solutions architect resume example with 8+ years of experience

Jessica Claire
Montgomery Street, San Francisco, CA 94105 (555) 432-1000,
Professional Summary

Innovative Solution Architect with in-depth understanding of software deployment and system design illustrated over 6+ years of experience in similar roles. I possess a special set of skills, managing server infrastructures and data center operations. Implementing upgradable, scalable, Hyper-converged infrastructure and micro-services across multiple platforms (Unix, Linux, Amazon Linux). Helping clients achieve business agility, high availability, scClairelity and flexibility.

  • AWS Certified Cloud Practitioner - Certified.
  • AWS Certified Solutions Architect (Associate) Certified.
  • AWS Certified Network Specialty (In-View)
  • ITIL Certified.

Strong analytical and creative problem-solving skills.
Excellent communication skills.
Strong organizational skills.
Business acumen.
Technical expertise and attention to detail.
Excellent awareness of cloud security issues.
Excellent verbal and written communications skill.
Strong Interpersonal skills.
Flexible and comfortable with multi-tasking. AWS Inspector, AWS Shield, Guard Duty,

AWS Secret Manager, Qualys, Nessus, OpenVAS, Symantec DLP.
(IDS/IPS) SIEM (Splunk/Qradar) Palo
Firewalls & Log Analysis, SIEM, etc.
Orchestration Services ECS, Docker Containers, Elastic Beanstalk – Amazon Web Services (EC2, EBS, S3, IAM, AMI, VPC, VPC Peering, NACL, SG, Route53, Auto Scaling, ELB, SNS, Cloud Watch and Cloud Formation). Dome9, Barracuda Guardian Security, F5, PostgreSQL, MySQL, SQL server, DynamoDB. Jenkins, Puppet, Chef, Terraform, Ansible.

Work History
12/2017 to 04/2020 Solutions Architect Leidos Holdings Inc. | Meridian, MS,
  • Organizational skills – ability to coordinate and prioritize many issues simultaneously.
  • Analytical/Problem solving ability – ability to quickly evaluate an issue, resolve it or implement a workaround with consistent accuracy and success.
  • Expert level knowledge with AWS design, architecture and services (EC2, IAM, S3 etc).
  • Sound experience with Infrastructure as Code (Terraform, Ansible, CloudFormation etc).
  • Sound knowledge of server infrastructure, virtualization, and cloud computing.
  • Experience with architecting and maintaining high availability production systems.
  • Experience in Software Installation, configuration and Patching Knowledge of system monitoring in a cloud environment including cloud specific products and tools.
  • Experience with Agile and DevOps concepts Developing monitoring architecture and implementing monitoring agents, dashboards, escalations and alerts.
  • Skilled in Vulnerability Management & Risk Management.
    Experience with Implementing, Consulting, and Delivering AWS Cloud Security to clients.
  • In-depth technical knowledge of networks, storage systems and computing platforms including Amazon AWS, .NET, Windows, and CI/CD pipelines.
  • As a last line of defense against a compromised account, I ensured all IAM users have multi-factor authentication activated for their individual accounts and limited the number of IAM users with administrative privileges.
  • Designed and implemented system security and data assurance.
    Involved IT security teams throughout the application development life cycle.
  • Inventoried and categorized all existing custom applications deployed in AWS.
  • Experience writing Production-ready automation code to implement solutions with Puppet, Ansible, CloudFormation or similar - e.g.: Chef, Terraform.
  • Proven experience in systems and cloud network design and development.
  • Strong understanding of information processing principles and practices.
  • Encrypted highly sensitive data such as protected health information (PHI) or personally identifiable information (PII) using customer-controlled keys.
  • Managed AWS-provided portal account access credentials and privileges.
  • Turned on Redshift audit logging in order to support auditing and post-incident forensic investigations for a given database.
  • Encrypted data stored in EBS as an added layer of security.
  • Encrypted Amazon RDS as an added layer of security.
  • Performed security monitoring, security event triage, and incident response; coordinate with other team members and management to document and report incidents.
  • Restricted access to RDS instances to decrease the risk of malicious activities such as brute force attacks, SQL injections, or DDoS attacks.
  • Enabled required parameter in all Redshift clusters to minimize the risk of man-in-the-middle attack.
  • Ability to diagnose and assess problems and deliver solutions
    Granted the fewest privileges possible for application users.
  • Familiarity with industry, state, federal, and international legislation such as PCI, SOX, HIPAA, CMR201, US-EU Privacy Shield, GDPR, etc.
    Familiar with technical security tools such as IDS sensors, vulnerability scanning, forensics tools, Splunk, etc.
  • Built VPCs from scratch, creating private and public subnets, creating security groups and network access lists, configuring internet gateways, OpenVPN, creating AMI, understanding of user access management/role based access/multi factor authentication and API access, configuration of auto scaling and elastic load balancer for scaling services if a configured threshold has been exceeded, configuration of SNS to send notifications and Cloud Watch to collect logs and metrics.
  • Participated in deep architectural discussions to build confidence and ensure customer success when building new and migrating existing applications, software and services on the AWS platform.
  • Proactively monitor resources and applications using AWS CloudWatch including creating alarms to monitor metrics such as EBS, EC2, ELB, RDS, S3, SNS and configured notifications for the alarms generated based on events defined.
  • Third Party Vendor engagement and coordination to customer site for Demo and POC.
  • Architected and operating solutions built on AWS Platform.
  • Created business continuity/disaster recovery, fail-over and runbook documentation.
  • Ensured security is integrated into all cloud architecture solutions built.
  • Responsible for creating VPCs for Dev/test team, simulating a production environment for web/application servers and database traditional servers in public and private subnets respectively.
  • Created implementation diagrams and data flow mappings for all projects with current customer.
  • Took complete ownership of assignments, actions items and issues, and remain accountable for their completion.
12/2013 to 12/2016 AWS Solutions Architect Transunion | San Luis Obispo, CA,
  • Utilized AWS snowball to quickly and securely migrate large-scale data transfers.
  • Focused on cloud-native services and optimizing the customer landscape through adoption of these services.
  • Define and engineer solution capabilities that satisfy a customer's goals and meet service delivery objectives.
  • Led technical discussions both internally and with customer teams
    Produce high-quality, well-written technical documentation, including design plans, implementation diagrams, data flow mappings, and as-built documents.
  • Developed strategies for modernization of existing systems and migration into a cloud environment using AWS Migration Hub, AWS Server Migration Service, and AWS Database Migration Service.
  • Led teams to architect, design, develop and implement Cloud solutions Amazon Web Services (AWS) encompassing multiple specializations, platforms, and technologies.
  • Experience in deploying and monitoring applications on various platforms using Elastic Beanstalk, setting up the life cycle policies to back the data from AWS S3 to AWS Glacier.
  • Architecting/operating solutions built on AWS Platform; Deployed Palo Alto, F5, Aviatrix Transit Gateway boxes and configured boxes with customer's requirements.
  • Drove Proof-of-Concepts and implementation, with hands-on involvement as SME, for new SOE items: build deployment automation pipelines, build automated next gen CI/CD pipelines partnering with development teams, build and integrate new technologies like containers enabling multi-cloud and preventing cloud provider lock-in.
    Developed software using Python3 and Node JS.
  • Enabled Cloud Trail log file validation so that any changes made to the log file itself after it has been delivered to the S3 bucket is trackable to ensure log file integrity.
  • Knowledge of data modeling, data access, and data storage techniques.
  • Built and maintained AWS infrastructure using Terraform and AWS CloudFormation.
  • Ran code seamlessly using AWS Lambda to build and run various application.
  • Administered IT-monitoring toolsets like AWS CloudWatch to collect and track metrics, collect and monitor log files, and set alarms
    Designed and implemented scalable solutions in the cloud environment leveraging cloud enterprise technology and services in AWS such as AWS VPC, Auto Scaling, ELB, AWS Global Infrastructure (Regions and Availability Zones).
  • Ensured compliance to defined privileged user access controls.
    Provisioned AWS Landing Zones to create a customized baseline of AWS accounts, networks, and security policies.
  • Configured multi-account architecture, identity and access management, governance, data security, network design, and logging within provisioned AWS Landing Zones.
  • Orchestrated cloud governance, authorization, authentication and identity access management of the clients' entire cloud environment using AWS IAM services (IAM users, IAM groups, IAM Roles, IAM Policies, identity federation) AWS organization, AWS Single Sign-On.
  • Designed, Deployed, managed, and operated scalable, highly available, and fault-tolerant systems on AWS Cloud.
  • Enabled access logging for Cloud Trail S3 bucket so that you can track access requests and identify potentially unauthorized or unwarranted access attempts.
  • Enabled Cloud Trail across all geographic regions and AWS services to prevent activity monitoring gaps.
  • Exposure to AWS cross-account code promotion best practices
    Experience with AWS IAM policies and automation tooling.
  • Assisted with designed and security oversight of next-generation firewalls, intrusion prevention systems, DDoS solutions, SSL-terminating load balancers, WAF, security groups and NACL.
  • Recommended and managed transmission protection requirements for all environments (systems, applications, containers, etc.) such as VPC peering best practices, SSL certificate management, key pairs, etc.
  • Designed a secured hybrid network connection between the provisioned private network in AWS Cloud space (VPC) and the customer corporate network leveraging AWS VPC Peering, VPN connection, AWS transit Gateway.
  • Designed the architectural frameworks solutions(IaaS, PaaS, SaaS) that best suits the clients web application hosting demands in the AWS cloud Platform, leveraging AWS services such as EC2, elastic beanstalk, S3 web hosting, ECS, Lambda, AWS Fargate, with focus on integrated and automated service delivery.
  • Rotated IAM access keys regularly and standardize on a selected number of days for password expiration to ensure that data cannot be accessed with a potential lost or stolen key.
  • Define cloud standards, DevOps, Continuous Integration / Continuous Delivery (CI/CD) tool chain and Standard Operating Environment (SOE)
    Define, implement and enforce the cloud standard operating environment, cloud standards, and associated tools/platforms/frameworks for the GMF application portfolio, in coordination with IT-wide efforts and Technology Architecture and Planning.
02/2011 to 11/2013 IT Security /Database Administrator Walmart | City, STATE,
  • Triage security vulnerabilities to eliminate false positives and work with the developers for remediation.
  • Carried out penetration testing to prevent cybersecurity incidents, employing the latest technologies to counter potential threats.
  • Installed and upgrade computer security software, such as encryption programs and firewalls, to protect data integrity.
  • Classified the critical, High, Medium, Low vulnerabilities in the applications based on OWASP Top 10 and SANS 25 and prioritizing them based on the criticality.
  • Reviewed, documented, evaluated and tested application controls, particularly automated controls on a wide range of software application packages for compliance reporting.
  • Developed, motivated and mentored associates by providing training, regular feedback and career guidance while fostering a team environment.
  • Analyzed vulnerability scans of information systems and assist in remediation tasks.
  • Collaborated with executive management and department leaders to assess near- and long-term Information Security compliance needs.
  • Served as subject matter expert to internal business and technology teams on range of compliance standards as influenced by regulatory mandates (e.g. SOX 2, HIPAA, etc.) and industry best practices (e.g. NIST CSF, ISO 27001 and 27017, ITIL, COSO, COBIT, etc).
  • Exceptional ability to multi-task, make sound judgments and respond with a sense of urgency in order to effectively support the business.
  • Built new SQL Servers and updated with latest service packs and cumulative patches (hot fixes) for SQL Server 2012/2014/2016/2017
    Configured and Managing Always on High Availability on 2/3 nodes cluster environments.
  • Migrated SQL Server 2008R2 databases to SQL server 2014/2016 by using Backup-Restore, Detach-Attach, and Management Studio Wizards and custom scripts.
  • Created new database objects like Tables, Procedures, Functions, Indexes and Views using T-SQL in Development and Production environment for SQL Server 2012/2014/2016/2017.
  • Upgraded QA and DEV SERVERS 2008R2 to 2016 on developer edition.
    Prepared Documentation for the Disaster Recovery plan.
  • Managed Databases spread across multiple servers in Production, Development, staging & testing environments.
  • Daily routine DBA tasks like handling user's permissions and space issues on Production and Semi-Production Servers and Troubleshooting Failed Jobs.
  • Troubleshoot Performance issues causing Application slowness.
  • Created SSIS jobs and scheduled Packages using SQL Server Management Studio for the Daily Load.
  • Involved in fine Tuning and Performance and Query optimization of the Database as required by the application.
  • Created Linked servers for distributed queries.
  • Hands-On experience on Replication set-up and troubleshooting.
  • Managed Security of SQL Server Databases by creating Server Logins, Database Users, Roles and assigning permissions in compliance with standards and resolving Account Locking issues by coordinating with Active Directory Group.
  • Provided 24x7 DBA Production support for Databases in Production on Clustered and standalone Servers to achieve Optimum Performance.
Expected in to to Bachelor of Science | Computer Science University of Lagos, Oversea, GPA:
Expected in 04/2018 to to Certificate of Completion | Cloud Security Architecture And Operations The SANS Technology Institute, Orlando, FL, GPA:

By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy

Your data is safe with us

Any information uploaded, such as a resume, or input by the user is owned solely by the user, not LiveCareer. For further information, please visit our Terms of Use.

Resume Overview

School Attended

  • University of Lagos
  • The SANS Technology Institute

Job Titles Held:

  • Solutions Architect
  • AWS Solutions Architect
  • IT Security /Database Administrator


  • Bachelor of Science
  • Certificate of Completion

By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy

*As seen in:As seen in: