Home

Deepthi - Sr Devops Engineer
[email protected]
Location: Detroit, Michigan, USA
Relocation: Yes
Visa: H1B
Resume file: Deepthi - Devops Secops SRE SME_1768944929814.docx
Please check the file(s) for viruses. Files are checked manually and then made available for download.
Deepthi
Detroit, Michigan
[email protected]
408-495-2897

Certifications: ITIL V3.0 | ITIL ST | AWS Solution Architect | AWS DevOps Engineer | Azure Admin

Professional summary:
DevSecOps and Platform SME with 14+ years of experience delivering secure, scalable, and highly available cloud platforms across AWS, Azure, GCP, and Oracle Cloud (OCI). Expert in CI/CD automation, GitOps workflows, infrastructure-as-code (Terraform, Ansible), and container orchestration (Kubernetes: EKS, GKE, OKE), enabling faster, reliable, and compliant application delivery.
Hands-on experience designing and implementing secure microservices platforms, integrating policy-as-code (Checkov, OPA), container security, vulnerability scanning, and artifact management (Artifactory, Nexus) to reduce deployment errors and enforce compliance across environments. Built self-service CI/CD pipelines and automated IaC frameworks with Jenkins, Git, Python, Helm, and GitOps, accelerating environment provisioning and release cadence.
Embedded SRE practices into multi-cloud operations by defining SLIs, SLOs, alerting, automated remediation, and monitoring solutions using Datadog, Prometheus, Grafana, Splunk, and Azure Monitor, ensuring operational resilience and proactive issue detection. Spearheaded cloud modernization and migration initiatives, integrating OCI databases, Azure data services, GCP application workloads, and hybrid Kubernetes clusters, improving scalability, security posture, and operational efficiency.
Recognized for bridging DevOps, DevSecOps, and SRE disciplines, delivering measurable improvements in deployment velocity, platform reliability, and cloud governance while maintaining audit-ready compliance across enterprise-grade multi-cloud environments.

Technical skills:

Cloud Platforms & Services AWS (EC2, S3, ELB, EKS, ECS, VPC, RDS, CloudFormation, Lambda, CloudFront, CloudWatch, IAM, Route 53, CodeBuild, CodeCommit, CodeDeploy, CodePipeline, Auto Scaling, Elastic Beanstalk, EFS, DMS, Direct Connect, SNS), Azure (VNets, Subnets, NSGs, Azure SQL, PostgreSQL, MySQL, Private Endpoints, Load Balancers, Storage, Azure Monitor), GCP (GKE, Cloud DNS, HTTPS Load Balancing, Managed SSL Certificates, Cloud Monitoring), Oracle Cloud Infrastructure (OCI Compute, Storage, Networking, Oracle 12c DB, OKE)
CI/CD & DevOps Tools Jenkins, GitLab, Bitbucket, GitHub Actions, Harness (CI/CD), Argo CD, GitOps Workflows, Maven, Gradle, Ant, Continuum, Hudson, Nexus, Artifactory
Configuration & IaC Tools Terraform, Ansible, CloudFormation, ARM Templates, Chef, Puppet, Kustomize, Helm
Containerization & Orchestration Docker (Engine, Hub, Compose, Registry), Kubernetes (EKS, GKE, OKE), ECS, Docker Swarm
Scripting & Programming Python, Shell/Bash, PowerShell, Go
Containerization Docker, Kubernetes, AWS ECS
Scripting languages Bash/shell, Python, Power Shell
Monitoring & Observability Splunk, Prometheus, Grafana, Dynatrace, ELK Stack (Elasticsearch, Logstash, Kibana), CloudWatch, Azure Monitor, Nagios, Datadog
Version Control & SCM Git, SVN, GitHub, Bitbucket, TFS, ClearCase
Databases & Data Services Oracle 12c, MySQL, PostgreSQL, Azure SQL, RDS, DMS
Operating Systems Linux (RHEL, Ubuntu, CentOS), UNIX, Windows, Mac OS
Security & Compliance Tools Checkov, OPA, SAST, DAST, SCA, IAM, Secrets Management, Policy-as-Code, RBAC, NACLs, Security Groups, TLS/mTLS


Professional experience:

Client: Apple Jun 2024 to till date
Role: DevSecOps/SRE SME
Location: California

Responsibilities:
Designed and implemented DevSecOps CI/CD pipelines using Harness (CI & CD), embedding security, compliance, and governance controls into build, test, and deployment workflows.
Embedded security-first practices into pipelines, including secrets management, policy enforcement, approval gates, and secure release promotion, without impacting delivery velocity.
Developed and enhanced Authentication and Authorization (AuthN/AuthZ) platforms using Go and Python, focusing on secure token generation, lifecycle management, and access control flows.
Remediated complex security vulnerabilities in AuthN/AuthZ services, including JWT validation flaws, token refresh issues, permission evaluation gaps, and API security weaknesses, aligned with zero-trust principles.
Implemented and optimized Blue-Green and Canary deployment strategies using Harness, improving deployment safety, rollback reliability, and release confidence.
Automated Amazon EKS provisioning and lifecycle management using Terraform, AWS CLI, and Harness pipelines, enforcing Infrastructure as Code and reducing manual operational risk.
Strengthened Kubernetes platform security by integrating LDAP-based identity federation with RBAC, enforcing least-privilege access and audit-ready authorization controls.
Built self-service ingress and TLS automation pipelines, and implemented mTLS between ingress upstreams and gateway services, enabling secure multi-tenant Kubernetes environments.
Architected and operated enterprise observability platforms using Splunk, Prometheus, Grafana, and Dynatrace, enabling deep visibility across services and infrastructure.
Defined and enforced SLIs, SLOs, error budgets, and alerting strategies, improving service reliability, availability, and incident response effectiveness.
Owned production-grade Amazon EKS clusters, including upgrades, node group scaling, control plane monitoring, and capacity planning to ensure high availability and resilience.
Acted as a Subject Matter Expert (SME) across DevSecOps, SRE, Harness, Kubernetes/EKS, observability, and authentication systems, providing architectural leadership and mentorship across engineering teams.

Client: Mercedes Benz Financial Services Nov 2022 to May 2024
Role: Principal DevSecOps Engineer
Location: Michigan

Responsibilities:
Built and maintained a hybrid Azure GCP DevSecOps platform to support multiple microservices, with Azure used primarily for networking and database services and GCP for application and Kubernetes workloads.
Created microservice onboarding automation using Python and Jenkins, allowing teams to spin up CI pipelines, Kubernetes manifests, and environment configurations with minimal manual effort.
Set up and maintained CI/CD pipelines for application builds, Terraform-based infrastructure provisioning, and Kubernetes deployments, ensuring consistent workflows across environments.
Provisioned Azure VNets, subnets, NSGs, and private endpoints to support isolated test and non-prod environments, enabling teams to validate application scenarios securely.
Implemented and supported Azure-managed databases (Azure SQL / PostgreSQL / MySQL), handling connectivity from GCP-hosted applications, secrets management, backups, and access controls.
Deployed and operated application workloads on Google Kubernetes Engine (GKE), supporting namespace creation, service configuration, ingress setup, and cluster-level security controls.
Configured GCP ingress, Cloud DNS, HTTPS load balancing, and managed SSL certificates to expose applications securely and standardize traffic routing.
Wrote and maintained Helm charts and Kustomize overlays to manage environment-specific Kubernetes configurations and reduce configuration drift between dev, test, and prod.
Implemented GitOps-based deployments using Argo CD, managing application synchronization, namespace-level access, and controlled promotion of changes across environments.
Integrated monitoring and logging using Azure Monitor, GCP Cloud Monitoring, Prometheus, Grafana, Datadog, and Splunk, focusing on application health, infrastructure signals, and security-relevant events.
Set up centralized logging pipelines, forwarding Kubernetes and application logs to Splunk, and configured alerts for common failure patterns and security exceptions.
Embedded security checks into CI/CD pipelines, including Python unit tests, Terraform validation, secrets handling, and basic vulnerability scanning as part of the build process.
Worked closely with application and QA teams to troubleshoot deployment issues, environment misconfigurations, and cloud connectivity problems across Azure and GCP.
Contributed to DevSecOps governance, documenting standards for pipelines, Kubernetes usage, cloud resource provisioning, and security best practices.
Company: Salesforce Mar 2022 to Oct 2022
Role: Principal DevSecOps Engineer
Location: California

Responsibilities:
Playing a strategic role by providing consultation to product teams on defining the process, technologies & best practices in DevOps.
Provided architectural guidance to product and engineering teams, designing DevSecOps workflows, CI/CD patterns, and secure deployment practices aligned with enterprise requirements.
Designed and maintained secure, automated CI/CD pipelines using Jenkins, Python, Docker, and Kubernetes, embedding vulnerability scanning, policy checks, and compliance validation.
Drove secure SDLC adoption, including branching strategies, artifact versioning, controlled release approvals, and integration of security and compliance checks into delivery workflows.
Enhanced Infrastructure as Code (Terraform and Ansible) with reusable modules, automated validation, and policy enforcement to prevent misconfigurations in AWS environments.
Developed Python-based automation APIs to streamline infrastructure provisioning and environment validation, reducing manual errors and increasing deployment consistency.
Delivered hardened AWS Kubernetes (EKS) platforms, implementing secure cluster configurations, namespace isolation, encrypted secrets, and standardized microservice onboarding workflows.
Implemented GitOps-based deployment workflows to manage Kubernetes configuration changes, reduce drift, and improve observability and auditability.
Integrated policy-as-code tools (Checkov, OPA) into pipelines for Terraform, Docker, and Kubernetes, enabling early detection of compliance and security violations.
Supported cloud security and migration initiatives, including IAM role hardening, network segmentation (NACLs and security groups), and runtime security improvements.
Built automation for deployment validation and continuous compliance, embedding security checks into Agile workflows without slowing feature delivery.
Documented and evangelized DevSecOps standards, reusable pipeline templates, and best practices, establishing repeatable, enterprise-wide adoption and platform consistency.
Maintained observability and monitoring pipelines using AWS native services, Prometheus, Grafana, and Splunk, providing actionable insights into application and infrastructure health.

Company: Oracle Apr 2018 to Mar 2022
Role: Senior DevOps Engineer
Location: India

Responsibilities:
Engineered scalable cloud platforms using AWS services (EC2, VPC, IAM, CloudFormation, Lambda, S3, RDS) with automated provisioning, resilient networking, and migration of large on-prem workloads into cloud-native architectures.
Designed and deployed Azure cloud platforms for enterprise applications, implementing VNets, subnets, NSGs, and load balancers, resulting in highly available and secure environments for multiple teams.
Built end-to-end CI/CD pipelines using Jenkins, Git, Docker, Node.js/NPM, and Kubernetes (OKE), reducing manual deployments and accelerating release cycles by automating build, test, and deployment processes.
Migrated critical on-prem Java/J2EE and WebLogic applications to Azure and OKE, achieving minimal downtime and improved scalability for global workloads.
Managed OCI infrastructure and Oracle 12c databases, including provisioning, backups, patching, and performance tuning, ensuring database reliability and consistent application connectivity.
Developed Terraform and Ansible automation modules for cloud and Kubernetes provisioning, which reduced setup time for new environments by 40% and improved configuration consistency.
Optimized OKE containerized workloads, creating Helm charts and managing namespaces, secrets, and deployments, improving cluster stability and reducing runtime errors.
Implemented monitoring and observability with Azure Monitor, Prometheus, Grafana, and custom scripts, detecting performance bottlenecks and enabling proactive resolution of platform issues.
Built artifact and content delivery workflows using Artifactory, CDN, and Oracle WebCenter Content, reducing deployment errors and improving content availability to end-users.
Developed Python and Shell automation tools to validate deployments, manage configurations, and enforce infrastructure standards, enhancing operational efficiency and reducing manual intervention.
Hardened platform and network security through IAM policies, RBAC for Kubernetes, and secure cloud access controls, ensuring compliance with enterprise security standards.
Led database and platform optimization projects, improving backup reliability, application connectivity, and cloud resource utilization for both Azure and OCI workloads.
Documented and standardized platform architecture, deployment procedures, and CI/CD templates, enabling repeatable practices and smoother onboarding for engineering teams.
Company: ASG Technologies Apr 2017 to Mar 2018
Role: DevOps Engineer and Package Management
Location: India

Responsibilities:
Built and packaged ~150 application components and automated CI/CD pipelines using Jenkins, Git/SVN, Ansible, and Shell scripting for multi-environment deployments.
Containerized and orchestrated services using Docker, Docker Registry, and Docker Swarm, including developing Jenkins-driven container deployments.
Implemented configuration and environment automation through Ansible Playbooks and Python-based orchestration across AWS and on-prem systems.
Performed WebSphere MQ server tuning, environment configuration, artifact management (Artifactory), and installation/upgrade activities across UNIX/Linux/Windows platforms.

Company: Kony IT Services Sep 2015 to Apr 2017
Role: DevOps Engineer
Client: TMB Bank
Location: India

Responsibilities:
Built, deployed, and automated application delivery pipelines using Jenkins, Shell/Bash/Python scripting, and configuration management tools across Linux/Windows environments.
Managed scalable AWS infrastructure, including EC2 provisioning, CloudWatch monitoring, CloudFormation-based infra builds, and migration of applications from on-prem datacenters to AWS.
Performed configuration, deployment, and troubleshooting of middleware and application servers (JBoss, WebSphere), ensuring high availability, load balancing, and seamless release operations.
Administered version control systems (Git, SVN), performing branching, merging, tagging, and repository maintenance while supporting automated build and packaging workflows.
Company: Alliance Global Services Pvt Ltd Sep 2014 to Aug 2015
Role: Build and Release Manager
Client: Global Foundries, New York
Location: India

Responsibilities:
Executed end-to-end build and deployment of J2EE and Windows applications, including packaging EAR/WAR files and deploying via JBoss 4.3 Admin Console using Shell and Perl automation scripts.
Configured and maintained CI/CD processes using Hudson/Jenkins, creating and optimizing build jobs to support reliable, repeatable software delivery across multiple environments.
Performed application and database deployments across Oracle and SQL Server environments, ensuring accurate execution, environment readiness, and seamless promotion to production.
Monitored server/application health during deployments, sending uptime/downtime notifications, validating release stability, and supporting high-quality, automated production environments.
Company: Cognizant Technology Solutions Pvt Ltd Jun 2012 to Sep 2014
Role: Build and Release Manager
Client: Amex and Xerox Healthcare
Location: India
Led end-to-end build and release engineering for Java/J2EE applications across Dev, QA, Pre-Prod, and Production, including code integration, conflict resolution, scheduled/emergency builds, and release coordination during code-freeze periods.
Developed and automated CI/CD pipelines using Jenkins, Maven, ANT, Continuum, Shell/UNIX scripts, and Nexus streamlining build creation, RPM packaging, environment configuration updates, DB pre-deployment tasks, and deployment workflows.
Maintained source control and issue management across GIT, Subversion, and ClearCase, resolving merge conflicts, authentication issues, and supporting developers with code integration, break/fix management, and continuous integration stability.
Owned release governance and documentation, publishing release notes, managing JIRA workflows, coordinating cross-team production deployments, and ensuring smooth, traceable releases through comprehensive planning, scheduling, and communication.

Company: Infosys Jun 2008 to Jun 2012
Role: Build and Release Engineer
Client: MetLife Insurance, New York
Location: India

Responsibilities:
Managed end-to-end build and release operations, including creating dynamic/snapshot views, applying baselines and labels, performing merges, generating release notes, and executing deployments across multiple environments.
Automated build and deployment workflows using NANT, Jenkins, batch scripts, and TFS/StarTeam tools establishing nightly builds, streamlining integration processes, and ensuring consistent, audit-compliant release execution.
Supported developers and project teams in setting up environments, views, configuration files, and IIS-based deployments while providing L1 troubleshooting, smoke testing, and 24/7 on-call production support for emergency fixes (EBFs).
Created complete release governance and documentation, including build instructions, deployment, runbooks, change tickets (BMC Remedy), and implementation schedules ensuring traceability, compliance, and smooth production rollout cycles.
Education & Certifications:
Bachelor of Technology in Electrical and Electronics Engineering, from JNT University, India (2001-2005).
ITIL V3.0 Certified.
ITIL Service Transition Certified.
AWS Certified Solution Architect.
AWS Certified DevOps Engineer.
Microsoft Certified Azure Admin
Keywords: continuous integration continuous deployment quality analyst message queue javascript sthree database information technology golang

To remove this resume please click here or send an email from [email protected] to [email protected] with subject as "delete" (without inverted commas)
[email protected];6670
Enter the captcha code and we will send and email at [email protected]
with a link to edit / delete this resume
Captcha Image: