aws solutions architect resume example with 9+ years of experience

Jessica Claire
Montgomery Street, San Francisco, CA 94105 609 Johnson Ave., 49204, Tulsa, OK
Home: (555) 432-1000 - Cell: - - : - -
Professional Summary

Awesome AWS Cloud Solutions Architect/Cloud Security Professional with Six (6)+ years of experience working as a Clou­­­­d Solutions architect/DevOps Engineer with breadth of experience across the Enterprise IT in multiple of the following areas: Software design or development; Infrastructure architecture; Database architecture; Networking; IT Security; Enterprise Applications; and Analytics.

  • AWS Certified Cloud Practitioner - Certified
  • AWS Solutions Architect Associate - Certified
  • AWS Certified Developer Associate - Certified
  • AWS SysOps Administrator Associate - (In View)
  • Certified Scrum Master - Certified
  • ITIL V4 - Certified

SIEM (Splunk/Qradar) Palo. Dome9, Barracuda Guardian Security, F5, Jenkins, Puppet, Chef, Terraform, Ansible, Database Firewalls & Log Analysis, SIEM, etc. Orchestration Services ECS, Docker Containers, AWS Shield, Macie, Guard Duty, AWS Secret Manager, (IDS/IPS).

Elastic Beanstalk – Amazon Web Services (EC2, EBS, S3, IAM, AMI, VPC, VPC Peering, NACL, Security Groups, Route53, Auto Scaling, ELB, SNS, Cloud Watch and Cloud Formation).Querying Languages; PostgreSQL, MySQL, SQL server, NOSQL/DynamoDB. AWS Inspector , Tanable Nessus, Qualys, VMWare, Hyper-V

