$12.0 per Hour
A performance driven ambitious software developer with an extraordinary blend of and technical knowledge. Ability to communicate and motivate team members to enhance strategic goals and bottom line objectives. Creative problem solving and troubleshooting skills complemented by meticulous attention details that will result in the success of an organization by developing new applications or improving existing ones.
Tech Stack Expertise
- January 2014 - April 2023 - 9 Year
- June 2019 - March 2023 - 46 Months
Worked on ACM certificates, such as creation, validation and uploading in Load balancers.
Worked on validation of certs that through the DNS or Mails as per requests.
Worked on IAM policies for providing access to required buckets.
Customizing the IAM policies as per requirement.
Worked on AWS backup policies as per Organization policy, configured for each AWS account.
Rotation of Access key and Secret keys if they are old as 120 days, coordinating with respective teams and rotating as per requirement.
Copying the data between the EFS.
Creating Elastic cache of both Mem and Redis cache, both read and write caches and providing the urls as requested.
Copying the data between the S3 buckets, which are in both different accounts.
Configuring the SSM agents on the AWS servers as per requirement.
Sharing the RDS images encrypted with Kms keys between the AWS accounts, by generating the custom KMS keys.
Domain registration in AWS.
Configuring the custom Url instead of default cloudfront url.
Configuring the Peering activity on Transitgateways.
Configuring SSM agent on the servers for connecting from AWS console.
Invalidating the S3 objects through Cloudfront.
Enabling the version for S3 bucket, for pushing up the latest updated information from Cloudfront.
Configuring simple AD for launching workspace.
Creating the Workspace as per the requirement.
Configured S3 bucket policies as per requirement.
Configured S3 ACL based on bucket & as well as individual objects.
Searching logs from CloudTrails based on the incident occurs.
Able to configure the organization, add and inviting the accounts into the master account and required.
Able to configure aws config, depend on the requirement.
Configuring the Route53 in aws depending on the requirement, such as simple and weighted policies.
Configuring the Route 53 end points for DNS issues on premises.
Able to configure the IPsec connection between AWS to Azure.
Worked on Paloalto migration project in AWS.
There was a VGW deprecation got happened in AWS, we have almost 15 tunnels for that particular vpc, For that we have configured a virtual paloalto in same vpc we migrated all tunnels on paloalto for temporary purpose. Later we migrated all tunnels back to AWS VGW.
Worked on OCI cloud as well, configuring VCN, security lists, NatGateways, Fastconnect, subnets.
Worked on Migration projects from on prem to OCI.
Configured VCN peering between two different regions through DRG.
Worked on OCI migration projects also.
Customize the OS images and lunching the server as per requirement.
Worked on CCNP level projects also, by maintain the local network of our company. Which includes wireless devices.
Cloudformation for creating the infra env based on the requirements.
- January 2014 - May 2019 - 65 Months
Building Vnet, Resourcegroups, subscription, Aks, Application gateways, front door for the complete application requirement on Azure cloud.
Building Pulse secure vpn solution on cloud for VPN connectivity for the development team.
Worked on configuring database like postgresql single server & flexible servers, adding the required vnet subnet into the database for connectivity.
Restoring the databases based on the requirements form DB.
Configuring the firewall rules for connectivity of database for AKS and public ips.
Configuring the NSG rules both Inbound and outbound based on company policies.
Configuring the Vnet peering between the two different Vnet for communication.
Configuring the ingress file for connectivity to Application gateways.
Configuring the probes on Application gateway to make sure the health checks looks good.
Configuring the custom DNS name for the application gateway.
Configuring the Azure keyvault for storing the password files.
Configuring the Azure keyvault for specific access only.
Creating the projects in Azure devops. Creating the users gitlab.
Creating the Repos.
Creating the Wiki page to consolidate the project information at one location.
Creating the different projects.
Creating the users and associating the users to respective users.
Adding the users into into admin roles based on the requirements.
Creating the storage accounts, configuring the static websites.
Restricting the storage access to specific network.
Configuring the CROS on storage accounts based on needs.
Using Azure storage explorer to copy the data from one storage account to another.
Providing the contributor & read roles to respective users based on the needs.
Creating the service connections to respective accounts for deploying the services.
Building the Prisma scan into the pipelines for scanning the container images.
Based on the alerts reported by the Prisma scan started working with dev team and updating the based images from our side.
Configuring the Private DNS and Global DNS based on the needs.
Deploying the configuration into webapps services.
Configuring the webapps into the private zone.
Redeploying the AKS pods based on requirements.
Deleting the deployments and deploying them again.
Worked on Terraform for implementing based on requirements.
Building the AWS (codecommit, artifacts, build, deploy & configuring pipelines) and Azure Devops pipelines
Worked on Terraform Template modules for Load Balancer
Worked on Automation scripts for seamless domain join process for compute instances.
Worked on automation for IAM Policy Assessment resource creation
in B.AHyderabad University
- June 2005 - June 2008