Harry Grace's Resume

Harry Grace

DevOps Engineer specializing in AWS infrastructure and automation.

Northridge, CA

Harry Grace's profile picture

About

DevOps Engineer with expertise in AWS cloud infrastructure, Linux systems engineering, and CI/CD automation. Experienced in CloudFormation, Ansible, GitLab administration, and building scalable, reliable production systems.

Work Experience

Businessolver

Mar 2024 - Present

DevOps Engineer I

  • Led AWS environment provisioning via modular CloudFormation (VPC, subnets, routing, security groups, EC2/RDS) with parameterized stacks and change sets; integrated Ansible for post-provision bootstrapping
  • Linux systems engineering & operations: standardized Amazon Linux/OL8 baselines with Ansible; managed systemd services, SELinux, firewalld, and OS patch cycles; implemented user/sudo & SSH key management, logrotate/auditd, and kernel/network tuning for production reliability
  • Managed and owned GitLab and org-wide CI/CD: administered runners, optimized pipelines (caching, artifacts, parallelization), enforced protected branches and merge checks, and created reusable templates to standardize build/test/deploy across teams; improved reliability and delivery speed
  • Remote
  • AWS
  • CloudFormation
  • Ansible
  • GitLab
  • Linux

Businessolver

Jun 2023 - Mar 2024

DevOps Intern

  • Developed Ansible plays to automate DKIM creation for a mail server and configured DNS records on AWS Route53, enhancing email security and streamlining domain management processes
  • Improved a critical database server script to ensure automatic restart upon server reboot. Integrated Splunk for real-time alerting, significantly enhancing system reliability and reducing downtime in case of tunnel failures
  • Updated and managed SSL certificates on internal servers, ensuring secure and encrypted communication, and maintaining compliance with security standards
  • Shadowed experienced DevOps Engineers, gaining insights into advanced system administration, automation strategies, and best practices in a real-world technology environment
  • Remote
  • AWS
  • Ansible
  • Splunk
  • Route53

Education

California State University - Northridge

2020 - 2024
BS in Computer Information Technology

California Lutheran University

2008 - 2011
Bioengineering

Certifications

AWS Certified Cloud Practitioner

Active
Amazon Web ServicesDec 2022

Certified Kubernetes Administrator (CKA)

In Progress
Cloud Native Computing FoundationIn Progress

Certified Cloud Native Platform Engineering Associate (CNPA)

In Progress
Cloud Native Computing FoundationIn Progress

Amateur Radio License — Technician Class

Active
FCCActive

Skills

  • Python
  • Bash
  • YAML
  • AWS CloudFormation
  • Route53
  • ACM
  • EC2
  • RDS
  • VPC
  • S3
  • CloudWatch
  • SSM
  • KMS
  • Ansible
  • systemd
  • Git
  • GitLab
  • SSL/TLS
  • DNS
  • DKIM/DMARC/SPF
  • Splunk
  • Nagios
  • Checkmk
  • Linux
  • Windows
  • macOS

Projects

Automated Resume Deployment with GitHub Actions

Built end-to-end CI/CD pipeline using GitHub Actions to automatically build, test, containerize, and deploy a Next.js resume application to Oracle Cloud Infrastructure. Implemented automated Docker image builds with GitHub Container Registry, SSH-based deployment automation, and container lifecycle management with health checks and rollback capabilities.

  • GitHub Actions
  • Docker
  • Oracle Cloud
  • nginx
  • SSH
  • CI/CD

Splunk Cloud Logging & Ingestion Program

Deployed and configured Splunk Universal Forwarders across 150+ DevOps-managed servers for consistent ingestion into Splunk Cloud. Built new monitoring inputs for GitLab instances and remediated misconfigured OSSEC setup.

  • Splunk
  • Universal Forwarders
  • GitLab
  • OSSEC

Containerization Rollout

Authored/updated Ansible roles and plays to deploy containers with parameterized JVM options and environment variables. Implemented environment-specific configuration to eliminate server drift and coordinated change controls for each stage.

  • Ansible
  • Docker
  • JVM
  • Configuration Management

AWS Environment Provisioning & Baseline

Built repeatable dev/stage/prod environments using modular CloudFormation stacks (VPC, subnets, routing, security groups, compute/database layers). Parameterized templates for account/region reuse and authored runbooks enabling self-service provisioning.

  • AWS CloudFormation
  • VPC
  • EC2
  • RDS
  • Ansible
  • Route53