Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Uche Anyanwu: AWS S A / AWS E /C E

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3
At a glance
Powered by AI
The applicant has extensive experience as an AWS Solutions Architect and Cloud Engineer, with skills in infrastructure deployment, automation, security best practices, and cost optimization on AWS.

The applicant has expertise in areas such as infrastructure deployment, automation, security, identity and access management, monitoring, and orchestration on AWS.

At CDW Government LLC, the applicant implemented Ansible Tower for automation, deployed infrastructure using services like EC2, RDS, VPC, implemented security best practices, configured monitoring, and automated operational tasks.

UCHE ANYANWU

AWS SOLUTIONS ARCHITECT / AWS ENGINEER /CLOUD ENGINEER

Contact: 832-762-0201 Houston, Texas


junioruch2001@gmail.com
PROFESSIONAL SUMMARY
Certified and highly qualified AWS Architect/Cloud Engineer with extensive skills and experience with planning,
implementing, and maintaining system applications in Architect Cloud Computing, IT Management and Business
Development. Driven engineer motivated by collaborating and supporting technical teams in the areas of cloud
orchestration, security, identity, data analysis and access management. Significant knowledge of AWS best practices
and market trends pertaining to the Cloud.
EXPERIENCE

AWS Devops Engineer March 2022 – till date


CDW Government LLC
• Implemented and managed Ansible Tower to scale automation and handle complex deployments.
• Infrastructure deployment on AWS by employing services such as EC2, RDS, CloudFront, VPC, Cloud Watch, etc.
• Consistently remediated Trusted Advisor findings using Amazon Cloud Watch events and AWS Lambda.
• Developed terraform modules and Cloud Formation templates to provision infrastructures in the cloud.
• Organized Guard Duty across our Control Tower managed organization with the Audit account being the delegate administrator.
• Leveraged AWS Control Tower to set up and govern a secure, multi-account AWS environment.
• Facilitated system manager to automate operational tasks across Well AWS infrastructure.
• Implemented and managed continuous delivery systems and methodologies on AWS.
• Designed, secured, and cost optimized, highly available and fault tolerant infrastructure in AWS.
• Successfully deployed and configured infrastructure using Ansible.
• Setup and customized log files for detail monitoring and alerts notification when changes are made.
• Configured CloudWatch alarm rules for operational and performance metrics for our AWS resources and applications.
• Leverage automated DevOps tools deployment and blue-green deployment patterns and strategies.
• Configured CI/CD Pipelines using Jenkins connected to GitHub and build environments (Dev, Stage & Prod).
• Managed provisioning of AWS infrastructures using CloudFormation and Terraform.
• Integrated Ansible control with nodes and deployed playbooks to automation configuration of servers across environments.
• Built and maintained automated CI/CD processes for applications with Jenkins, eliminating up to 70% of manual work which
reduced human error and speed up production.
• Designed, built, installed and configure Red Hat Enterprise Linux servers workstations and VM’s.
Solution Architect/AWS Devops Engineer Nov. 2019- March 2022
McKinsey& Company

● Continuously used AWS budgets to set custom budgets for tracking costs and usage of resources AWS account.
● Set up alerts via email when forecasted/actual cost and usage exceed budget threshold.
● Facilitated AWS Identity and Access Management (IAM) to manage access to AWS services and resources.
● Performed Multi-Factor Authentication (MFA) for extra protection of the environment.
● Successfully used Amazon’s unlimited simple storage service (S3) to host a static website where individual web pages
include static content.
● Used S3 to store developer codes before hosting them on virtual servers (EC2) for dynamic web apps.
● Designed an isolated virtual network that launched AWS resources using Amazon’s Virtual Private Cloud.
● Created a public and a private subnet- used the private subnet for databases to protect the resources from the internet -used
the public subnet for web servers.
● Designed highly available infrastructure using Elastic Load Balancer and Auto-Scaling for web servers, which scale out
and in automatically when demand needed, also isolated environments by having security groups and NACL across
Subnets and EC2 Instances.
● Demonstrated use of database Migration Service (DMS) to securely and safely migrate data to AWS platform from
on-premises.
● Used Amazon’s Route 53, a highly available and scalable cloud Domain Name System (DNS) web service to route end
users to my demo application using a custom domain name I bought in AWS.
● Implementing version control services using GIT to create repository, store, and track changes in source code during
software development.
● Design, develop and implement DevOps capabilities across various project teams.
● Install, configure, and maintain all tools needed to accomplish the following DevOps functions: source control
management, CICD (continuous integration, deployment) pipeline, monitoring, repository management, provisioning,
release management, logging, building, testing, containerization, collaboration, and security.
● Used Cloud Endure to migrate on-premises workloads to AWS Cloud.
● Leveraged Docker to build, test and deploy applications in different environments.
● Managed provisioning of AWS infrastructures using CloudFormation and Terraform.
● Migrated all local Linux user and system accounts to Active Directory based authentication.

Cloud Architect/ Devops Engineer Feb. 2018- Oct. 2019


Cox Communications Inc.

● Responsible for launching Amazon EC2 instances using Amazon web services and configuring launched instances with
respect to specific applications and regions.
● Installed applications on AWS EC2 instances and configured the storage on S3 buckets. Responsible for S3 buckets, bucket
policies and IAM role-based policies creation.
● Responsible for creating EBS volumes and building servers using importing volumes.
● Responsible for creating Security Groups as well as Network access control lists, load balancers in the defined virtual private
network. Responsible for creating CloudWatch alarms, events and notifications using SNS.
● Involved in migrating and implementing multiple applications from on premise to the cloud using services such as
CloudFormation, S3, Route 53, EC2, RDS, Lambda, VPC and SMS.
● Monitored end-to-end infrastructure using CloudWatch and SNS for notification.
● Used AWS system manager to automate operational tasks across AWS resources.
● Project Management -AWS Infra design & application migration.
● Developed and documented security guardrails for AWS Cloud environment
● Managed provisioning of AWS infrastructures using CloudFormation and Terraform.
● Creating Docker environment via Docker hub and managing different Docker images and deployment of applications inside
container.
● Implementing version control services using GIT to create repository, store, and track changes in source code during software
development.
● Design, develop and implement DevOps capabilities across various project teams.
● Install, configure, and maintain all tools needed to accomplish the following DevOps functions: source control management, CICD
(continuous integration, deployment) pipeline, monitoring, repository management, provisioning, release management, logging,
building, testing, containerization, collaboration, and security.
● Built and configured Linux servers from scratch with type one hypervisors for virtualization and network components.

AWS Engineer/Architect Oct. 2013 – Feb. 2018


Seadrill Americas

• Optimized cost through reserved instances, selection and changing of EC2 instance types based on resource need, S3 storage
lasses and S3 lifecycle policies, leveraging Autoscaling.
• Leveraged EC2 Lifecycle Manager to create snapshots of EBS Volumes on scheduled intervals for backup and define a retention
period as a cost saving measure.
• Configured CloudWatch alarm rules for operational and performance metrics for our AWS resources and applications.
• Configured S3 events to set up automated communication between S3 and other AWS services.
• Designed highly available infrastructure using Elastic load balancer and auto-scaling for web servers Performed isolated
environment by having security groups and NACL across subnets for EC2 instances.
• Worked closely with teams to design and develop technically compliant, cloud-native enterprise architectures to meet business
outcomes.
• Performed architecture/design reviews for applications, infrastructure, and network designs.
• Managed provisioning of AWS infrastructures using CloudFormation and Terraform.
• Managed and monitored mission-critical systems for optimal performance and high level of availability.
• Implemented security best practices in AWS including multi factor authentication, access key rotation, role-based
permissions, enforced strong password policy, configured security groups and NACLs, S3 bucket policies and ACLs, etc.

EDUCATION

Bachelor of Engineering: Electrical/Electronic Engineering Port Harcourt,


Nigeria
University of Port Harcourt August 2004

TECHNICAL SKILLS

Governance & Compliance Identity & Access Management


AWS Config. Rules, AWS Organization, AWS Organization, AWS IAM, Single
AWS Control Tower, AWS Trusted Sign-on (SSO), Active Directory, AWS
Advisor, AWS Well Architected Tool, Workspaces, AWS Secrets Manager,etc.
AWS Budgets, AWS Landing Zone,
patch management etc.

AWS Security Monitoring & Event Management


AWS Security Hub, Guard Duty, AWS Shield, AWS Cloud Watch, AWS SNS, AWS SES
AWS-Firewall Manager, AWS Inspector.

Data Protection Network


AWS Certificate Manager, Encryption, Snapshot, VPC, VGW, TGW, CGW, IGW, NGW, etc.
Lifecycle Manager,

Programming Languages Cloud Orchestration and automation


Bash, JSON, YML, Shell, Python Ansible, AWS, CloudFormation, Terraform,
System Manager

AWS
Identity and access management (IAM), EC2, S3
Storage Services, Databases, DNS using Route 53,
VPCs, ELB, Autoscaling, CloudFront,
CloudWatch, CloudTrail, Data Migration Service,
SNS, DMS and Cloud Endure -(MGN)

REFERENCES AVAILABLE UPON REQUEST

You might also like