Professional Resume

Hi, I am Ozioma Udah

Welcome to my portfolio. highly experienced and results-oriented Senior DevOps Engineer specializing in secure and scalable cloud infrastructure, particularly within high-security environments like government agencies. Expertise in CI/CD, automation, and compliance, combined with strong collaborative skills, enables me to deliver reliable solutions for mission-critical operations.

The Technologies I Use Most: Top 20

  • AWS
  • Terraform
  • Kubernetes
  • ArgoCD
  • ⁠Git
  • Python
  • Jenkins
  • Guthub-Actions⁠
  • Nexus
  • Postgres
  • Prometheus
  • Ansible
  • Azure
  • Agile
  • Linus
  • Windows
  • Helm
  • Bash
  • GCP
  • Nginx
JS Azure VS Code React Azure VS Code jira visio powerbi fit excel postgress tabul SQL React Python

Skills & Experience

Senior DevOps Engineer

Significantly improved infrastructure and application deployment efficiency and reliability through automation and standardization using Terraform, Kubernetes, Docker, GitOps practices, and CI/CD pipelines.

DevOps Engineer

Skilled DevOps Engineer with a proven track record of automating and optimizing cloud infrastructure using Terraform and AWS services, significantly improving deployment efficiency and reducing costs. Expertise in container orchestration with ECS Fargate and serverless architecture with Lambda demonstrates the ability to build scalable and cost-effective solutions for complex applications.

Cloud Engineer

Seasoned cloud infrastructure expert specializing in multi-cloud environments, particularly AWS and Azure, with a strong focus on automation, security, and cost optimization for high-volume applications like Expedia's travel platforms. Experience in designing hybrid architectures, implementing robust data storage solutions, and establishing comprehensive monitoring and disaster recovery plans.

My Top 5 Projects

  • 1. Terraform-Based Infrastructure Management Designed and implemented Infrastructure as Code (IaC) solutions using Terraform for AWS and Azure environments. Created modular Terraform configurations to manage VPCs, Route 53 DNS, Security Groups, and IAM roles, ensuring a scalable and maintainable infrastructure. Integrated Terraform workflows with GitHub Actions & GitLab CI/CD, automating provisioning and infrastructure updates. Standardized Grendel Cognito User Pool configurations to ensure disaster recovery (DR) readiness.
  • 2. CI/CD Pipeline Automation & Security Enhancements Developed CI/CD pipelines using Jenkins, GitLab CI, and Harness CI to automate deployment processes. Implemented security scanning and compliance checks in CI/CD pipelines using BlackDuck, Trivy, Wiz, and Nessus. Modified DevOps cron scripts to automate key rotations and environment cleanups, ensuring compliance with security policies. Created scheduled cleanup jobs in GitLab to remove stale environments and optimize cloud resource usage.
  • 3. Cloud Infrastructure Optimization & Disaster Recovery Optimized AWS ECS & Lambda-based applications for improved efficiency and cost-effectiveness. Designed disaster recovery strategies for critical applications, ensuring high availability (HA) and fault tolerance in AWS. Managed multi-cloud infrastructure with AWS and Azure, implementing security best practices for IAM, WAF, and KMS encryption. Created self-service portals to enable teams to provision infrastructure rapidly while adhering to security and compliance standards.
  • 4. DNS & Networking Automation with Terraform Led the creation of a centralized Terraform repository to manage AWS Route 53 hosted zones, simplifying DNS record management. Designed a scalable approach to manage multiple hosted zones in a single Terraform repo, reducing operational overhead. Researched best practices for Route 53 DNS management, balancing security, permissions, and automation strategies. Proposed and implemented CI/CD workflows for DNS management to allow PR-based approvals for infrastructure changes.
  • 5. Monitoring, Logging & Observability Solutions Integrated Datadog, New Relic, Splunk, Prometheus, and Grafana to improve monitoring and observability. Developed custom dashboards to track application performance, security events, and cloud resource utilization. Configured CloudWatch alerts and log aggregation, reducing incident response time and improving operational insights. Assisted teams in analyzing security vulnerabilities and performance bottlenecks using Splunk and Datadog metrics.

Certifications

AWS Certified Cloud Practitioner (CLF)
AWS Solution Architect
Microsoft Certified: Azure Fundamentals
Hash Corp Certified: Terraform Associate