0% found this document useful (0 votes)
11 views5 pages

Azizul Maqsud - AWS

Azizul Maqsud is a seasoned DevOps and Site Reliability Engineer with over 6 years of experience in multi-cloud environments, specializing in Kubernetes, AWS administration, and CI/CD pipelines. He has a proven track record in optimizing application performance, cost management, and implementing security best practices across various industries, including E-commerce and Financial Services. His expertise includes automation tools like Terraform and Ansible, as well as monitoring solutions such as Prometheus and Grafana.

Uploaded by

Ghaffar Baig
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views5 pages

Azizul Maqsud - AWS

Azizul Maqsud is a seasoned DevOps and Site Reliability Engineer with over 6 years of experience in multi-cloud environments, specializing in Kubernetes, AWS administration, and CI/CD pipelines. He has a proven track record in optimizing application performance, cost management, and implementing security best practices across various industries, including E-commerce and Financial Services. His expertise includes automation tools like Terraform and Ansible, as well as monitoring solutions such as Prometheus and Grafana.

Uploaded by

Ghaffar Baig
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

AZIZUL MAQSUD (USC)

DevOps Engineer | Site Reliability Engineer | Infra Support Engineer | Automated Deployment Engineer | AWS Administrator |

📧 go2azizul.aws@gmail.com | 📞
AWS Solutions Architect Professional | AWS Community Builder
330-474-9060 |
LinkedIn https://www.linkedin.com/in/azizul-maqsud/
📍 Woodbridge, VA 22191

YouTube www.youtube.com/channel/UCNwP7KEElaJ7cdDTLP-KbBg
GitHub https://github.com/azizulmaqsud?tab=repositories
Hash node https://azizulmaqsud-1684501031000.hashnode.dev/
Medium https://medium.com/@azizulmaqsud

PROFESSIONAL SUMMARY
Results-driven DevOps and Site Reliability Engineer (SRE) with 6+ years of expertise in multi-cloud designing, deploying, and
managing Kubernetes (EKS, AKS, GKE, OpenShift) clusters, Helm charts, Karpenter for autoscaling, and Spinnaker for continuous
delivery. Strong expertise in cloud-native architectures, infrastructure as code (IaC), CI/CD pipelines, and optimizing Kubernetes
workloads for scalability and cost-efficiency. Proficient in AWS System Administration with optimizing application performance,
cost management, and enabling seamless cloud migrations. Expert in DevOps & SRE with bridging development and operations
with Jenkins, GitOps (ArgoCD), Docker, Kubernetes, Terraform, and Ansible. Demonstrated success in E-commerce and
Financial Services, delivering innovative, cost-effective solutions with strong troubleshooting and root cause analysis skills.

SOFT SKILLS
- Problem-Solving & RCA -Effective Communication - Self-Starter
- Leadership & Mentorship -Critical Thinking -Time Management & Flexibility

TOOLS & TECHNOLOGIES


Key Skills (years) AWS (9+), Azure (6+), SAAS (6+), Jenkins (6+), Ansible (6+), Terraform (6+), Docker (6+), ECS (6+), Kubernetes (6+),
Helm (6+), EKS (6+), AKS (6+), GKE (6+), Karpenter (6+), Spinnaker (6+), OpenShift (6+), HashiCorp Vault (6+), Lambda (6+), Postman API
Testing (6+), JIRA (7+), Git (7+), MySQL Workbench (7+), PostgreSQL(6+), DynamoDB (6+), SNS / SQS (6+), Bash / Shell (8+), PowerShell (8+),
Python (6+), Java (8+), Maven (6+), GitLab (6+), ArgoCD (6+), Glue (5+), RedShift (5+), RDS (7+), S3 (7+), CloudWatch (7+), EC2 (7+), ALB (6+),
NLB (6+), WAF (6+), Nginx (6+), Apache (6+)
Scripting/Language Core Java, JavaScript, Python, Golang, Gherkin, HTML, CSS, XML/JSON, Bash/Zsh, PowerShell, Shell Scripting
Framework/Model Spring Boot, Angular.JS, Express.JS, React.JS, Node.JS, MVC
Databases ORACLE, Microsoft SQL Server, MySQL Workbench, PL/SQL, MongoDB, DynamoDB
Operating Systems Windows, Linux, Unix, MacOS, Debian Ubuntu, Linux CentOS
Monitoring & Logging Prometheus, Grafana, Splunk, CloudWatch, PagerDuty, ELK, EFK, CloudTrail
IDE Eclipse, Postman, IntelliJ, VS Code, Cloud9, Mobaxterm

PROFESSIONAL EXPERIENCES
DevOps Engineer
AT&T – Plano, TX (Remote, Contract)
July 2022 – Present
Here, day-to-day activities, I do manage and support SaaS-based applications, including internal systems, vendor integrations,
customer-facing platforms, and operational tools. My focus includes delivering new projects, maintaining existing applications,
ensuring AWS administrative and security compliance, and optimizing AWS cloud costs. Key responsibilities include:
 participated in Agile ceremonies (sprint planning, daily stand-ups, retrospectives), documented issue resolutions, and led
weekly Root Cause Analysis (RCA) meetings to improve team efficiency and reduce recurring incidents.
 Designed and enforced SCPs to restrict AWS services and actions at the OU/accounts; implemented Just-in-Time (JIT) access,
temporary credentials, and attribute-based access control (ABAC) strategies.
 Managed and supported SaaS-based applications, including vendor integrations, customer-facing platforms, and internal
systems.
 Automated infrastructure provisioning using Terraform and CloudFormation, reducing deployment times by 30%.
 Defined, documented, and enforced Kubernetes best practices for deployment, security, and scaling; Optimized container
orchestration for high availability, performance, and cost efficiency.

Page
 Designed and deployed scalable, fault-tolerant architectures on AWS (Lambda, API Gateway, DynamoDB, EKS, ECS, RDS, S3).
Deployed Karpenter to replace Cluster Autoscaler, improving node spin-up time by 30-60 seconds and reducing over-
provisioning costs by 30%.
 Migrated monolithic systems to modern microservices architectures, integrating ALB and NLB for optimized traffic
management.
 Implemented High Availability (HA) and Disaster Recovery (DR) solutions, achieving 99.99% uptime.
 Configured and optimized networking components (DNS, Load Balancers, Reverse Proxies, Security Groups, TGW, and Linux OS
troubleshooting).
 Built and optimized CI/CD pipelines using GitLab CI, Jenkins, Docker, and AWS CodePipeline, increasing deployment efficiency
by 40%.
 Implemented GitOps workflows using ArgoCD and Helm, enabling zero-downtime deployments.
 Integrated AWS WAF to protect applications from SQL injection, XSS, and DDoS attacks.
 Developed and managed EKS clusters, optimizing performance and security.
 Automated AWS cost optimization strategies, reducing operational costs by 20% through auto-scaling, right-sizing, and spot
instances.
 Enhanced security compliance using HashiCorp Vault, AWS GuardDuty, Security Hub, and AWS Shield. Designed and managed
AWS networking infrastructure including Elastic Load Balancing (ALB/NLB), Direct Connect, and VPC endpoints for secure
hybrid cloud connectivity.
 Managed Prometheus Alertmanager alerts across environments; translated requirements into PromQL.
 Configured Datadog for infra monitoring, RUM & APM; Grafana, Prometheus, CloudWatch, and CloudTrail for observability and
logging.
 Designed multi-region AMIs using Packer, reducing deployment time by 50%.
 Migrated legacy applications to OpenShift (ROSA), improving developer productivity by 40%. Optimized CI/CD pipelines
with GitOps (ArgoCD) and OpenShift Pipelines (Tekton).
 Automated Linux (RHEL) server management and patching using Ansible.
 Integrated SonarQube (SAST) and Trivy (DAST) into CI/CD pipelines for enhanced security. Collaborated with security teams to
enforce IAM least-privilege policies, reducing vulnerabilities by 30%.
 Joined to SRE Team for on-call rotation, if anyone of SRE team went to vacation.
Key Achievements:
 Achieved 99.97% uptime through infrastructure automation and security best practices.
 Reduced security incident response time by 40% via automated threat detection.
 Minimized downtime by 30% using predictive scaling and optimized load balancing.
 Improved MTTR (Mean Time to Recovery) by 40% through automated observability and alerting strategies.
Environment & Tools:
Cloud & Infrastructure: EC2, EKS, AKS, Azure DevOps, GKE, ECS, Lambda, S3, RDS, DynamoDB, ELB, VPC, Route 53, CloudFormation,
CodePipeline, CodeBuild, Step Functions, Secrets Manager, CloudWatch, CloudTrail, CloudFront, SNS, SQS, Kinesis, Glue, Athena
Automation & DevOps: Terraform, Ansible, Jenkins, GitLab CI/CD, Docker, Helm, ArgoCD; Monitoring & Logging: Prometheus,
Grafana, Splunk, Dynatrace, Datadog; Languages: Python SDK, Bash, PowerShell, Golang, Node.js; OS: Linux (Amazon Linux, Ubuntu,
CentOS); Collaboration: Jira, Confluence, ServiceNow, Agile/Scrum

DevOps Engineer (SRE)


Equifax – St. Louis, MO (Hybrid Contract)
January 2021 – June 2022
Started as a DevOps Engineer, expanding responsibilities to include Site Reliability Engineering (SRE) on-call rotation using PagerDuty
and ServiceNow while managing AWS administration and security with a focus on cost optimization. I have deployed applications
using AWS services such as EKS, ECS, and Lambda, ensuring high availability and scalability. Additionally, I integrated SaaS monitoring
tools like Datadog, Prometheus, and PromQL to enhance application performance tracking. Key responsibilities included:
 Administered and optimized AWS services including EC2, S3, RDS, Lambda, and IAM to enhance system performance and
reliability.
 Automated cloud provisioning with Terraform and Ansible, reducing deployment time by 50%.
Managed Terraform state files (S3 backend, DynamoDB locking, Terraform Cloud).
Designed GitOps-driven Kubernetes deployments using ArgoCD and Helm, ensuring automated release processes.
Assisted product teams with onboarding and migration to centralized Kubernetes environments; Provided guidance and
troubleshooting support for teams adopting Kubernetes.
Migrated 35+ legacy applications to AWS (EC2, ECS, Lambda) with 40% faster performance post-optimization.
 Deployed applications using EKS, ECS, Lambda, ensuring high availability and scalability. Designed Karpenter NodePools with spot
instance diversification for fault tolerance.
Page
 Configured and enforced security best practices, including IAM policies, AWS WAF, AWS Shield, and periodic security
assessments; Developed Service Control Policies (SCPs) to restrict high-risk actions (e.g., disabling CloudTrail, modifying IAM
roles) across 50+ AWS accounts.
 Integrated Datadog, Prometheus, and PromQL to monitor application performance. Created Grafana dashboards for
operational monitoring and real-time visibility.
 Deployed and managed AWS services (EC2, VPC, RDS, Lambda, CloudFormation, S3, SQS, Kinesis Firehose, Transit Gateway).
 Designed AWS Step Functions to manage complex workflows with Lambda integrations.
 Configured AWS WAF and VPCs to ensure PCI DSS compliance for financial applications.
 Built secure CI/CD pipelines using GitLab, Jenkins, AWS CodePipeline, and GitHub Actions.
 Monitored infrastructure with CloudWatch, CloudTrail, Datadog, and Splunk.
 Configured Spinnaker for multi-cloud deployments, including OpenShift for enterprise-grade CI/CD.
 Reduced infrastructure costs by 25% via right-sizing OpenShift and EKS workloads.
 Ensured high security compliance through IAM policies, security groups, and network segmentation.
 Developed Fluent-bit pipelines to ingest logs into Elasticsearch; built Kibana dashboards for log analysis.
 Managed on-call SRE rotations using PagerDuty and ServiceNow, ensuring rapid incident resolution.
 Automated AWS infrastructure deployment in EKS using eksctl and Helm, reducing environment setup time from 4 hours to 30
minutes. Integrated authentication and authorization solutions using OIDC and IAM Roles for Service Accounts (IRSA).
 Optimized AWS costs by 25% through auto-scaling, right-sizing, and policy automation.
Key Achievements:
 Reduced AWS infrastructure costs by 25% through resource right-sizing and automation.
 Improved operational visibility, reducing incident investigation time by 40% using Grafana and CloudWatch dashboards.
 Achieved 99.95% system uptime through proactive monitoring and performance optimization.
 Reduced deployment times by 50% through Terraform and Ansible automation.
Environment & Tools:
Cloud & Infrastructure: EC2, EKS, AKS, Azure DevOps, GKE, ECS, Lambda, S3, RDS, DynamoDB, ELB, VPC, Route 53, CloudFormation,
CodePipeline, CodeBuild, Step Functions, Secrets Manager, CloudWatch, CloudTrail, CloudFront, SNS, SQS, Kinesis, Glue, Athena
Automation & DevOps: Terraform, Ansible, Jenkins, GitLab CI/CD, Docker, Helm, ArgoCD; Monitoring & Logging: Datadog,
Prometheus, Splunk, Grafana, CloudWatch, CloudTrail; Languages: Python SDK, Bash, PowerShell, Golang, Java (Spring Boot); Security
& Compliance: AWS GuardDuty, Security Hub, AWS Shield, PCI DSS; Collaboration: Jira, Confluence, ServiceNow, Agile/Scrum

DevOps Engineer
Avaya Inc. – Durham, NC (Hybrid Contract)
January 2019 – December 2020
As a DevOps Engineer, I focused on automating CI/CD pipelines, implementing Infrastructure as Code (IaC), and optimizing AWS
environments for security, scalability, and cost efficiency. I played a key role in securing SaaS applications using IAM roles, HashiCorp
Vault, and DevSecOps best practices. Also, I was a part of the SRE team. Here is the Key Responsibilities:
 Designed, provisioned, and maintained AWS infrastructure (EC2, EKS, ECS, ELB, IAM, VPC, Lambda, RDS, S3, Elasticsearch,
CloudFront) for high availability and security. Managed AWS master organizational accounts, ensuring compliance with
company policies across sub-accounts.
 Developed and maintained Terraform modules and CloudFormation templates to automate infrastructure provisioning,
reducing deployment time by 40%.
 Secured SaaS applications by implementing IAM roles, HashiCorp Vault, and DevSecOps best practices to ensure compliance
with PCI-DSS and GDPR. Automated guardrails using AWS Control Tower and Config Rules, preventing 200+ monthly violations.
 Optimized GitLab CI/CD, Jenkins, and ArgoCD pipelines, improving deployment efficiency by 60% and enabling zero-downtime
releases.
 Managed Kubernetes workloads (EKS, ECS) using Helm and ArgoCD, ensuring highly available applications.
 Migrated Kubernetes resources across AWS regions using Velero and AWS S3 for backup and disaster recovery.
 Migrated legacy workloads to EKS with Karpenter scaling. Implemented observability for Karpenter metrics (CloudWatch,
Prometheus) to track node provisioning trends.
 Automated security patching and environment consistency using Ansible playbooks and Bash scripts, reducing manual effort
by 50%.
 Integrated Prometheus and Grafana for real-time monitoring, reducing incident resolution time by 20%. CloudTrail, Datadog,
and Splunk.
 Implemented AWS WAF, CAPTCHA, and Bot Control features for enhanced security. Led PCI-DSS compliance by designing 15+
SCPs to block non-compliant resource creation (e.g., unencrypted S3, public EC2) across 50+ accounts, reducing audit effort by
70%.
 Designed AWS Step Functions workflows to orchestrate complex processes, improving efficiency by 35%.
 Participated in database migration of 10 TB+ data to AWS Aurora via DMS, achieving zero data loss. Optimized post-migration
costs by $80K/year using S3 lifecycle policies and RI purchases.
 Reduced migration downtime by 70% using AWS MGN and cutover automation scripts.
 Designed and deployed multi-cloud Kubernetes clusters (EKS, AKS, GKE, OpenShift) with high availability and disaster recovery.
 Built and maintained CI/CD pipelines for Java-based applications using Jenkins and GitLab CI/CD.
Page
 Developed RESTful APIs using Spring Boot, integrated Log4j2, and used Maven for dependency management.
 Designed Packer templates to create consistent golden images for AWS EC2 instances.
 Implemented Docker image management using JFrog Artifactory, improving deployment speeds.
 Deployed Istio service mesh for intelligent traffic routing and zero-trust security (RBAC).
 Designed HIPAA-compliant AWS infrastructure for a healthcare system, securing PHI with AWS KMS, TLS/SSL, and IAM roles.
 Managed incidents and change requests using ServiceNow and Jira, improving operational efficiency by 15%.
Key Achievements:
 Reduced deployment time by 60% through automation of CI/CD pipelines and infrastructure provisioning.
 Improved infrastructure reliability and minimized downtime by optimizing load balancing and auto-scaling.
 Decreased false positives by 35% by optimizing Prometheus alert configurations.
 Enhanced troubleshooting efficiency by 30% by integrating Splunk with Spring Boot applications.
 Successfully migrated critical workloads to AWS, reducing costs by 20% and enhancing performance.
 Recognized as "Employee of the Quarter" for outstanding contributions to cloud security initiatives.
Environment & Tools:
Cloud & Infrastructure: EC2, EKS, AKS, Azure DevOps, GKE, ECS, Lambda, S3, RDS, DynamoDB, ELB, VPC, Route 53, CloudFormation,
CodePipeline, CodeBuild, Step Functions, Secrets Manager, CloudWatch, CloudTrail, CloudFront, SNS, SQS, Kinesis, Glue, Athena. IaC
& Automation: Terraform, CloudFormation, Ansible, Bash, Python SDK. CI/CD Tools: Jenkins, GitLab, Docker, JFrog Artifactory,
ArgoCD. Monitoring & Logging: Prometheus, Grafana, Splunk, Dynatrace, Datadog. Languages: Python, Shell, PowerShell, Golang,
Node.js, Flask. Containerization & Orchestration: Docker, Kubernetes (EKS, ECS), Helm. OS: Linux (Amazon Linux, Ubuntu, CentOS).
Collaboration: Jira, ServiceNow, DevOps Runbook in Confluence, Agile/Scrum.

US Bank, Manhattan, NY
SDET / Test Automation Engineer (Contract & Hybrid)
July 2017 – December 2018
 Automated testing for the Next Generation Loan Processing (NGLP) system built on Spring Boot and AngularJS, using Java,
Selenium, Cucumber, and TestNG.
 Developed test automation frameworks, including Page Object Model, and performed BDD using Gherkin.
 Conducted functional, UI, database, API, and regression testing, including backend testing with SQL queries.
 Managed test automation scripts in Git, executed in Jenkins CI/CD pipeline running on AWS EC2.
 Utilized Postman for REST API testing and JIRA for defect tracking.
 Participated in Agile Scrum processes, including sprint planning, design meetings, and QA validation.

Expedia Group, Seattle, WA


SQL Database Administrator (Junior) – (Contract & Hybrid)
January 2017 – June 2017
Assisted with database administration tasks, including backups, recovery, and security management.
Monitored and optimized MySQL database performance, resolving bottlenecks.
Set up and tested high availability solutions, such as master-slave replication.
Documented database configurations, schemas, and troubleshooting steps.
Ensured data security by implementing access controls and encryption.
Environment: MySQL, VS Code, Git, AWS EC2, RDS, S3, Bash, PowerShell, ServiceNow, Jira, Agile Scrum.

Colonial Parking Inc. – Washington, D.C.


IT Helpdesk – Shift Manager (Full-time)
January 2016 – December 2016
 Provided technical support, including troubleshooting Active Directory, VPN, and network issues.
 Managed infrastructure on Windows Server 2016 and UNIX, performing server builds account setups, and software
installations. Bash & PowerShell used as Language
 Resolved tickets in Remedy and escalated hardware/network issues when necessary.
 Handled daily monitoring of switches, routers, firewalls, and other infrastructure.

ACCOMPLISHMENTS
AWS Certified Security - Specialty
https://www.credly.com/badges/3299dbb1-8679-4d8e-84f1-eae00befd69c/public_url
AWS Certified Solutions Architect
https://www.credly.com/badges/9970b1f3-649a-4047-933c-5ab122783958/public_url
AWS Certified DevOps Engineer
https://www.credly.com/badges/a8858f43-506a-4257-8aed-32e6086f3318/public_url
AWS Certified Cloud Practitioner
https://www.credly.com/badges/c5a2ba69-0878-4294-a135-0d3261f3fde8/public_url
Page
Certified Kubernetes Administrator
https://www.credly.com/badges/6a78be17-11a1-4836-9da7-41a2550866ee/public_url
CompTIA Security+SY0-601
https://www.credly.com/badges/d7c241f8-2833-45ed-a8f6-6354542e9e49/public_url

EDUCATION
MBA in IT, GPA 3.79, Alumni (ID # MA2940499), 2021
University of the Potomac, Washington D.C.
Achievements: Master of Business Administration (MBA), with a concentration in Information Technology, with
active involvement in Tech-Fest and Technical Teams.
Guest Faculty for Training sessions with New Students, subject materials: Structured Query language SQL, Java &
Python OOPS, and AWS Solutions Architect Level Resources.

ADDITIONAL INFO / ACTIVITIES


 Writing in Hashnode & Medium has become a part of my knowledge sharing.
 Playing Lawn Tennis and Cricket regularly’ just to keep up physical stamina in good condition.
 And content creation for my YouTube channel gives me immense pleasure in the realm of my creative vista!
 On March 04, 2025, I become an AWS Community Builder for continuous contributions over the years. Connected
with CB (Community Builder) Slack and participate in their events regularly.

REFERENCES
Available if required.

Page

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy