Talent's Information
-
Location
Hyderabad, India
-
Rate
$12.0 per Hour
-
Experience
9.5 Year
-
Languages Known
English,Hindi
Available for
Background Verification
40 Hr/Week
About Paramesh
A performance driven ambitious software developer with an extraordinary blend of and technical knowledge. Ability to communicate and motivate team members to enhance strategic goals and bottom line objectives. Creative problem solving and troubleshooting skills complemented by meticulous attention to details that will result in the success of an organization by developing new applications or improving existing ones.
Work Experience
Azure Devopes
- January 2015 - February 2023 - 8 Year
- India
Projects
RISO
- January 2017 - January 2018 - 13 Months
Technologies
Role & Responsibility
-
Worked on ACM certificates, such as creation, validation and uploading in Load balancers.
Worked on validation of certs that through the DNS or Mails as per requests.
Worked on IAM policies for providing access to required buckets.
Customizing the IAM policies as per requirement.
Worked on AWS backup policies as per Organization policy, configured for each AWS account.
Rotation of Access key and Secret keys if they are old as 120 days, coordinating with respective teams and rotating as per requirement.
Copying the data between the EFS.
Creating Elastic cache of both Mem and Redis cache, both read and write caches and providing the urls as requested.
Copying the data between the S3 buckets, which are in both different accounts.
Configuring the SSM agents on the AWS servers as per requirement.
Sharing the RDS images encrypted with Kms keys between the AWS accounts, by generating the custom KMS keys.
Domain registration in AWS.
Configuring the custom Url instead of default cloudfront url.
Configuring the Peering activity on Transitgateways.
Configuring SSM agent on the servers for connecting from AWS console.
Invalidating the S3 objects through Cloudfront.
Enabling the version for S3 bucket, for pushing up the latest updated information from Cloudfront.
Configuring simple AD for launching workspace.
Creating the Workspace as per the requirement.
Configured S3 bucket policies as per requirement.
Configured S3 ACL based on bucket & as well as individual objects.
Searching logs from CloudTrails based on the incident occurs.
Able to configure the organization, add and inviting the accounts into the master account and required.
Able to configure aws config, depend on the requirement.
Configuring the Route53 in aws depending on the requirement, such as simple and weighted policies.
Configuring the Route 53 end points for DNS issues on premises.
Able to configure the IPsec connection between AWS to Azure.
Worked on Paloalto migration project in AWS.
There was a VGW deprecation got happened in AWS, we have almost 15 tunnels for that particular vpc, For that we have configured a virtual paloalto in same vpc we migrated all tunnels on paloalto for temporary purpose. Later we migrated all tunnels back to AWS VGW.
Worked on OCI cloud as well, configuring VCN, security lists, NatGateways, Fastconnect, subnets.
Worked on Migration projects from on prem to OCI.
Configured VCN peering between two different regions through DRG.
Worked on OCI migration projects also.
Customize the OS images and lunching the server as per requirement.
Worked on CCNP level projects also, by maintain the local network of our company. Which includes wireless devices.
Cloudformation for creating the infra env based on the requirements.
Envirotese
- January 2019 - January 2021 - 25 Months
Technologies
Role & Responsibility
-
Building Vnet, Resourcegroups, subscription, Aks, Application gateways, front door for the complete application requirement on Azure cloud.
Building Pulse secure vpn solution on cloud for VPN connectivity for the development team.
Worked on configuring database like postgresql single server & flexible servers, adding the required vnet subnet into the database for connectivity.
Restoring the databases based on the requirements form DB.
Configuring the firewall rules for connectivity of database for AKS and public ips.
Configuring the NSG rules both Inbound and outbound based on company policies.
Configuring the Vnet peering between the two different Vnet for communication.
Configuring the ingress file for connectivity to Application gateways.
Configuring the probes on Application gateway to make sure the health checks looks good.
Configuring the custom DNS name for the application gateway.
Configuring the Azure keyvault for storing the password files.
Configuring the Azure keyvault for specific access only.
Creating the projects in Azure devops. Creating the users gitlab.
Creating the Repos.
Creating the Wiki page to consolidate the project information at one location.
Creating the different projects.
Creating the users and associating the users to respective users.
Adding the users into into admin roles based on the requirements.
Creating the storage accounts, configuring the static websites.
Restricting the storage access to specific network.
Configuring the CROS on storage accounts based on needs.
Using Azure storage explorer to copy the data from one storage account to another.
Providing the contributor & read roles to respective users based on the needs.
Creating the service connections to respective accounts for deploying the services.
Building the Prisma scan into the pipelines for scanning the container images.
Based on the alerts reported by the Prisma scan started working with dev team and updating the based images from our side.
Configuring the Private DNS and Global DNS based on the needs.
Deploying the configuration into webapps services.
Configuring the webapps into the private zone.
Redeploying the AKS pods based on requirements.
Deleting the deployments and deploying them again.
DEVOPS:
Worked on Terraform for implementing based on requirements.
Building the AWS (codecommit, artifacts, build, deploy & configuring pipelines) and Azure Devops pipelines
Worked on Terraform Template modules for Load Balancer
Worked on Automation scripts for seamless domain join process for compute instances.
Worked on automation for IAM Policy Assessment resource creation
Linux Environment
- January 2020 - January 2021 - 13 Months
Role & Responsibility
Planning and installation of Redhat, Cent OS, Fedora and Ubuntu Linux.
Kick-start installations of the Workstations through Kick start server.
Configuring the private repository for accessing the packages with YUM.
Creation of new users, groups, user passwords, changing passwords, managing user accounts and locking users and managing password aging policies.
Responsible for monitoring and maintaining Linux Servers and Cluster Services deployed and ESX Servers using ground works.
Remote login using putty, ssh etc.,
Setup SSH password less login in OpenSSH.
Configuring the LVMs and adding the additional disk space as and when required.
Prerequisites verification before go live like rpm's, creation of users, compilations, oracle prerequisites, tuning kernel parameters, setting users limits.
Installation and configuration of monitoring agents on Servers.
Performing on system backups, file replications, script management for server and Media usage.
Providing work/ effort estimates to Manager for effective planning.
Maintaining and extending system monitoring frameworks.
Developing and implementing administration standards and procedures.
Configuring Send mail to Send emails from the Servers.
Monitoring Instance Refreshes together with user Management and documenting.
Updating to Clients on regular basis and Managing Escalations/ Issues as per SLA’s defined.
Scheduling of Maintenance Tasks.
Monitored System Activities like CPU, Memory, Disk and Swap space usage to avoid any performance issues
Providing on-call support in emergencies.
Done upgraded OS from OEL 5.6 to OEL 6.6.
Configuring Monitoring Agents and configuring the servers with Monitoring Tool.
Securing the Apache Hosted Servers using Nessus to Check the Vulnerabilities and fixing them.
Making the IP’s as static as per the requirement.
Installation of required Operating System on VM Hosts as well as on Physical Servers.
Perform daily backup operations, ensuring all required file systems and system data are successfully backed up to the appropriate media, recovery tapes or disks are created, and media is recycled and sent off site as necessary.
Verifying & Troubleshooting Printer connectivity issues and Monitoring Print Queues.
Actively engaged in troubleshooting efforts for OS, network, and/or applications
Analyze the performance of the UNIX system to identify memory, disk I/O and network problems using ps, vmstat, top, netstat and iostat values.
Windows Environment
- June 2021 - January 2022 - 8 Months
Role & Responsibility
-
Experience on giving remote support across the globe.
Windows server support and management duties include systems administration, monitoring and management.
Provide support on Enterprise & standard Edition of Windows 2003, 2008, 2012 and 2016
Configuring and managing active directory service (ADS).
Assisting on Virtualization and Backup solutions for Backup Disaster Recovery.
Involved in Transition projects like windows 2000 to 2003 & 2003 to 2008R2 & 2008 to 2012.
Experience on Decommission and promotion of a DC.
Troubleshooting AD Replication, FRS, Folder Redirection issues.
Securing servers/desktops using Group policies and restricting access.
Troubleshooting DNS, DHCP, and Network Connectivity and TCP/IP configuration issues.
Installing & configuring different services like TCP/IP, DNS, and DHCP.
Symantec End Point Anti-virus updates maintenance on all desktops and server.
Installing and administering network printers.
Managing replication through between active directory sites.
Managing file system security through NTFS permissions.
Implementing group policies.
VM Ware Administration likes Creating and Managing VM’s, troubleshooting any Issue’s with Vm ware through Virtual Infrastructure Client (VIC)
Virtual Environment:
- January 2021 - January 2022 - 13 Months
Role & Responsibility
-
Installing ESXi software on hard ware. Adding the new server to the environment.
Installing Vcentre on windows server 2008 for managing the all ESXi hosts. Creating the datacenter, clusters and adding the hosts into the clusters. Creating the cluster under datacenter.
Perform the patching on the ESX server when ever required.
For antivirus we installed Macfee SVA agents on each ESXi machine which will be communicated to Vcentre and Vsheild. All these agents are monitored through Macfee EPO.
VDI (Virtual desktop Infrastructure):
Maintaining the VDI infrastructure through Vconnection, Vsecurity. With the help of Vconnection users will login into the VDI environment. Vsecurity connection will help the users to connect remotely without connecting to SSLVPN.
Week end activities applying the patches to ESXi servers.
Soft Skills
Industry Expertise
Education
in B.A
Hyderabad University- June 2005 - June 2008