Profiles search
Mike Benzel
Information Security Cloud Engineer at Modis
Nampa, ID, United States
Details
Experience:
• Review AWS cloud-base security settings for the environment.
• Participate in weekly status reporting for Security Technology Operations contract resources, including metric, SLA, and issue reporting into JIRA.
• Integrate with existing ISS Security Architecture Team
• Assess gaps in security countermeasure coverage based on security settings and implementation of security tools.
• Construct integration security countermeasure solutions for review and approval
• Integrate and assist in implementation of cloud-base security tools into existing management infrastructure.
• Conduct initial tuning of implemented cloud-based tools
• Develop POC integrations into Customers AWS environment
• Integrate with existing ISS M&A governance
2020 : Present
Modis
Information Security Cloud Engineer
• Install, upgrade, and manage systems powering Circonus SaaS infrastructure and Customer infrastructure running Circonus software in multiple cloud service providers, AWS ,Google Cloud, Digital Ocean or Promox. Install configure and troubleshoot CentOS, RedHat, CentOS, PostgreSQL.
• Automate AWS storage (ZFS) and Linux Administration daily tasks using bash, awscli, gcloud and CLI based scripts.
• Maintain Code and Documentation in GitHub both Public and Private.
• Create Jenkins CI/CD Pipelines for GitHub and Google, AWS Code and Documentation Deployment.
• Build internal Docker images for testing and Dockerize applications for deployment.
• Deploy Kubernetes applications for metrics testing and comparisons.
• Maintain JIRA ticketing system and project updates for weekly engineering call.
• Weekly on call 24/7 rotation.
2019 : 2020
Circonus
Site Reliability Engineer
• Responsible for Federal Risk and Authorization Management Program (FedRAMP) compliance and global Inventory management for Federal Government authorized Cloud Service Provider (CSP) across two Federally facing teleconferencing-based network environments, Webex.com with monthly Government audits.
• FedRAMP / WebEX. Infrastructure vulnerability, POA&M remediation / compliance and general maintenance of Linux environments, VMware, RSA, Qualys, including customer requests and break-fix situations.
• Created FedRAMP SSP-A13 Automated inventory reporting for Cloud Service Provider monitoring across 10,000+ devices using Device 42, SNMP, UCS Power Tools, SQL Scripts, Python, PowerCLI, PowerShell, Ansible and D42 Python tools.
• Resolved vulnerabilities in the Linux servers within WebEx and FedRAMP environments, POA&M & NIST, using automated scripts created in Python, PowerShell, Bash.
• Create scripts for the automation/deployment of Linux, CIMC, UCS, UCSM, for Updates and Patches in Python/Ansible/PowerShell.
• Review Qualys security logs and create Remedy Work Order’s and or Change Requests as needed.
• Create JIRA Stories, Work Orders, WCR’s for change requests and work time tracking. Present at scrum meetings my current assigned WO within the current sprint.
• Completed both Federal, State and Cisco required security and background checks for Federal Government Cloud Service Provider contracts as well as SSP-100 -300 Standards. I have also equally completed a full ITAR for Cloud Service Provider compliance and background check for US Government contractors.
2018 : 2019
Cisco
Senior Cloud/Systems Engineer FedRAMP
2018 : 2019
Cisco
Senior Cloud/Systems Engineer FedRAMP
Responsible for working in multiple technology teams maintaining clients’ cloud environments, including orchestration related applications and infrastructure, in a multi-tenant virtualized environment.
Work with the Design, Implementation, and Development teams to resolve issues related to underlying patterns or pattern extensions. Using orchestration engines, such as ICO (IBM Cloud Orchestrator), SoftLayer, BlueMix,Openstack Heat, VMware vRA, vCloud Orchestrator (vCO), or VMware vCloud Automation Center (vCAC) DB2 Using automation scripting technologies, such as Python, Ruby, or Chef for Cloud Orchestration and VMware Virtualization. Cloud security using HashiCorp Vault to maintain secure client installations.
Work within client environments to troubleshoot and resolve issues relating to the client’s hybrid cloud using industry standard tools such Python, YAML, bash, RDO, Vagrant, Docker, PowerShell and PowerCLI programming languages. ITAR Certified by IBM for secure cloud installations.
2015 : 2018
IBM
Senior Cloud Engineer
• Participate in weekly status reporting for Security Technology Operations contract resources, including metric, SLA, and issue reporting into JIRA.
• Integrate with existing ISS Security Architecture Team
• Assess gaps in security countermeasure coverage based on security settings and implementation of security tools.
• Construct integration security countermeasure solutions for review and approval
• Integrate and assist in implementation of cloud-base security tools into existing management infrastructure.
• Conduct initial tuning of implemented cloud-based tools
• Develop POC integrations into Customers AWS environment
• Integrate with existing ISS M&A governance
2020 : Present
Modis
Information Security Cloud Engineer
• Install, upgrade, and manage systems powering Circonus SaaS infrastructure and Customer infrastructure running Circonus software in multiple cloud service providers, AWS ,Google Cloud, Digital Ocean or Promox. Install configure and troubleshoot CentOS, RedHat, CentOS, PostgreSQL.
• Automate AWS storage (ZFS) and Linux Administration daily tasks using bash, awscli, gcloud and CLI based scripts.
• Maintain Code and Documentation in GitHub both Public and Private.
• Create Jenkins CI/CD Pipelines for GitHub and Google, AWS Code and Documentation Deployment.
• Build internal Docker images for testing and Dockerize applications for deployment.
• Deploy Kubernetes applications for metrics testing and comparisons.
• Maintain JIRA ticketing system and project updates for weekly engineering call.
• Weekly on call 24/7 rotation.
2019 : 2020
Circonus
Site Reliability Engineer
• Responsible for Federal Risk and Authorization Management Program (FedRAMP) compliance and global Inventory management for Federal Government authorized Cloud Service Provider (CSP) across two Federally facing teleconferencing-based network environments, Webex.com with monthly Government audits.
• FedRAMP / WebEX. Infrastructure vulnerability, POA&M remediation / compliance and general maintenance of Linux environments, VMware, RSA, Qualys, including customer requests and break-fix situations.
• Created FedRAMP SSP-A13 Automated inventory reporting for Cloud Service Provider monitoring across 10,000+ devices using Device 42, SNMP, UCS Power Tools, SQL Scripts, Python, PowerCLI, PowerShell, Ansible and D42 Python tools.
• Resolved vulnerabilities in the Linux servers within WebEx and FedRAMP environments, POA&M & NIST, using automated scripts created in Python, PowerShell, Bash.
• Create scripts for the automation/deployment of Linux, CIMC, UCS, UCSM, for Updates and Patches in Python/Ansible/PowerShell.
• Review Qualys security logs and create Remedy Work Order’s and or Change Requests as needed.
• Create JIRA Stories, Work Orders, WCR’s for change requests and work time tracking. Present at scrum meetings my current assigned WO within the current sprint.
• Completed both Federal, State and Cisco required security and background checks for Federal Government Cloud Service Provider contracts as well as SSP-100 -300 Standards. I have also equally completed a full ITAR for Cloud Service Provider compliance and background check for US Government contractors.
2018 : 2019
Cisco
Senior Cloud/Systems Engineer FedRAMP
2018 : 2019
Cisco
Senior Cloud/Systems Engineer FedRAMP
Responsible for working in multiple technology teams maintaining clients’ cloud environments, including orchestration related applications and infrastructure, in a multi-tenant virtualized environment.
Work with the Design, Implementation, and Development teams to resolve issues related to underlying patterns or pattern extensions. Using orchestration engines, such as ICO (IBM Cloud Orchestrator), SoftLayer, BlueMix,Openstack Heat, VMware vRA, vCloud Orchestrator (vCO), or VMware vCloud Automation Center (vCAC) DB2 Using automation scripting technologies, such as Python, Ruby, or Chef for Cloud Orchestration and VMware Virtualization. Cloud security using HashiCorp Vault to maintain secure client installations.
Work within client environments to troubleshoot and resolve issues relating to the client’s hybrid cloud using industry standard tools such Python, YAML, bash, RDO, Vagrant, Docker, PowerShell and PowerCLI programming languages. ITAR Certified by IBM for secure cloud installations.
2015 : 2018
IBM
Senior Cloud Engineer
Company:
Modis
About
Sr. Cloud Engineer --- Retired