solution architect resume example with 8+ years of experience

(555) 432-1000,
, , 100 Montgomery St. 10th Floor

Cloud Engineer||AWS solutions Architect||Windows||Linux|| Scrum Master||Business Administration Highly skilled AWS Solution Architect/Cloud engineer with over 6+ years of experience in Cloud Architecture and Implementation. An outstanding performer seeking to use my professional knowledge and experience to help transform clients' IT infrastructure, operations and Applications to the most innovative, scalable, secured, highly available, fault tolerant and cost-effective systems on AWS cloud platform. Design the overall Virtual Private Cloud using IAC and implement CI/CD pipeline using Jenkins, provisioning, and managing highly available, fault tolerant and scalable infrastructures on AWS utilizing terraform, CloudFormation along with Ansible to automate configuration management. Proficient in Linux environment with cloud orchestration, Cloud security, identity & access management, monitoring and event management, governance & compliance, application delivery, data protection, and infrastructure provisioning. I have strong aptitude to analyze and resolve problems. I am proactive to good leadership, organizational and management skills. I'm a great team player, dynamic and reliable. I'm good with multi-tasking and I pay keen attention to details.

  • Operating Systems: Linux, Ubuntu, Windows, Windows Server
  • Workflow Tools: MS-Project, Excel, Word, PowerPoint, Visio, Access
  • AWS Security: AWS Security Hub, AWS Guard Duty, AWS Shield, AWS Firewall Manager, AWS Inspector, IAM, Security Groups, NACL, AWS WAF
  • Monitoring & Event Management: AWS CloudWatch (Events & Logs), AWS SNS, Kubernetes.
  • Identity & Access Management: AWS Organization, AWS IAM, AWS AD Connector, AWS Workspaces, AWS Secrets Manager.
  • Governance & Compliance: AWS Config Rules, AWS Organization, AWS Control Tower, AWS Trusted Advisor, AWS Budgets, AWS License Manager, AWS SSO.
  • Application Delivery: Jenkins, Github, AWS Code Pipeline, AWS Code Commit, Blue/Green deployment, Elastic Beanstalk.
  • Other Skills: Risk Management, Intrusion Prevention/Detection, Incident Response, ServiceNow, Agile Methodology, Active Directory, bash scripting.
Education and Training
UNIVERSITY OF BUEA , Expected in 12/2009 Bachelor of Science : BUSINESS ADMINISTRATION - GPA :

AWS Certified Cloud Practitioner

AWS Certified Solutions Architect – Associate

Certified Scrum Master

SAFe Scrum Master 5.0

Motion Recruitment - Solution Architect
Saint Louis, MO, 09/2021 - Current
  • Responsible for designing and implementing log strategies (cloud trail, VPC flow logs, etc.) to provide detective controls in multiple tenants
  • Implementing clients’ versions of the AWS reference architecture (dedicated VPCs for security, enforcing gateways when viable, etc.)
  • Maintaining a high level of industry knowledge to recognize solutions that simplified deployment, and improved agility to cost-effectively accelerate application delivery
  • Participating in various brainstorming teams to define and plan to implement high level solution definition document
  • Designing network security approaches to enforce proper network controls using security groups, ACLs, etc
  • Architected and implemented continuous integration and deployment pipelines using Jenkins and other CICD
  • Highly experienced with Security Services in AWS (IAM, KMS, Secrets Manager, AWS Firewall Manager, WAF, Guard Duty, and SCPs)
  • Support and advise on application assessment, migration, and modernization
  • Designed secured, cost optimized, highly available and fault tolerant infrastructure in AWS
  • Highly experienced with Network Services in AWS (VPC, Route Table, Security Groups, Transit Gateway, and VPC Interface Endpoint)
  • Highly experienced with Management Services in AWS (CloudWatch, Lambda, AWS Config, Security Hub)
  • Experienced with writing Lambda functions to perform, prevent, detect, respond, and remediate actions
  • Proficient in selecting appropriate Cloud services to design and deploy an application based on given requirements
  • Architected and configured Dev/Stage/QA environments in AWS (VPC, subnets, security groups, EC2 instances, load balancer, RDS, Redis, route53, etc.) cloud engineer/devops
Nes Associates - Cloud Engineer/Devops
Eagan, MN, 10/2017 - 08/2021
  • AWS Security Hub, AWS, , AWS Shield, AWS Firewall, , AWS Inspector, IAM, Security Groups, NACL, AWS WAF,
  • Monitoring & Event Management: AWS CloudWatch (Events & Logs), AWS SNS, Kubernetes
  • Identity & Access Management: AWS Organization, AWS IAM, AWS AD Connector, AWS Workspaces, AWS Secrets Manager
  • Governance & Compliance: AWS Config Rules, AWS Organization, AWS Control Tower, AWS Trusted Advisor, AWS Budgets, AWS License Manager, AWS SSO
  • Application Delivery: Jenkins, Github, AWS Code Pipeline, AWS Code Commit, Blue/Green deployment, Elastic Beanstalk., Leverage highly available Applications across availability zones and regions
  • Ability to setup and manage monitoring systems in AWS using CloudWatch and integrated with SNS for notifications for system and performance changes
  • Implemented highly available, fault tolerant, self-healing and scalable systems in AWS
  • Created baseline VPC and Network design including leveraging VPN connectivity and Direct Connect
  • Built serverless architecture with Lambda integrated with SNS, CloudWatch logs and other AWS services
  • Leveraged automated DevOps tools deployment and Blue-green deployment patterns and strategies
  • Configured CI/CD Pipelines using Jenkins connected to GitHub and build environments (Dev, stage & Prod)
  • Leverage IAM best practices and role-based access control
  • Implemented AWS Organization to centrally manage multiple AWS accounts including consolidated billing and policy-based restrictions
  • Implemented Control Tower Preventive and Detective guardrails and leveraged Account Factory, integrated with Lambda for new AWS account creation and setup
  • Setup Ansible control and target nodes and developed playbooks to automate configuration of servers across environments
  • Implemented security best practices in AWS including multi factor authentication, access key rotation, role-based permissions, enforced strong password policy, configured security groups and NACLs, S3 bucket policies and ACLs, etc
  • Optimized cost through reserved instances, selection and changing of EC2 instance types based on resource need, S3 storage classes and S3 lifecycle policies, leveraging Autoscaling etc
  • Leveraged EC2 Create Snapshot API call to create snapshots of EBS Volumes on scheduled intervals
  • Configured CloudWatch alarm rules for operational and performance metrics for our AWS resources and applications
  • Monitoring from end-to-end view of runtime systems CPU, bandwidth, disk space and log files using New Relic
  • Deployed and configured infrastructure using Cloud Formation Terraform and Ansible
  • Conducted regular audits of infrastructure to ensure compliance with internal policies and industry regulations
Motion Recruitment - Linux Administrator
Saint Paul, MN, 01/2016 - 08/2017
  • Performed applications installation, upgrades/patches, troubleshooting, maintenance, and monitoring Linux servers
  • Installation, configuration, and administration of Enterprise Linux
  • Created, managed, and administered user accounts security and SSH password less login
  • Task automation, service management and application deployment using Ansible and Jenkins
  • Perform security setup, networking, system backup and patching for both AWS, and on-premises environments
  • SSL setup for Apache and Nginx application couple with AWS ELB SSL for all http to https thereby maximizing security
  • Network, CPU, Disk and connectivity monitoring with CloudWatch and setup to trigger alarm and notify system administrators
  • Aide setup for and configured for logs files detail monitoring and alerts notification when changes are made
  • Performed root-cause analysis of recurring issues, system backup, and security setup
  • Security groups configured and locked down to the various authorized subnet and IP addresses in AWS
  • Automated deployment, configuration and security settings using Ansible
  • Experienced in GitHub (cloning a Git repository, creating a branch, pushing to Git from local, making a PR, etc.)
City, STATE, 01/2014 - 12/2015
  • Worked closely with the product, development, and QA teams on releases to ensure they are on time and stable
  • Created weekly reports on project status and team performance to stakeholders/executive team
  • Facilitated daily scrum, sprint retrospective, sprint planning, sprint demo, sprit review, and backlog refinement meetings
  • Ensure the sprint backlog was always ready for the upcoming sprint
  • Created a team working agreement and ensure the team strictly adhered to it to improve the efficiency of the team on an incremental basis
  • Tracked project deliverables using Project Management tool JIRA
  • Removed impediments through provision of appropriate resources, guidance, and escalation to the leadership
  • Ensured the development teams are practicing the core agile principles of collaboration, prioritization, team accountability, and visibility
  • Drove continuous process improvement and implement best practices to increase customer satisfaction, quality, and business value

By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy

Your data is safe with us

Any information uploaded, such as a resume, or input by the user is owned solely by the user, not LiveCareer. For further information, please visit our Terms of Use.

Resume Overview

School Attended


Job Titles Held:

  • Solution Architect
  • Cloud Engineer/Devops
  • Linux Administrator
  • Scrum Master


  • Bachelor of Science

By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy

*As seen in:As seen in: