Professional Documents
Culture Documents
Vandana Devops
Vandana Devops
Vandana
vandanadv92@gmail.com
469-455-3518
Senior DevOps/Cloud Engineer – Azure/AWS/GCP
Professional Summary:
10+ years of IT experience as Cloud Engineer, DevOps Engineer, Build & Release Engineer, Linux Administrator,
Systems Engineer in SCM, Build/Release Management with Continuous Integration & Continuous
Deployment/Delivery as an iterative process and Automation of infrastructure including end-to-end code
configuration using different tools, and cloud Providers like AWS, Azure, OpenStack, and GCP.
Created a Virtual Network on Azure to connect all the servers, Designed ARM templates for Azure Platform. Utilized
Azure services like compute, blobs, ADF, Azure Data Lake, Azure Data Factory, Azure SQL, Cloud services and ARM and
utilities focusing on Automation.
Designed and implemented Azure ExpressRoute and Hub-and-Spoke architectures for various use cases, such as
connecting on-premises data centers to Azure, and creating a secure, scalable network infrastructure on Azure.
Networking technologies such as Virtual Private Networks (VPNs), Azure Virtual Networks, Network Security Groups
(NSGs), and Azure Load Balancers.
Proficient in using Azure DevOps to manage development processes, including code release management, build and
release management, and continuous integration and deployment (CI/CD) practices. Design and deploy reliable and
scalable solutions on Azure, using services like Azure Virtual Machines, Azure Functions, Azure App Service, and Azure
Kubernetes Service (AKS).
Proficient in writing bicep templates to build compute capacity like SQL Server with high availability for application
backend infrastructure and virtual machines that scale for frontends and multiple servers such as reporting, writing
scripting and scheduling.
Managed Amazon Web Services like EC2, S3 bucket, RDS, EBS, ELB, Auto - Scaling, AMI, IAM through AWS Console
and API Integration with Puppet Code a responsible for creating multi-region, multi-zone AWS cloud infrastructure.
Proficient in managing, configuring, and optimizing MSSQL and MySQL databases for performance, security, and high
availability in a DevOps environment.
Experience in managing DNS infrastructure with Route53, including creating and managing DNS records, configuring
routing policies, and monitoring DNS health checks and integrating Route53 with other AWS services, such as Elastic
Load Balancing, Amazon S3, AWS Certificate Manager, and AWS Cloud Map, to ensure consistent naming and routing
across the infrastructure.
Proficient in configuring and managing VPN solutions such as OpenVPN, IPSec, and SSL VPNs to establish secure
connections between distributed networks and cloud environments.
Proficient in using CloudFormation with AWS Code Pipeline and AWS Code Deploy to implement continuous
integration and continuous delivery (CI/CD) pipelines, as well as in writing CloudFormation templates using YAML or
JSON to define AWS resources such as EC2 instances, security groups, S3 buckets, and Lambda functions, and
automating the deployment and management of AWS infrastructure, including multi-region, multi-account, and hybrid
cloud environments.
Expertise in integrating AWS Lambda with other AWS services, such as Amazon S3, Amazon DynamoDB, Amazon
Kinesis, and Amazon SQS, to build event-driven architectures and programming languages such as Node.js, Python,
Java, and C# to write and deploy Lambda functions.
Designed, configured, and automated CI pipelines in TeamCity for various projects.
Implemented CloudWatch Synthetics to monitor web applications, APIs, and other endpoints for availability and
performance and integrating CloudWatch with other AWS services, such as AWS Lambda, AWS SNS, and AWS EC2
Auto Scaling, to automate response actions and improve system availability.
Experience in using EKS with other AWS services such as Amazon Elastic Container Registry (ECR), AWS Auto Scaling,
and AWS CloudFormation to optimize application deployment and management and using Kubernetes monitoring
and logging tools such as Prometheus, Grafana to monitor EKS clusters and troubleshoot issues.
The ability to operate infrastructure as code (IaaC) for hybrid cloud settings, including multi cloud platforms like
Amazon and Azure, also setting up the other services like Hashicrop vault and data dog monitor, alerts using
Terraform.
Worked on modularizing Terraform code to interact with the Kubernetes API and create, update, or delete EKS
cluster objects and used dependencies like vault, fluetbit, Keda and other Kubernetes Add-on's such as auto scalars
.
.
and Alb controllers with Kubernetes resources using Terraform to ensure resources are created in the correct order
and avoid conflicts.
Proficient in implementing Istio to manage and secure service mesh in Kubernetes environments, including
knowledge of Istio architecture, Istio components, and Istio networking and with the architecture, workflows, and best
practices of Argo CD and experience building continuous delivery (CD) for Kubernetes and Istio-based apps.
Used scripting languages such as PowerShell, Bash, and Python to automate tasks and scheduled Tasks and
maintained Terraform modules, writing Terraform code, and implementing best practices for managing infrastructure
resources.
Experienced in MS Azure Cloud Architecture (MS Azure Pack (Private Cloud), PaaS and IaaS) assessments.
Worked extensively with Terraform and wrapped it Terragrunt and managed the back-end state in S3 Bucket and
wrote an Ansible role that combined with Terraform and Terragrunt will deploy an Elastic Beanstalk application and
environment.
Extensive experience in deploying docker services in the Amazon ECS and Azure container Apps for the entire
microservices stack. Worked with Docker container snapshots, attaching to a running container, managing containers,
directory structures and removing Docker images.
Ability in using build tools like MAVEN and ANT for the building of deployable artifacts such as wars & jars from source
code.
Ability to manage RESTful APIs with Amazon API Gateway, including throttling, authorization, and API key
management, adding automated test suites, and integrating Postman with CI/CD process, as well as using Postman to
test and debug APIs.
Installing, Configuring, and managing the Ansible Centralized Server and creating the playbooks to support various
middleware application servers, and involved in configuring the Ansible tower as a configuration management tool to
automate repetitive tasks.
Well versed with Installing and configuring an automated tool Chef that includes the writing chef cookbooks and
recipes, policy files and configuration of the Chef master, agent nodes and an admin control workstation.
Experience in using Nagios and New Relic monitoring systems and different Bug Tracking Tools like Remedy, Jira, VSTS,
ServiceNow and Clear Quest. Designed, deployed, and coordinated with different teams to enhance ELK platform and
took ownership of modern technologies.
Expertise in Splunk solution design, architect, deployment, and configuration of Splunk components like forwarders,
Indexers, Search heads etc.
Extensive involvement in LINUX/Unix system Administration, System Builds, Server Builds, Installations, Upgrades,
Patches, Migration, Troubleshooting on RHEL.
Education:
Bachelors in Electronics and Communication Engineering, SRM University, Chennai, India – May 2013
Master of Science in Computer Information Systems, ACCT, Virginia.
Master of Science in Information Technology Management, Campbellsville University, Kentucky.
Pursuing Executive Doctor of Philosophy in Information Technology from University of the Cumberland’s, Kentucky
.
.
.
.
Work Experience:
.
.
Developed and executed Azure DevOps pipelines for the automated deployment and testing of Dynamics 365
customizations and extensions. Additionally, optimized Dynamics 365 performance through Azure resource fine-tuning
and load testing.
Established Azure Backup Vault, safeguarding essential VMs through VM-level backups, file/folder level backup, and
adherence to CIS benchmark standards for cloud security. Implemented Azure best practices for securing workloads in
the cloud and migrating on-premises resources to Azure.
Enforced Azure Policies to ensure compliance with security and governance standards, such as resource tagging
enforcement or restrictions on certain resource types.
Managed configuration files and environment-specific settings within TeamCity, ensuring consistency across different
deployment stages.
Developed and maintained Groovy scripts for various automation tasks, including build and deployment processes,
configuration management, and data manipulation.
Designed Network Security Groups (NSGs) to control inbound and outbound access to network interfaces (NICs), VMs,
and subnets. Provided high availability for IaaS VMs and PaaS role instances for access from other services in the VNet
with Azure Internal Load Balancer.
Utilized Azure PIM to manage privileged access for users and groups, aligning with security policies and mitigating the
risk of unauthorized access to critical resources.
Configured time-bound access, approval workflows, and access reviews to uphold the principle of least privilege and
comply with regulatory requirements.
Utilized Azure Resource Manager (ARM) for deploying, updating, and deleting various Azure resources, including Azure
Virtual Networks, Virtual Machines, Cloud Services, Resource Groups, Load Balancing, Application Gateways, Auto-
Scaling, Kubernetes Service (AKS), Cosmos DB, Monitor, and RBAC.
Maintained a central repository of Azure Blueprints using Azure DevOps Repos and ARM templates, ensuring consistent
and scalable infrastructure code across multiple environments and regions while providing version control and
auditability.
Created Templates for Azure Infrastructure as code using Terraform to build staging and production environments.
Integrated Azure Log Analytics with Azure VMs for monitoring the log files, storing them, and tracking metrics and used
Terraform as a tool, Managed different infrastructure resources Cloud, VMWare, and Docker containers.
Designed and implemented Azure Blueprints and Azure Bicep to establish a repeatable and scalable approach for
deploying cloud infrastructure. Leveraged Azure Policy to enforce governance and compliance across multiple
environments, resulting in increased efficiency and reduced risk.
Configured and managed Azure Storage accounts, utilizing features such as Blob storage and Azure Files for storing and
retrieving large amounts of data in mission-critical applications to optimize performance and cost efficiency.
Managed PostgreSQL database instances, including installation, configuration, and regular maintenance.
Configured and deployed containerized applications on Azure Kubernetes Service (AKS) using Istio Service Mesh,
improving application performance and reliability through advanced traffic management, security, and observability
features.
Implemented and managed Azure Kubernetes Service (AKS) clusters with Calico CNI for efficient networking and
enhanced security, resulting in improved application deployment and scalability.
Leveraged Prometheus and Grafana for monitoring Kubernetes object metrics, configuring alerts from the Azure
Kubernetes cluster through email notifications and web-hook mechanisms, and writing Python scripts for Prometheus
Alert-manager alerts to run on Linux VM.
Worked on Azure Kubernetes Service (AKS) to create and manage Kubernetes clusters, ensuring smooth operation and
maintenance of the infrastructure. Upgraded and maintained the clusters and collaborated with development teams to
deploy applications on AKS.
Deployed containerized applications on Azure Kubernetes Service (AKS) cluster using Azure CI/CD pipeline with Azure
Container Registry (ACR) as the image repository, ensuring rapid and reliable deployment while adhering to DevOps
principles.
Integrated Azure Boards with Microsoft Teams to enhance communication and collaboration between development
teams and stakeholders, facilitating real-time updates on work items, bug reports, and code changes.
Developed custom scripts and deployment steps in Octopus Deploy using PowerShell and other scripting languages to
accommodate complex deployment scenarios and integrate with various systems.
.
.
Designed a robust future state Ingestion Framework solution leveraging Azure Data Factory, Azure SQL database & Data
warehouse. Deployed and managed Azure storage for SQL DB's (SaaS and PaaS applications), SQL Server on Azure,
Windows, and Linux instances among other Azure cloud services.
Designed project workflows/pipelines using Azure DevOps as a CI tool, wrote Python Scripts, and converted Classic
pipelines to YAML pipelines to automate the build process.
Implemented CI/CD pipelines using Azure DevOps Repos and Pipelines, securing pipelines using Azure DevOps security
and compliance, and streamlined the licensing strategy to ensure optimal resource utilization. Utilized Azure Repos as
the source control and code repository.
Created Service Connections to Azure subscriptions, Azure Container Registries, and Azure Key Vaults, and
created/managed Service Principals for Azure Active Directory (AAD) authentication, enabling seamless integration of
Azure resources in DevOps pipelines.
Deployed and optimized a two-tier .NET web application to Azure DevOps, focusing on development using services like
Repos for code commits, Test Plans for triggering application and unit tests, artifact deployment to App Service, and
Azure Application Insight for collecting process health, performance, and usage data.
Worked with Ansible and Ansible Tower as a configuration management tool, automating tedious operations,
expediting key application deliveries, and dynamically managing change.
Used Ansible to automate the installation and setup of Azure services, such as Azure Kubernetes Service (AKS), Azure
Container Instances (ACI), and Azure Functions, enabling rapid and reliable deployment of containerized applications.
Authored Ansible Playbooks in YAML as wrappers to manage configurations of Azure Nodes, tested Playbooks on Azure
instances using Python SDK, and automated various infrastructure activities like continuous deployment, application
server setup, and stack monitoring using Ansible Playbooks.
Leveraged Azure Stream Analytics for real-time data processing and analytics, facilitating quick and automated decision-
making based on streaming data.
Collaborated with cross-functional teams to integrate Dynatrace with other monitoring and logging tools in the Azure
DevOps pipeline, including Azure Monitor, Application Insights, and Log Analytics, ensuring comprehensive observability
across the entire stack.
Developed and maintained synthetic scripts for Azure Kubernetes using Dynatrace, resulting in a significant reduction in
downtime and improved application performance.
Used ELK stacking to monitor the logs for detailed analysis and worked on dashboarding using Elastic, Logstash & Kibana
(ELK). Used ELK to set up real-time logging and analytics for Continuous delivery pipelines & applications.
.
.
Developed Jenkins files for automating infrastructure and application deployment, implementing blue/green
deployment techniques and internal Jenkins pipelines for AKS service automation.
Managed SSL certificate operations, including Azure Certificate Manager and Entrust certificates, to ensure secure
end-to-end connectivity, with a focus on Azure Disk Encryption for efficient disk volume and snapshot management.
Implemented security measures in TeamCity, including role-based access control (RBAC) and secure artifact
management.
Configured Azure Monitor Log Analytics to conduct security analysis, change tracking, troubleshooting, and
compliance monitoring across Azure resources and subscriptions.
Designed and implemented infrastructure-as-code solutions using Terraform to securely store key-value pairs in
Azure Key Vault, while effectively managing Key Vault access policies using Terraform.
Ensured the security of IaaS resources by configuring firewalls, access controls, and encryption.
Automated Key Vault creation and configuration with Terraform to ensure consistency and enforce fine-grained
access control over keys and secrets.
Established Docker containers and consoles for managing the application lifecycle and automated Docker component
tasks, including Docker Registry usage and Dockerized application creation.
Integrated Docker container-based test infrastructure into the Jenkins CI/CD flow, executing builds triggered by Jira
Webhooks and Slave Machines.
Implemented security operations configurations to GitLab pipelines meeting CIS benchmark requirements, and
configured ARAP docker images for security threat detection.
Implemented security measures for Kubernetes services using Istio Service Mesh and Docker, ensuring efficient
application deployment in containers, and managed Kubernetes cluster services using Terraform and Ansible.
Managed and configured Azure AD Domain Services for seamless integration with legacy applications and services that
rely on Active Directory.
Planned and executed PostgreSQL version upgrades, ensuring minimal downtime and data integrity.
Integrated PaaS platforms with CI/CD pipelines to automate application builds, testing, and deployments.
Implemented Istio installation for Node-to-Node encryption on Azure Kubernetes service, deploying applications using
Terraform modules and managing them using Lens.
Developed and configured Kubernetes objects and employed Kubernetes operators for managing applications on EKS.
Optimized AKS cluster security monitored using Prometheus and Grafana and implemented proactive measures for
enhanced system performance.
Configured Prometheus server and Grafana dashboards for monitoring Kubernetes cluster components and visualizing
performance metrics.
Contributed to CICD pipeline development, encompassing stages from unit testing to production, and refined
application deployment processes using internally hosted pipelines.
Implemented robust security controls and policies for Azure resources and applications, ensuring adherence to
industry standards like PCI-DSS and HIPAA.
Developed comprehensive monitoring solutions for Azure resources, including customized metrics using Azure
Monitor APIs for aspects not covered by native Azure monitoring services.
Established CloudWatch alarms for monitoring server performance and initiated corrective actions for enhanced
performance.
Designed and built custom dashboards and visualizations in Splunk to provide real-time visibility into system and
application performance.
Oversaw and maintained the DevOps Toolset, comprising GitHub, Jenkins, JFrog Artifactory, and Ansible Tower, to
ensure seamless functioning of the CI/CD pipeline.
Developed scripts in Bash and Python to automate provisioning and fortifying new Linux servers in Azure Virtual
Machines, encompassing virtual machine creation, configuration, and network security group establishment.
.
.
Responsibilities:
Developed Azure web application projects, managed ASP .NET web apps and web jobs deployment via Visual Studio,
GitHub, and Azure Resource Manager.
Oversaw application deployment and management through Azure app service, cloud services, and other Azure PaaS
solutions.
Established infrastructure pipelines using DevOps tools like ARM templates, Azure CLI, PowerShell, and Python. Also,
implemented unit testing and code coverage for both .NET Core and Python projects.
Utilized Jenkins Pipeline for automating CI/CD pipelines, configuring stages, steps, and triggers. Additionally, set up
CI/CD pipelines for deploying various Azure resources such as Azure Function app, web apps, APIM, .NET Core, and SQL
database projects.
Implemented DevSecOps strategies for security auditing and continuous monitoring, including Azure Web Application
Firewall (WAF) rule enforcement against attacks like SQL injection.
Implemented Terraform Sentinel Policies Alongside Terraform Enterprise for enhanced reusability of Terraform Sentinel
functions and data exposure from Terraform plans to Sentinel policies.
Developed infrastructure as code using Terragrunt with Terraform, emphasizing modularity. This involved building
infrastructure, AKS (Kubernetes) clusters, and utilizing Tekton pipelines for CI/CD of application resources.
Managed Kubernetes charts using Helm, ensuring reproducible builds of Kubernetes applications, and efficiently
managing Kubernetes manifest files and Helm package releases.
Managed Terraform workspaces and Sentinel policies using Terraform Enterprise, facilitating concurrent and secure
collaboration on infrastructure code.
Managed MongoDB database instances, including installation, configuration, and maintenance.
Configured Azure Kubernetes Service (AKS) with Terraform scripts for microservices deployment and management,
including pod operations, service maintenance, load balancing, and network policies.
Configured and monitored Kubernetes cluster security using kops, including RBAC policies, network policies, and TLS
certificates. Troubleshooted and resolved issues using logs and metrics.
Implemented backup and disaster recovery solutions for Kubernetes clusters, collaborating closely with developers to
address application deployment and infrastructure issues.
Implemented Blue-Green Deployment for Kubernetes clusters, managing rollout methods, deployment strategies, and
Helm chart packaging in production environments.
Deployed Logstash and Filebeat for log propagation to Elasticsearch, ensuring adherence to Elasticsearch Hot-Warm-
Cold architecture and Index Lifecycle Management (ILM) policy through Kibana monitoring.
Configured Datadog for real-time dashboards and alerts to monitor Azure resource usage, performance metrics, and
security threats. Integrated Datadog with Azure Monitor and Azure Insights for analyzing Azure API activity and ensuring
compliance.
.
.
Leveraged the JIRA tool for creating, updating, and tracking project status through stories. Utilized JIRA in all our projects
following scrum methodology, including story creation and point assignment.
Integrated Bamboo with JIRA and AWS to establish a seamless end-to-end development and deployment workflow.
Additionally, configured and supervised multiple Bamboo agents to enhance build capacity and reduce build times,
leading to quicker feedback loops and improved efficiency.