SlideShare a Scribd company logo
1 of 6
Download to read offline
Page1
Onkar Singh
Associate Hadoop Analyst & Cloud Administrator
onkarasingha@gmail.com
Summary
Strongly believe in Open Source values.
Experience:
- BigData & Hadoop Administration (Hadoop): Cloudera, Ambari, Apache Hadoop
ecosystem framework and open source software.
- Cloud Administration: AWS(Amazon Web Services), Microsoft Azure.
- Linux Administration: Centos, Redhat, Debian and services.
- Infrastructure management (over 120 hosts)
- Management orchestration
- Network Administrator (lead IT Admin in Growthstory(http://www.growthstory.in))
- Capacity to adopt new environments and learn new tools.
- Experience in implementing new technologies and excellent interpersonal skills with abilities in
resolving complex software and Server issues.
- Writing technology blogs on behalf of organization - have written 30+ technology blogs on Hadoop,
Linux, and Cloud Computing.
Experience
Hadoop Administrator & Cloud Admin(AWS Consultant) at AcadGild
October 2015 - Present (1 year 2 months)
I have been working as Hadoop Administrator & Cloud Admin and have been related to projects involving
Big Data and Cloud technologies like Hadoop,Shell Script, AWS (Amazon Web Services).
I am currently involved in AcadGild (https://acadgild.com) server monitoring and maintenance. Also
involved in Hadoop Administration to guide Industrial professionals to gain expertise in Big Data
technology.
I have been writing many blogs in the Big Data technologies and linux. And my focus has been on
creating ,Planning and Implementation of various Processes with in an Organisation.
Here is the list of some blogs written by me on various technologies like Hadoop, Linux and Cloud.
https://acadgild.com/blog/configuring-rack-awareness-hadoop-using-centos/
https://acadgild.com/blog/installing-cloudera-cdh-5-centos-linux/
Page2
https://acadgild.com/blog/hadoop-admin-commands/
https://acadgild.com/blog/getting-started-aws-amazon-web-services/
https://acadgild.com/blog/job-trends-big-data/
https://acadgild.com/blog/hadoop-fault-tolerant/
https://acadgild.com/blog/ambari-installation-guide-part/
https://acadgild.com/blog/ambari-installation-guide-part-ii/
https://acadgild.com/blog/configuring-replication-factor-block-size-hdfs/
https://acadgild.com/blog/cassandra-installation-centos/
https://acadgild.com/blog/customer-case-studies-hadoop-can-used-sloution/
https://acadgild.com/blog/recover-a-forgotten-root-password-on-linux/
https://acadgild.com/blog/beginners-guide-ftp-sftp-server-configuration/
https://acadgild.com/blog/wordpress-installation-on-linux-server/
you can also visit https://acadgild.com/blog/ to see the all blogs written by me by selecting Hadoop Admin,
Linux and Cloud category.
Projects
AcadGild Website (https://acadgild.com) Monitoring and Security Implemention
May 2016 to Present
Members:Onkar Singh, Aakar Srivastava, Shabeena .
AcadGild Server Administration and monitoring is continuous process of deployment, management, and
operations on the AWS platform.
Here the list of proposed concepts which we have implemented in Acadgild website:-
>> Deploying, managing, and operating scalable, highly available, and fault tolerant systems on AWS.
>> Migrating an existing on-premises application to AWS.
>> Implementing and controlling the flow of data to and from AWS.
Page3
>> Selecting the appropriate AWS service based on compute, data, or security requirements.
>> Identifying appropriate use of AWS operational best practices.
>> Estimating AWS usage costs and identifying operational cost control mechanisms.
Analytics on Acadgild Leads
February 2016 to Present
Members:Onkar Singh, Kiran Krishna Innamuri, Manjunath N, prateek kumar, Brundesh R
Leads are the data of the people who are interested in taking course from Acadgild. We will get leads from
different sources. Some leads are converted into enrollments and the rest are not. We need to keep focus on
the areas from where we will get good leads and are converted into enrollments. for that we will perform
analytics on the data which we will get from different locations and from different sources. Depending on the
results of the analytics pain campaigning in google and other sources will be decided.
Real Time Social Media Analysis for Acadgild
February 2016 to Present
Members:Onkar Singh, Kiran Krishna Innamuri, Brundesh R, prateek kumar, Manjunath N
Analyzing social media tweets and shares related to Acadgild to implement some new marketing strategy to
generate new Leads.
Intrusion Detection System
October 2014 to Present
Members:Onkar Singh, Puja Kumari, sonal khare, Swati Soni
IDS is a multilevel security program which provides security for system and servers at various levels. Aim of
An intrusion detection system (IDS) is a kind of security system that detect
unauthorized use and abuse of networks and computer systems, and takes appropriate actions to
handle the intrusion. An Intrusion Detection System (IDS) is a device or software application that monitors
network or system activities for malicious activities or policy violations and produces reports to a
management station. IDS come in a variety of “flavors” and approach the goal of detecting suspicious traffic
in different ways. Configuring an intrusion detection system (IDS) is very challenging, and if improperly
configured an IDS is rendered ineffective. Packed with real-world tips and practical techniques, this book
shows IT and security professionals how to implement, optimize, and effectively use IDS.
Features coverage of the recently revised IDS specification. Covers IDS standards, managing traffic volume
in the IDS, intrusion signatures, log analysis, and incident handling. Provides step-by-step instructions for
configuration procedures.
>> It is based on Linux.
>> Easy to access hence GUI mode is available.
>> Built on Linux platform.
>> Helps to differentiate the authenticated user from intruder and in the observation of user.
>> Protect System and Server files.
>> Easy to block any IP address or user.
>> Easy to see user activity details.
>> Helpful in the prevention of unauthorized hits.
Page4
>> User friendly.
language used :- Shell Script and RedHat servers for configuration.
Global Medical Records
February 2014 to Present
Members:Onkar Singh, Sujeet Rai
Global Medical Record(GMR) is a web platform which provides Medical details of peoples during
emergencies like accident. GMR is a part of global service corps series. It will repair to help the doctors in
case of serious injury or sudden operations. It also helps patient to maintain his health by analyzing the data
of patient.
Frontend:-
1. HTML and css
2. Php
Backend :-
1. Php
2. Server tools:- xampp .
Skills & Expertise
Hadoop Administration
Big Data Analytics
Server Configuration
C
Linux System Administration
Shell Scripting
Leadership
Management
Teamwork
Java
HTML
PHP
SQL
Amazon Web Services (AWS)
Amazon EC2
Identity & Access Management (IAM)
Amazon S3
Amazon RDS
Certifications
AMCAT Certified Data Processing Specialist
Aspiring Minds License 1785557-211 September 2014
Page5
Organizations
Acadgild
Hadoop & Cloud Administrator
October 2015 to Present
Education
TRUBA INSTITUTE OF ENGINEERING & INFORMATION TECHNOLOGY
Bachelor of Engineering (B.E.), Computer Science Engineering, 2011 - 2015
Activities and Societies: * Discipline Member of Truba College Discipline committee. * Worked for TFS(Tech
for Seva) at MP.
Excellence School of Rewa
10+2, (P.C.M), 2007 - 2011
Grade: A
Activities and Societies: National Cadet Corps (N.C.C.)
Languages
English,
Hindi
Page6
Onkar Singh
Associate Hadoop Analyst & Cloud Administrator
onkarasingha@gmail.com
Contact Onkar on LinkedIn

More Related Content

What's hot

Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...
Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...
Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...Amazon Web Services
 
Compliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by DesignCompliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by DesignAmazon Web Services
 
FireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the CloudFireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the CloudAmazon Web Services
 
Big Data Analytics to Enhance Security
Big Data Analytics to Enhance SecurityBig Data Analytics to Enhance Security
Big Data Analytics to Enhance SecurityData Science Thailand
 
Why API Security Is More Complicated Than You Think (and Why It’s Your #1 Pri...
Why API Security Is More Complicated Than You Think (and Why It’s Your #1 Pri...Why API Security Is More Complicated Than You Think (and Why It’s Your #1 Pri...
Why API Security Is More Complicated Than You Think (and Why It’s Your #1 Pri...ProgrammableWeb
 
Cloud ID Management of North Carolina Department of Public Instruction (SEC10...
Cloud ID Management of North Carolina Department of Public Instruction (SEC10...Cloud ID Management of North Carolina Department of Public Instruction (SEC10...
Cloud ID Management of North Carolina Department of Public Instruction (SEC10...Amazon Web Services
 
Sicurezza e Compliance nel Cloud
Sicurezza e Compliance nel CloudSicurezza e Compliance nel Cloud
Sicurezza e Compliance nel CloudAmazon Web Services
 
FS-ISAC 2017 Amazon Web Services & Cloud Security
FS-ISAC 2017 Amazon Web Services & Cloud SecurityFS-ISAC 2017 Amazon Web Services & Cloud Security
FS-ISAC 2017 Amazon Web Services & Cloud SecurityAmazon Web Services
 
Migrating Your HIPAA Compliant Healthcare Analytics to AWS
Migrating Your HIPAA Compliant Healthcare Analytics to AWSMigrating Your HIPAA Compliant Healthcare Analytics to AWS
Migrating Your HIPAA Compliant Healthcare Analytics to AWSGerry Miller
 
AWS Security Week: Security, Identity, & Compliance
AWS Security Week: Security, Identity, & ComplianceAWS Security Week: Security, Identity, & Compliance
AWS Security Week: Security, Identity, & ComplianceAmazon Web Services
 
Security in the Cloud - AWS Symposium 2014 - Washington D.C.
Security in the Cloud - AWS Symposium 2014 - Washington D.C. Security in the Cloud - AWS Symposium 2014 - Washington D.C.
Security in the Cloud - AWS Symposium 2014 - Washington D.C. Amazon Web Services
 
Compliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by DesignCompliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by DesignAmazon Web Services
 
Getting started with aws security toronto rs
Getting started with aws security toronto rsGetting started with aws security toronto rs
Getting started with aws security toronto rsAmazon Web Services
 
Wrangling Security & Identity across 99+ AWS Accounts
Wrangling Security & Identity across 99+ AWS AccountsWrangling Security & Identity across 99+ AWS Accounts
Wrangling Security & Identity across 99+ AWS AccountsAndrew Bienert
 
Security as an Enabler for the Digital World - CISO Perspective
Security as an Enabler for the Digital World - CISO PerspectiveSecurity as an Enabler for the Digital World - CISO Perspective
Security as an Enabler for the Digital World - CISO PerspectiveApigee | Google Cloud
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudAmazon Web Services
 
Securing enterprise big data workloads on AWS
Securing enterprise big data workloads on AWSSecuring enterprise big data workloads on AWS
Securing enterprise big data workloads on AWSAmazon Web Services
 
AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...
AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...
AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...Amazon Web Services
 

What's hot (20)

Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...
Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...
Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...
 
Compliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by DesignCompliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by Design
 
FireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the CloudFireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the Cloud
 
Big Data Analytics to Enhance Security
Big Data Analytics to Enhance SecurityBig Data Analytics to Enhance Security
Big Data Analytics to Enhance Security
 
Why API Security Is More Complicated Than You Think (and Why It’s Your #1 Pri...
Why API Security Is More Complicated Than You Think (and Why It’s Your #1 Pri...Why API Security Is More Complicated Than You Think (and Why It’s Your #1 Pri...
Why API Security Is More Complicated Than You Think (and Why It’s Your #1 Pri...
 
Cloud ID Management of North Carolina Department of Public Instruction (SEC10...
Cloud ID Management of North Carolina Department of Public Instruction (SEC10...Cloud ID Management of North Carolina Department of Public Instruction (SEC10...
Cloud ID Management of North Carolina Department of Public Instruction (SEC10...
 
Sicurezza e Compliance nel Cloud
Sicurezza e Compliance nel CloudSicurezza e Compliance nel Cloud
Sicurezza e Compliance nel Cloud
 
FS-ISAC 2017 Amazon Web Services & Cloud Security
FS-ISAC 2017 Amazon Web Services & Cloud SecurityFS-ISAC 2017 Amazon Web Services & Cloud Security
FS-ISAC 2017 Amazon Web Services & Cloud Security
 
Migrating Your HIPAA Compliant Healthcare Analytics to AWS
Migrating Your HIPAA Compliant Healthcare Analytics to AWSMigrating Your HIPAA Compliant Healthcare Analytics to AWS
Migrating Your HIPAA Compliant Healthcare Analytics to AWS
 
AWS Security Week: Security, Identity, & Compliance
AWS Security Week: Security, Identity, & ComplianceAWS Security Week: Security, Identity, & Compliance
AWS Security Week: Security, Identity, & Compliance
 
Security in the Cloud - AWS Symposium 2014 - Washington D.C.
Security in the Cloud - AWS Symposium 2014 - Washington D.C. Security in the Cloud - AWS Symposium 2014 - Washington D.C.
Security in the Cloud - AWS Symposium 2014 - Washington D.C.
 
Compliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by DesignCompliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by Design
 
Getting started with aws security toronto rs
Getting started with aws security toronto rsGetting started with aws security toronto rs
Getting started with aws security toronto rs
 
AWS Security Hub Deep Dive
AWS Security Hub Deep DiveAWS Security Hub Deep Dive
AWS Security Hub Deep Dive
 
Wrangling Security & Identity across 99+ AWS Accounts
Wrangling Security & Identity across 99+ AWS AccountsWrangling Security & Identity across 99+ AWS Accounts
Wrangling Security & Identity across 99+ AWS Accounts
 
Security as an Enabler for the Digital World - CISO Perspective
Security as an Enabler for the Digital World - CISO PerspectiveSecurity as an Enabler for the Digital World - CISO Perspective
Security as an Enabler for the Digital World - CISO Perspective
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
 
Securing enterprise big data workloads on AWS
Securing enterprise big data workloads on AWSSecuring enterprise big data workloads on AWS
Securing enterprise big data workloads on AWS
 
AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...
AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...
AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...
 
AWS Governance Overview - Beach
AWS Governance Overview - BeachAWS Governance Overview - Beach
AWS Governance Overview - Beach
 

Viewers also liked

Viewers also liked (20)

#RichardAlmadaResumeNew1 (2) (1)
#RichardAlmadaResumeNew1 (2) (1)#RichardAlmadaResumeNew1 (2) (1)
#RichardAlmadaResumeNew1 (2) (1)
 
LaFleur, Resume
LaFleur, ResumeLaFleur, Resume
LaFleur, Resume
 
JOHN1223
JOHN1223JOHN1223
JOHN1223
 
Ddd physics content for 118
Ddd physics content for 118Ddd physics content for 118
Ddd physics content for 118
 
Tanner Resume 2
Tanner Resume 2Tanner Resume 2
Tanner Resume 2
 
Abby resume2
Abby resume2Abby resume2
Abby resume2
 
Flanigan Resume
Flanigan ResumeFlanigan Resume
Flanigan Resume
 
Akshay Kumar Dadhich resume
Akshay Kumar Dadhich resumeAkshay Kumar Dadhich resume
Akshay Kumar Dadhich resume
 
Navendu_Resume
Navendu_ResumeNavendu_Resume
Navendu_Resume
 
Amalia Lynn Howard Resume 2015.2
Amalia Lynn Howard Resume 2015.2Amalia Lynn Howard Resume 2015.2
Amalia Lynn Howard Resume 2015.2
 
Tim Purk__resume__May2016
Tim Purk__resume__May2016Tim Purk__resume__May2016
Tim Purk__resume__May2016
 
OL SR reference
OL SR referenceOL SR reference
OL SR reference
 
Breanna's Theatre Resume
Breanna's Theatre ResumeBreanna's Theatre Resume
Breanna's Theatre Resume
 
Resume 2016
Resume 2016Resume 2016
Resume 2016
 
Web server hardware and software
Web server hardware and softwareWeb server hardware and software
Web server hardware and software
 
Hajimiyan cv
Hajimiyan cvHajimiyan cv
Hajimiyan cv
 
Copyof2016Resumemjh1
Copyof2016Resumemjh1Copyof2016Resumemjh1
Copyof2016Resumemjh1
 
Lessee Resume
Lessee ResumeLessee Resume
Lessee Resume
 
Unforgettable maldiveswww.Tripmart.com
Unforgettable maldiveswww.Tripmart.comUnforgettable maldiveswww.Tripmart.com
Unforgettable maldiveswww.Tripmart.com
 
Resume_Vinod
Resume_VinodResume_Vinod
Resume_Vinod
 

Similar to Hadoop & Cloud Administrator

Information Security Analytics
Information Security AnalyticsInformation Security Analytics
Information Security AnalyticsAmrit Chhetri
 
Webinar: Vulnerability Management leicht gemacht – mit Splunk und Qualys
Webinar: Vulnerability Management leicht gemacht – mit  Splunk und QualysWebinar: Vulnerability Management leicht gemacht – mit  Splunk und Qualys
Webinar: Vulnerability Management leicht gemacht – mit Splunk und QualysGeorg Knon
 
Introduction to Backend Development (1).pptx
Introduction to Backend Development (1).pptxIntroduction to Backend Development (1).pptx
Introduction to Backend Development (1).pptxOsuGodbless
 
You Can't Protect What you Can't See. AWS Security Best Practices - Session S...
You Can't Protect What you Can't See. AWS Security Best Practices - Session S...You Can't Protect What you Can't See. AWS Security Best Practices - Session S...
You Can't Protect What you Can't See. AWS Security Best Practices - Session S...Amazon Web Services
 
AWS 클라우드를 통한 교육 및 연구 혁신 - AWS Summit Seoul 2017
AWS 클라우드를 통한 교육 및 연구 혁신 - AWS Summit Seoul 2017AWS 클라우드를 통한 교육 및 연구 혁신 - AWS Summit Seoul 2017
AWS 클라우드를 통한 교육 및 연구 혁신 - AWS Summit Seoul 2017Amazon Web Services Korea
 
Financial Services Analytics on AWS
Financial Services Analytics on AWSFinancial Services Analytics on AWS
Financial Services Analytics on AWSAmazon Web Services
 
ScottSpearman-master-resume
ScottSpearman-master-resumeScottSpearman-master-resume
ScottSpearman-master-resumeScott Spearman
 
CASE STUDY: UK NATIONAL HEALTH SERVICE
CASE STUDY: UK NATIONAL HEALTH SERVICECASE STUDY: UK NATIONAL HEALTH SERVICE
CASE STUDY: UK NATIONAL HEALTH SERVICEForgeRock
 
Cloud Resource Management
Cloud Resource ManagementCloud Resource Management
Cloud Resource ManagementNASIRSAYYED4
 
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...Amazon Web Services
 
AWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend MicroAWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend MicroAmazon Web Services
 
Real-time Visibility at Scale with Sumo Logic
Real-time Visibility at Scale with Sumo LogicReal-time Visibility at Scale with Sumo Logic
Real-time Visibility at Scale with Sumo LogicAmazon Web Services
 

Similar to Hadoop & Cloud Administrator (20)

Information Security Analytics
Information Security AnalyticsInformation Security Analytics
Information Security Analytics
 
Webinar: Vulnerability Management leicht gemacht – mit Splunk und Qualys
Webinar: Vulnerability Management leicht gemacht – mit  Splunk und QualysWebinar: Vulnerability Management leicht gemacht – mit  Splunk und Qualys
Webinar: Vulnerability Management leicht gemacht – mit Splunk und Qualys
 
internship1
internship1internship1
internship1
 
Ranadip Basak
Ranadip BasakRanadip Basak
Ranadip Basak
 
Introduction to Backend Development (1).pptx
Introduction to Backend Development (1).pptxIntroduction to Backend Development (1).pptx
Introduction to Backend Development (1).pptx
 
Aman kaur gandhi
Aman kaur gandhiAman kaur gandhi
Aman kaur gandhi
 
Aman kaur gandhi
Aman kaur gandhiAman kaur gandhi
Aman kaur gandhi
 
You Can't Protect What you Can't See. AWS Security Best Practices - Session S...
You Can't Protect What you Can't See. AWS Security Best Practices - Session S...You Can't Protect What you Can't See. AWS Security Best Practices - Session S...
You Can't Protect What you Can't See. AWS Security Best Practices - Session S...
 
AWS 클라우드를 통한 교육 및 연구 혁신 - AWS Summit Seoul 2017
AWS 클라우드를 통한 교육 및 연구 혁신 - AWS Summit Seoul 2017AWS 클라우드를 통한 교육 및 연구 혁신 - AWS Summit Seoul 2017
AWS 클라우드를 통한 교육 및 연구 혁신 - AWS Summit Seoul 2017
 
Financial Services Analytics on AWS
Financial Services Analytics on AWSFinancial Services Analytics on AWS
Financial Services Analytics on AWS
 
Madhu
MadhuMadhu
Madhu
 
Keynote & Introduction
Keynote & IntroductionKeynote & Introduction
Keynote & Introduction
 
Archonnex at ICPSR
Archonnex at ICPSRArchonnex at ICPSR
Archonnex at ICPSR
 
ScottSpearman-master-resume
ScottSpearman-master-resumeScottSpearman-master-resume
ScottSpearman-master-resume
 
CASE STUDY: UK NATIONAL HEALTH SERVICE
CASE STUDY: UK NATIONAL HEALTH SERVICECASE STUDY: UK NATIONAL HEALTH SERVICE
CASE STUDY: UK NATIONAL HEALTH SERVICE
 
Cloud Resource Management
Cloud Resource ManagementCloud Resource Management
Cloud Resource Management
 
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
 
AWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend MicroAWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend Micro
 
Real-time Visibility at Scale with Sumo Logic
Real-time Visibility at Scale with Sumo LogicReal-time Visibility at Scale with Sumo Logic
Real-time Visibility at Scale with Sumo Logic
 
Inphina at a glance
Inphina at a glanceInphina at a glance
Inphina at a glance
 

Recently uploaded

Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsMehedi Hasan Shohan
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?Watsoo Telematics
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 

Recently uploaded (20)

Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software Solutions
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 

Hadoop & Cloud Administrator

  • 1. Page1 Onkar Singh Associate Hadoop Analyst & Cloud Administrator onkarasingha@gmail.com Summary Strongly believe in Open Source values. Experience: - BigData & Hadoop Administration (Hadoop): Cloudera, Ambari, Apache Hadoop ecosystem framework and open source software. - Cloud Administration: AWS(Amazon Web Services), Microsoft Azure. - Linux Administration: Centos, Redhat, Debian and services. - Infrastructure management (over 120 hosts) - Management orchestration - Network Administrator (lead IT Admin in Growthstory(http://www.growthstory.in)) - Capacity to adopt new environments and learn new tools. - Experience in implementing new technologies and excellent interpersonal skills with abilities in resolving complex software and Server issues. - Writing technology blogs on behalf of organization - have written 30+ technology blogs on Hadoop, Linux, and Cloud Computing. Experience Hadoop Administrator & Cloud Admin(AWS Consultant) at AcadGild October 2015 - Present (1 year 2 months) I have been working as Hadoop Administrator & Cloud Admin and have been related to projects involving Big Data and Cloud technologies like Hadoop,Shell Script, AWS (Amazon Web Services). I am currently involved in AcadGild (https://acadgild.com) server monitoring and maintenance. Also involved in Hadoop Administration to guide Industrial professionals to gain expertise in Big Data technology. I have been writing many blogs in the Big Data technologies and linux. And my focus has been on creating ,Planning and Implementation of various Processes with in an Organisation. Here is the list of some blogs written by me on various technologies like Hadoop, Linux and Cloud. https://acadgild.com/blog/configuring-rack-awareness-hadoop-using-centos/ https://acadgild.com/blog/installing-cloudera-cdh-5-centos-linux/
  • 2. Page2 https://acadgild.com/blog/hadoop-admin-commands/ https://acadgild.com/blog/getting-started-aws-amazon-web-services/ https://acadgild.com/blog/job-trends-big-data/ https://acadgild.com/blog/hadoop-fault-tolerant/ https://acadgild.com/blog/ambari-installation-guide-part/ https://acadgild.com/blog/ambari-installation-guide-part-ii/ https://acadgild.com/blog/configuring-replication-factor-block-size-hdfs/ https://acadgild.com/blog/cassandra-installation-centos/ https://acadgild.com/blog/customer-case-studies-hadoop-can-used-sloution/ https://acadgild.com/blog/recover-a-forgotten-root-password-on-linux/ https://acadgild.com/blog/beginners-guide-ftp-sftp-server-configuration/ https://acadgild.com/blog/wordpress-installation-on-linux-server/ you can also visit https://acadgild.com/blog/ to see the all blogs written by me by selecting Hadoop Admin, Linux and Cloud category. Projects AcadGild Website (https://acadgild.com) Monitoring and Security Implemention May 2016 to Present Members:Onkar Singh, Aakar Srivastava, Shabeena . AcadGild Server Administration and monitoring is continuous process of deployment, management, and operations on the AWS platform. Here the list of proposed concepts which we have implemented in Acadgild website:- >> Deploying, managing, and operating scalable, highly available, and fault tolerant systems on AWS. >> Migrating an existing on-premises application to AWS. >> Implementing and controlling the flow of data to and from AWS.
  • 3. Page3 >> Selecting the appropriate AWS service based on compute, data, or security requirements. >> Identifying appropriate use of AWS operational best practices. >> Estimating AWS usage costs and identifying operational cost control mechanisms. Analytics on Acadgild Leads February 2016 to Present Members:Onkar Singh, Kiran Krishna Innamuri, Manjunath N, prateek kumar, Brundesh R Leads are the data of the people who are interested in taking course from Acadgild. We will get leads from different sources. Some leads are converted into enrollments and the rest are not. We need to keep focus on the areas from where we will get good leads and are converted into enrollments. for that we will perform analytics on the data which we will get from different locations and from different sources. Depending on the results of the analytics pain campaigning in google and other sources will be decided. Real Time Social Media Analysis for Acadgild February 2016 to Present Members:Onkar Singh, Kiran Krishna Innamuri, Brundesh R, prateek kumar, Manjunath N Analyzing social media tweets and shares related to Acadgild to implement some new marketing strategy to generate new Leads. Intrusion Detection System October 2014 to Present Members:Onkar Singh, Puja Kumari, sonal khare, Swati Soni IDS is a multilevel security program which provides security for system and servers at various levels. Aim of An intrusion detection system (IDS) is a kind of security system that detect unauthorized use and abuse of networks and computer systems, and takes appropriate actions to handle the intrusion. An Intrusion Detection System (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station. IDS come in a variety of “flavors” and approach the goal of detecting suspicious traffic in different ways. Configuring an intrusion detection system (IDS) is very challenging, and if improperly configured an IDS is rendered ineffective. Packed with real-world tips and practical techniques, this book shows IT and security professionals how to implement, optimize, and effectively use IDS. Features coverage of the recently revised IDS specification. Covers IDS standards, managing traffic volume in the IDS, intrusion signatures, log analysis, and incident handling. Provides step-by-step instructions for configuration procedures. >> It is based on Linux. >> Easy to access hence GUI mode is available. >> Built on Linux platform. >> Helps to differentiate the authenticated user from intruder and in the observation of user. >> Protect System and Server files. >> Easy to block any IP address or user. >> Easy to see user activity details. >> Helpful in the prevention of unauthorized hits.
  • 4. Page4 >> User friendly. language used :- Shell Script and RedHat servers for configuration. Global Medical Records February 2014 to Present Members:Onkar Singh, Sujeet Rai Global Medical Record(GMR) is a web platform which provides Medical details of peoples during emergencies like accident. GMR is a part of global service corps series. It will repair to help the doctors in case of serious injury or sudden operations. It also helps patient to maintain his health by analyzing the data of patient. Frontend:- 1. HTML and css 2. Php Backend :- 1. Php 2. Server tools:- xampp . Skills & Expertise Hadoop Administration Big Data Analytics Server Configuration C Linux System Administration Shell Scripting Leadership Management Teamwork Java HTML PHP SQL Amazon Web Services (AWS) Amazon EC2 Identity & Access Management (IAM) Amazon S3 Amazon RDS Certifications AMCAT Certified Data Processing Specialist Aspiring Minds License 1785557-211 September 2014
  • 5. Page5 Organizations Acadgild Hadoop & Cloud Administrator October 2015 to Present Education TRUBA INSTITUTE OF ENGINEERING & INFORMATION TECHNOLOGY Bachelor of Engineering (B.E.), Computer Science Engineering, 2011 - 2015 Activities and Societies: * Discipline Member of Truba College Discipline committee. * Worked for TFS(Tech for Seva) at MP. Excellence School of Rewa 10+2, (P.C.M), 2007 - 2011 Grade: A Activities and Societies: National Cadet Corps (N.C.C.) Languages English, Hindi
  • 6. Page6 Onkar Singh Associate Hadoop Analyst & Cloud Administrator onkarasingha@gmail.com Contact Onkar on LinkedIn