profile-pic
Vetted Talent

Kuppala Sasi Pavan

Vetted Talent

Dedicated and results-driven DevOps professional with 3+ years of hands-on experience in optimizing

and streamlining IT operations. Proven ability to design and manage Azure environments and automate

tasks with Terraform and scripting. Expertise in containerization with Docker and Kubernetes. Seeking a

challenging DevOps Engineer role to leverage cloud and DevOps skills within a dynamic team.

  • Role

    DevOps Engineer

  • Years of Experience

    3.8 years

Skillsets

  • DevOps - 4.0 Years
  • Terraform - 3 Years
  • Azure - 4.0 Years
  • SQL - 4.0 Years
  • Shell Scripting
  • Kubernetes - 4.0 Years
  • Docker - 4.0 Years
  • CI/CD
  • automation
  • Containerization
  • Disaster Recovery
  • continuous deployment
  • Monitoring
  • cost optimization
  • Azure infrastructure

Vetted For

10Skills
  • Roles & Skills
  • Results
  • Details
  • icon-skill_image
    Azure DevOps Engineer (Remote)AI Screening
  • 54%
    icon-arrow-down
  • Skills assessed :gitlab ci, Ci/Cd Pipelines, PowerShell, Terraform, AWS, Azure, Azure DevOps, Jenkins, JSON, Python
  • Score: 49/90

Professional Summary

3.8Years
  • Mar, 2023 - Present3 yr 2 months

    Azure Analyst

    Sopra Steria - Azure Analyst (UK client - TESCO)
  • May, 2022 - Present4 yr

    Azure Analyst

    Sopra Steria, Chennai Azure Analyst [UK client STW]
  • Nov, 2021 - Apr, 2022 5 months

    Azure Support Engineer

    Sopra Steria, Hyderabad Azure Support Engineer

Applications & Tools Known

  • icon-tool

    Azure

  • icon-tool

    Docker

  • icon-tool

    Kubernetes

  • icon-tool

    Terraform

  • icon-tool

    Shell Scripting

  • icon-tool

    Git

  • icon-tool

    GitHub

  • icon-tool

    Azure Monitor

  • icon-tool

    Grafana

  • icon-tool

    Prometheus

  • icon-tool

    Linux

  • icon-tool

    Windows

  • icon-tool

    GitHub Actions

  • icon-tool

    Nexus

  • icon-tool

    Azure Storage

Work History

3.8Years

Azure Analyst

Sopra Steria - Azure Analyst (UK client - TESCO)
Mar, 2023 - Present3 yr 2 months
    Designed and implemented CI/CD pipeline workflows using GitHub Actions to automate application deployment. Configured and managed GitHub Actions workflows to build Docker images and push them to the Nexus repository for version control and artifact management. Integrated GitHub Actions for continuous deployment (CD) with private Kubernetes clusters, deploying applications using Kubernetes manifests and Helm charts. Utilized GitHub Actions secrets and environment variables to securely store and access credentials for Nexus and private Kubernetes clusters. Established robust monitoring practices using Prometheus and Grafana to ensure the optimal performance and health of deployed applications. Managed and maintained Kubernetes clusters, ensuring high availability and scalability for containerized applications. Implemented rolling updates and automatic scaling to accommodate increased workloads during peak usage periods. Conducted resource allocation and utilization analysis, optimizing container resource limits and requests, resulting in a 15% reduction in infrastructure costs while maintaining optimal application performance. Developed custom Shell scripts to automate routine system backups, enhancing disaster recovery capabilities. Experienced in setting up multi-region and multi-cloud Terraform projects and using Terraform workspaces. Led International knowledge-sharing sessions on Docker and Kubernetes automation, empowering team members to take ownership of their workflows. Resolved critical production incidents promptly, maintaining system availability and minimizing business impact.

Azure Analyst

Sopra Steria, Chennai Azure Analyst [UK client STW]
May, 2022 - Present4 yr
    Automated provisioning of TEST and PROD Azure Infrastructure using Terraform. Configured services such as Azure VNET, WAFV2-enabled Application Gateway, Custom WAF Rules, App Service, Function App, Azure Storage, and Azure SQL Server to meet project requirements. Managed deployments for every update build, ensuring continuous integration and delivery. Restored SQL databases from backups, ensuring data availability and integrity. Handled SSL/TLS certificate creation and installation to ensure secure communication. Maintained and monitored the Azure environment to ensure optimal performance and security. Enhanced cloud security by using Azure Entra ID. Established robust monitoring practices using Azure App Insights, Azure Monitor, and Log Analytics Workspace. Implemented cost optimization strategies, reducing 20 % cloud expenditure by identifying and optimizing resource configurations. Resolved incidents within the defined SLA to maintain system reliability.

Azure Support Engineer

Sopra Steria, Hyderabad Azure Support Engineer
Nov, 2021 - Apr, 2022 5 months
    Facilitated the Dev & Test team by managing Azure infrastructure requests, ensuring seamless operations across development and testing environments. Orchestrated Azure environment management, focusing on performance optimization and robust security measures. Implemented proactive alert handling strategies, swiftly resolving issues to maintain high system reliability and availability. Collaborated cross-functionally to analyze and implement new Azure services and infrastructure requirements, aligning with evolving project demands and business objectives. Led the successful migration of over 20 Azure VMs to a secure environment, enhancing both security protocols and operational efficiency. Deployed Azure Bastion to fortify VM access security, significantly bolstering the overall infrastructure defense strategy. Utilized Azure IAM Policy and Azure Security Center for governance and compliance, ensuring adherence to industry standards and regulatory requirements. Automated operational tasks using Azure Automation Accounts, improving efficiency and reducing manual intervention. Integrated Azure Monitor and Application Insights for comprehensive monitoring and proactive alerting, ensuring continuous availability and performance optimization.

Achievements

  • Pinnacle Award 2022
  • Spot Award - 2023

Education

  • B. Tech (Computer Science)

    Hindustan University (2021)

Certifications

  • Microsoft certified: azure administrator associate (az-104)

  • Microsoft certified: azure fundamentals (az-900)

AI-interview Questions & Answers

Hi, my name is Sisi Pawan. I'm a DevOps and cloud engineer with over 3 years of hands-on experience in optimizing IT operations. I have a strong background in designing and maintaining Azure environments and also automating tasks with Terraform and PowerShell scripting, and have used containerization using Docker and Kubernetes. So, overall, coming to my professional experience, I'm currently working as an Azure analyst at Sopra Steria. With a main focus on UK clients like Tesco, I design and implement CICD pipelines and workflows using GitHub Actions to automate application deployment. I manage Kubernetes clusters for high availability and scalability, and I have optimized container resource allocation, reducing infrastructure cost by 15%. Coming to my self-intro conclusion, I'm very passionate about leveraging my skills in a DevOps engineer role. So I want to contribute my skills to a very dynamic team. Thanks for your time.

So we can use Python in many ways. There are many libraries in Python where we can import into Azure resources. So using those import libraries, we'll automate the deployment of Azure resources with compliance to Azure policy constraints. Using various import libraries, we'll automate the deployment of Azure resources.

So in Terraform, how will we manage secrets required for cloud resources deployment? To manage secrets for cloud resources deployment in Terraform, we use a Key Vault or a HashiCorp Key Vault provided by Terraform itself. We'll use a Key Vault to store our secrets in the Key Vault or any certificates. It will be stored in an encrypted format. We'll use Key Vault in Terraform to manage secrets required for cloud resources deployment.

So here, we'll use Terraform workspaces. So, if you want to deploy in a multi-phase deployment strategy, if you want to use this strategy, then we will use Terraform workspaces. At the time, we can declare different types of variable files in Terraform so that, when we apply Terraform, multiple resources will be created in multiple environments. Using Terraform workspaces, we can integrate these Terraform modules with Azure DevOps pipelines. So directly in the workflow itself, we can declare workspaces of these Terraform modules so that we can deploy into multiple environments.

Importance. So we have to make sure our automation script, using either PowerShell or Python, is very optimized, and it should be a time-based solution that checks the time complexity. We need to ensure importance by using our time complexity so that our automation script using PowerShell or Python executes in a particular time complexity. We have to make sure to include very small chunks of code, where we can also use cron jobs in the script or in Python, which ensures importance for automating the script.

So, initially, we can import the JSON file into Python and modify it using Python. So to change Azure policy configuration directly in the Azure portal itself, there will be an option in the automation section. In the Azure portal, there will be an automation blade. So there, we can see where we can check this automation option so we can pass this JSON file there. So we can complete whatever the resources are there in that solution. So for each resource, the JSON file will be available. So we can pass the JSON file and we can modify it using Python. So we can use the pip command in Python to modify it to JSON.

So here, the for loop, so where VMs to start here, it won't logically provide an error there in the line itself. So, while looping it, there they have provided only 1 parameter, that is VM to start, and they haven't provided computer client. They have provided only in the for loop, 1 parameter, that is VM to start, and they haven't provided computer client. So for each VM, there should be a computer client. There should be a for loop, which needs to be looped for computer client parameter also, so that then only it will start each VM separately.

Here in this Azure policy assignment, it will fail because the way of declaring this HCL programming syntax is wrong. So it will definitely fail, and we can't apply it to resolve this. We need to change the HCL form, the syntax. We need to change the syntax in Azure RM policy assignment. So there also, we need to provide double quotes there. Only single quote is provided. And here also, the way of syntax is not correct in each line. We need to change that.

So we have to use while creating Azure resources using Terraform modules. To bring up the reliability and security, we need to use RBAC, secure and other security policies. We have to assign only limited roles to users, so they'll have only limited access. We need to configure role-based access control for each resource while creating with Terraform modules to ensure reliability and security for this well-architected framework in Azure. For reliability, we have to ensure it will take a backup of each resource so it will maintain liability. And for security, we can assign or use Azure logs also. If we log that particular resource while deploying this using Terraform modules, we can show no one will have access to delete it. So it will have security also. We can use Azure logs.

So we can use AWS and Azure multi-cloud environment in Terraform, where we can optimize this using Terraform workspaces and Terraform modules also.

We'll have to use encryption to secure sensitive information used in Terraform scripts. So, if any secrets are there, we have to first encode that into base 64. And later, we can decode it. And also, we have to store the sensitive information, like your login details or any tokens, or we need to save in secrets so that we can store the secret in a keyword, so we can fetch the details from that keyword later.