DevSecOps Lead Engineer with 11+ years of experience driving secure, scalable, and automated solutions across multi-cloud environments (AWS, Azure, GCP). Proven expertise in embedding security into every stage of the SDLC through CI/CD pipeline automation, vulnerability management, and compliance frameworks. Hands-on with AWS services (EC2, S3, RDS, Lambda, IAM), Azure DevOps pipelines, and terraform for infrastructure as code. Strong background in containerization with Docker, Kubernetes orchestration, and implementing GitOps workflows. Skilled in integrating DevSecOps tools for SAST, DAST, SCA, and secrets management (Vault, AWS Secrets Manager) while ensuring adherence to CIS, NIST, and ISO standards. Experienced in managing messaging and streaming platforms like Kafka and MQTT, and optimizing caching with Redis. Adept in monitoring and observability using CloudWatch, ELK, Prometheus, and Grafana. Recognized for leading cross-functional teams, improving cloud security posture, and mentoring engineers in DevOps and security best practices.
Overview
12
12
years of professional experience
3
3
Certification
Work History
DevSecOps Engineer
Dolf Technlogies Pvt Ltd
03.2018 - Current
Designed and managed multi-cloud infrastructure on AWS and Azure with high availability and disaster recovery.
Implemented Azure DevOps CI/CD pipelines for automated build, test, and deployment across microservices.
Designed and implemented highly available, scalable cloud architectures on AWS and Azure, including VPC/VNet design, networking, IAM, security groups, load balancers, and multi-AZ deployments.
Automated provisioning of AWS services (EC2, S3, RDS, IAM, VPC, Lambda) using Terraform. Secured AWS IAM roles, policies, and access keys to enforce least-privilege access.
Defined cloud architecture standards and best practices, ensuring optimized performance, security, scalability, and cost efficiency across environments.
Developed and maintained PowerShell and Bash automation scripts to automate infrastructure provisioning, deployments, system maintenance, and operational tasks.
Configured Azure Application Gateway and Key Vault for secure application delivery and secrets management.
Performed Linux performance tuning and troubleshooting, analyzing CPU, memory, disk, and network bottlenecks using tools like top, htop, iostat, vmstat, and netstat.
Developed PowerShell scripts to automate cloud resource management, application deployments, server provisioning, and configuration tasks, reducing manual effort and deployment time.
Monitored AWS CloudWatch and Azure Monitor to track system health, cost, and security compliance. Enabled infrastructure as code (IaC) for repeatable deployments with Terraform and Azure ARM templates. Conducted cloud cost optimization and rightsizing strategies for AWS/Azure workloads.
Administered and supported Linux systems (Ubuntu, RHEL, Amazon Linux), including user and permission management, patching, performance tuning, and troubleshooting production issues.
Created reusable PowerShell modules and functions for environment validation, health checks, monitoring, and reporting across multiple servers.
Integrated PowerShell automation with CI/CD pipelines (Azure DevOps/GitHub Actions) for infrastructure provisioning, application releases, and operational workflows.
Deployed and managed Docker containers for microservices applications.
Built scalable and resilient Kubernetes clusters (EKS, AKS) for production workloads. Implemented Helm charts for Kubernetes package management and deployment standardization. Configured Kubernetes RBAC policies and NetworkPolicies for workload security.
Integrated service mesh (Istio/Linkerd) for traffic routing, observability, and zero-trust networking. Enabled autoscaling (HPA/VPA) and optimized cluster resource utilization.
Implemented secure container image scanning with tools like Trivy.
Built and maintained Jenkins pipelines for continuous integration and automated deployments.
Integrated SonarQube, Checkmarx, OWASP Dependency-Check for code quality and vulnerability analysis. Automated infrastructure provisioning and app deployment with Azure DevOps YAML pipelines.
Implemented error handling, logging, and security best practices in PowerShell scripts, including credential management, role-based access, and script performance optimization.
Built and managed CI/CD pipelines using Azure DevOps, GitHub Actions, and Jenkins to enable reliable and automated application deployments.
Managed patching, security hardening, and OS upgrades, applying CIS best practices, configuring firewalls, SELinux, and ensuring compliance across environments.
Integrated SAST, DAST, and SCA tools into CI/CD for early vulnerability detection. Deployed HashiCorp Vault and AWS Secrets Manager for secure secrets management. Configured static code scanning and container vulnerability scanning in pipelines.
Implemented compliance frameworks (CIS Benchmarks, NIST, ISO27001) in cloud infrastructure. Deployed SIEM tools (ELK Stack, Splunk, Wazuh, AWS GuardDuty) for threat detection and monitoring. Secured APIs with OAuth2, JWT, and API Gateway policies.
Automated log management, backup verification, and cron-based maintenance tasks, ensuring system stability and high availability.
Performed penetration testing and security audits across CI/CD workflows. Implemented Shift-Left Security practices to embed security early in SDLC. Designed real-time messaging and streaming pipelines with Apache Kafka. Integrated MQTT brokers for IoT device communication and data ingestion. Configured Redis caching for performance optimization and session management.
Implemented Infrastructure as Code (IaC) using Terraform, ARM templates, and CloudFormation for consistent, version-controlled infrastructure management.
Tuned Kafka topics, partitions, and consumer groups for high-throughput event streaming. Secured Kafka and MQTT communication with TLS encryption and ACL policies.
Implemented Prometheus and Grafana for monitoring containerized workloads. Integrated ELK logging stack for centralized log management and troubleshooting.
Monitored and optimized systems using CloudWatch, Azure Monitor, Prometheus, and ELK, enabling proactive alerting and improved system reliability.
Automated incident response and alerting with PagerDuty/Slack integrations. Deployed NewRelic for full-stack observability and performance insights.
Enabled auto-healing and self-remediation scripts for critical infrastructure failures.
Implemented security and compliance controls, including IAM governance, secrets management, backup strategies, disaster recovery, and vulnerability remediation.
Led cross-functional DevSecOps teams to align cloud-native security and DevOps best practices. Mentored engineers on cloud, DevOps, security, and automation tools, improving team productivity and compliance.
Cloud Engineer
Edgerock Software Solutions
06.2014 - 02.2018
Deployed and managed multi-tier applications on AWS using services like EC2, S3, RDS, and VPC, ensuring scalability, security, and availability.
Automated infrastructure provisioning using Terraform and Ansible, significantly reducing manual deployment errors and improving delivery timelines.
Migrated critical on-premises workloads to AWS with multi-region and multi-AZ architectures, improving uptime and disaster recovery readiness.
Designed and implemented CI/CD pipelines using Jenkins, AWS CodePipeline, and CodeBuild, minimizing manual intervention and speeding up release cycles.
Set up and managed Kubernetes clusters (EKS) to orchestrate containerized applications, improving resource allocation and operational agility.
Conducted infrastructure security hardening by designing fine-grained IAM policies, managing roles, and configuring Security Groups and NACLs.
Architected and enforced backup strategies using AWS Backup and snapshot policies to meet stringent RTO/RPO compliance requirements.
Integrated advanced monitoring and alerting tools such as CloudWatch, Nagios, and Grafana to proactively manage system performance and health.
Configured Auto Scaling Groups and Application Load Balancers (ALB) to ensure dynamic scaling and high availability for customer-facing services.
Delivered technical workshops, playbooks, and operational documentation to onboard new team members and enhance DevOps team productivity.
Analyzed system logs, performance metrics, and user feedback to proactively troubleshoot and resolve complex infrastructure and application issues.
Performed regular RDS database administration tasks including maintenance, backups, monitoring, parameter tuning, and version upgrades.
Developed custom automation scripts (Bash/Python) for routine operations like log cleanup, user creation, and environment setup.
Provided expert L2/L3 support, escalating critical incidents as needed and ensuring minimal downtime with root cause analysis and quick recovery.
Participated in on-call rotations and maintained SLAs by promptly responding to alerts and supporting incident management workflows.
Strengthened system and network security through implementation of firewalls, antivirus systems, VPN configurations, and port restrictions.
Authored and maintained AWS infrastructure documentation, including architecture diagrams, runbooks, and operational procedures.
Continuously monitored AWS workloads using CloudWatch metrics, dashboards, and alarms to ensure optimal performance and availability.
Enforced disaster recovery best practices, conducted periodic data backup and restoration drills, and ensured compliance with IT audit requirements.
Proactively reduced infrastructure costs and improved performance by identifying and decommissioning underutilized resources.