Azure Storage, VM's, Azure Key Vault services to protect and secure the data of cloud applications.
  • Deployed Azure Databricks workspace to an existing virtual network that has public and private subnets.
  • Migrated Data center using Azure Site Recovery, Active Directory and Exchange users to Microsoft Azure AD.
  • Configured Azure Multi-Factor Authentication (MFA) as a part of Azure AD Premium to securely authenticate users.
  • Created Power Shell scripts to automate tasks, deploy Azure AD Connect and configured ADFS authentication flow, ADFS installation using Azure AD.
  • Configured Azure Traffic Manager to build routing for user traffic Infrastructure, migrations to drive operational efforts to migrate all legacy services to a fully Virtualized Infrastructure.
  • Configured Vnets, subnets as per the project requirement, Azure blob storage and Azure file servers, private and public facing Azure load balancers.
  • Implemented IAC with Terraform, developed PowerShell scripts and ARM templates to automate provision resources.
  • Worked with Terraform templates to automate the Azure IaaS virtual machines using terraform modules and deployed virtual machine scale sets in various environments.
  • Written Ansible handlers with multiple tasks to trigger multiple handlers and to decouple handlers from their names, making it easier to share handlers among Playbooks and Roles.
  • Automated activities like CD, application server setup and stack monitoring with Ansible playbooks.
  • Used Ansible to Setup/teardown of ELK stack (Elasticsearch, Log stash, Kibana) and troubleshoot the build issues with ELK and work towards the solution.
  • Used Ansible and created playbooks for machine creations and SQL server, cluster server & my SQL installations.
  • Encrypted the data using Ansible Vault and maintained role-based access control by using Ansible Tower and Implemented IT orchestration using Ansible to run tasks in a sequence which can work on different servers.
  • Automated build and deployment process with Jenkins eliminating 80% of manual work.
  • Managed CD systems and methodologies using Jenkins and migrated the setup to Azure DevOps to handle CI/CD process.
  • Build and managed the ELK cluster for centralized logging and search functionalities.
  • Used Grafana, ELK Stack with Logspout and Nagios for server monitoring.
  • Deployed and configured Prometheus to monitor Kubernetes nodes with node-exporter, monitor Kubernetes API and resources with Kube-state metrics.
No skills were added
Remove Skill
Information Technology
May 2016 - Jun 2018
Responsible for design and migrate network layout, data automation, deployments and cutover documentation, cost analysis, and timeline services from a managed hosting environment to AWS environment.
  • Worked on Salesforce platform to designed and migrated network layout, data automation, deployments and cut over documentation, cost analysis, and timeline services from a managed hosting environment to AWS environment.
  • Written Terraform and CloudFormation scripts to automate AWS ELB, CloudFront distribution, RDS, EC2, database security groups, Route 53, VPC, Subnets, Security Groups, and S3 Bucket.
  • Used the Code Pipeline plugin to integrate Jenkins with AWS and created the EC2 instances to provide the virtual servers.
  • Converted existing AWS infrastructure to AWS Lambda deployed via Terraform and AWS CloudFormation.
  • Automated backups of ephemeral data-stores to S3 buckets, EBS and created AMIs for critical production servers.
  • Worked on AWS costs by writing the Ansible Playbooks for auto Start/Stop of AWS resources at the time of the day by triggering it from Jenkins.
  • Managed AWS CloudFormation Template to create custom sized VPC, subnets, NAT and Route53 to ensure successful deployment of web applications and database templates.
  • Implemented Microservices using Pivotal Cloud Foundry (PCF) platform build upon Spring Boot Services and created workflows on Jenkins for setting up automated pipelines for CI/CD with PCF.
  • Used Docker to virtualize deployment containers and push the code to Cloud platform AWS EC2 using PCF.
  • Created Docker images using a Docker file, worked on Docker container snapshots and managed containerized applications in Kubernetes using nodes and managed Kubernetes using Helm charts. Built CI environment with Artifactory and CD environment using Jenkins.
  • Configured Ansible to manage AWS environments and automate the build process for core AMIs used for application deployments including Autoscaling, and CloudFormation Templates.
  • Implemented Jenkins workflow, plugins for repeatable deployments of Multi-Tier Applications, artifacts, and services to Docker and managed the Docker deployment pipeline for custom application images using Jenkins.
  • Created Docker images using a Docker file, worked on Docker container snapshots, removing images.
  • Built secret store with Hashicorp Vault and automated the application secret management process and management tool to provide security for credentials, tokens, and API Keys.
  • Managed Kubernetes using Helm charts and created reproducible builds of Kubernetes web applications.
  • Managed applications in Kubernetes using nodes, ConfigMaps, Selector, Services and deployed containers as Pods.
  • Upgraded the Terraform modules that had version conflicts to empower controls and missing potency. Supported administrators to ensure Splunk is running accurately and monitored the current infrastructure for capacity planning, scalability, and optimization.
  • Written Ansible Playbooks with Python SSH as the wrapper to manage configurations of AWS Nodes and Test Playbooks on AWS instances using Python and automated the installation of ELK agent (Filebeat) with Ansible playbook.
  • Provisioned AWS virtual servers by Ansible roles to ensure the deployment of web applications.
  • Automate the installation of ELK (Elasticsearch, Logstash, Kibana) agent (Filebeat) with Ansible playbook and set up a centralized login mechanism ELK with Filebeat based on Docker.
  • Implemented a centralized logging system using Logstash configured as an ELK stack (Elasticsearch, Logstash, Kibana) to monitor system logs, AWS CloudWatch, VPC Flow Logs, CloudTrail Events, changes in S3.
  • Monitored the current infrastructure for capacity planning, scalability, and optimization of application with Splunk.
  • Worked with Relational (PL/SQL, Oracle), Non-relational databases and Document-oriented databases (MongoDB).
  • Worked with Atlassian JIRA for creating Projects, assigning permissions to users and groups for the projects & created the mail handlers and notification schemes for JIRA.
No skills were added
Remove Skill
Sr. Build and Release Engineer
Information Technology
Nov 2014 - Apr 2016
  • Involved in DevOps migration/automation processes for build and deploy systems.
  • Built and developed various CI/CD pipelines from the scratch according to the developer's requirements on top of AWS cloud infrastructure used groovy scripts to develop scripted continuous delivery pipelines in Jenkins.
  • Responsible to monitor 200+ daily builds executed each day and monitored multiple Kafka jobs and maintained Jenkins pipeline scripts in GitHub using Groovy, Python, PowerShell, Perl and Bash.
  • Developed CI/CD system with Jenkins utilizing Kubernetes and Docker to build and test and deploy.
  • Actively maintained Jenkins build servers and all configurations for development, testing, production environments and improve build automation and to reduce bottlenecks in the delivery pipeline.
  • Worked with developers to resolve any failure or anomalies either with the build product and build node ecosystem.
  • Create and managed release plan for all development releases and provide instructions to teams on releases days.
  • Automated nightly build to discover new produced bugs earlier, reducing bug fixing time from 1-2 days to few hours.
  • Implemented the Build automation process for all the assigned projects in Vertical Apps domain.
  • Integrated Jenkins with tools like Maven, Git, SonarQube, nexus, Selenium and CD using Chef and Vagrant.
  • Automated infrastructure using Terraform, Ansible and created playbooks to automatically install packages from a repository, change the configuration of remotely configured machines and to deploy new builds.
  • Managed Amazon Redshift clusters such as launching the cluster by specifying the nodes and performed data analysis.
  • Launched and configured MySQL instances on both EC2 and RDS.
  • Managed an end-to-end solution for centralized logging, metrics collection and alerting.
  • Managing and architecting large volumes of servers and monitoring its applications through Nagios and Zabbix.
  • Used JIRA as a Change Management/ Work Management/ SCRUM Agile Tool.
  • Managed on-call rotation for operations team and part of daily scrums, weekly status meetings, and incident postmortem.
No skills were added
Remove Skill
Systems Engineer
Information Technology
Aug 2013 - Oct 2014
  • Led migration of data center to virtual environment (VMware) from standalone Linux servers.
  • Provided support to 250+ users in Linux and Mac environment and automated data collection task to eliminate manual tasks.
  • Implemented disaster recovery solutions and achieved 98% uptime for all servers.
  • Experience in building, releasing the software baselines, branch and labels development in SVN/GIT.
  • Involved in authoring pom.xml files, performing releases with the Maven release plugin, and managing Artifacts in NEXUS and JFrog repository.
  • Worked on Jenkins, used it for continuous Integration and End to End automation in building and deploying application.
  • Configured DB to optimize product configuration, server provisioning using CHEF recipes.
  • Configured and maintained network services, backup and recovery and maintaining web servers in Linux environment
  • Used SonarQube to identify the issues like build errors from the components in the system and escalated the errors.
  • Hands on experience in installing and maintaining of Splunk on servers.
No skills were added
Remove Skill
Edit Skills
Non-cloudteam Skill
University of Alabama 2019
Certified Kubernetes Application Developer