Home

Venkata Karthik Varma Sagi - Devops
[email protected]
Location: Boston, Massachusetts, USA
Relocation: Yes
Visa: GC
Resume file: VenkataKarthikVarmaSagi Resume u1 2 (1)_1775676179865.docx
Please check the file(s) for viruses. Files are checked manually and then made available for download.
Venkata Karthik Varma Sagi
Sr. Cloud DevOps Engineer
Phone: +17743204999
Email: [email protected]

PROFESSIONAL SUMMARY:
Overall 10+ years of comprehensive experience in IT Industry in which 8 years of experience in the areas of DevOps, AWS/Azure Cloud, and CI/CD pipeline, Configuration Management Build/Release Management, and 2 years of experience in Linux/Windows Administration.
Involved in various stages of Software Development Life Cycle (SDLC) including analysis, requirement gathering, and Design, Development, Testing, Deployment and Maintenance of DevOps applications.
Managed architecting and building solutions leveraging DevOps tools such as GIT, Maven, Jenkins, Docker, Ansible, and Chef Etc.
Experience with AWS Cloud services like EC2, VPC, ELB, Auto-Scaling, Security Groups, ECR, EKS, Route53, IAM, EBS, AMI, EFS, RDS, S3, SNS, SQS, Cloud Watch, CloudFormation, and Lambda & Direct Connect.
Collaborated with development teams to create and maintain efficient CI/CD pipelines using AWS CodePipeline, CodeBuild, and CodeDeploy, resulting in accelerated software delivery.
Automated application deployments using Argo CD, leveraging blue/green deployment strategies and canary releases to minimize downtime and ensure smooth rollouts.
Experienced in building tools like Maven, Ant & Gradle for building deployable artifacts from source code.
Expertise in using Repository Managers like Nexus, Docker Hub and JFrog to store the Artifacts.
Experience in Administrating Microsoft Azure Services like Azure App Services, Azure SQL Database, Azure AD, Azure Blob storage, Azure Functions, Virtual machines, Azure Fabric controller, Azure Data Factory, Azure web applications, Azure Service Bus, and Notification hub.
Experience in designing Azure Resource Manager (ARM) Template to deploy multiple resources as well as in designing custom build steps using Power Shell and Developed PowerShell scripts and ARM templates to automate the provisioning and deployment process.
Implemented scalable, resilient, and cost-effective cloud architectures on Azure, leveraging services like Azure Virtual Machines, Azure Kubernetes Service, and Azure App Services.
Configured Azure Automation Desired State Configuration (DSC) configuration management to assign permissions through Role-Based Access Control (RBAC), assign nodes to proper automation accounts and DSC configurations, to get alerts on any changes made to nodes and their configuration.
Expertise in Designing and implementing Continuous Integration (CI) throughout many environments utilizing Azure DevOps tools to provide an agile development process that is automated and repeatable, allowing teams to safely deploy code several times per day while ensuring Azure Kubernetes Services (AKS) are supported.
Experience in working on several Docker components like Docker engine, Hub, Machine, Compose, and Docker registry. Worked on creation of custom Docker container images, tagging, and pushing the images to Docker Hub.
Managed Kubernetes charts using Helm charts, and created reproducible builds of the Kubernetes applications, managed Kubernetes deployment and services files and managed releases of Helm packages.
Used Azure Infrastructure as a Service (IaaS), Provisioning VMs, Virtual Networks, Deploying Web Apps, Microsoft SQL Server, using ARM Templates, and Azure DevOps CI/CD pipelines.
Conducted vulnerability assessments and security scans in various stages for early detection and mitigation of security threats through SonarQube and Aqua scans.
Worked on monitoring tools like Nagios, Splunk, CloudWatch to health check the various deployed resources and services.
Expertise in configuring the Monitoring and Alerting tools according to the requirements like Prometheus and Grafana, Splunk setting up alerts, and developing multiple dashboards for individual applications in Kubernetes.
Experience in Configuring VNet Peering using Terraform Modules and configuring Network Security Groups for two tiers and three-tier applications were set up to filter network traffic, to facilitate connectivity between resources across various Virtual Networks.
Used Dynatrace APM tool to monitor our Kubernetes workloads, applications, and cloud services by enabling full stack monitoring. Created dashboards to provide insights into application performance metrics, such as response time, throughput, and error rates.
Implemented Ansible to manage servers and automate the build and configuration of new servers.
Worked with Ansible playbooks for virtual and physical instance provisioning, configuration management, patching and software deployment.
Worked on Terraform key features such as Infrastructure as Code, Execution plans, Resource Graphs, and Change Automation.
Performed L2 & L3 level Full Life-cycle triage for all events on production servers including Incident logging and troubleshooting.
Integrated Kibana with Elasticsearch to seamlessly visualize and analyze data stored in Elasticsearch indices.
Created CI/CD pipelines for .NET, Java, and Python apps in Azure DevOps by integrating Bitbucket, SonarQube, and Nexus repository.
Utilized Groovy to build complex pipelines in Jenkins.
Created deployment areas such as testing, pre-production, and production environment in Azure Kubernetes Service.
Led the migration of legacy applications to Azure Kubernetes Service (AKS), improving scalability and resilience while reducing infrastructure costs.
Hands-on in using OpenShift for container orchestration with Kubernetes, container storage, and automation, to enhance container platform multi-tenancy.
Good exposure in managing various LINUX servers clustered environments.
Experience in building Docker images using GitLab CI/CD build automation runner.
Experience in Setting up the build and deployment automation for Terraform scripts using Jenkins.
Resolved production issues very quickly with an analytical bent of mind.
Excellent communication skills with experience in organizing meetings and gathering project requirements from multiple teams in large multi-functional organizations.

EDUCATION:
Masters in computer science from Kent State University December 2013
Bachelor of Technology from Andra University, India. May 2012

TECHNICAL SKILLS:
Title Tools Used
Cloud Environments Microsoft Azure, Amazon Web Services (AWS)
AWS EC2, S3, Lambda, RDS, ECS, ECR, EKS, CloudFormation, IAM, VPC, CloudWatch, Kinesis, Elastic Beanstalk, Autoscaling, CloudTrail, AWS Direct Connect, Route53, SQS, SNS
Azure VM, App Services, Azure Repos, Azure Pipelines, Azure Boards, Azure Kubernetes Service (AKS), Azure Container Registry (ACR), Azure Functions, Azure Blob Storage, DevOps Services, Azure Monitor and Log Analytics, Networking Services
Configuration Management Ansible, Chef, Puppet
Build Tools ANT, Maven, Gradle
CI/CD Tools Jenkins, Argo CD, Azure Pipelines, GitLab, GitHub Actions
Monitoring Tools Splunk, Dynatrace APM, Cloud Watch, ELK, Grafana, Prometheus, Datadog
Container Tools Kubernetes (EKS, AKS), OpenShift, ECS, Docker
Scripting/Programming Languages Python, Java, Shell (Bash), Ruby, .NET, YAML, JSON, Golang, PowerShell, Groovy
Version Control Tools GIT, GitHub, Azure Repos, Bit Bucket, GitLab
Operating Systems UNIX, Linux, RHEL, Windows Server
Databases SQL Server, MYSQL, NoSQL, S3, MongoDB, Dynamo DB, Cassandra, Data Lake
Ticketing Tools Jira, ServiceNow, Bugzilla, Mingle
Testing / Code Quality Selenium, SonarQube, Veracode, X-Ray
Web/Application Servers Apache Tomcat, Nginx, IIS, httpd, Web logic, Kafka
Virtualization Tools Oracle Virtual Box, VMWare, vSphere, Vagrant
Infrastructure as Code Terraform, ARM Templates, CloudFormation

WORK EXPERIENCE

Client: Alabama Medicaid Agency, Montgomery, Alabama August 2025 Present
Role: DevOps Engineer
Responsibilities:
Designed, implemented, and maintained Microsoft Azure infrastructure across Azure Government and Commercial environments, ensuring secure, scalable, and highly available cloud services for enterprise applications and core agency platforms.
Administered and supported Microsoft Entra ID (Azure AD), Active Directory, and hybrid identity solutions, including identity lifecycle management, directory synchronization, role-based access control (RBAC), and secure access governance.
Managed and supported Microsoft Entra Connect / Azure AD Connect infrastructure, including configuration analysis, staging server validation, synchronization troubleshooting, and upgrade planning for high availability and minimal service disruption.
Configured and maintained Single Sign-On (SSO) integrations using SAML, OAuth, OpenID Connect, NTLM, and Kerberos for enterprise and third-party applications, ensuring secure and seamless authentication experiences.
Developed and automated infrastructure provisioning, configuration management, and operational workflows using Terraform, PowerShell, Azure CLI, and Ansible, improving consistency, security, and deployment efficiency.
Built and maintained CI/CD pipelines using Azure DevOps, GitHub Actions, and GitLab CI/CD for automated infrastructure deployments, application delivery, secrets management, and configuration updates.
Administered Azure networking components including Virtual Networks, Subnets, NSGs, Azure Firewall, Private Endpoints, Private DNS Zones, Load Balancers, and Application Gateways to ensure secure and resilient connectivity across hybrid environments.
Managed Azure virtual machines, storage accounts, backup configurations, and disaster recovery components, supporting secure and stable hosting for business-critical systems and agency workloads.
Integrated Azure Key Vault with infrastructure and application workflows for secure secret management, certificate handling, and least-privilege access control across environments.
Monitored and optimized Azure resources using Azure Monitor, Log Analytics, KQL, Dynatrace, and native platform metrics to improve observability, troubleshoot issues, and maintain platform health and performance.
Designed workbook and monitoring solutions to identify stale resources, unused services, duplicate alerts, failed integrations, and cost optimization opportunities across subscriptions and resource groups.
Performed Azure cost analysis and reporting using Azure Cost Management and Advisor, identifying underutilized resources, recommending remediation actions, and improving spending efficiency across environments.
Troubleshot complex infrastructure and identity issues involving authentication failures, hybrid join/device registration, DNS resolution, private endpoint connectivity, access control, and synchronization problems.
Supported enterprise backup and recovery operations, including validation of restore capabilities, backup policy reviews, and operational readiness for critical Azure and identity services.
Administered and secured Azure resources with Conditional Access, MFA, identity governance, and policy enforcement to align with organizational security standards and compliance requirements.
Collaborated with infrastructure, security, application, and vendor teams to support cloud modernization initiatives, production support, identity integrations, and enterprise platform stability.
Created and maintained technical documentation including architecture diagrams, operational runbooks, upgrade plans, cost reports, access workflows, and support procedures to ensure knowledge transfer and operational continuity.
Provided technical guidance and troubleshooting support for Azure services, identity platforms, networking, and infrastructure automation, helping teams adopt best practices and improve operational maturity.
Environment: Microsoft Azure, Azure Government, Microsoft Entra ID, Active Directory, Azure AD Connect, Terraform, PowerShell, Azure CLI, Ansible, Azure DevOps, GitHub Actions, GitLab CI/CD, Azure Monitor, Log Analytics, KQL, Dynatrace, Azure Key Vault, NSG, VNet, Private Endpoint, Private DNS, Azure Firewall, Application Gateway, Load Balancer, RBAC, Conditional Access, MFA, SAML, OAuth, OpenID Connect, Kerberos, NTLM, Backup and Recovery Services.



Client: State of Nevada, Carson City, Nevada. April 2022 August 2025
Role: DevOps Engineer/ Kubernetes Administrator
Team Name: CloudOps Innovators





Responsibilities:
Designed, implemented, and maintained secure, scalable Azure infrastructure using Infrastructure as Code (IaC) with Terraform and managed state/workspaces via Terraform Cloud.
Developed and maintained CI/CD pipelines leveraging GitHub Actions and Azure DevOps to provision and configure infrastructure, automate deployments, and prevent configuration drift. Evaluated feasibility of enhancement requests across Jira, Confluence, and Bitbucket, leveraging in-depth knowledge of Jira configurations including screens, workflows, roles, permissions, custom fields, and project automation.
Assessed marketplace add-ons and plug-ins for Jira, analyzing functionality, security, and performance impact to ensure compatibility and suitability for enterprise-level adoption.
Delivered hands-on administration and optimization of the Atlassian suite (Jira, Confluence, Bitbucket) to support Agile and DevOps workflows.
Applied strong understanding of Agile DevOps methodologies to improve team velocity, streamline collaboration, and support continuous delivery pipelines.
Took ownership of technical solutions, ensuring timely and high-quality delivery while managing stakeholder expectations and scope boundaries.
Demonstrated strong analytical and troubleshooting skills to resolve configuration conflicts, plugin issues, and workflow inconsistencies.
Produced clear, concise documentation and communicated effectively with technical and non-technical stakeholders across teams.
Built modular, reusable Terraform modules for consistent provisioning of Azure resources including AKS clusters, VNets, App Gateways, Key Vaults, and Function Apps.
Integrated Policy-as-Code (PaC) controls across Azure environments to enforce compliance with NIST and CIS benchmarks using automated remediation logic and security scanning tools.
Utilized cloud security posture management (CSPM) platforms like Wiz and Prisma Cloud to scan IaC pre-deployment and continuously monitor misconfigurations and vulnerabilities.
Implemented automated remediation workflows via ITSM integration for rapid response to compliance violations and security threats across Azure assets.
Managed Azure networking components including NSGs, Azure Firewall, UDRs, Private Endpoints, Service Endpoints, and Application Gateways for secure, resilient connectivity.
Automated infrastructure provisioning and configuration using PowerShell scripts, Azure CLI, Azure Automation runbooks, and Ansible playbooks to reduce manual efforts.
Developed Azure governance policies for identity, access control, cost management, tagging standards, and resource locks to enforce operational discipline.
Enforced RBAC policies, integrated Azure Key Vault for secret and certificate management, and implemented least privilege access control across all Azure services.
Performed risk assessments, conducted internal security audits, and implemented security recommendations to align with organizational standards and regulatory compliance.
Troubleshot critical Azure infrastructure issues, resolved authentication failures, service interruptions, and network misconfigurations with minimal business disruption.
Instrumented observability tooling such as Dynatrace and Azure Monitor for full-stack monitoring, log analytics, proactive alerting, and root cause analysis.
Participated in ITSM activities such as change management, incident response, and service request resolution, ensuring adherence to SLAs and operational KPIs.
Architected Azure solutions aligned with Microsoft s Well-Architected Framework, focusing on security, performance, reliability, and cost optimization.
Evaluated and implemented cloud-native tools and third-party vendor products to enhance automation, security, and DevOps capabilities across cloud platforms.
Troubleshot and resolved complex Azure service issues including virtual networking, authentication failures, compliance violations, and integration challenges, ensuring minimal downtime.
Automated Azure resource provisioning, policy deployments, and compliance monitoring workflows using PowerShell, Azure CLI, Azure Automation, Terraform, and Ansible, improving operational efficiency.
Integrated Azure Key Vault with IAM and application workflows for secure secrets management and implemented role-based access control (RBAC) to enforce least privilege principles.
Built and maintained CI/CD pipelines using Azure DevOps and GitHub Actions for Azure resource deployments, ensuring automated and consistent environment provisioning.
Integrated Dynatrace OneAgent across Azure services and Kubernetes (AKS) clusters for full-stack observability, proactive monitoring, and rapid incident response.
Implemented cost optimization strategies and monitored Azure spend using Azure Cost Management and Advisor to recommend efficiency improvements and eliminate waste.
Designed and maintained comprehensive technical documentation for Azure architectures, security controls, compliance reports, and operational procedures.
Collaborated closely with cybersecurity, data, and application teams to continuously improve Azure solutions, support secure cloud migrations, and strengthen cloud governance.
Proactively stayed informed on Azure updates, new service capabilities, and evolving regulatory compliance requirements to ensure platform modernization and best practice adoption.
Provided technical mentorship and training to internal teams on Azure architecture, security best practices, troubleshooting methodologies, and compliance management.
Managed identity lifecycle processes, including user provisioning, de-provisioning, and access reviews, enforcing least privilege access across applications and platforms.
Configured and supported Single Sign-On (SSO) using SAML, OAuth, and OpenID Connect to enable seamless and secure authentication across cloud and on-premises applications.
Developed and enforced security policies such as Multi-Factor Authentication (MFA), Conditional Access, and identity governance policies to enhance security and compliance.
Monitored IAM compliance with regulatory frameworks such as PCI, NIST, and 201 CMR 17 through risk assessments and security audits.
Strong understanding of cloud computing concepts, including IaaS, PaaS, and SaaS, with hands-on experience in Microsoft Azure.
Administered Active Directory forests, domains, trusts, and replication models, optimizing performance and ensuring high availability.
Troubleshot and resolved IAM-related issues, including SSO failures, directory synchronization problems, and access control challenges.
Deployed and configured Dynatrace OneAgent across distributed systems to enable full-stack observability and APM (Application Performance Monitoring).
Automated IAM workflows using PowerShell, Azure Automation, Ansible, and Chef to improve operational efficiency and reduce manual intervention.
Integrated Azure Key Vault with IAM workflows for secure credential management and implemented role-based access control (RBAC) to enforce least privilege access.
Created and maintained IAM-related technical documentation, including access policies, security configurations, and compliance reports.
Integrated Dynatrace with Azure services, Kubernetes (AKS), and CI/CD pipelines for continuous performance monitoring and release validation.
