profile-pic
Vetted Talent

Talwinder Singh

Vetted Talent

I'm Talwinder Singh, an AWS Certified Solution Architect with over 6 years of expertise in AWS Cloud, CICD, Linux Administration, and Containerization. I possess practical experience in constructing secure cloud architectures for deploying and overseeing applications.

  • Role

    DevOps / Cloud Engineer

  • Years of Experience

    5.6 years

Skillsets

  • Terraform - 4 Years
  • Networking - 6 Years
  • Containerization
  • Linux Administration
  • Azure cloud
  • Bash - 3 Years
  • EKS - 4 Years
  • Docker - 5 Years
  • CI/CD - 6 Years

Vetted For

15Skills
  • Roles & Skills
  • Results
  • Details
  • icon-skill_image
    Senior Software Engineer, DevOpsAI Screening
  • 61%
    icon-arrow-down
  • Skills assessed :infrastructure as code, Terraform, AWS, Azure, Docker, Kubernetes, 組込みLinux, Python, AWS (SageMaker), gcp vertex, Google Cloud, Kubeflow, ml architectures and lifecycle, pulumi, seldon
  • Score: 55/90

Professional Summary

5.6Years
  • Sep, 2022 - Present3 yr 4 months

    DevOps / Cloud Engineer

    Beesolver Technology Pvt
  • Aug, 2021 - Sep, 20221 yr 1 month

    AWS Engineer

    Tac Security Pvt Lmt
  • Feb, 2019 - Jul, 20212 yr 5 months

    System Administrator

    Unisep Technologies

Applications & Tools Known

  • icon-tool

    PHP

  • icon-tool

    WordPress

  • icon-tool

    MySQL

  • icon-tool

    FTP server

  • icon-tool

    Git

  • icon-tool

    React

  • icon-tool

    Laravel

  • icon-tool

    Apache

  • icon-tool

    Node.js

  • icon-tool

    AWS (Amazon Web Services)

  • icon-tool

    Docker

  • icon-tool

    cPanel

  • icon-tool

    Kubernetes

  • icon-tool

    Amazon EKS

  • icon-tool

    Amazon S3

  • icon-tool

    AWS Code Pipeline

  • icon-tool

    nginx

  • icon-tool

    AWS WAF

  • icon-tool

    AWS EC2

  • icon-tool

    AWS CloudWatch

  • icon-tool

    Github Actions

  • icon-tool

    Jenkins

  • icon-tool

    Bash

  • icon-tool

    CICD

  • icon-tool

    AWS

  • icon-tool

    GitHub Actions

  • icon-tool

    ECS

  • icon-tool

    EKS

  • icon-tool

    ECR

  • icon-tool

    IAM

  • icon-tool

    VPC

  • icon-tool

    RDS

  • icon-tool

    CLI

  • icon-tool

    EC2

  • icon-tool

    S3

  • icon-tool

    Route53

  • icon-tool

    EBS

  • icon-tool

    AMI

  • icon-tool

    Nodejs

  • icon-tool

    Nginx

  • icon-tool

    phpMyAdmin

  • icon-tool

    GoDaddy

  • icon-tool

    Digital Ocean

  • icon-tool

    AWS

  • icon-tool

    AWS CodePipeline

  • icon-tool

    Bash Scripting

  • icon-tool

    Terraform

  • icon-tool

    ECS

  • icon-tool

    IAM

  • icon-tool

    CloudWatch

  • icon-tool

    Auto Scaling

  • icon-tool

    SSM

  • icon-tool

    ELB

  • icon-tool

    CloudFormation

  • icon-tool

    Lambda

  • icon-tool

    Linux Administration

  • icon-tool

    Helm

  • icon-tool

    CI/CD Pipelines

  • icon-tool

    Microservices

  • icon-tool

    Kafka

  • icon-tool

    DNS

  • icon-tool

    ELK

  • icon-tool

    GitHub Actions

  • icon-tool

    Terraform

Work History

5.6Years

DevOps / Cloud Engineer

Beesolver Technology Pvt
Sep, 2022 - Present3 yr 4 months
    Architected AWS infrastructure, implemented CI/CD pipelines, containerized microservices, enhanced security with AWS WAF, administered EKS and Kubernetes clusters, configured AWS resources, managed IAM roles.

AWS Engineer

Tac Security Pvt Lmt
Aug, 2021 - Sep, 20221 yr 1 month
    Administered AWS services, deployed server-side frameworks, optimized web servers, secured server access, automated backups.

System Administrator

Unisep Technologies
Feb, 2019 - Jul, 20212 yr 5 months
    Managed Linux servers, developed Bash scripts, oversaw web server management, configured websites, managed network interfaces.

Achievements

  • Designed an AWS infrastructure that is highly available by using Multi AZ, multi regions
  • Set up CICD Pipelines with Jenkins, GitHub Actions, and AWS Code Pipeline
  • Containerized and Deployed applications on AWS
  • Managed AWS EKS and Kubernetes clusters
  • Configured of AWS Load balancers, Autoscaling, Route 53

Testimonial

Cybersenshi

JA

Hard worker Ontime Proactive, Thanks you help me out Talwinder I wish you all the best, For sure going to work with him again

Major Projects

3Projects

AWS Code Pipeline Setup

My radds
Sep, 2023 - Present2 yr 4 months

    Setup the AWS Code Pipeline with CodeIgniter project by utilizing the AWS Code Deploy agent that will deploy the code on EC2 Web server

Containerize and Deploy

users.www.enhancv.com Powered by TCPDF (www.tcpdf.org)Powered by TCPDF (www.tcpdf.org)\x0c'

Education

  • Bachelors in arts

    Glocal University (2018)
  • Diploma in Networking

    Jetking (2012)

Certifications

  • AWS Certified Solutions Architect

    AWS (Sep, 2022)

    Credential URL : Click here to view
  • Aws certified solutions architect

AI-interview Questions & Answers

My name is Teleminder. I am from Punjab. I have done my 10 plus 2 from Punjab port and after that I have done my graduation from the Global University and I have started my career as ADB's headman. Then I moved myself to AWS Cloud. So I have done the AWS Certificate Certification. Then after that I started learning about the AWS technology and Linux administration and AWS. So I am using multiple technologies and have experience on CIDT pipeline and other things.

to minimize the downtime, we can use the AWS autoscaling group. So it will help us to minimize the downtime, so we can roll over update by updated AMI and that AMI we can use in our autoscaling group, so in that way we will have a minimum of downtime whenever our IPC2 installs.

. . . . . . . . . . . . . . . . . . . . . . . . . . . .

Yes, to manage the state in the Terraform across multiple environment, we can use the we can move Terraform back into the cloud so we can use the DynamoDB with the S3 bucket. So in the DynamoDB, so there will be a table that will be created by the Terraform, then the Terraform state files will be moved out the S3 bucket. So whenever we have a like a different environment or different user, so they just have to type the Terraform INAT command, so the backend will be fetched from the AWS cloud, so in this way we can like manage our Terraform state file.

In fact, in a sense.

Yes, to convert a monolithic application architecture into a microservices, so first we have to review the existing architecture, so we just have to containerize every microservices like we have a application that having multiple services like a backend, frontend, database and some like a cache, some other thing, so we have to first containerize every single services, then after containerize the single services, we have to push those images to the on the Docker registry and after containerize those things, we can build the same thing on the Kubernetes, so we have to create the deployment yaml file, so which will help us to spin up the port, so that will serve our multiple microservices, so we can use the multiple things on the Kubernetes, so we have our deployment yaml file, then to expose of our application, we can use the node port service and application node plan service in the Kubernetes.

. . . . . . . . . . . . . . . . . . . . . . . . .

. . .

We can deploy the multi-tier application in the Terraform by utilizing the different providers in our Terraform configuration group. So for the high-availability, we can take multiple things, like we can deploy our instance in the multi-AV. Then we can use the AWS load balancer, and then with the utilization of the auto-scaling group. So that will help us for the high-availability. And then we can also route over traffic by using the Route 53. So we can also provide some health check there. So if the instance is unhealthy, so it will route traffic to a different instance. So this type of things we can do.

Thank you for watching.

We will use SOC 2 for electrolysis.