LiveCareer-Resume

devops engineer resume example with 4+ years of experience

Jessica Claire
  • , , 609 Johnson Ave., 49204, Tulsa, OK 100 Montgomery St. 10th Floor
  • H: (555) 432-1000
  • C:
  • resumesample@example.com
  • Date of Birth:
  • India:
  • :
  • single:
  • :
Professional Summary
Highly motivated Sales Associate with extensive customer service and sales experience. Outgoing sales professional with track record of driving increased sales, improving buying experience and elevating company profile with target market.
Skills
  • DEVOPS ENGINEER
  • TECHNICAL SKIILS:
  • Cloud Technologies
  • AWS, GCP
  • Containerization and orchestration Tools
  • Kubernetes, Docker
  • CI/CD and Configuration Management Tools
  • Terraform, Chef, Puppet, Ansible, Jenkins.
  • Version Control Tools
  • GitHub, GitLab.
  • Scripting/programming Languages
  • Python, Shell/Bash, YAML.
  • Monitoring Tools
  • ELK, Cloud Watch, Prometheus, Grafana, DataDog.
  • Operating Systems
  • Linux, Ubuntu, DEBIAN.
  • Databases
  • MySQL, MongoDB, DynamoDB, AWS RDS.
  • Build Tools
  • Maven, Ant, Gradle
  • Bug Tracking Tools
  • JIRA, Service Now
  • Repository Management
  • JFrog, Nexus, Artifactory
Work History
DevOps Engineer, 02/2022 - Current
Blackbaud Bedford, NH,
  • Upgraded Kubernetes clusters of Dev/QA/Prod environments to newer versions
  • Created and maintained fully automated CI/CD pipelines for deployment using GitHub Actions/Jenkins
  • Managed Kubernetes on AWS and GCP
  • Designed, implemented, and managed monitoring and alerting systems using tools such as Datadog, Prometheus, and Grafana
  • Implemented Docker based micro-service deployments using Helm Charts
  • Built and managed cloud infrastructure as IAAC via Terraform
  • Created and updated AWS AMI Images using Packer
  • Experienced in Ansible automation including writing playbooks for deployment
  • Developed and implemented automation tools for Continuous Integration and Continuous Deployment (CI/CD) pipelines using GitHub Actions/Jenkins
  • Continuously assess and improve infrastructure and processes to increase efficiency and reduce downtime
  • Used Terraform for creating subnets, security groups, route tables and ACL's
  • Experienced on load balancing, controlling flow of traffic using AWS, ELB, ALB, NLB
  • Communicate and collaborate with cross-functional teams, including development, QA, and product management
  • Update Kubernetes deployments Helm Charts
  • Deployed Kubernetes clusters on AWS using Terraform
  • Managed Helm Charts for application deployment
  • Deployed Grafana/Prometheus on Kubernetes clusters
  • Created Terraform modules to deploy 3- tier applications on AWS
  • Designed and developed AWS Cloud Formation templates to create custom VPC, Subnets, NAT to ensure deployment of web applications
  • Involved in Upgrade of Jenkins & Artifactory Server by scheduling backups in S3
  • Worked on Multiple AWS instances, set the security groups, Elastic Load Balancer and AMIs, Auto scaling to design cost effective, fault tolerant and highly available systems
  • Created templates for AWS infrastructure as a code using Terraform to build staging and production environments
  • Proficient in Bash scripting with extensive experience in developing shell scripts for automation purposes
  • Collaborated with cross-functional teams to assess existing infrastructure, policies, and processes for SOC2 compliance
  • Implemented security measures and best practices to protect customer data and ensure data privacy in accordance with SOC2 standards
  • Implemented security measures and best practices to protect customer data and ensure data privacy in accordance with SOC2 standards, utilizing Vault's encryption and access control capabilities
  • Worked closely with the security team to establish secure configuration management, access controls, and incident response procedures within Vault
  • Implemented security measures and best practices to protect customer data and ensure data privacy in accordance with SOC2 standards, utilizing Vault's encryption and access control capabilities.
DevOps Engineer, 09/2020 - 02/2022
Blackbaud Chicago, IL,
  • Designed and maintained containerization solutions using Kubernetes for both development and production environments
  • Developed, maintained, and improved DevOps processes and practices, ensuring smooth and efficient delivery of application
  • Created and maintained fully automated CI/CD pipelines for deployment using GitHub Actions/Jenkins
  • Update Kubernetes deployments Helm Charts
  • Troubleshooted and resolved issues with Kubernetes clusters and workloads, including networking, storage, and resource constraints
  • Developed and implemented automation tools for Continuous Integration and Continuous Deployment (CI/CD) pipelines using GitHub Actions/Jenkins
  • Developed and maintained Kubernetes manifests and Helm charts to deploy and configure Kubernetes resources and applications
  • Collaborated with development teams to integrate test automation into the development process
  • Managed infrastructure as code using tools like Terraform and Ansible
  • Worked with cloud providers (AWS, GCP) to design and maintain scalable, highly available, and fault-tolerant systems
  • Created Terraform modules to deploy 3- tier applications on AWS
  • Deployed Grafana/Prometheus on Kubernetes clusters
  • Developed and tested enterprise products, with current focus on cloud-based application and giving solution to challenges imposed by multi data center deployed SaaS products and their needs for DevOps tools and automation
  • Created and maintained Amazon Virtual Private Cloud (VPC) resources such as Subnets, Network Access Control Lists (NACL), and Security Groups
  • Used Terraform in AWS Virtual Private Cloud (VPC) to automatically setup and modify settings by interfacing with control layer
  • AWS EC2/VPC/S3/SQS/SNS based infrastructure automation through Terraform, Ansible, Python, Bash Scripts
  • Developed and maintained a wide range of Bash scripts to automate system administration tasks, resulting in a significant reduction in manual effort and increased operational efficiency
  • Created a script to monitor server health and generate automated alerts, enabling proactive issue identification and resolution
  • Maintained up-to-date knowledge of SOC2 standards, industry best practices, and emerging trends related to secret management and compliance
  • Utilized HashiCorp Vault as a central solution for managing and securing sensitive data, including passwords, API keys, and cryptographic keys
  • Collaborated with cross-functional teams to assess existing infrastructure, policies, and processes for SOC2 compliance
  • Automated secret management and access using HashiCorp Vault, reducing the risk of unauthorized access and enhancing operational efficiency
  • Implemented dynamic secrets and credential rotation in Vault, mitigating the risk associated with static credentials.
Cloud Engineer, 10/2018 - 09/2020
Fis Schriever Air Force Base, CO,
  • Automated infrastructure management and deployment pipelines with tools like Terraform, Ansible
  • Designed and deployed scalable, highly available, and fault-tolerant infrastructure on AWS
  • Worked with Development teams to automate container-based deployments
  • AWS provisioning via Terraform - this includes defining VPCs, ECS clusters, Auto-Scaling Policies/Groups, and Security Group
  • Worked on AWS ASG providing high availability of applications and EC2 instances based on the load
  • Strong understanding of infrastructure as code (IaC) using tools like Terraform and CloudFormation
  • Proficient in scripting languages (Bash, Python) for automation and infrastructure management
  • Automated infrastructure tasks using scripting languages (Bash, Python) and configuration management tools like Ansible
  • Worked closely with development teams to implement DevOps practices, promoting automation, continuous integration, and delivery
  • Designed and implemented a multi-region, highly available architecture on AWS, utilizing VPC peering, Route 53 DNS failover, and Elastic Load Balancers to ensure high uptime and fault tolerance
  • Experienced on AWS EC2 Instances creation, setting up VPC, launching EC2 instances on private and public subnets based on the requirements for each of the applications
  • Experience working with S3, API Gateway, IAM, and other core AWS technologies
  • Proficient in Bash scripting with extensive experience in developing shell scripts for automation purposes
  • Strong understanding of Linux systems and command-line tools.
Education
Bachelor’s degree: International Scientific, Expected in
-
and Technical University - Kiev,
GPA:
Status -
Certifications
CKA Certified Kubernetes Administrator CKAD Certified Kubernetes Application Developer Terraform Associate Certificate AWS Cloud Practitioner AWS Solution Architect AWS Solution Architect-Professional,

By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy

Your data is safe with us

Any information uploaded, such as a resume, or input by the user is owned solely by the user, not LiveCareer. For further information, please visit our Terms of Use.

Resume Overview

School Attended

  • and Technical University

Job Titles Held:

  • DevOps Engineer
  • DevOps Engineer
  • Cloud Engineer

Degrees

  • Bachelor’s degree

By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy

*As seen in:As seen in: