Hi, I am a Cloud Architect. I deploy and manage highly available multi-AZ and disaster-proof cross-region applications and databases. I love to provide solutions.
Core Skills
• AWS Virtual Private Cloud (VPC)
• AWS CloudFormation
• Elastic Compute Cloud (EC2)
• Elastic Load Balancer (ELB)
• Auto Scaling Groups (ASG)
• Relational Database Service (RDS)
• ElastiCache
• Dynamo DB
• Dynamo DB Accelerator (DAX)
• AWS CLI
• AWS SDK boto3
• AWS Route 53
• Simple Storage Service(S3)
• S3 Glacier
• Amazon Elastic File System (EFS)
• Amazon FSx
• Identity and Access Management (IAM)
• AWS Cloudwatch
• AWS CloudTrail
• Simple Queue Service (SQS)
• Simple Notification Service(SNS)
• AWS Lambda
• AWS Config
• Amazon Cloudfront
• AWS Athena
• AWS Direct Connect (DX)
• Amazon Security Token Service (STS)
• Web Application Firewall (WAF)
• AWS Backup
• Data Migration Service(DMS)
• Amazon Schema Conversion Tool (SCT)
• Key Management Service (KMS)
• AWS Aurora
• AWS Shield
Additional Skills
• Python
• Bash and PowerShell Scripting
• AWS SnowFamily
• AWS Kinesis
• API Gateway
• Amazon Cognito
• Amazon Redshift
• AWS Glue
• AWS Neptune
• Amazon Elastic Search
• AWS Identity Federation
• Resource Access Manager (RAM)
• AWS Single Sign-On (SSO)
• AWS Secretes Manager
• SSM Parameter Store
• AWS Cloud SHM
• AWS Private Link
• Data Migration Service
• Step Functions and SWF
• Elastic Map Reduce (EMR)
Past Experience
• Deployment of Java application using EC2 and RDS with cross-zone load balancing, auto-scaling.
• Deployment of highly available multi-AZ and disaster-proof cross-region applications and databases.
• Infrastructure as a code with CloudFormation.
• Bastion Server with an internet gateway, route tables, and NAT gateway
• Private hosted zone in VPC with Route 53
• Network Access Control List and Security Groups for the security of subnet and EC2 instances.
• Management of Route 53 with various types of policies, including weighted, latency-based, geo-location-based, and failover policies.
• Custom AMI creation for EC2
• S3 Pre-sign URLs using AWS CLI tool
• Lambda Functions with boto3 SDK
• Encryption, versioning, cross-region replication for S3 buckets
• Writing custom S3 JSON policies such as an S3 bucket policy which allows only encrypted files to be uploaded on the bucket.
• Cross-region resource sharing for static websites hosted on different S3 buckets
• Writing custom IAM policies
• S3 with Multifactor Authentication (MFA) delete, S3 logging.
• S3 lifecycle management and event notifications
• High availability with Cloudfront CDN
• Cloudfront signed URL for premium content delivery
• Message visibility and dead letter queue in SQS
• First in first out (FIFO) pattern for SQS
• SQS + Auto scaling of the application instances which are processing the SQS messages.
• SNS fan-out pattern
• Cross Region table replication for Dynamo DB
• High availability of RDS using Standby instance and read replicas.
• Analyzing various AWS logs with Athena