Close this

Omololu Imani

Development
MD, United States
Skills
DevOps
Terraform
Git
Jenkins
Kubernetes
Docker
AWS (Amazon Web Services)
Amazon SQS
Amazon CloudSearch
Bash (Gnu Bash)
DynamoDB (AWS)
Agile
About
Omololu, a skilled Dev(Sec)Ops Engineer at Deloitte, excels in driving automation and efficiency in software development processes. With expertise in AWS, Kubernetes, Terraform, and security tools, he enhances infrastructure resilience, scalability, and security. Notably, he champions CI/CD implementation, security best practices, and disaster recovery solutions, contributing to operational excellence. Omololu's proactive approach in optimizing AWS environments and streamlining workflows underscores his commitment to delivering robust and secure cloud-based solutions.
Acomplishments
Transitioning our company from traditional Redshift clusters to a serverless architecture led to significant cost savings and operational efficiencies. It eliminated continuous cluster operation, optimizing resource usage and enhancing budget transparency. Automatic scalability streamlined DevOps responsibilities and improved environmental sustainability.
Designed and implemented a Virtual Private Cloud (VPC) for enhanced network security and scalability. Segregated components into isolated subnets, set up public/private configurations, and implemented robust routing mechanisms, bolstering security and optimizing traffic flow.
Work Experience

AWS Cloud Engineer

Kapstack
October 2016 - November 2018
  • Developed utility tool using Python 3 and Bash to back up and/or migrate data between specified directories.
  • Developed utility tool using Python 3 and Bash to migrate database schemas between specified databases and directories.
  • Developed front-end GUI using Tkinter module in Python 3 for file backup and directory migration, paired with backend Oracle RDS database tracking operation times.
  • Developed Terraform module for IAM user provisioning, de-provisioning, and other IAM tasks.
  • Created S3 static websites for customers with appropriate use cases.
  • Utilized Lambda functions, SNS Topics, API Gateways, and S3 buckets to develop dynamic serverless architecture for customers.
  • Managed code repository (GitHub) to track code progress through SDLC process.
  • Wrote Terraform code to deploy EC2 instances and provision necessary EBS volumes with volume groups, logical volumes, and partitions.
  • Wrote Terraform code to automate creation of complex VPC architectures with multiple public and private subnets for various application tiers.
  • Wrote Terraform code to deploy applications into complex VPC architectures.
  • Wrote Terraform code to deploy applications into 3-tier architectures as requested.
  • Wrote Terraform code to deploy PHP front-end application with backend MySQL database.
  • Configured Jenkins pipeline for continuous integration/deployment (CI/CD) of applications.
  • Applied scripting methodologies (Batch, PowerShell, Bash, Python) to automate IT administrative tasks.
  • Monitored and optimized cloud deployment expenses against business needs.
  • Performed advanced engineering in configuration, management, and deployment of AWS cloud environments.

Information Security Consultant

Richard S Carson & Associates
July 2014 - October 2016
  • Conducted technical security assessments of major enterprise applications to identify vulnerabilities and non-compliance with security standards, recommending mitigation strategies.
  • Facilitated kick-off meetings with system application owners and stakeholders to gather pertinent information for security assessments, following NIST requirements.
  • Wrote Standard Operating Procedures (SOPs) for Information Assurance processes and procedures.
  • Developed security control baselines and test plans for assessing security controls.
  • Established user ID roles, responsibilities, and reporting structures, testing different user roles and privileges for compliance.
  • Managed vulnerabilities using Nessus vulnerability scanners across the enterprise network.
  • Reviewed complex security analyses of existing systems for compliance with security requirements independently.
  • Monitored security controls post-authorization to ensure continuous compliance.
  • Identified trends and root causes of system vulnerabilities using NESSUS Vulnerability Scanner and Nmap for port scanning, weak configurations, and missing patches.

Dev(Sec)Ops Engineer

Deloitte
April 2022 - Present
  • Developed pipelines using AWS Code Suite to automate code builds and software integration, resolving build/release failures.
  • Created custom Terraform modules for deploying various services in AWS.
  • Deployed Kubernetes clusters in AWS, migrating workflows for cost savings, high availability, and efficiency.
  • Wrote and updated custom code/modules for deploying AWS security tools.
  • Utilized Kubernetes pods with Jenkins for isolated pipeline jobs per AWS account.
  • Integrated code scanning across all pipelines to ensure all Infrastructure as Code (IaC) code is scanned before production rollout.
  • Assisted in navigating through various PCI audits.
  • Collaborated with cloud architects to build disaster recovery infrastructure and conducted failover testing.
  • Wrote Splunk queries for threat analysis and real-time alerting from collected infrastructure logs.
  • Leveraged Prisma Cloud for cloud threat monitoring.
  • Implemented security best practices for data and asset protection.
  • Developed tools and integrations to meet cross-platform user needs.
  • Maintained detailed project design write-ups on a wiki page for reference and future use cases.

AWS DevOps Engineer

Stack IT Solutions
November 2018 - April 2022
  • Participated in architectural discussions to build confidence and promote customer success when developing new and migrating existing applications, software, and services on AWS platform.
  • Automated manual tasks using Lambda functions to optimize time and increase cost savings.
  • Successfully migrated on-premise Oracle Database to Oracle RDS using Bash, SQL scripts, EC2 instances, S3 buckets, mostly automated with Terraform.
  • Deployed tier applications in auto-scaling groups across multiple availability zones for high availability.
  • Deployed 3-tier applications along with application load balancers with latency Route53 record for name resolution regardless of location.
  • Deployed bastion servers in auto-scaling group with public load balancers which forward port 22, alleviating cumbersome ssh methods.
  • Secured traffic to/from deployed EC2 instances using Security Groups/NACLs.
  • Baked golden images/AMIs with Packer to streamline and reduce post-configuration time of deployed EC2 instances, thereby increasing efficiency.
  • Directly coordinated testing, configuration, and deployment of infrastructure requested for application development throughout entire SDLC process.
  • Leveraged Jenkins CI/CD pipeline for continuous integration and deployment for production application releases.
  • Worked with Business Analysts to gather clear and concise requirements from Business/Product Owners.
  • Wrote User Stories in JIRA for all projects and tasks in order to wholly capture and perform tasks/projects to product owner satisfaction.
  • Developed process flow/OPS diagrams for all developed processes.
  • Authored and cataloged Knowledge Base articles for various issues/workarounds encountered.
Education

University of Maryland

Bachelor of Science
January 2014 - August 2017