Srikanth - DevOps Engineer

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

Srikanth Sirikonda

AWS/DevOps Engineer
+1267-993-1122
Srikanthsirikonda1993@gmail.com

Professional Summary:

Over 9 years of experience in the IT industry comprising Cloud Implementation and Migration, Cloud services, Cloud
security, Infrastructure as Code, Containerization/Orchestration, Configuration Management, Continuous Integration
(CI), Continuous Deployment (CD) and Release Management.

 Expertise in setting up enterprise infrastructure on Amazon Web Services ( AWS) using services such as Amazon
EC2, VPC (NAT, Peering, VPN), IAM, EC2 Container service, Elastic Beanstalk, Lambda, S3, Cloud Front, Code pipeline,
Code Deploy, Glacier, RDS, DynamoDB, Elastic Cache, Redshift, Direct Connect, Route 53, Cloud watch, Cloud
Formation, Cloud Trial, Security Groups, Ops works, Amazon Elastic Map Reduce (EMR), AWS IoT, SNS, SQS, Lambda,
API Gateway.
 Experienced in all SCM processes including Building binaries, end-to-end code configuration, & deployments of
artifacts for Enterprise Applications.
 Hands-on Experience working on Migrations from On-Premises to AWS Cloud.
 Had Experience in installing and developing on ELK.
 Experience and thorough understanding of automated implementation and deployment of a cloud-based
infrastructure like Web apps, Application Service Environments, firewalls, load balancers, storage, monitoring and
security.
 Experienced in Gitlab CI and Jenkins for CI and for End - to-End automation for all build and CD. Proficient in
documenting and implementing procedures related to build deployment and release.
 Had Experience in Configuring XL Deploy and XL Release Tools from the Scratch to the following applications.
 Expertise in Branching, Merging, Tagging and maintaining the versions across the environments using SCM tools like
Git, GitHub, SVN, and Perforce.
 Used Bash and Python included Boto3 to supplement automation provided by Ansible and Terraform for tasks such
as encrypting EBS volumes backing AMIs and scheduling Lambda functions for routine AWS tasks.
 Experience in Setting up the build and deployment automation for Terraform scripts using Jenkins.
 Provisioned the highly available EC2 Instances using Terraform and cloud formation and wrote new plugins to
support new functionality in Terraform.
 Experience with container-based deployments using Docker, working with Docker images, Docker hub and Docker
registries, installation and configuring Kubernetes and clustering them.
 Experience on Vagrant, AWS and Kubernetes based container deployments to create self-environments for dev
teams and containerization of env’s delivery for releases.
 Developed Ansible scripts for an automated server provisioning and Docker images, reducing the time between
provisioning and deployment from over 3 hours to less than 10 minutes.
 Experienced with DevOps/Agile operations process and tools (Code review, unit test automation, and Build &
Release automation, Service, Incident and Change Management).
 Expertise in Google Cloud Platform (GCP) Services Like Compute Engine, Cloud functions, Cloud DNS, Cloud Storage
and Cloud Deployment and SaaS, PaaS and IaaS concepts of Cloud computing architecture and Implementation using
GCP.
 Experienced in Automating, Configuring and deploying instances on AWS, Azure environments and Data centers,
also familiar with EC2, Cloud watch, Cloud Formation and managing security groups on AWS.
 Expertise with Configuration management tools- Chef, Puppet and Ansible for Deployment on Multiple platforms.
 Have extensive experience in Hudson/Jenkins, for continuous integration and for the end to end automation of
builds and scheduled deployments.
 Used Web Application Firewall (WAF) to control over traffic to allow/block web applications by defining
customizable web security rules.
 Created GCP Firewall rules in order to allow or deny traffic to and from the VM' s instances and used CDN to
deliver content from GCP cache locations drastically improving user experience and latency.
 Building/Maintaining Docker container clusters managed by Kubernetes Linux, Bash, GIT, Docker, on Google Cloud
Platform (GCP). Utilized Kubernetes and Docker for the runtime environment of the CI/CD system to build, test
deploy.
 Manage different environments like Vagrant, Integration. And UAT via Chef.
 Managed Kubernetes charts using Helm. Created reproducible builds of the Kubernetes applications, managed
Kubernetes manifest files and managed releases of Helm packages.
 Completely automated the process of building OAuth, OpenID and SAML stacks with Ansible and Jenkins.
 Installed Jenkins on a Linux machine and created a master and slave configuration to implement multiple parallel
builds through a build farm.
 Having good implementation experience with installation and configuration of Kubernetes, clustering them and
managed local deployments in Kubernetes.
 Experience and familiar with Virtualization technologies like installing, configuring, administering VMware.
 Created and managed VMs (virtual server) and involved in the maintenance of the virtual server.
 Experienced in LINUX/Unix System Administration production, test and development servers, System Builds, Server
Builds, Installations, Upgrades, Patches, Migration and Troubleshooting of RHEL Servers.
 Also Had Experience working with Java, Python, scripting languages (such as BASH & PowerShell) and
complementary programming languages, operating systems and supporting software.
 Rich experience in using Jenkins as Continuous Deployment tools to setup automated and scheduled deployments.
 Wrote Bash/Shell/Perl scripts for managing day-to-day transactions &for automation of routine tasks.
 Written automation scripts for creating resources in OpenStack Cloud using Python and terraform modules.
 Implemented automated local user provisioning in instances created in OpenStack cloud through Ansible Play
books.
 Unique experience with Pivotal Cloud Foundry and OpenShift/Kubernetes architecture and design, troubleshooting
issues with platform components (PCF), and developing global/multi-regional deployment models and patterns for
large scale developments/deployments on Cloud Foundry and OpenShift/Kubernetes.
 Used Allure and SonarQube for implementing testing on CI/CD pipeline of Jenkins.
 Good experience in writing Helm Charts, Kubernetes YAML files for deployment of microservices into Kubernetes
clusters.
 experience in LDAP solutions, Access Management solutions, Single Sign - On Capabilities in LINUX, UNIX and
Windows environments
 Extensively worked on Jenkins/Hudson by installing, Configuring, and maintaining Continuous Integration (CI) and
for End-End automation for performing tests and pushing build artifacts to JFrog Artifactory and Nexus.
 Building/Maintaining Docker container clusters managed by Kubernetes Linux, Bash, GIT, Docker, on GCP (Google
Cloud Platform). Utilized Kubernetes and Docker for the runtime environment of the CI/CD system to build, test
deploy.
 Designed and implemented Software configuration management (SCM) and change management (CM) solution
using Ansible Tower, Jira, and Jenkins, Configured SonarQube for code coverage.
 Had Experience in working on Configuration Management Tools like Ansible.
 Hands on experience in containerized based deployments using Docker and Kubernetes.
 Extensive experience in defining the branching and the merging strategies, creating baselines, and releasing the
code. Worked with bug tracking tools like JIRA.
 Provisioned and configured Tomcat and Apache instances using shell/Perl/groovy in UDeploy.
 Expertise in Querying RDBMS such as Oracle, MYSQL, and SQL Server by using PL/SQL for data integrity.
 Had Experience in Configuring the Kubernetes cluster and supported it running on the top of the CoreOS.
 Good understanding of OpenShift platform in managing Docker containers and Kubernetes Clusters.
 Experienced in integrating Docker Swarm into Docker Engine to orchestrate and schedule containers.
 Good understanding of OSI Model, and proficient in configuring TCP/IP, DNS, NFS, LDAP, SSH, SMTP, etc.
 Experienced in working with IT infrastructure monitoring tools like Nagios and Splunk.
 Experience in administering, integrating, and supporting middleware technologies like WebSphere Application
Server, IIS, WebSphere Portal Server, Apache Tomcat, and JBOSS.
 Experienced in functional usage and Deployment of Applications in WebLogic, WebSphere and Apache Tomcat
Server.

Certifications:
 Amazon Web Services Solutions Architect Associate
 AWS Certified Security Specialist
 Red Hat Certificate of Participation in Linux System Administration.