Implemented infrastructure automation and configuration management using Terraform, Ansible, and Puppet for IAM-related services and Azure resources.
Developed CI/CD pipelines using Azure DevOps, GitHub Actions, GitLab CI, Jenkins, and Harness to automate IAM policy deployments, secrets management, and Azure resource provisioning.
Integrated Argo CD with Kubernetes and GitOps workflows to enable secure and auditable IAM deployments.
Collaborated with cybersecurity, IT, and application teams to implement and maintain IAM best practices and security measures.
Provided technical guidance and training on IAM security practices to stakeholders, ensuring effective identity management across the organization.
Proficient in Infrastructure as Code (IaC) with experience using Terraform to provision, manage, and scale cloud infrastructure in Azure and AWS environments.
Designed and implemented reusable Terraform modules for efficient and consistent infrastructure deployment, leveraging remote state management and workspaces for multi-environment support.
Strong understanding of modern CI/CD and deployment automation principles, integrating Terraform workflows into Azure DevOps and GitHub Actions pipelines for seamless delivery.
Solid expertise in Azure Networking, including configuration and management of VPN Gateways, Subnets, NSGs, VNET Peering, Private DNS Zones, Private Endpoints, and custom Routing Tables.
Proven ability to troubleshoot complex infrastructure and networking issues across hybrid environments, demonstrating strong problem-solving and analytical skills.
Effective communicator and cross-functional collaborator with a track record of clearly documenting solutions and guiding teams through infrastructure changes and incident resolution.
Integrated IAM solutions with cloud and on-premises applications, ensuring secure and efficient authentication and authorization processes.
Conducted training sessions and knowledge-sharing workshops to upskill IT and security teams on IAM processes, tools, and best practices.
Integrated GitLab CI/CD with Kubernetes, Terraform, and Azure services, enabling automated infrastructure provisioning and application deployments.
Developed and enforced Azure Policies across multiple environments, ensuring compliance with corporate security standards and regulatory requirements.
Created and managed GitLab repositories and GitLab CI/CD pipelines for version control, automated testing, and deployment of applications across multiple environments.
Configured GitLab Runners to execute CI/CD jobs, ensuring efficient software delivery and compliance with best practices.
Integrated GitLab CI/CD with Kubernetes, Terraform, and Azure services, enabling automated infrastructure provisioning and application deployments.
Developed GitLab pipeline templates to standardize deployment workflows across teams, improving efficiency and reducing manual intervention.
Skilled in troubleshooting and debugging .NET applications and Azure services, identifying performance bottlenecks, memory leaks, and other issues to ensure optimal application performance and reliability.
Used Terraform to migrate legacy and monolithic systems to Azure.
Created Terraform templates and modules for creation of various resources in Azure, Kubernetes, and deployment of various applications across multiple environments to manage infrastructure.
Set up the build and deployment automation for Terraform scripts using Jenkins on Azure. Restricted user access/service accounts access over jobs on Jenkins using Assign and managing roles for security purposes in development and test environments.
Involved in Migration of on-premises data to Azure Data Lake using Azure Data Factory.
Implemented and configured HashiCorp Vault to securely store and manage sensitive information, including cryptographic keys, passwords, and API tokens.
Designed and implemented disaster recovery and high availability solutions for Azure Databricks environments, including data replication, backup, and failover mechanisms, ensuring business continuity and data resilience.
Created hooks on Bitbucket repositories in aiding automation of Jenkins jobs on Azure.
Created jobs to manage F5 balanced load environments deployments in dev environment on Azure.
Installed, integrated, and ran Docker containers on Azure Container Instances or Azure Kubernetes Service.
Utilized Kubernetes and Docker for the runtime environment for the Continuous Integration/Continuous Deployment system to build, test, and deploy. Created Jenkins jobs to deploy applications to Azure Kubernetes Service.
Created Docker containers, Docker images, tagged and pushed the images and managed the application lifecycle on Azure Container Instances or Azure Kubernetes Service consoles.
Leveraged ISTIO for streamlined microservices communication and seamless integration with Kubernetes deployments.
Installed and Configured Ingress Nginx Controller in Kubernetes clusters to enable external access to services.
Implemented encryption and decryption mechanisms using HashiCorp Vault's transit secrets engine to protect sensitive data in transit and at rest, ensuring compliance with data security standards.
Used Jenkins and Azure pipelines to drive all microservices builds out to the Docker registry and then deployed to Azure Kubernetes Service.
Deployed the artifacts to staging and production environments from artifact tools like Azure Container Registry. Built the Docker image, published it to Azure Container Registry repo.
Wrote Ansible playbooks to automate deployments, restart servers, and install new packages.
Monitored the deployed applications using performance monitoring tools like Grafana and Prometheus on Azure Monitor.
Collaborated with development teams to design, implement, and optimize Azure DevOps (ADO) pipelines for efficient build and deployment processes, ensuring minimal downtime during releases.
Assisted in creating and configuring build and release pipelines tailored to project requirements, ensuring smooth deployment flows and adherence to best practices.
Configured deployment groups and environments in ADO, optimizing the deployment process for stability and reduced downtime during releases.
Monitored and troubleshot deployment issues using logs and ADO tools, ensuring rapid resolution of any issues during deployment activities.
Collaborated with development teams to define and refine deployment steps, ensuring the accuracy and efficiency of the pipeline setup.
Implemented release pipelines for seamless transitions from development to production, optimizing deployment strategies for each project.
Coordinated with cloud operations teams to handle any Azure DevOps organization creation tasks and ensured smooth collaboration across teams for project setup.
Assisted in adding servers and agents to ADO and integrating them into deployment groups for enhanced operational efficiency.
Experienced in version control and source code management using Git and GitHub.
Proficient in managing Git repositories, branching strategies, and Git workflows (GitFlow, trunk-based development).
Hands-on experience with GitHub Actions for CI/CD automation and infrastructure deployments.
Implemented GitHub security best practices, including branch protection rules, signed commits, and secret scanning.
Ensured pipelines executed within allocated windows, monitoring deployments to detect any issues and addressing them promptly.

Environment: Azure DevOps, Terraform, Azure SQL, Azure Active Directory, Jenkins, Python, GIT, Bitbucket, Ansible, Azure Services, Docker, Azure Databricks, Azure Key Vault, SonarQube, Argo CD, Azure Kubernetes Service (AKS), Azure Container Registry (ACR), CI/CD pipelines, Datadog, HashiCorp, OpenShift Container Platform, .NET, ISTIO, ELK stack, Azure Log Analytics, Azure Pipelines, Nginx, Prometheus & Grafana, Splunk, Kafka, Azure Cosmos DB, Migration, Jira.

Client: Union Bank of Switzerland, Jersey City, New Jersey March 2018 April 2022
Role: AWS DevOps Engineer / SRE (Site Reliability Engineering)
Team Name: CloudOps Vanguard







Responsibilities:
Installed and Administered Jenkins CI for ANT and Maven Builds and managed the installation, configuration, and administration of RDBMS and NoSQL tools such as DynamoDB.
Worked extensively on creating and managing Docker containers and Docker consoles for application lifecycle management.
Integrated Argo CD with CI/CD pipelines (e.g., Jenkins, GitLab CI) to trigger deployments automatically when changes are pushed to the Git repository, enabling seamless continuous integration and delivery.
Utilized Docker container snapshots, attaching to running containers, removing images, managing directory structures, and overseeing containers in AWS ECS.
Created and maintained S3 buckets, implemented policy management, and utilized Glacier for storage and backup on AWS.
Implemented and managed Red Hat Enterprise Linux (RHEL) OpenShift Container Platform for Docker and Kubernetes, leveraging Kubernetes for managing containerized applications using nodes, Config Maps, node-selector, Services, and deploying application containers as Pods.
Installed, configured, and administered VMware, and automated jobs through crontab and AutoSys.
Orchestrated deployments using Atlassian development repository tools, Jenkins as the build engine, and executed deployments to container orchestration tools, including OpenShift on EC2, AWS.
Configured health checks on Route53 and implemented various routing policies like Simple, Weighted, and Fail-over.
Developed and deployed Cron-Jobs, Argo workflows for security scans, compliance scans, and triggering builds for applications in a cluster.
Developed Groovy scripts for setting up LDAP configuration for Jenkins using security matrix.
Set up and maintained Logging and Monitoring subsystems utilizing tools such as Elasticsearch, Fluent, Kibana, Prometheus and Grafana.
Created dashboards, metrics, alarms, and notifications for servers using AWS CloudWatch, Grafana, Prometheus, and Nagios.
Proficient in UNIX shell/Bash scripting, Autosys scheduling experience, and batch processing in the production environment.
Designed and implemented end-to-end CI/CD pipelines using AWS CodePipeline, AWS CodeBuild, and AWS CodeDeploy also integrated source code repositories, such as AWS CodeCommit, with AWS CI/CD services to enable automated build, test, and deployment processes.
Wrote Ansible Playbooks for various applications and deployed them in AWS using Terraform.
Automated Kubernetes clusters with Ansible, writing playbooks for deployment.
Responsible for monitoring alerts from Prometheus about Kubernetes nodes, disk usage, memory, app restarts, and troubleshooting.
Developed and deployed Helm charts to Kubernetes using Helm file as a declarative configuration for deploying distributions of Helm charts while adhering to 12-factor application principles.
Proficient in writing Helm charts and Kubernetes YAML files for deploying microservices into Kubernetes clusters.
Configured JUnit coverage report and Integration Test cases as part of the build in GitLab Runner.
Developed build workflows using Gradle, Gitlab-CI, Docker, and OpenShift.
Acted as an AWS DevOps Engineer for a team overseeing multiple simultaneous software releases.
Migrated and maintained build and test environments into Cloud Infrastructure.
Configured AWS Identity Access Management (IAM) Group and users for improved login authentication.
Set up AWS Virtual Private Cloud (VPC) and Database Subnet Group for isolation of resources within the Amazon RDS Aurora DB cluster and created notifications and alarms for EC2 instances using CloudWatch.
Involved heavily in setting up the CI/CD pipeline using Jenkins, Maven, Nexus, GitHub, Ansible, and AWS.
Experienced with AWS services like Amazon S3, RDS, EC2, CloudFormation, Lambda, VPC, ELB, Glacier, Elastic Block Store, DynamoDB, Amazon RDS, CodeDeploy, CloudWatch, Amazon IAM, SES, SQS, Security Groups, and Route 53 in an Agile environment.
Implemented SonarQube for developer code quality checks, established quality gates, and designed gate thresholds by muting/unmuting rules through TeamCity.
Configured Groovy script, shared Jenkins libraries, and multi-branch pipelines to manage automated deployment for Dev, QA, UAT, and PROD environments.
Implemented Terraform modules for deployment of applications across multiple cloud providers and employed Git/GitHub, Ansible, Jenkins, and VMware software to build automated testing and delivery pipelines.
Automated various infrastructure activities like Continuous Deployment, Application Server setup, Stack monitoring using Ansible playbooks, and integrated Ansible with Jenkins.
Designed and built custom VPC setups, maintained and architected Cloud Formations for rapid deployment, set up High Availability Cloud architectures in AWS, and architected and set up AWS Customer Gateway via VPN.
Maintained AWS Cost Optimization, AWS Cloud Security, Operational Excellence, Performance, and Reliability for AWS Cloud architecture and deployments.
Customized existing playbooks downloaded from the Puppet supermarket using Python DSL and Handlers.
Deployed Java and .NET applications through WebLogic/WebSphere Application servers and build tools like Gradle.
Designed Auto-scaling Launch configurations templates using various modules like Key-pairs, Security groups, and block device mapping to configure EC2 instances within the Auto-scaling group.
Scheduling, deploying, and managing container replicas onto a node using Kubernetes and experienced in creating Kubernetes clusters, and deployments with the help of Helm charts as a package/version manager.
Configured ISTIO service mesh on Kubernetes cluster and implemented security protocols like mutual TLS for internal service-to-service communication.
Deployed Kubernetes clusters on top of Amazon EC2 Instances using KOPS and Managed local deployments in Kubernetes, creating local clusters, deploying application containers, and building/maintaining Docker container clusters managed by Kubernetes and deployed Kubernetes using HELM Charts.
Set up development and production data pipelines for ML teams on Mesos managed EC2 clusters with Marathon Docker Management and data stored in AWS S3, transformed with Python ETL scripts.
Designed and implemented ServiceNow solutions tailored to organizational needs, leveraging IT Service Management (ITSM) modules such as Incident, Change, Problem, and Service Catalog.
Expertise in using build tools like MAVEN and ANT for building deployable Artifacts such as War & Ear from Source Code.
Performed administrative tasks such as user management, role-based access control (RBAC), license management, and Splunk instance tuning. Scheduled backups, maintenance tasks, and upgrades to keep Splunk environments running smoothly.
Integrated Splunk with other IT operations tools and platforms (e.g., Nagios, ServiceNow, AWS CloudWatch) to streamline monitoring, troubleshooting, and incident management workflows.
Implemented Dynatrace for end-to-end application performance monitoring, enabling real-time visibility into application health and performance.
Implemented Real User Monitoring (RUM) with Dynatrace to analyze user interactions and optimize page load times.
Configured custom alerts in Dynatrace to receive real-time notifications for application and infrastructure anomalies, enabling swift incident response.
Defined and implemented SLOs and SLIs for critical services, establishing measurable targets for reliability and performance.
Managed SLAs to ensure the delivery of services met agreed-upon performance standards and availability targets.
Developed and tracked key SRE KPIs, including MTTR (Mean Time to Recovery), availability, incident frequency, and error rate.
Implemented KPI dashboards to provide real-time visibility into system performance and reliability metrics.

Environments: Ansible, Apache Tomcat, AWS, AWS CodePipeline, Argo CD, AWS Secret Manager, Chef, CI/CD Pipeline, CloudCheck, CloudFormation, CloudWatch, Confluence, Cost Explorer, Docker, Dynatrace, Elastic Container Registry (ECR), Elastic Kubernetes Service (EKS), ELK Stack, GitLab, GitHub, GIT, Helm Charts, IAM, Jenkins, JIRA, Migration, Nagios XI, OpenShift, Prometheus, Python, ServiceNow, SonarQube, Splunk, Terraform.

Client: Tele stream, San Francisco, CA March 2016 March 2018
Role: DevOps Engineer
Team Name: DevOps Trailblazers





Responsibilities:
Established a Continuous Delivery pipeline with Docker, Jenkins, and GitHub. Installed and configured Jenkins to support various Java builds, automated continuous builds using Jenkins plugins, and published Docker Images to the Nexus Repository.
Implemented SonarQube for continuous inspection of code quality and automated Nagios alerts and email notifications using Python scripts executed through Chef.
Installed, configured, and maintained web servers like Apache Web Server and WebSphere Application Server on Red Hat Enterprise Linux (RHEL).
Proficient with Red Hat Linux kernel, memory upgrades, and swaps area. Experienced in 111 Linux Kickstart and Sun Solaris Jumpstart Installation. Configured DNS, DHCP, NIS, NFS in Sun Solaris 8/9, and other Network Services.
Leveraged multiple EC2 instances simultaneously and ensured exceptionally durable and available data using S3 data store, versioning, and lifecycle policies. Created AMIs for mission-critical production server backups.
Automated deployments using AWS by creating IAMs, integrating Jenkins with AWS using the code pipeline plugin, and provisioning EC2 instances.
Implemented various concepts of Chef such as Roles, Environments, Data Bags, Knife, and Chef Server Admin/Organizations. Wrote Chef Recipes to automate the build/deployment process and utilized data bags in Chef for better environment management.
Implemented monitoring solutions using Splunk, enabling proactive issue detection and resolution for CI/CD pipelines and infrastructure.
Evaluated Chef Cookbook modifications on cloud instances in AWS using Test Kitchen and Chef Spec.
Developed Chef Cookbooks for various DB configurations to modularize and optimize product configuration, converting production support scripts to Chef Recipes, and provisioning AWS servers using Chef Recipes.
Worked with the Knife command-line tool for creating Recipes and Cookbooks and utilized the Chef Supermarket.
Implemented Docker-Maven plugin and Maven POM to build Docker Images for all microservices and utilized Docker file to build Docker Images from Java jar files.
Utilized Git for source code version control, integrated with Jenkins for CI/CD pipeline, and managed user management with Maven and Ant build tools.
Installed, configured, and managed Monitoring Tools such as Nagios for Resource Monitoring and Network Monitoring.
Developed automated build and deployment processes for applications, re-engineered setups for better user experience, and built a continuous integration system for all products.
Managed infrastructure servers from SCM to GitHub and Chef.
Extensively worked with the distributed version control system Git.
Responsible for building/deploying consistently repeatable build/deployments to company production and non-production environments using Jenkins.
Collaborated with the development team to generate deployment profiles (jar, war, ear) using Ant Scripts and Jenkins.
Used Maven dependency management system to deploy snapshot and release artifacts to Nexus, facilitating artifact sharing across projects.
Implemented CI/CD Automation Process using CI Tool Jenkins, CD Tool Docker.
Installed, updated, diagnosed, and troubleshot the issue tracking and project management application, learning agile methodology by JIRA. Created and configured new JIRA projects and maintained existing JIRA projects.
Managed servers built on Linux, Solaris, and Windows platforms using the Chef Configuration management tool.
Created Deployment notes in collaboration with the Local SCM team and released Deployment instructions to Application Support.

Environments: Docker, Jenkins, GitHub, Nexus, SonarQube, Nagios, Python, CI/CD pipeline, Chef, Red Hat Enterprise Linux (RHEL), AWS (Amazon Web Services), Apache Web Server, WebSphere Application Server, Sun Solaris, EC2, S3, IAM, Test Kitchen, Chef Spec, Knife, Docker-Maven plugin, Maven, Git, Ant, Nagios, Maven, JIRA.

Client: University of Pittsburgh Medical Center, Pittsburg, Pennsylvania Feb 2015 -Mar 2016
Role: Linux Administrator
Team Name: Cloud Infrastructure Specialists








Responsibilities:
Deployment and management through AWS cloud formation on EC2 instances and maintaining amazon S3 storage.
Knowledge on SaaS, PaaS, and IaaS concepts of cloud computing architecture.
Responsible for creating and managing a Docker deployment pipeline for custom application images in the cloud using Jenkins.
Implemented and maintained the branching and build/release strategies utilizing GIT Administration of Jenkins server- Includes Setup of Jenkins, Configure Nightly builds, and parameterized builds.
Wrote Python scripts for automating the deployments of applications.
Used Git as source code management tool and integrated it with Jenkins for CI/CD pipeline, code quality tracking and user management with build tool Maven.
Expertise in Installation and configuration of automated tool like Puppet which includes Puppet Master, Agent Nodes and an administration control workstation and tools like Hiera, Mcollective & Puppet Console. Used Bamboo and Octopus as CI (Continuous Integration) and CD (Continuous Deployment).
Using Puppet as a configuration management tool for environment more than 5000 servers which have Virtual machines and Physical machines.
Wrote modules from scratch and enhanced the existing modules as per the application requirements and wrote templates in ruby format and used Hiera to use template variables to configure the nodes.
Experience in using Atlassian tools such as JIRA (for work tracking) and Confluence as central repository for documentation.
Troubleshooting and performance tuning issues with applications like Oracle 10.x, 11.x and application servers like WebLogic.
Used Puppet to manage Web Applications, Config Files, and Data base, Commands, Users Mount Points, and Packages.
Also involved in Production support task including in troubleshooting and data issues for both divisional and national systems.

Environments: AWS CloudFormation, Amazon S3, Amazon EC2, CI/CD, Docker, Jenkins, GIT, Python, PowerShell, Maven, Puppet, Bamboo, Octopus, Atlassian JIRA, Atlassian Confluence, Oracle WebLogic, Hiera, Mcollective, Shell Scripting.

Client: Intel Corporation, Santa Clara, CA Feb 2014 Feb 2015
Role: Linux System Administrator
Team Name: System Administration and Support Engineers







Responsibilities:
Installation, Configuration & Upgrade of Linux, Solaris, and HP-UX Operating System.
Proficient in the installation of patches and other software packages using RPM and YUM in Linux, pkgadd, pkginfo, pkgrm, patchadd, showrev p, patchadd p in Solaris, and swinstall, swremove, swlist in HP-UX.
Expert in creating depot for patches and installing packages using depot in HP-UX and Build RPM using RPMBuild in Linux.
Exceptional knowledge in Installation, Configuration and file system and RAID volume management through VXVM and Solaris Volume Manager (SVM) in Solaris and LVM in Linux and HP-UX.
Impressive knowledge of Linux/Unix kernel tuning, building customized kernels.
Experience in installing, configuring, and maintaining WebLogic Application Server and WebSphere Server with java Application tools on Linux and UNIX servers environment.
Created Zettabyte file system (ZFS) in Solaris 10. Created pools, snapshots, and clones.
Exported ZFS from local zones to local zones.
Worked on maintaining DNS & NTP, MySQL database servers.
Installed and configured system network monitoring tool used Nagios and troubleshooted virtual machine issues.
Compiled, Build & Installed PostgreSQL database 8.3.1 and written shell script for startup in SUSE Enterprise Linux 10sp1 Supermicro dedicated server 6015B-3R for Fortress platform development Lab, app, and QA team.
Expert in applying new patches and packages on Linux.

Environments: Linux, Solaris, HP-UX, RPM, YUM, pkgadd, pkginfo, pkgrm, patchadd, showrev, swinstall, swremove, swlist, VXVM, Solaris Volume Manager (SVM), LVM, WebLogic Application Server, WebSphere Server, ZFS, DNS, NTP, MySQL, Nagios, PostgreSQL, shell scripting.
Keywords: continuous integration continuous deployment quality analyst machine learning user experience sthree database active directory information technology ffive hewlett packard bay area California Delaware Idaho

To remove this resume please click here or send an email from [email protected] to [email protected] with subject as "delete" (without inverted commas)
[email protected];7135
Enter the captcha code and we will send and email at [email protected]
with a link to edit / delete this resume
Captcha Image: