Demola Onifade
Development
Texas, United States
Skills
DevOps
About
DEMOLA ONIFADE's skills align with Consultants and Specialists (Information and Communication Technology). DEMOLA also has skills associated with Programmers (Information and Communication Technology). DEMOLA ONIFADE has 5 years of work experience.
View more
Work Experience
Delivery/DevOps Engineer
InMoment
May 2023 - Present
- Working with a small team of engineers that provides support for over 200 developers. Managing CI/CD pipelines; maintaining bamboo build agents troubleshoot and investigating build failures. Handling service requests: providing access to tools for a team of developers and assisting with troubleshooting as needed. Managing EKS environments (dev, demo, and prod environments) and Managing GitOps workflow (Flux CD) Managing Git repository (Bitbucket and Gitlab) assigning and unassigning licenses as required, creating repository for developers. Managing and maintain bamboo Yaml specs for build setup. Managing security scanner Trivy used to perform incline scans, also ensuring that developers follow security best practices for build processes, i.e performing local scans of docker images and including Trivy scans in bamboo Yaml specs. IAC- maintaining terraform modules, using it to perform regular upgrades of tools like Flux2 in all environments. Leveraging Ansible as a server configuration manager; automating the installation of tools on various servers. Performing regular upgrades tools such as Gitlab instance, Bitbucket server, Bamboo server, TeamCity server, Proget, Trivy operator, Artifactory, Nexus and Trivy Cli Server management: CentOs, Ubuntu and Windows Server Monitoring environment with Prometheus and Grafana/Firewatch Scripting: Bash and Python Proficient in Agile Methodology Recent Projects: Base Image Audit: o Created Base Image Audit policy and documentation. o Performance Base Image Maintenance: keeping company base images updated and vulnerability free. o Maintenance Build time scan reports: modifying python and bash scripts to add more visibility to the reports. Cluster to cluster Migration: o Created Terraform modules to manage VMs. o Created ansible playbook to install NFS server, Bamboo server, Bitbucket server, and PostgreSQL. o Deploy and configured NFS server, Bamboo server, Bitbucket server in new environment. o Perform Cutover to new servers for NFS, bamboo and Bitbucket.
Cloud DevOps Engineer
EnCapture
July 2021 - May 2023
- Using Terraform configuration scripts to configure AWS resources. Proficiency in YAML-based Ansible playbooks- Installation and configuration Utilizing Terraform and Ansible for automated infrastructure provisioning on AWS. Secure management of access to AWS services and resources involves utilizing AWS Identity and Access Management (IAM) and implementing Multi-Factor Authentication (MFA) to safeguard the environment. Developed and enforced IAM policies and procedures, ensuring compliance with regulatory requirements and industry best practices. Designed and implemented a PAM policy framework that enforced the principle of least privilege and restricted access to sensitive systems and data. Create workflows and systems for CI/CD pipelines with Jenkins and other integrations- Setting up and maintaining CICD Pipelines in Jenkins and, adding the necessary plugins. Creating Docker files and implementing automated Docker image generation through the use of Jenkins and Docker. Deploying Applications to EKS. Conduct a root cause analysis of any production issues that have an impact, which may involve initiating problem cases with vendors and overseeing their resolution. Troubleshooting issues related to deployment activities, including the release of software in both development and production environments. Using Maven as build tool on Java projects for the development of build artifacts on the source code. Overseeing GitHub repositories and their respective access privileges. Engage in peer review to assess the quality, reliability, and reusability of the systems and processes used in deployment. Proficiency in working with variety of AWS resources such as EC2, S3, VPC, SUBNETS, SGs, NACLs, ELB, ECS FARGATE, ECR, IAM policies, security groups, CloudWatch, and CloudFormation. Utilizing AWS Budgets to implement custom financial plans for monitoring expenditures and resource utilization within an AWS account, along with configuring email notifications to alert when real or anticipated costs and usage go beyond designated thresholds. Utilizing Amazon's unlimited simple storage service (S3) for storing Terraform state files, hosting a static website that contains individual web pages with static content and for storing developer codes, which are later hosted on virtual servers (EC2) for creating dynamic web applications.
Associate Cybersecurity analyst
Wipro
December 2019 - July 2021
- Demonstrating a comprehensive understanding of enterprise cloud environments and cloud service provider platforms such as Microsoft Azure, AWS, and Google Cloud Platform, including their built-in security features, as well as the various technologies utilized for managing security across multiple clouds. Effectively communicating the information to the engagement team and client management via written correspondence and verbal presentations. Effectively handling and comprehending various aspects of business processes and risk management including cybersecurity, cloud security, cloud governance and compliance, DevOps, cloud data protection, cloud monitoring and incident response, enterprise security architecture, technology risk management, and several other related areas. Strategizing and carrying out client engagements centered on evaluating, examining, creating, and/or setting up secure Cloud infrastructure, platform, or software. Additionally, recognizing areas for enhancement in terms of process efficacy and security, such as role-based security, and identifying and accessing management using Wipro's cloud methodology. Assessing intricate business and technology hazards and determining solutions to alleviate them. Conducted regular audits and assessments of PAM controls, identifying and remediating gaps and vulnerabilities. Container/Kubernetes Security Project Deploying container security technology such as Sysdig in an EKS environment for enterprise use. Supervising EKS/Kubernetes and container security - monitoring infrastructure, and workload comprehensively. Creating a container test framework that is automated to test the security monitoring of EKS/Kubernetes configuration. Guaranteeing EKS reference architecture adherence to NIST 800-53 and PCI DSS compliance framework. Configure alerts in Sysdig to create a highly effective alert profile for the Security Operations Center (SOC). Incorporating container image scanning functionality into a CI/CD pipeline and performing scans on container images that are kept in a registry. Upgrading Sysdig to the latest releases including agents, inline scanner, runtime scanner, Sysdig admission controller, and other related components. Security and Program Assessments Configured and managed PAM tools such as CyberArk and Thycotic and integrated them with other security tools such as SIEM and DLP systems. Co-anchored the implementation of a PAM solution for a financial institution, providing granular control over privileged accounts and reducing the risk of insider threats. Conducted an assessment on the configuration management techniques for cloud services (AWS) and container platforms (Kubernetes, Pivotal Cloud Foundry) in a prominent financial institution and suggested guidelines for the least security requirements for AWS services, containers, and container platforms. Assisted a pharmaceutical industry leader in transitioning from their current DLP solution to Microsoft MCAS. This involved conducting a thorough assessment of the rules to ensure consistency with the previous system, as well as integrating additional best practice. Migration - In the planning phase of the database migration project, all aspects of the migration from the client's on-premises system to AWS were carefully considered. The migration was executed using AWS Data Migration Services, along with other AWS technologies such as Snowball and Data Sync, to ensure a comprehensive and successful transfer of the database to the cloud.
AWS Cloud Support Engineer
Snapx.AI
January 2019 - December 2019
- Creating S3 buckets, StoreDB, and logs backup for uploading images on CDN server. Monitoring servers via Amazon CloudWatch and SNS and managing DNS records on Amazon Route 53 Setting up and managing Linux servers on Amazon across EC2, EBS, ELB, SSL, Security Groups, RDS, etc. Creating and managing AMI/Snapshots/Volumes and upgrading/downgrading AWS resources (CPU, Memory, EBS) Executing AWS Instances and Resources Bills, creating IAM Users and generating permissions as per user requirements (policies) Implemented multi-factor authentication (MFA) for cloud-based applications and services, reducing the risk of unauthorized access. Integrating GIT into the continuous Integration (CI) environment along with Jenkins. Developing and realizing EC2 instances on Amazon, Linux to develop POCs in Production Environment Deployed and configured GIT repositories with branching forks, tagging and notifications. Implement Configuration Management systems and Infrastructure as Code (Terraform and Ansible) Managed GitHub repositories and permissions, including branching and tagging. Maintained fully automated CI/CD pipelines for code deployment using Jenkins and Implemented Release management workflow for QA, and Prod environments. Worked closely with development teams to create processes and tools that provide immediate feedback on source changes, Identify and advocate for improvements to our build and release toolchain. Used shell scripts to automate the deployment process • Monitored developed applications and fixed bugs. Implemented AWS solutions using EC2, VPC, S3, RDS, EBS, Elastic Load Balancer, Auto scaling groups. Used GIT as source code management tool: creating local repo, cloning the repo, adding, committing, Pushing the changes in the local repositories, saving changes for later (Stash), recovering files, Git tasks: Branching, creating tags, viewing logs, pulling latest commits, etc.