Technical Skills:

Cloud Platforms Amazon Web Services (AWS), Azure, GCP, Pivotal Cloud Foundry

Configuration Management Ansible, Chef, Puppet


Tools
CI/CD Tools Jenkins, Bamboo
Build Tools Maven, ANT, Gradle, Eclipse
Virtualization Technologies Windows Hyper-V, VMware ESXi, Virtual Box, vCenter, vSphere, vRealize, Power
VM.
Containerization Tools Kubernetes, Docker, OpenShift, Spinnaker, Docker Swarm
Application/Web Server Tomcat, Apache, Application Server, IIS, Oracle WebLogic Server 11g.
Testing and ticketing tools SonarQube, Selenium, JIRA.
Monitoring and Logging Tools Nagios, Splunk, ELK, CloudWatch, Datadog, Prometheus, Grafana.
Version Control Tools GIT, GitHub, GitLab, Subversion, Bitbucket, Team Foundation Server (TFS).
Scripting and
Python, Bash/Shell, Scala, PowerShell, JSON, C, PHP, Java/ J2EE, .Net
Programming Languages
Operating System UNIX, Linux, Windows, Solaris, MacOS.
Database Systems Oracle, MySQL, MariaDB, NoSQL (MongoDB, DynamoDB, Cassandra).
Networking/Protocol DNS, DHCP, Cisco Routers/Switches, NIS, NFS, WAN, SMTP, LAN, FTP/TFTP, TCP/IP.

PROFESSIONAL EXPERIENCE:

Client: CapitalOne, TX | Oct 2021 – Present


Role: Sr. DevOps Engineer
Responsibilities:
 Created AWS CloudFormation templates to create custom-sized VPC, subnets, EC2 instances, ELB, and security
groups. Worked on tagging standards for proper identification and ownership of EC2 instances and other AWS
Services like Cloud Front, Cloud Watch, RDS, S3, Route53, SNS, SQS, and Cloud Trail.
 Designed and configured VPC– IGW, EMR Public and Private subnets, Security groups, NACLs, and Route
Tables.
 Created and Configured VPC Peering Connections and Resolved the issues of overlapping CIDRs.
 Managed S3 buckets and Object policies using IAM and S3 bucket Policies and Created MFA for Accidental
Deletion.
 Provisioning servers/instances using infrastructure as code such as Serverless framework, CloudFormation and
AWS SAM. Code is stored in a private repository and constantly updated.
 Used Serverless framework in AWS Virtual Private Cloud to automatically setup and modify settings by
interfacing with control layer.
 Created and design the CloudFormation templates to create custom-sized VPC, NAT subnets, for the
deployment of Web applications and databases.
 Leveraged AWS cloud services such as EC2, auto-scaling and VPC to build secure, highly scalable and flexible
systems that handled expected and unexpected load bursts.
 Creating CloudWatch alerts for instances and using them in Auto scaling launch configurations
 Worked with AWS public and Private API gateways and configured DNS routing mechanism for these API.
 Worked with Swagger2.0 and OpenAPI3.0 for defining the API body and used custom Authorizer for
Authorizing the calls coming to API gateways.
 Designed an API gateway authorizer i.e. A Lambda function, to authorize the incoming calls to the API.
 Created and leveraged multiple kinesis stream through AWS CloudFormation template and added these kinesis
streams as a trigger to different AWS resources.
 Provisioned AWS IOT service and created subscription event for end client, so as to send records for
synchronization with the in-house DB.
 Configured and managed AWS lambda as proxy-integration for API gateways.
 Extensively worked with AWS ECS service for hosting inhouse application and provisioned ECS through
CloudFormation and AWS SAM templates.
 Configured AWS application load balancer at layer 7 and network load balancers at layer4. Defined listener
rules for target groups.
 Migrated VGW subnets to TGW subnets, so as to decrease the communication latency between the application
and AWS resources.
 Created VPC private links and VPC endpoints for different AWS services for faster and secure inbound AWS
communication.
 Upgraded HashiCorp vault into EKS improving availability, fault tolerance, and disaster recovery for a core
infrastructure service. Improves configuration of vault service with automated configuration, and deployed
promethium as a daemon set in the cluster to increase collection of vault metrics.
 Migrated our application to Active-Active model to support multi-region and disaster recovery.
 Implemented AWS DMS clusters and created replica instances to migrate on-prem data to AWS RDS cluster.
 Moved Dynamo DB regional tables to global tables and created two replica regions with provisioning RCU and
WCU.
 Provisioned RDS oracle DB clusters and MySQL Aurora DB clusters through CloudFormation templates.
 Created step functions with cron job triggers, to stop and restart the different services.
 Onboarded New Relic APM agent onto the ECS containers for more granular monitoring and added New Relic
Lambda layer to lambda functions to the monitor each call executed.
 Created New Relic infrastructure monitoring dashboards and created alert with a specific threshold limits with
integration to pager duty.
 Implement log4j driver to stream the cloud watch logs to Kibana logz, where the log level monitoring was
performed.
 Created log level alerting events in logz and performance dashboards to monitor the application latency.
 Integrated Pager Duty to all the alert channels and addressed the production issues as a first priority.
 Created Docker images using a Docker file, worked on Docker container snapshots, removing images, and
managing Docker volumes.
 Installation & Maintenance of LDAP servers (ODSEE11gR1/DSEE 6.3.1) on various Linux machines.
 Creation and maintenance of multiple LDAP instances on various servers used by Siteminder, IDM & UNIX (PAM).
 Installed Hot fixes, Patches for performance & memory leak related Issues.
 Created Docker images using a Docker file, worked on managing Docker volumes, and created Docker
Automation as a solution for CI/CD.
 Worked with setting up ngnix as a global proxy-service and configured path-based routing to the backend
application.
 Configured and developed approval gate at each environment (QA, PROD, UAT) and integrated with Microsoft
Teams channel to store the tickets.
 Training Involves Complete building of LDAP directories involving through analysis, planning, & maintenance of
LDAP Servers in Multi-Master Deployed Environments.
 Worked on to setup for the various Jenkins CICD pipeline configurations for all the microservices.
 Setup Jenkins master-slave architecture to use Jenkins as a pipeline as a service.
 Configuration of various plugins for Jenkins for automation of the workflow and to optimize and smooth
running of build jobs.
 Worked with an agile Development team to deliver an end-to-end continuous integration/continuous delivery
product in an open-source environment using Jenkins. Created and executed test cases and test scenarios for various
functionalities using Selenium.
 Created pipelines for deploying code from GitHub to AWS ECS cluster in the form of Docker containers.
 Integrated Maven builds into Jenkins and configured GIT parameterized builds. Also installed many custom
plugins along with Maven plugins.
 Performed all necessary day-to- day GIT support for different projects, Responsible for design and maintenance of
the GIT Repositories, and the access control strategies.
 Monitored the servers and Linux scripts regularly and performed troubleshooting steps like testing and installing
the latest software on server for end-users.
 Determined ways to optimize/improve JIRA and JIRA Agile setup and process workflows, as well as identify where
functionality can/cannot meet user requests
 Created Ansible roles in YAML and defined tasks, variables, files, handlers and templates. Created inventory and
configured the Ansible files for parallel deployment in Ansible for automating the Continuous delivery process.
 Developed Ansible playbooks for managing the application/OS configuration files in GitHub, integrating with
Jenkins, and Verifying with Jenkins plugins, deploying the application into the Linux environment.
Environment: Unix/Linux, Shell scripting, Git version Control, GIT HUB, Gitlab, Maven, Ansible, Jenkins, AWS (EC2, ECS,
VPC, ELB, S3, RDS, IOT, DNS, VPC endpoints, Private links, SQS, SNS, Step Functions, Cloud Trail and Route 53, EBS, IAM,
ELB, Cloud watch, Cloud Formation, Auto Scaling, serverless, Lambda, API), Istio, Docker, New Relic, Kibana.

Client: Johnson & Johnson, CA | Jul 2019 – Sep 2021


Role: Sr. DevOps Engineer
Responsibilities:
 Configured scalable, secure and disaster recovery cloud Architecture using Amazon Web Services.
 Deployed multi-tier applications utilizing AWS stack (EC2, Route53, S3, RDS, DynamoDB, SNS, SQS, and IAM)
focusing on fault tolerance and auto-scaling.
 Managed EC2 instances using launch configuration, Auto scaling, Elastic Load balancing, automated the process of
provisioning infrastructure using Cloud Formation, Ansible templates, and created alarms to monitor using
CloudWatch.
 Managed storage in AWS using Elastic Block Storage, S3, created Volumes, configured Snapshots.
 Deployed Lambda code into Amazon S3 buckets.
 Used Terraform in AWS Virtual Private Cloud to automatically setup and modify settings by interfacing with control
layer.
 Extended the generic process by attaching the Jenkins job webhook to all the current Java and Scala-based projects
in GitHub.
 Developed Templates for AWS infrastructure a using Terraform to generate staging and production environments.
 Created and design the Terraform templates to create custom-sized VPC, NAT subnets, for the deployment of Web
applications and databases.
 Created Maven POMs to automate the build process for the new projects and integrated them with third-party tools
like SonarQube, Jfrog.
 Design AWS Cloud Formation templates to create custom sized VPC, subnets, NAT to ensure successful deployment
of Web applications and database templates.
 Deployed CoreOS Kubernetes Clusters to manage Docker containers in the production environment with light
weight Docker Images as base files.
 Worked with Ansible Tower to manage Multiple Nodes and Manage Inventory for different Environments.
 Automated various infrastructure activities like Continuous Deployment, application server setup, using Ansible
playbooks.
 Creating, validating and reviewing solutions and effort estimate of converting existing workloads from classic to
ARM based Azure Cloud Environment
 Developed automation system using PowerShell scripts and JSON templates to remediate the Azure services
 Migrating from GitLab to docker and implementing GitLab inside docker.
 Responsible for design and maintenance of the Subversion/GITLAB, Stash Repositories, views, and the access
control strategies.
 Designed and built Azure V2 network infrastructure including Site to Site connection through
 Meraki VPN/Firewall appliance, with Point-To Site (V1 network connection to V2 Network) for migration of Azure
VMs from classic Portal to Azure Portal.
 Deployed Active Directory domain controllers to Microsoft Azure using Azure VPN gateway.
 Generated reports by pulling Telemetry data from Azure SQL tables. Wrote custom queries to fetch the data for
different time ranges, and for different ISVs.
 Wrote Powershell scripts for .Net application deploys, service installs and for windows patches/upgrades.
 Similarly, the above process was also repeated for Scala-based projects, where the maven got replaced by SBT tool
 Involved in using Terraform migrate legacy and monolithic systems to Amazon Web Services.
 Setting up the build and deployment automation for Terraform scripts using Jenkins.
 Provisioned the highly available EC2 Instances using Terraform and Ansible Playbooks.
 Extensively worked on creating Ansible Playbooks for the application deployment and configuration changes.
 Managed AWS infrastructure as code using Terraform.
 Developed environments of different applications on AWS by provisioning on EC2 instances using Docker, Bash and
Terraform.
 Used Terraform scripts to Automate Instances for Manual Instances that were launched before.
 Extensively involved in infrastructure as code, execution plans, resource graph and change automation using
Terraform.
 Developed microservice on boarding tools leveraging Python and Jenkins allowing for easy creation and
maintenance of build jobs and Kubernetes deploy and services.
 Worked on Google Cloud Platform (GCP) services like compute engine, cloud load balancing, cloud storage, cloud
SQL, stack driver monitoring and cloud deployment manager.
 Utilized Ansible as a Configuration Management tool, to automate repetitive tasks, quickly deploys critical
applications, and proactively manages change.
 Used groovy scripts for CI/CD pipeline builds and actively involved in entire Pipeline setups and Jenkins
configuration.
 Configuring JUnit coverage report and Integration Test cases as part of build in GitLab Runner.
 Developed CI/CD system with Jenkins on Kubernetes container environment, utilizing Kubernetes and Docker for
the runtime environment for the CI/CD system to build and test and deploy.
 Created Kubernetes charts using Helm, and Created reproducible builds of the Kubernetes applications, and
managed Kubernetes manifest files.
 Worked on GIT, GitLab repositories. Used SONAR code coverage tool to improve the unit test cases.
 Experience in migrating the Legacy application into GCP platform and managing the GCP services such as Compute
engine, cloud storage, Big Query, VPC, Stack Driver, Load Balancing and IAM.
 Written groovy scripts to use multi branch pipeline project sin Jenkins to configure it as per client’s requirements.
 Deployed Web Applications and Applications developed with java, Python, Ruby and Node.js on AWS Elastic
Beanstalk and worked with Docker on familiar servers such as Apache, Nginx and IIS.F
 Designed Network Security Groups to control inbound/outbound traffic to network interfaces (NICs), Virtual
Machines & subnets.
 Experience in developing and deploying the micro services applications in Pivotal Cloud Foundry (Paas) cloud
platform and CF command line interface.
 Responsible for CI/CD process implementation using Jenkins along with Python and Shell scripts to automate
routine jobs.
 Generated scripts in Maven, Perl & Bash Shell for build activities in QA, Staging and Production environments.
 Secured the GCP infrastructure with Private, Public subnets as well as security groups and leveraged the Google
cloud services such as compute, auto-scaling and VPC to build secure, Scalable systems to handle unexpected
workloads.
 Configured a Virtual Private Cloud (VPC) and Database Subnet Group for isolation of resources. Architecting the
infrastructure on Google cloud platform using GCP services and automated GCP infrastructure using GCP Cloud
Deployment manager.
 Developed UNIX and Perl Scripts for the purpose of manual deployment of the code to the different environments
and E-mail the team when the build is completed
 Worked on Google Cloud Components, Google container builders and GCP client libraries and cloud SDK’s.
Experience on Google Cloud Platform (GCP) and worked on OpenStack-manuals and Security Guide to the OpenStack
Community.
 Created and maintained the Shell/Perl deployment scripts for TC Server/Tomcat web application servers.
 Had Experience in using Tomcat and Apache web servers for deployments and for hosting by using these tools.
 Used Kubernetes to manage containerized applications using its nodes, Config Maps, Selector Services and deployed
application container as Pods.
 Prototype CI/CD system with Gitlab utilizing Kubernetes and Docker for the CI/CD systems to build and test and
deploy.
 Helped with the migration from the old server to Jira database (Matching Fields) with Python scripts for transferring
and verifying the information.
 Scheduled the LinuxCron jobs and Jenkins jobs for build automation. Developed Perl and shell scripts for automation
of the build and release process.
 Setting GitLab repository and Runner for build automation.
 Used AWS Beanstalk for deploying and scaling web applications and services developed with Python, Ruby, and
Docker on familiar servers such as Apache, and IIS.
 Determined ways to optimize/improve JIRA and JIRA Agile setup and process workflows, as well as identify where
functionality can/cannot meet user requests.
 Developed automation and deployment utilities using Ruby, Bash, PowerShell, Python, Groovy.
 Managed Kubernetes charts using Helm, Created reproducible builds of the Kubernetes applications, managed
Kubernetes manifest files, and managed releases of Helm packages.
 Created Docker images using a Docker file, worked on managing Docker volumes and created Docker Automation as
a solution for CI/CD.
 Configured Splunk (Splunk Enterprise) to gain real-time Operational Intelligence across applications and services.
 Responsible for maintaining GIT Repositories and Coordinated and assisted developers with establishing and
applying branching, labeling/naming conventions using GIT source control.
 Building and maintaining Docker container clusters managed by Kubernetes, Linux, Bash, GIT, Docker, on GCP.
 Utilized Kubernetes and Docker for the runtime environment of the CI/CD system to build, test, deploy.
 Built scripts using Maven build tools in Jenkins to move from one environment to another environments.
 Setup Jenkins master slave architecture to use Jenkins as pipeline as a service.
 Configuration of various plugins for Jenkins for automation of the workflow and to optimize and smooth running of
build jobs. Configured GIT with Jenkins and schedule jobs using the Poll SCM option.
 Integrated Maven builds into Jenkins and configured GIT parameterized builds. Also installed many custom plugins
along with Maven plugins.
 Managed configurations of multiple servers using Ansible.
Environment: AWS (EC2, S3, VPC, ELB, RDS, EBS, Cloud Formation, Cloud watch, Cloud trail, Route 53, AMI, SQS, SNS,
CLI, CDN), GCP, Azure, Scala, Docker, GitLab, JAVA, Liquid base, Jenkins, Maven, .Net, Git, Jira, Bash, Batch, Shell, Perl,
Python, Tomcat, Autoscaling, Route53, RHEL 6.8/7. X.

Client: BCBS, IL | Nov 2017 – Jun 2019


Role: DevOps Engineer
Responsibilities:
 Installation, configuration and upgradation of RedHat Linux, HP-UX, Solaris, and IBM AIX operating systems.
 Configured and installed Solaris, HP-UX and RedHat Linux Servers using jumpstart, Ignite and kick start.
 Disk and File System management through Solaris Volume Manager, Logical Volume Manager, and Veritas Volume
Manager.
 Built high-end servers, creating, and loading images on Solaris, HP-UX and Linux servers using System Imager tool.
 Expertise in Global File System (GFS), Creating, configuring, and managing clusters in RedHat Linux Servers using
GFS.
 Used the ADO.NET for the Data Access from the Database.
 Used ADO.NET and data objects such as Data Adapter, Data Reader, Dataset, data table for consistent access to SQL
data sources
 Used Microsoft Entity Framework Code First approach for the Data Access Layer for the ASP.NET MVC 3 application.
 Installed, configured, and managed RedHat Cluster Suite in Linux servers.
 Performed configuration and troubleshooting of services like NFS, NIS, DHCP, FTP, LDAP, Web servers, Samba
server, and Apache server.
 Planned and implemented migrations from lower end to higher end in OS level and Hardware level in Solaris, HP-UX,
and Linux servers.
 RPM package administration using RPM Build and performed Data Backup, Recovery using Veritas Net Backup
(VNB).
 Update the systems using RedHat Enterprise Network (RHN), Managing and monitoring through RHN.
 Worked on installing and configuring VMware/ESX Servers for virtualizations.
Environment: Solaris, RedHat Linux, HP-UX, IBM AIX, Sun Enterprise Servers E5500/E4500, Sun Fire V1280/480/440,
Sun SPARC 1000, L, N class Server, HP blade servers, .Net, Dell blade servers, IBM RS/6000, p Series servers, VMware
ESX Server.

Client: Verizon, India | May 2014 – Aug 2017


Role: Linux System Administrator
Responsibilities:
 Installation, configuration, and administration of Red Hat Linux servers and support for servers.
 Planned and performed the upgrades to Linux (RHEL 4x, 5x, SUSE 10, 11, CentOS) operating systems and hardware
maintenance like changing memory modules, and replacing disk drives.
 Provided support of building the server, patching, user administration tasks, deployment, software installation,
performance tuning and troubleshooting, and KVM.
 Installation and configuration of Oracle 7. X/8. X. Handling NFS, Auto Mount, DNS, LDAP related issues.
 Monitoring CPU, memory, physical disk, hardware, and software raid, multipath, file systems, and networks.
 Performing failover and integrity test on new servers before rolling out to production.
 Wrote Shell Scripts for automation of daily tasks, documenting the changes that happen in the environment and in
each server, analyzing the error logs, analyzing the user logs, analyzing the /var/log/Messages.
 Good understanding of OSI Model, TCP/IP protocol suite DNS, IP, ARP, TCP, UDP, SMTP, FTP, and TFTP.
 Created local repositories on Linux servers Performed server updates, patching, upgrade, and package installations
using RPM and YUM.
 Performed server updates, patches, and upgrades using YUM and RPM.
 Installed Firmware Upgrades, Kernel patches, systems configuration, and performance tuning on Linux systems.
 Extensive knowledge on Server administration, Kernel upgrade and deployment of patches and applying all firewall
and security policies with emphasis on maintaining best practices.
 Identified, troubleshoot, and resolve problems with the OS build failures.
 Installation, configuration, and customization of services send mail, Apache, and FTP servers to meet the user needs
and requirements.
 Hands-on Experience with Jira ticketing system.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy