LiveCareer-Resume

aws cloud security architect resume example with 19+ years of experience

Jessica Claire
  • , , 609 Johnson Ave., 49204, Tulsa, OK 100 Montgomery St. 10th Floor
  • Home: (555) 432-1000
  • Cell:
  • resumesample@example.com
  • :
Summary

Versatile technical security analyst with 10+ years Professional experience and 5+ years as AWS Cloud Security Engineering / Solutions Architect with a proven track record in Security and solutions design for cloud technologies. Possess in depth experience in transitioning multiple projects and ensuring seamless end to end delivery of services. Drive excellence in every project to deliver outstanding results. Skilled in evaluating current technologies to support short and long-term IT initiatives. Experience working in cloud architectural security to deliver functional and highly secured environment.


Resourceful and experienced in evaluating and assessing client requirements and implementing infrastructure to solve identified problems. Harnessed code and cloud-native technologies to create scalable and user-centric systems. Strong negotiator with excellent value-driven solutions.

SKILLS
  • AWS VPC, SUBNETS, TGW ,IGW ,NGW ,SPLUNK
  • AWS IAM, AWS DNS, ROUTE 53, AWS AUTOSCALING,
  • AWS EC2, AWS RDS, AWS S3 BUCKETS,
  • AWS SECURITY, AWS CLOUD WATCH (EVENTS AND LOGS ), AWS CLOUD TRAIL, PARAMETER STORE, AWS SECRETS MANAGER, AWS CONFIG RULES, AWS TRUSTED ADVISOR, AWS CERTIFICATE MANAGER, AWS KMS, AWS CLOUDFRONT, AWS INSPECTOR, SNAPSHOT LIFECYCLE MANAGER.
  • AWS GUARDDUTY, AWS SHIELD, AWS SECURITY HUB.
  • AWS CLOUDFORMATION, AWS LAMBDA, AWS SYSTEM MANAGER, AWS SNS, AWS ORGANIZATION.
  • ACTIVE DIRECTORY, AWS CONTROL TOWER.
  • PYTHON, BASH, JSON, YAML, JIRA,AWS CLOUD 9.
  • GIT, GITHUB etc.
  • AWS CICD PIPELINE
  • DOCKER CONTAINARIZATION.
Experience
AWS Cloud Security Architect, 03/2020 to Current
Cdk Global Inc.Charleston, SC,
  • Create and manage IAM user accounts and role-based policies for access to AWS services.
  • Implemented security best practices in AWS including multi-factor authentication, access key rotation, role-based permissions, encryption using KMS, enforced strong password policy, firewalls, configured security groups and NACLs, S3 bucket policies and ACLs, mitigating DDoS attacks etc.
  • Designed secure, cost-optimized, highly available, and fault-tolerant infrastructure in AWS.
  • Architected and configured Dev / Stage / QA environments in AWS (VPC, subnets, security groups, EC2 instances, load balancer, RDS, Redis, route53, etc.).
  • Optimized cost through reserved instances, selection and changing of EC2 instance types based on resource need, S3 storage classes and S3 lifecycle policies, leveraging Autoscaling, etc.
  • Plan, build and configure network infrastructure within VPC with public and private subnets, configure routing tables, security groups and internet gateways.
  • Implement and maintain the monitoring and alerting of production and corporate servers/storage using CloudWatch.
  • Perform S3 bucket creation, access policies, and archive outdated data to Glacier through the Lifecycle policy configuration.
  • Migration of high availability web servers and databases to AWS EC2 and RDS with minimum or no downtime.
  • Automate infrastructure and application deployment using Cloud Formation and Terraform.
  • Evaluate and improve existing AWS deployments.
  • Troubleshoot various customer technical problems and adhere to best practices.
  • Worked with networking team to build out an edge security design consisting of separate VPC’s for HCI, IP, or Internet facing EC2 instances
  • Developed an AWS security roadmap which included the AWS Services and 3rd party tools to be utilized in the AWS Cloud for Security monitoring
  • Developed an AWS Security Group strategy. Determined naming conventions, owners, and approval process for Security Group change requests in a promote-to-production environment
  • Enabled and configured CloudTrail logs for all VPC's in all AWS accounts
  • Created and managed an encrypted S3 Bucket for all CloudTrail logs Encrypted bucket, and adjusted bucket policy to allow MSSP to access the logs
  • Provided governance around AMI server hardening using the Center for Internet Security Level 1 standards
  • Installed and configured Amazon's Inspector. Created targets and templates and scheduled assessment runs on all EC2 instances in the AWS account. Notified instance owners of vulnerabilities found
  • Created Lambda function to automate Inspector scans in 15 AWS accounts
  • Enabled AWS Config to monitor changes in company AWS accounts. Developed AWS Config Rules to monitor for unencrypted volumes and untagged resources in all accounts
  • Configured AWS Config Rules to evaluate AWS resources for compliance. Set up SNS notifications by creating a topic and subscribing a distribution list to that topic
  • Enabled and utilized AWS Trusted Advisor to inspect accounts and provide reporting and remediation recommendations
  • Trained by AWS on Security Operations on AWS Security Concepts
  • Collaborate with application developers, Project Managers and QA analysts to ensure proper testing, configuration and deployment
  • Experience on GitHub.
AWS Cloud Security Engineer, 07/2017 to 02/2020
Ventech Inc.City, STATE,
  • Implemented security best practices in AWS including multi factor authentication, access key rotation, role-based permissions, enforced strong password policy, configured security groups and NACLs, S3 bucket policies and ACLs, etc.
  • Eliminated single point of failure in production architecture designs by deploying service instances (e.g., EC2 or RDS) across two or more isolated AZs based on our customer’s actual resiliency and availability requirements.
  • Provision AWS resources using management console as well as Command Line Interface.
  • Optimized cost through reserved instances, selection and changing of EC2 instance types based on resource need, S3 storage classes and S3 lifecycle policies, leveraging Auto Scaling etc.
  • Leverage AWS cloud services such as EC2, auto scaling and VPC to build secure, highly scalable and flexible systems that can handle expected and unexpected load bursts.
  • Leveraged EC2 Create snapshot API call to create snapshots of EBS Volumes on scheduled intervals.
  • Configured CloudWatch alarm rules for operational and performance metrics for our AWS resources and applications.
  • Configuring NACL and Security Groups to secure the application and VPC network depending on access parameters provided and conditions.
  • Migrate databases and workloads from on premise servers to the cloud using tools such as AWS Data Migration Service (DMS), Schema conversion tool (SCT).
  • Automate provisioning of cloud infrastructure using CloudFormation, Terraform etc.
  • Setup Ansible control and slave nodes and used playbooks for automation configuration of servers across environments.
Branch Operation Manager /IT Administrator, 10/2005 to 11/2016
Ecobank Nigeria PLCCity, STATE,
  • Maintenance and Management of Branch IT servers and equipment.
  • Managing day to day customer enquiry and offering exceptional customer services.
  • Securing banks Assets and Liabilities.
  • Securing banks database and operational tools.
  • Ensuring Authentication and Authorization for use of bank assets.
  • Ensuring regular IT logs call-over to detect and correct irregularities.
  • Maintained scheduling for main branch to keep shifts appropriately staffed.
Branch Operations Helpdesk and IT Admin Officer, 01/2003 to 10/2005
First Bank Of Nigeria PLCCity, STATE,
  • Ensuring Authentication and Authorization for use of bank assets.
  • Regular transaction Logs scanning to detect and correct irregularities.
  • Applied disaster recovery and business continuity measures in securing organizations systems and applications,
  • Ensuring that proper backups and business continuity plans exist.
  • Prepared threats and vulnerability documentation ensuring existing
    threats and vulnerabilities in systems are properly documented and the business unit bears the risk as owners of the application.
  • Ensuring optimal utilization of branch Servers to ensure high availability .
  • Ensuring and maintaining low system downtime in the branch.
  • Advising senior management on branch operations and IT needs and conditions
  • Ensured infrastructure security best practices are deployed in all production environment.
  • Ensuring Authentication and Authorization for use of bank assets.
  • Regular transaction Logs scanning to detect and correct irregularities.
  • Ensuring optimal utilization of branch Servers to ensure high availability .
  • Used coordination and planning skills to achieve results according to schedule
  • Identified issues, analyzed information and provided solutions to problems
  • Increased customer satisfaction by resolving issues
  • Demonstrated respect, friendliness and willingness to help wherever needed
  • Collaborated with team members to achieve target results
  • Saved cost by implementing cost-saving initiatives that addressed long-standing problems
Education
Bachelor of Science: Business Management, Expected in to ABIA STATE UNIVERSITY - ABIA STATE, NIGERIA,
GPA:

By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy

Your data is safe with us

Any information uploaded, such as a resume, or input by the user is owned solely by the user, not LiveCareer. For further information, please visit our Terms of Use.

Resume Overview

School Attended

  • ABIA STATE UNIVERSITY

Job Titles Held:

  • AWS Cloud Security Architect
  • AWS Cloud Security Engineer
  • Branch Operation Manager /IT Administrator
  • Branch Operations Helpdesk and IT Admin Officer

Degrees

  • Bachelor of Science

By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy

*As seen in:As seen in: