Sawant .
Sawant .
✆ +1 908-394-8019
✉ [email protected]
PROFESSIONAL SUMMARY:
IT Professional with more than 10+ years of experience in the IT industry comprising of build release management,
software configuration, design, development and cloud implementation in the domains of Banking, Automobile
and Healthcare
Experience in designing, deploying, and operating highly available, scalable, and fault-tolerant systems cloud data
platforms using Amazon Web Services (AWS)
Experienced with event-driven and scheduled AWS Lambda functions to trigger various AWS resources.
Hands-on experience working with Amazon Web Services like EC2, S3, Amazon RDS, Amazon Elastic Load Balancing,
AWS Identity and access management, AWS Cloud Watch, Amazon EBS and Amazon Cloud Front.
Experience in Migrating production infrastructure into Amazon Web Services cloud utilizing Elastic Bean Stalk, Cloud
Formation, Code Deploy, Code Commit and Ops Works.
Experience in designing AWS Cloud Formation templates to create custom-sized VPC, Subnets, and NAT to ensure
successful deployment of Web applications, database templates and expertise in architecting secure VPC solutions
in AWS with the help of Network ACLs, Security groups, public and private network configurations.
Experience in Terraform templates for provisioning the cloud Infrastructure in AWS and developed modules for
saving time and wrote Templates for AWS infrastructure as a code using Terraform to build staging and production
environments.
Hands-on experience on Terraform for building, changing and versioning Infrastructure and writing Templates for
AWS infrastructure as a code using Terraform to build staging and production environments.
Experience in setting up Kubernetes (k8s) Clusters for running microservices and pushing microservices into
production with Kubernetes Infrastructure. Development of automation of Kubernetes clusters via playbooks in
Ansible.
Good experience in writing Helm Charts Kubernetes YAML files for the deployment of microservices into Kubernetes
Clusters. Also deployed and configured Prometheus to monitor Kubernetes nodes with node-exporter and monitor
Kubernetes API and resources with Kube-state-metrics.
Expertise in using Amazon AWS API tools like Linux Command line and puppet integrated AWS API tools.
Experienced on Amazon AWS IAM Service: IAM Policies, Roles, Users, Groups, AWS Access Keys and MFA.
Expertise in in-depth knowledge of Cloud Computing Strategies (IaaS, PaaS, SaaS)
Hands-on experience installing and administrating CI tools like Hudson/Jenkins, CVS, Subversion, Team foundation
server and Nexus & Jfrogg Artifactory.
Experience in using Build and Automation tools like ANT and Maven
Experience in setting up Baselines, Branching, Merging and Automation Processes using Shell, Ruby, Python and Bash
Scripts.
Experienced in converting build.xml into pom.xml to build applications using MAVEN.
Extensively worked on Jenkins and Bamboo for continuous integration and End-to-End automation for all builds
and deployments.
Experience in development and configuration experience with software provisioning tools like Chef, Puppet and
Ansible
Expertise with scheduling, deploying and managing container replicas onto a node cluster using Kubernetes and
experienced in creating Kubernetes clusters work with frameworks running on the same cluster resources.
Experience working on several Docker components like Docker Engine and Docker Hub, creating Docker images,
Docker Compose, Docker Registry and handling multiple images essentially for middleware installations and domain
configurations.
Hands-on Experience with Ansible and Ansible Tower as a Configuration management tool to computerize
redundant tasks, rapidly send basic applications and proactively manage change.
Experience in Custom integration and plugin development for different tools around CI/CD like Jenkins
and Artifactory using API and other techniques.
Expertise in designing project workflows/pipelines using Jenkins as a CI tool and in building Jenkins jobs to create AWS
infrastructure from GitHub repos containing Terraform code.
Proficient with Shell, Bash, Python, YAML and languages for automation and monitoring
Expertise in GIT implementation containing various Remote repositories for a single application and hands-on
experience in creating branching & tagging strategies to maintain the source code in the GIT repository.
Configured Network and Server monitor using Grafana and expertise in using different log monitoring tools like
Dynatrace, Prometheus, AppDynamics and Splunk to see log information, monitor, security and get the health
notifications from nodes.
Strong management and administration skills in providing installation, configuration and troubleshooting in multiple
Applications and Web Servers like IBM WebSphere Application Server and IBM HTTP Server. Experience in
troubleshooting and issue resolution for middleware technologies like Apache, Tomcat, JBoss and WebSphere MQ.
Experience in using Tomcat, JBOSS, WebLogic, RedHat OpenShift, OpenStack, RedHat Virtualization and
WebSphere Application servers for deployments.
Install, configure and administer WebSphere Liberty profile on Linux/Windows Environment.
Developed automation solution for SUSE Linux Patching and created Ansible roles and playbooks for SUSE Linux
Patching automation.
Certifications:
Technical Skills:
Responsibilities:
Built S3 buckets and managed policies for S3 buckets and used S3 bucket and Glacier for storage and backup
on AWS
Work with other teams to help develop the Puppet infrastructure to conform to various requirements
including security and compliance with managed servers
Built a VPC, established the site-to-site VPN connection between the Data Center and AWS
Developed Infrastructure as Code (IaC) using AWS CDK to provision and manage cloud resources
Managed and deployed AWS CDK stacks for various environments, including development, testing, and production
Develop push-button automation for app teams for deployments in multiple environments like Dev, QA,
and Production.
Help with the creation of dev standards for Puppet module development including best practices for version
control (git).
Perform troubleshooting and monitoring of the Linux server on AWS using Zabbix, Nagios and Splunk
Management and Administration of AWS Services CLI, EC2, VPC, S3, ELB Glacier, Route 53, CloudTrail, IAM,
and Trusted Advisor services.
Created automated pipelines in AWS CodePipeline to deploy Docker containers in AWS ECS
using services like CloudFormation, CodeBuild, CodeDeploy, S3 and puppet
Worked on JIRA for defect/issues logging and tracking and documented all my work using CONFLUENCE
Integrated services like GitHub, AWS CodePipeline, Jenkins and AWS Elastic Beanstalk to create a
deployment pipeline.
Good Experience in architecting and configuring secure cloud VPC using private and public networks
through subnets in AWS.
Amazon IAM service enabled the granting of permissions and resources to users. Managed roles and permissions
of users with the help of AWS IAM
Designing and implementing fully automated server build management, monitoring and deployment by
using Technologies like Puppet
Deployed Puppet, Puppet dashboard for configuration management to existing infrastructure
Initiating alarms in CloudWatch service for monitoring the server's performance, CPU Utilization, disk usage, etc.
to take recommended actions for better performance
Configured AWS Multi-Factor Authentication in IAM to implement 2-step authentication of user's access
using Google Authenticator and AWS Virtual MFA
Included security groups, network ACLs, Internet Gateways, and Elastic IPs to ensure a safe area for
the organization in the AWS public cloud
Writing UNIX shell scripts to automate the jobs and scheduling cron jobs for job automation using commands
with Crontab
Wrote Ansible Playbooks with Python SSH as the Wrapper to Manage Configurations of AWS Nodes
and Test Playbooks on AWS instances using Python
Experience with Puppet to more easily manage enterprise Puppet deployments
Design AWS Cloud Formation templates to create custom-sized VPC, subnets and NAT to ensure
successful deployment of Web applications and database templates
Created scripts in Python which integrated with Amazon API to control instance operations
Coordinate/assist developers with establishing and applying appropriate branching, labeling /naming
conventions using GIT source control
Environment: AWS, EC2, RDS, Python, DynamoDB, S3 bucket, Route53, Docker, GIT, Jenkins, Kubernetes,
OpenShift, Ansible, Terraform, Shell, ArgoCD and WebSphere Liberty
Responsibilities:
Involved in designing and deploying a multitude of applications utilizing almost all the AWS stack (Including EC2,
Route53, S3, RDS, Dynamo DB, SNS & IAM) focusing on high-availability, fault tolerance and auto-scaling in AWS
CloudFormation
Worked on AWS Cloud Formation and Terraform API to create infrastructure on AWS as a code and spinning up
AWS resources by using Terraform. Converted existing AWS infrastructure to serverless architecture (AWS Lambda)
deployed via Terraform and AWS CloudFormation
Integrated AWS CDK with CI/CD pipelines to achieve continuous deployment of infrastructure changes
Created AWS resources like VPC, subnets, EC2 instances, ELB, security groups and S3 by using Terraform
Enforce automated Kubernetes cluster security using Kyverno policy generator & ArgoCD
Creating and Developing Deployments, namespaces, Pods, Services, config maps, stateful sets, Health checks, etc., for
Kubernetes in YAML Language
Ensure that the Ingress controller is correctly integrated with your cluster and can communicate with the
Kubernetes API server
Set up and manage TLS/SSL certificates for securing traffic, including certificate issuance, renewal, and rotation
Create and manage Kubernetes Ingress resources to specify the routing rules for your applications
Configure path-based routing to direct traffic to different services based on URL paths
Utilized Kubernetes for the runtime environment of the CI/CD system to build, test deploy
Implemented a production-ready, load-balanced, highly available, fault-tolerant Kubernetes infrastructure
Deploying the WebSphere Liberty operator application Kubernetes and OpenShift platforms
Automated the infrastructure using Terraform and making it auditable by storing all the infrastructure changes in a
version control system like GIT
Deployed containerized applications onto a Kubernetes cluster which is managed by AWS Elastic Kubernetes Service
(EKS)
Configured ‘kubectl’ to interact with Kubernetes infrastructure and used Terraform to launch a cluster of worker
nodes on Amazon EC2 instances
Build and Published Docker Images to Azure Container Registry, Deployed Docker Containers to Kubernetes and
Implemented cluster services using Docker and Kubernetes to manage local deployments in Kubernetes using YAML
Files
Maintained the GitHub Enterprise SAAS across the organization, including GHAS and Actions
Worked on Azure Kubernetes(k8’s) cluster with objects like Pods, Deployments, Services, and ConfigMaps and created
reproducible builds of the Kubernetes applications managed Kubernetes manifest files
Implementation of IBM WebSphere Liberty for Amazon EKS on AWS environment
Implementation and Administration of ELK stack for Application Logs centralization and Grafana for Monitoring
Responsible for creating Terraform scripts for deploying various resources in AWS for various environments
Involved in Blue/green deployment strategy by creating identical applications, which already existed in the
production environment
Responsible for working with container-based deployments using Docker, with Docker images
Integrated SonarQube with Jenkins for continuous inspection of code quality and analysis with SonarQube scanner
for Maven
Performs 24/7 production/test support to perform Break/Fix Analysis/Troubleshooting on servers
Monitor and alert on infrastructure health and performance using tools like Prometheus and Grafana
Worked on Ansible for configuration management and infrastructure automation. Also, created dynamic inventory
in Ansible for automating continuous deployment and wrote playbooks using YAML scripting
Built Jenkins jobs to create AWS infrastructure from GitHub repos containing Terraform code and
administered/engineered Jenkins for managing weekly builds
Used GIT version control to manage the source code and integrated GIT with Jenkins to
support build automation and integrated with JIRA to monitor the commits
Configured and managed source code using GIT and resolved code merging conflicts in collaboration with
application developers
AWS DevOps Engineer /Securian Financial – MN Oct 2018 – Dec 2020
Environment: AWS, Jenkins, Ansible, Shell Script, Python, GitHub, Linux, Docker and Kubernetes, Ansible, CI/CD,
WAS, WebSphere MQ, Apache and Tomcat
Responsibilities: -
Worked with various services of AWS: EC2, ELB, Route53, S3, Cloud Front, RDS, IAM, Cloud Watch and Cloud
Formation
Designed AWS Cloud Formation templates to create custom-sized VPC, subnets and NAT to ensure successful
deployment of Web applications and database templates
Implemented & maintained monitoring & alerting of production and corporate servers using Cloud Watch
Successfully Implemented End-to-End automation of auto-restart service for WebSphere processes on RHEL
systems, using Ansible Tower. The automation resulted in reducing the average startup time for WebSphere
processes to 2 minutes after RHEL reboot
Worked on Ansible Playbooks and Ansible Tower to automate repetitive tasks, deploy critical applications quickly,
and proactively manage the changes
Worked in a group running Jenkins in a Docker container with EC2 slaves in Amazon AWS cloud configuration. Also,
gain familiarity with surrounding technologies like Kubernetes
Provision and manage the Kubernetes cluster infrastructure, including nodes and networking
Configure and maintain cluster-level security, such as RBAC (Role-Based Access Control) and network policies.
Monitor cluster health and performance, troubleshoot issues, and ensure high availability
Worked on Terraform for managing the infrastructure through the terminal sessions and executing the scripts and
creating alarms and notifications for EC2 instances using Cloud Watch
Created the Docker file. Built various containers using Docker engine and Docker Machine environments and
worked on several Docker components like Docker Engine, Hub, Machine, Compose and Docker Registry
Experienced in Building, Testing and Deploying applications by adopting DevOps tools like GIT, Ansible,
Jenkins, Dockers, Kubernetes
Managed Kubernetes charts using Helm, and created reproducible builds of the Kubernetes applications,
managed Kubernetes deployment and service files and managed releases of Helm packages
Responsible for ensuring Continuous Delivery/Continuous Integration across all environments from UAT/TEST to
Pre- Production and Production using Jenkins
Created IAM policies for delegated administration within AWS and Configure IAM Users / Roles / Policies to
grant fine-grained access to AWS resources to users
Integrated Jenkins with various DevOps tools such as GitHub, SonarQube, Ansible and used the CI/CD system of
Jenkins on Kubernetes container environment, utilizing Kubernetes and Docker for the runtime environment
for the CI/CD system to build and test and deploy
Involved in Blue/green deployment strategy by creating identical applications, which already existed in
the production environment
Container management using Docker by writing Docker files setting up the automated build on Docker HUB and
installing and configuring Kubernetes
Created branching & tagging strategy to maintain the source code in the GIT repository and coordinated with
developers with establishing and applying appropriate branching, labeling/naming conventions using GIT source
control
Experience in monitoring System/Application Logs of servers using Splunk to detect Production issues.
Automated all Administrative tasks including Installations, configurations and Fixpack Upgrades of WebSphere
servers by using Ansible playbooks
Experience in troubleshooting and issue resolution for middleware technologies like Apache, Tomcat & WebSphere
Automated manual deployment effort from 5hr to 1hr using Ansible Tower
Working on Automating the Grand Opening Store process by building VMs and configuring them to the company
standards
Working with Rally for tracking the issues and stories
Worked on setting up SPLUNK dashboards and adding data to SPLUNK by adding log files
Configured SPLUNK Alerts and created Dashboards for Monitoring
Maintained IIS webserver during deployments and production for .net applications
Working on Automating Pre and post-Linux Migration steps using Ansible Tower
Working on Automating Audit report to filter the list of active users on the Domain
Provide technical support in middleware services including Patching, upgrading, performance tuning and production
support
Experience in Configuring and administering JMS Connection factories, JMS Queues, Topics, Distributed Queues
Experience in configuring MQ objects such as Queue Managers, channels and queues in local and remote MQ servers
Environment: WebSphere 8.x, Redhat/SuSe Linux, IBM HTTP Server, SiteScope, Dynatrace, LDAP, JDBC, F5 load
balancer
Responsibilities: -
Responsible for Setting up AWS infrastructure using resources VPC, EC2, S3, RDS, Lambda, ELB, IAM, EBS,
Route53, SNS, SES, SQS, Cloud Watch, Cloud Trail, Security Groups and Auto scaling using Terraform and Cloud
Formation templates
Hands-on experience in creating and configuring resource groups, storage accounts, Azure Web Apps, Azure
Functions, App Services, Application Insights, API Management Service, Key Vault, Service Bus, Azure Identity
and Access Management across all environments
Designed and implemented Continuous Integration & Continuous deployment (CI/CD) Pipeline using Jenkins,
Azure DevOps for deploying infrastructure, application setup, creating application packages
Used IaC tools like Terraform and Cloud Formation templates to provision infrastructure in AWS & Azure
Automated the infrastructure using Terraform and making it auditable by storing all the infrastructure changes in
a version control system like GIT
Deployed containerized applications onto a Kubernetes cluster which is managed by AWS Elastic Kubernetes
Service (EKS). Configured ‘kubectl’ to interact with Kubernetes infrastructure and used Terraform to launch a
cluster of worker nodes on Amazon EC2 instances
Build and Published Docker Images to Azure Container Registry, deployed Docker Containers to Kubernetes and
Implemented cluster services using Docker and Kubernetes to manage local deployments in Kubernetes using
YAML Files
Maintained the GitHub Enterprise SAAS across the organization, including GHAS and Actions
Worked on Azure Kubernetes(k8’s) cluster with objects like Pods, Deployments, Services, and ConfigMaps and
created reproducible builds of the Kubernetes applications, managed Kubernetes manifest files
Create build and release pipelines for 30+ applications in Azure DevOps
Deployed certificates stored in Azure Key Vault to Azure VMs by using Azure Resource Manager and restricting
the access by directing appropriate access policies for the key vault
Worked with Azure Active Directory for single sign-on, authentication, authorization, and Azure Role-based
Access Control (RBAC)
Configured on-perm build agents and agent pools to handle multiple concurrent build and release pipelines.
Maintained Nexus Repository to maintain various privately hosted Java Packages, APT Packages and Docker Registry
Implemented Grype and Syft for artifact and container scanning in the CI pipeline
Worked with Jenkins to manage upgrades of Nodes and instances on AWS EKS and Azure AKS Cluster with
Terraform and Kubernetes YAML files
Configured and managed Elastic Load Balancer (ELB) with Auto scaling groups for high availability and fault tolerance
Utilized Route53 to route traffic to different environments based on the routing policy defined
Used databases and data visualization technologies for operations such as SQL dbs., Influx dB, Grafana, Kibana
Implemented Azure Application Insights for performance monitoring and exception logging
Monitored the Azure services by collecting metrics, activity logs and diagnostic logs using Azure Monitor
Setup Datadog monitoring across different servers and AWS services
Used Amazon Kinesis to push AWS cloud trail logs from CloudWatch with Subscription filters to Datadog.
Created Audit Dashboards & Views to monitor the user activity on AWS
Worked on Terraform for building, changing and versioning infrastructure and collaborating on the automation
of AWS Infrastructure
Created and wrote shell scripts (Bash), YAML and PowerShell for automating tasks
Experience in building DevOps Dashboard by integrating various toolchain tools using technologies like Splunk, ELK
Implemented and Integrated SONAR QUBE with Jenkins and Azure DevOps to check for Code Quality when
creating a build
Synchronized users and groups of Active directories to Google Workspace
To be cost-efficient on AWS migrated the instances from older T2 & R4 to the latest T3a and R5a
Converted the EBS volumes from gp2 to gp3 to have control over the IOPS rate which helped in making
the application processing work faster and cost-effective
Migrated a few repositories from Nexus Repository V2 to V3 and implemented AWS S3 as blob storage for
Nexus Repository V2
Created and maintained the OpenVPN on AWS to access the private resources on AWS in initials pandemic times
Worked on the feasibility of OpenShift in the existing application architecture style, with Podman and CRI-O as
the container runtime
Responsible for leading a team of 4 people tasked with improving applications deployments using CI/CD Tools
Involved in effectively operating within diverse and cross-functional groups
Responsibilities: -
Automating Manual deployments using Bogie Pipeline and making them PAR-ready for production
Designed blue/green deployment for multiple applications
Migrating an On-Premises Windows System Application to the Cloud
Managing GitHub repositories and permissions, including branching and tagging
Managing, improving, and monitoring cloud infrastructure on AWS, EC2, S3, Route53, Cloud formation and RDS
Working on AWS Auto Scaling to provide high availability of applications and EC2 instances based on the load of
applications by using Cloud Watch in AWS
Created custom CDK constructs to encapsulate reusable patterns and components for different projects
Used JIRA for all our projects in scrum methodology for creating stories and giving points to the stories and updates
Working on designing, developing and implementing of decommissioning & re-provisioning process and Virtual
Machine using bash and Python Flask as framework
Hands-on administrative experience with the installation of packages and patches on UNIX and Windows servers.
Manage AWS EC2 instances utilizing Auto Scaling, Elastic Load Balancing and Glacier for our QA and UAT
environments as well as infrastructure servers for Git and Chef
Managed Chef Cookbooks to automate system operations
Manage configuration of Web App and Deploy to AWS cloud server through Chef
Interact with developers and Enterprise Configuration Management Team for changes to best practices and tools to
eliminate non-efficient practices and bottlenecks
Coordinate with Release Management regarding appropriate system releases among other development platforms.
Maintained IIS webserver during deployments and production for .net application
Created batch files for .net applications to automate the deployment
Designed the chef cookbooks to automate system operations
Developed IIS Web Servers in Windows system Servers 2016
Created & updated security groups in multiple VPC’s using Nimbus deployment
Created and Updated Cloud Formation Templates to deploy stacks in the cloud
Configured Bridger (List Screening Application) in the servers testing the functionality and helping above 200 users
screen customers
Worked on the CI/CD pipeline for the application which starts from unit testing to production and various stages
involved in it
Created TOSSG documentation for the application with further troubleshooting tips & all details
Working on automation of Jenkin jobs on the Cloud Formation Stacks and chef server Jobs to save time and to be
cost- effective
Performing blue/green deployment techniques to reduce downtime of the application
Works on SSL certificate which includes ACM & Entrust certificate to provide a Secure Connectivity system from end-
to-end connectivity
Working on EBS volume management and snapshots and their usage
Working on Automating DB snapshot migration from one region to another in the Cloud
Develop system architecture and set up SMTP mail server access to the end users
Works with Jira to track the issues and stories
Working on automating Windows server patches downloading from Antifactory like Jfrogg
Configured SPLUNK and Datadog Alerts and created Dashboards for Monitoring. Integrated pager duty with Datadog
to create incidents based on the monitoring results
EBS Volumes management and snapshots for backups using Terraform scripts and deploying them to different
regions based on the requirement
Used JIRA for all our projects in scrum methodology for creating stories and giving points to the stories and updated
them
Maintained IIS webserver during deployments and production for .net applications