profile-pic
Vetted Talent

Bhanu Prathap Reddy

Vetted Talent
My name is John Doe and I am an experienced DevOps Engineer having 3 years of experience in the IT industry. I have expertise in various DevOps tools and technologies such as AWS, Terraform, and Kubernetes. I have been involved in various projects, from small to large scale, and have successfully implemented DevOps solutions for my clients. My passion for technology and problem solving has enabled me to stay ahead of the curve and stay on top of the latest trends. I am confident that I can be an asset to any organization with my skills and knowledge.
  • Role

    Principal Security Engineer

  • Years of Experience

    13.83 years

Skillsets

  • Cyber security
  • Prisma Cloud
  • OWASP ZAP
  • CodePipeline
  • XDR
  • SOAR
  • SIEM
  • Shell
  • SentinelOne
  • Go
  • Fluentbit
  • Terraform
  • CSPM
  • CNAPP
  • Cloudformation
  • Cloud Security
  • Akamai
  • Lambda
  • AWS
  • Python
  • Jenkins
  • Kubernetes

Vetted For

12Skills
  • Roles & Skills
  • Results
  • Details
  • icon-skill_image
    Senior AWS DevOps EngineerAI Screening
  • 63%
    icon-arrow-down
  • Skills assessed :Agile principles, Jira, CI/CD Tools, Terraform, AWS, Docker, Java, Jenkins, Kubernetes, 組込みLinux, Python, Ruby on Rails
  • Score: 63/100

Professional Summary

13.83Years
  • Apr, 2025 - Present1 yr

    Principal Security Engineer

    mPokket
  • Feb, 2023 - Apr, 20252 yr 2 months

    Senior Security Engineer

    mPokket
  • Apr, 2022 - Feb, 2023 10 months

    DevOps Engineer - l

    MediBuddy
  • Dec, 2019 - Jul, 2020 7 months

    DevOps Intern

    XenonStack
  • Nov, 2020 - Nov, 20211 yr

    Associate DevOps Engineer

    BootLabs
  • Nov, 2021 - Apr, 2022 5 months

    DevOps Engineer - l

    BootLabs
  • Personnel

    Impact App
  • Aug, 2019 - Dec, 2019 4 months

    DevOps Intern

    Click Labs
  • Sep, 2017 - Oct, 20181 yr 1 month

    Member

    RISC

Applications & Tools Known

  • icon-tool

    AWS CloudFormation

  • icon-tool

    AWS Lambda

  • icon-tool

    AWS (Amazon Web Services)

  • icon-tool

    DNS

  • icon-tool

    Python

  • icon-tool

    Jenkins

  • icon-tool

    Kubernetes

Work History

13.83Years

Principal Security Engineer

mPokket
Apr, 2025 - Present1 yr

Senior Security Engineer

mPokket
Feb, 2023 - Apr, 20252 yr 2 months
    Directed triage and resolution of cloud security incidents across 20+ AWS accounts, addressing critical IAM vulnerabilities and improving Security Hub scores. Implemented AWS security monitoring solutions including GuardDuty, DNS Firewall, NACL, and WAF rules to mitigate threats such as crypto mining and malicious IPs. Automated cloud security practices using Terraform modules and scripts, enhancing IAM role management, enforcing IMDSv2, and migrating access keys to role-based access. Deployed advanced DevSecOps tools such as Prisma Cloud, Security Hub, Twistlock, and OWASP ZAP; piloted AWS Patch Manager and Akamai WAF for enhanced security. Led cross-functional initiatives for IAM best practices, encryption standardization, BCP/DR testing, and centralized logging, achieving cost savings of ~$5K/month. Centralized security logs with SentinelOne integration, automated agent deployment for EC2 instances, and implemented CMK encryption for S3, SQS, and Secrets Manager.

DevOps Engineer - l

MediBuddy
Apr, 2022 - Feb, 2023 10 months
    Reduced AWS infrastructure costs by approximately 50 lakhs while enhancing security and automation processes. Developed and implemented CI/CD pipelines using Jenkins to streamline deployment workflows and improve efficiency. Ensured security compliance by managing AWS IAM user access keys rotation and improving operational efficiency. Provisioned scalable infrastructure and deployed microservices effectively using Terraform. Automated workflows and processes with Python and AWS Lambda, enhancing operational efficiency and reliability. Architected a staging environment for over 100 microservices, ensuring seamless testing and deployment processes. Improved AWS infrastructure security posture, achieving a security score of 90+ by addressing vulnerabilities and implementing best practices.

DevOps Engineer - l

BootLabs
Nov, 2021 - Apr, 2022 5 months

Associate DevOps Engineer

BootLabs
Nov, 2020 - Nov, 20211 yr

DevOps Intern

XenonStack
Dec, 2019 - Jul, 2020 7 months

Personnel

Impact App
    At Impact, our mission is to get the world healthy and happy. That includes you, your family, friends and colleagues. So our products and offerings are crafted with care, keeping our mission in mind and your happiness at heart.

DevOps Intern

Click Labs
Aug, 2019 - Dec, 2019 4 months

Member

RISC
Sep, 2017 - Oct, 20181 yr 1 month
    RISC-LPU, also known as Robotics and Intelligent Systems Community is a technical student organization, for the students and by the students. We work on various innovative projects and researches.RISC has worked on various innovative projects which have and will bestow creative Mind’s thinking patterns to the upcoming future Technology so that our mind can boost enough power to face many hurdles in the way of learning the new tactics to deal with ever-changing or dynamic technology.

Major Projects

2Projects

HA-ARCHITECTURE

    Built a fault-tolerant WordPress site using Route53, ELB, autoscaling groups, EC2 instances, RDS instances, bootstrap scripts, and S3 buckets. Deployed EC2 and RDS instances in multi-AZ for high availability. Used failover routing policy to ensure availability in case of one AZ failure.

SERVER-LESS ALEXA SKILL

    Built a serverless Alexa skill using Lambda function, S3, Amazon Polly, and Alexa. Tested the skill using Amazon Echo device with Alexa voice assistant. Used AWS free tier and developer accounts to build the project while preparing for the AWS Solutions Architect exam.

Education

  • ICSE

    Simhapuri Public School (2014)
  • BIEAP-MPC

    Narayana IIT Academy (2016)
  • BTECH ECE-HONS

    Lovely Professional University (2020)

AI-interview Questions & Answers

Yeah. So my name is. I'm a 2020 person from lovely University. So, currently, I'm a dev sec ops in the end of pocket company. So I I work with DevOps on security related things here. So I'm only the responsible person for automation and everything. I'm AWS certified, Terraform certified, and CKI certified. So, yeah, I'm very passionate DevOps and security engineer. Looking forward for better opportunities. Yeah. So I have worked in a Fintech domain, pharma domain, Credit card business and everything. So I have worked with AstraZeneca, Bootlabs, Medibuddy. I'm currently working with Empockett throughout my Carrier. So I have a very good knowledge in AWS, Docker, Kubernetes, Terraform, Linux, shell scripting, Python, and etcetera. So I have outdone multiple things Throughout my career, like, cost optimization, building high dollar rent, available architectures. Not else. So so I have a knowledge and expertise to start or implement everything from scratch by myself. Uh, so all the experience I have here, uh, or I bring to US from the startups. So, yeah, I can do everything by myself from scratch.

So I would like to use Python scripting in EC 2 Or Linux servers because so it is a very old, and we have a lot of open source community around it. So if we face any issues or if we want some guidance, there is a lot of documents, a lot of people to help out there. It will be very easy for us. And and it is more flexible, and it is human friendly, readable, and easy to Understand for any other person who have not written the script as well. So, yeah, Python is so I'll go with Python. So ease of learning and readability, the versatility, you can say. So there are extensive libraries around Python, open source community, you can say. So there is a community support as well, and it it compacts with cross platform. So it comes with cross platform compatibility. So automation and scripting is very easy, and we can furthermore use it for web development purpose as well. It can be used for data analytics and visualization, machine learning AI, lot of things. So I'll go with

So yeah. So there are a lot of, Scenarios or lot of things we have to consider before going with Terraform or cloud formation. So one one is so it is, like, open source and multi cloud platform support. So multi cloud support. And it has a declarative syntax, so Terraform uses declarative syntax allowing you to describe and describe the design state of your infrastructure. This can be At more readable and compared to JSON or YAML languages offered by the CloudFormation. And you can you can say community and ecosystem. So Terraform has large and great community that contributes models and best practices over, Uh, CloudFormation. CloudFormation is just for AWS only. So provider abstraction. So Can so Terraform cloud provided details providing consistent interface across different platforms. This abstraction Section allows users to manage infrastructure with set of commands and guidance, a lot of things, an execution plan. So immutable infrastructure. So this HCL language is supported, By lot of, uh, code editors like Visual Studio Code, uh, Atom, and etcetera. So, yeah, state management, it easy for migration, it is easier than cloud formation.

So steps in the sense, the first, I ensure monitoring and logging is enabled for all all my applications on all the infrastructure. So once you have the monitoring and logging enabled, then we we can check at what time the error erased Or at what time the application started behaving unexpectedly, then we can pinpoint the particular point of time, and we can correlate it with other services if any other service impacted this particular service, or we can go and check the Infrastructure logs as well if something happened on the infra at at that particular time or if any maintenance happened from AWS end or if anyone deleted anything. So, yeah, we can check all these things. So starting from there, then So if it is something which have done by humans or, uh, engineers, so we will Have a strict access control over it, and we can prevent it, uh, from happening again and again. So we'll set up alerts If something is modified or changed in the infra end or in in the application end. So, yeah, having strict access controls, prevents a lot of errors and a lot of security breaches as well. So and So we should have IS infrastructure as code as well so that any change happening, Uh, where the infrastructure can be monitored by this and only set of people have access to it.

So, yeah, use print functions first. So in Python, do print statement test. And, uh, and Python, it's a function. So so use print functions and, uh, division behavior. There are a lot of things. So one is print function. So division behavior. So in Python 2, division between integrates and results. Division so in Python 3, division between integrated results and flow division. And so Unicode strings use Unicode strings and 6 library. So there are a lot of other things as well, like so underscore function, underscore imports, utilize these things and try expect expect blocks accept, like, exceptions. We have to Use exceptions, blocks for import any importer between 213. Uh, use range and x range, integers which are not available in few. So following these practices using tools like 6 or you can increase the likelihood that your code will run smoothly on both Python 2 and Python 3. However, keep in mind that Python 2 Uh, reached its end of life. So it is not recommended to use Python 2. Always go with Python 3.

So first, I'll I'll enable logs, CloudWatch logs. And So in in AWS, uh, Kubernetes offering is like EKS. So we can enable all the logs, control plain logs, node logs, port logs, logs on every logs there, and we can dump them into the, uh, CloudWatch. From there, we can send those logs to Open search, and we can create dashboard visualizations, alerts, and lot of things there. So this helps us to, understand what is happening inside the EKS cluster or EKS applications. So, yeah, So Elasticsearch is my primary, uh, way to monitor. And so, uh, I will send my alerts to Slack as well If any if there is any error or which something is unexpectedly happening, these things can be monitored there. So, yeah, the my go to a tool or monitoring tool, you can say, to monitor applications deployed in Kubernetes on AWS's, so CloudTrail sorry. CloudWatch and OpenSearch. Yeah. And integrate with to Slack or Microsoft Teams, whatever the company uses. Yeah. So there are some other custom monitoring solutions offered by some other companies as well. Yeah. So we can consider the cost and lot of other factors uh

And so it it looks like there are a couple of syntax errors in the Java code here. So first, the correct, The changes here to be done are, like, corrected the print in method name, and So we have to correct the printing method and use string dot value of string to handle the case if string might be null or prevent null point exception when calling the string. So these 2 things. So one is we have to correct the method, And we have to, uh, use string dot value of string to handle the case where string might be null. These 2 things.

So they we have to fix the labels here. So if you see the spec, there is a match label section, And under that, there is app NGINX, and there is some other label in the template. Right? So that is app NGINX. So both the labels should be the same. That is the first one. And, yeah, I think I only I think this so rest, everything looks fine. Yeah. So both the labels in the template and spec section should be same. So it should be either NGINX or NGINX 1.

Yeah. I think yes. There are multiple. So and as well, I was working with AstraZeneca. Right? So I was only the person who was working on that, and I was kind of fresh air. I was having this up to 1 year of experience there, so I have to explore lot of things, and I have to learn and implement on my own. So so there so there is a lot of pharma data, like TVS of pharma data, which is, uh, incoming into the project, and we have to process it by using step functions, uh, Lambda function, s three, and lot of AI ML, uh, tools. So it was very new to me, and I've learned and implemented on my own. And I have used AWS services like Step Function, SageMaker Studio, Amplify EKS, ECS, and lot of other AWS services to to set up all these things and process the data. And I've used Linux, uh, Linux from my local so, normally, I use Linux laptop only. So I've used shell scripting of and Python scripting to run the Lambda functions and step functions to process the huge amount of data. So yeah. So so data for data processing purpose, I've used these these things in AstraZeneca

So version control system, I'll be using, uh, Git repository, branching strategies, versioning, And then I'll be using, uh, infrastructure as a code, either Terraform or CloudFormation. Like, I'll go with Terraform because it is a multi cloud. Then, uh, multi cloud abstraction layers. Abstraction layers, uh, helps us to use a multi multiple public clouds such as GCP, AWS, and Azure, and configuration management tools like Ansible, Puppet, uh, to to have a uniform or consistent configurations across all the clouds. And the CICD, we can go with Jenkins. Cloud. It is open source and cheap. So, Yeah. So immutable infrastructures. Nothing should be muted again and again. Like, same should be not repeated. I'll I'll I'll choose better monitoring and logging tools there, uh, which again which are cloud diagnostic, Like, LK, Grafana, Prometheus, and etcetera. And I'll have proper documentation, how the things are set up, How the configuration management is working, how the release management is working, and and everything. Uh, security considerations. So, As a security engineer, I I'm very much concerned about the securities. I'll I'll go with cloud diagnostic security tools like Prisma Cloud or some other things. And then the periodic testing and penetration testings, all these things helps me to, um, do all these things in multiple clouds.