Work History
01/2018 to 05/2020
AWS Solutions Architect Transunion Cherry Hill, NJ,
  • Managed AWS-provided portal account access credentials and privileges.
  • Rotated IAM access keys regularly and standardize on a selected number of days for password expiration to ensure that data cannot be accessed with a potential lost or stolen key.
  • Turned on Redshift audit logging in order to support auditing and post-incident.
  • Designed and implemented monitoring and protection capabilities to help identify and protect against DoS attacks, MITM, EC2 instance compromise, secret compromise, etc.
  • Developed tactical response procedures for security incidents.
  • Performed security monitoring, security event triage, and incident response; coordinate with other team members and management to document and report incidents.
  • Operational experience with network security appliances with a clear understanding of the architecture behind secure networks, DMZ's, NAT's, rule placement, VPN setup, and system maintenance.
  • Led root cause analysis, debugging, support, and postmortem analysis for security incidents and service interruptions.
  • Enabled Cloud Trail across all geographic regions and AWS services to prevent activity monitoring gaps.
  • Enabled Cloud Trail log file validation so that any changes made to the log file itself after it has been delivered to the S3 bucket is trackable to ensure log file integrity.
  • Enabled access logging for Cloud Trail S3 bucket so that you can track access requests and identify potentially unauthorized or unwarranted access attempts.
  • Developed patching, cloning and backup strategy for Oracle E-business R12(12.1.3) on Amazon EC2 Cloud and Appko Cloud.
  • Developed strategy for cloud/virtualization migration and implementation best practices.
  • Built and delivered machine images for Appko for Oracle E-Business Suite R12, OBIEE and Oracle Weblogic servers.
  • Helped to develop backup and recovery strategy for applications and database on virtualization platform.
  • Involved in building security model, VPC, Elastic IP for databases on Cloud platform.
  • Experienced in building private, public and community clouds for Oracle applications.
  • Set up the test servers on Amazon for Oracle E-Business Suite R12 and Oracle 10g databases using AMIs.
  • Experience building infrastructure as code using AWS CloudFormation, Terraform or similar automated techniques.
  • Ability to work within an agile project management methodology.
  • Automated software deployment and configuration management.
  • Working knowledge of software development life cycle (SDLC) and agile/iterative methodologies required.
  • Experience in CI/CD frameworks like UrbanCode, Jenkins, Maven, AWS Code Commit, AWS CodeDeploy, Docker and Kubernetes.
  • Designed and implemented system security and data assurance.
  • Hands-on experience writing Production-ready automation code to implement solutions with Puppet, Ansible, CloudFormation or similar - e.g.: Chef, Terraform.
  • Strong interpersonal, organizational, and communication skills with the ability to work effectively across internal and external organizations and virtual teams.
  • Proven experience in systems and cloud network design and development.
  • Strong understanding of information processing principles and practices.
  • In-depth technical knowledge of networks, storage systems and computing platforms including Amazon AWS, .NET, Windows, and CI/CD pipelines.
  • As a last line of defense against a compromised account, I ensured all IAM users have multi-factor authentication activated for their individual accounts, and limited the number of IAM users with administrative privileges.
02/2014 to 12/2017
AWS Cloud Engineer Booz Allen Hamilton Inc. Des Moines, IA,
  • AWS – built VPCs from scratch, creating private and public sub-nets, creating security groups and network access lists, configuring internet gateways.
  • Extensive experience defining IT Roadmap, cloud strategy, Enterprise/solution architecture, Architecture assessment.
  • Hands-on experience on implementing Cloud Solutions using various AWS Services including EC2, VPC, S3, Glacier, EFS, AWS Kinesis, Lambda, Directory Services, Cloud Formation, Ops works, Code Pipeline, Code Build, Code Deploy, Elastic Beanstalk, RDS, Data Pipeline, DynamoDB, Redshift etc.
  • Hands-on experience Architecting and securing the Infrastructure on AWS using IAM, KMS, Cognito, API Gateway, Cloud Trail, Cloud Watch, Config, Trusted Advisor, Security Groups, NACL etc.
  • Worked with engineers and development teams to ensure that architecture solutions are compliant with security frameworks, such as NIST, FedRAMP, ISO 27001/27002, PCI, etc.
  • Designed and contributed to security architecture processes that enable the enterprise to develop and implement secure solutions and capabilities that are clearly aligned with the business, technology, and threat drivers.
  • Practiced understanding of AWS Organizations and account modeling strategies to segment billing, networking, identity management, etc.
  • Strong practiced and demonstrated knowledge of AWS Networking including VPCs (sharing and peering), NACLs, Security Groups, Routing, Subnets, NAT Gateways, ELB/ALB, Route53 Public and Private Zones and Resolvers.
  • Identified opportunities for infrastructure optimization and cost reduction.
  • Experience with deploying, operating, and monitoring infrastructure in the AWS Cloud.
  • Led data center transformations projects to migrate client/server applications and platforms to AWS cloud environments.
  • Developed cloud reference architectures, governance policies, security models, and best practices.
  • Developed new Cloud Management product features for ScaleXtreme platform.
  • Implemented new Cloud Management Platforms from CloudWatch, CloudStack, OpenStack, VMware vCloud Automation Suite (vCloud Director, vCloud Connector, vCenter Operations Manager).
  • Migrated IaaS, PaaS and SaaS instances between public and private clouds - Java, J2EE, .NET, Ruby, LAMP, Apache, RDBMS, Oracle, SQL, MySQL, Unix/Linux, NAS/SAN, LAN/WAN VPN, Security, IDS, Firewalls and Encryption.
  • Proactively monitored resources and applications using AWS CloudWatch including creating alarms to monitor metrics such as EBS, EC2, ELB, RDS, S3, SNS and configured notifications for the alarms generated based on events defined.
  • Established the appropriate monitoring and alerting of solution events related to performance, scalability, availability and reliability.
  • Ensured compliance to defined privileged user access control.
  • Experience in deploying and monitoring applications on various platforms using Elastic Beanstalk, setting up the life cycle policies to back the data from AWS S3 to AWS Glacier.
  • Provisioned AWS Landing Zones to create a customized baseline of AWS accounts, networks, and security policies.
  • Configured multi-account architecture, identity and access management, governance, data security, network design, and logging within provisioned AWS Landing Zones.
02/2011 to 12/2014
Information Security Analyst Peraton Patuxent River, MD,
  • Provided hands-on administration of user provisioning, including security profiles and permissions, for all Georgia Power systems, including the Developedment of administrative tools and procedures that was utilized company wide.
  • Defined and drove an Information Security Roadmap program to improve the security posture at all levels of the organization, including key initiatives such as Data Loss Prevention, Email Encryption, Privileged Access Management, and Active Directory Remediation.
  • Drove and Provided regular reporting on the status of the information security program to senior business leaders as part of a strategic enterprise risk management program.
  • Played a key thought leadership and operational role in driving the security design and implementation workstream within the SAP Finance Transformation program.
  • Created and facilitate an information security governance structure in collaboration with the compliance team to define and enforce critical policies, processes, and training across the enterprise.
  • Created and manage a targeted information security awareness training program for all employees and contractors and establish metrics to measure the effectiveness of this security training program.
  • Provided clear risk mitigating directives for operations and projects with components in IT, including mandatory application controls.
  • Determined the information security approach and operating model in consultation with stakeholders and aligned with the risk management approach and compliance monitoring of nondigital risk areas.
  • Developeded, implemented, and monitored a strategic, comprehensive information security program to ensure appropriate levels of confidentiality, integrity, availability, safety, privacy, and recovery of information assets owned, controlled and/or processed by the organization.
  • Developed and enhance an up-to-date information security management framework.
Expected in 12/2010 to to
Bachelor of Science: Industrial Chemistry/Computer Science
University of Benin - Overseas,
Expected in 04/2018 to to
Certificate of Completion: Cloud Security Architecture And Operations
The Sans Institute - Orlando, FL,

By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy

Your data is safe with us

Any information uploaded, such as a resume, or input by the user is owned solely by the user, not LiveCareer. For further information, please visit our Terms of Use.

Resume Overview

School Attended

  • University of Benin
  • The Sans Institute

Job Titles Held:

  • AWS Solutions Architect
  • AWS Cloud Engineer
  • Information Security Analyst


  • Bachelor of Science
  • Certificate of Completion

By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy

*As seen in:As seen in: