AWS (Amazon Web Services)
System Engineer II
- Created Python applications to manage user lifecycle.
The code runs using Lambdas and are triggered by an Event Schedule,
and SQS (message queues) to trigger subsequent Lambdas.
The applications query a 3rd party API, along with an internal API to calculate,
and manage user lifecycle, and keep groups in sync.
AWS: Lambdas, DynamoDB, Cloudwatch, EventBridge, SQS, S3, IAM policies and Roles, Secrets Manager.- User Provisioning
- User Deactivation
- Rapid Termination
- Group synchronization
- Collecting 3rd Party activity logs
- Creating Alarms, and Dashboards
- Developed CI/CD pipeline written in Typescript to generate a Docker image and deployed a
containerized app managed by Kuberenetes using Fargate (Serverless computing).
The code would build a Docker Image by installing the 3rd party's RPM on an Amazon Linux 2 (OS)
Base Image, along with configuration files to build a Docker image.
The containerized applications allowed for a secure connection between data sources, and
Software as a Service (SaaS).
AWS: EC2, VPCs, NATs, IGW, ELastic IP, Subnets, EKS, Fargate, CloudWatch, NLB, Security Group, Secrets Manager, ADOT (AWS Distro for OpenTelemetry)
: External Secrets Operator (Kubernetes operator), Python, Bash, AWS CDK, Helm.- Dashboards and Alerting (CloudWatch)
- Log Collection from containers using FluentBit deployed as a sidecar
- Enabling VPC peering to establish a secure connection to internal business units data sources.
- Automated the deploying, maintaining, and upgrading both On-premises SaaS
offering, and the AWS infrastructure running the SaaS offering.
AWS: EC2, VPCs, NATs, IGW, ELastic IP, Subnets, CloudWatch, NLB, Security Group, Secrets Manager, AWS Redshift, RDS, S3.
: MongoDB, Windows and Linux EC2s, JSON, AWS CDK.- Bluescape (on-premises)
- Tableau Server (on-premises)
- Configuring Single-Sign-On both in SAML or OIDC protocols.
- Bluescape (on-premises)
- Service Now (SaaS)
- Tableau Cloud (SaaS)
- Adobe Target (SaaS)
- Adobe Analytics (SaaS)
- Tableau Server (on-premises)
- Evaluate 3rd party SaaS offerings to onboard for our AWS internal users.
- Creating System Designs for Core integrations (user lifecycle, log collection, Monitoring and Alerting)
- Creating Threat Models to review with security for vulnerabilities.
Bloomberg L.P.
Senior Backend System Engineer
- Maintained and helped develop Python service used to coordinate maintenance windows for 400+ servers, 40+ clusters. The service was used across the engineering teams to pull server maintenance window information. The service and client were using the Simple Object Access Protocol (SOAP), lightweight xml.
- Server lifecycle management - commission and decommission of our backend servers using Ansible, and Ansible Tower. Involved in scripting, monitoring, troubleshooting, debugging.
- Created a Python script to obtain backend server diskspace usage, across 400+ Backend servers. Help with visibility, budgeting and purchasing diskspace.
Bloomberg L.P.
Front End System Engineer
- Created two Python scripts, to start and stop fix servers. The generic scripts read a configuration file with a list of server names to start and stop. This reduced the need to create separate start and stop scripts for each fixed server instance. Greatly improve efficiency.
- Developed a script to process all incoming FTP files. The bash script processes incoming FTP files based on account logins and engineering teams requirements. The script takes the account login as an argument, it reads a pipe delimited configuration file. An entry of the Account login is entered in the configuration file. The script helped to reduce the time needed to set up new incoming FTP accounts by more than 70%.
Bloomberg L.P.
Senior Operations Support Analyst
- Wrote a bash script to generate a status report of the health of over 500+ servers. The Unix Script helped to automate the need for operators to manually run status check commands on every server. Eliminating the need for daily operational tasks.