Muhammad Faizan
Development
Lahore, Punjab, Pakistan
Skills
DevOps
About
Muhammad faizan's skills align with Consultants and Specialists (Information and Communication Technology). Muhammad also has skills associated with Programmers (Information and Communication Technology). Muhammad faizan appears to be a low-to-mid level candidate, with 3 years of experience.
View more
Work Experience
Software Engineer
NUI Solutions
September 2021 - March 2022
- Main Tasks Developed frontend appication using React framework Server-side development using Nodejs and MongoDB as data store Developed E2E application converting student profile data to PDF files and visualization in colleges dashboards Collaborating with other teams to improve the deployment processes and operations procedures. Worked in agile/iterative methodologies using Jira, Miro Board and Slack AWS Cloud S3-Bucket VPC, Subnets, IGW, NAT Cognito Forensics RDS (MySql, PostgreSQL) S3-Bucket Policy SNS, SES EC2, SecurityGroups EBS, EFS, DynamoDB SQS, SSM IAM Roles and Policies Beanstalk ELB, ALB Cloudfront Distribution AWS Organizations KMS, ACM Terraform AutoCloud Serverless DevOps Tools Stack GitLab Jenkins Github Actions Ansible Docker Tenable Nessus Typescript - Implemented scripts for the automation using AWS SDK. Also write Lambdas Backend Language for serverless architecture Proficiency NodeJs - Developed web applications using core NodeJs along with Express framework using Mongo as database Python - Implemented scripts for the automation using AWS SDK Boto3. Also write Lambdas for serverless architecture
DevOps Engineer
Nextbridge Ltd
July 2022 - Present
- Main Responsibility Designed a custom VPC with public and private subnets having Internet and NAT gateways. Production applications were deployed in private subnets behind an Application Load Balancer while SSM was used to access terminal of specific instances. This reduced DDoS attacks on our application by 90% Deployed frontend via CDN with S3 origin, while API Gateway redirects backend requests to NLB, efficiently routing to specific backend ports on an EC2 instance hosted in a private subnet. This increased security and reduced the latency of our global users by 45% Leveraged GitHub Actions for CI across Vue, Laravel, Java, and React apps. Stored artifacts in S3 buckets and orchestrated deployments through AWS CodeDeploy (CD). Implemented Prometheus for metric collection across servers and utilized Grafana for data visualization, alongside automated alerts via email and Slack for anomaly detection. Configured multiple MySQL RDS instances, with production RDS in multi-AZ for fault tolerance. Enabled CloudWatch audit logs and used AWS ElastiCache to cache data, reducing website downtime due to RDS failure by 90% and boosting data fetching speed by 60%. Deployed VPC peering to secure communication channels between our MongoAtlas account and production/staging VPCs, resulting in a 50% reduction in latency and a 20% decrease in network-related incidents. It furthermore reduced data-transfer cost by upto 70% Leveraged AWS Organizations to segregate production and staging environments, reducing incidents related to misconfigurations by 25%. Implemented SCPs to control user's permissions on OU level to enforce strict access controls and ensure compliance with organizational policies and security standards Conducted vulnerability assessments and remediations using Tenable Nessus and Lynis scanners, achieving PCI-DSS 3.2.1 compliance with Autocloud auditing. This comprehensive approach eliminated vulnerabilities across devices, applications, operating systems, and cloud services, enhancing security posture and safeguarding sensitive data, thus ensuring regulatory compliance and mitigating potential security risks for the company. Established AWS CloudWatch for RDS monitoring and alerting, leading to a 15% decrease in downtime and a 40% reduction in mean time to resolution for database issues. Deployed AWS Config for compliance monitoring, achieving a 20% improvement in compliance scores and a 40% reduction in auditing time. Implemented AWS GuardDuty for continuous threat detection, reducing successful security breaches by 30% and minimizing the impact of potential threats. Deployed applications on Spot Instances behind an autoscaling group and load balancer for continuous availability and scalability. This strategic move resulted in annual cost savings of $20,000 and eliminated downtime entirely, ensuring uninterrupted service for users while optimizing infrastructure expenditure for the company. Leveraged AWS Route53 Service for DNS management of all applications, ensuring efficient and reliable routing of traffic. Orchestrated a SAM (Serverless Application Model) pipeline using AWS CodePipeline, aws CloudFormation for lambdas creation. Employed AWS Secrets Manager service to securely store application secrets, and utilized an SQS queue for invoking Lambda functions.
DevOps Engineer
SkipQ
April 2022 - July 2022
- Main Responsibility Building and maintaining the Infrastructure as Code using AWS CDK Keeping the availability of Infrastructure high by building and maintaining CI/CD using AWS CodePipeline and automate deployments using AWS CodeBuild and CodeDeploy Implemented Lambda to monitor availability and latency with Cloudwatch custom Metrics, Events and Alarms Implemented Logging mechanism with AWS DynamoDB Constructed backend framework with ExpressJs and integrated AWS API Gateway with serverless-express library