Sally Wong, Developer in Hoboken, NJ, United States
Sally is available for hire
Hire Sally

Sally Wong

Verified Expert  in Engineering

DevOps/Security Specialist and Developer

Hoboken, NJ, United States

Toptal member since December 10, 2024

Bio

Sally is a skillful technologist with a versatile background in managing services such as Linux and Windows and supporting the development, DevOps workflows, and effective troubleshooting. An expert in AWS, Azure, GCP, CloudFormation, Terraform, Helm, and Python scripting, she specializes in configuration management, Ansible, Puppet, Docker, Kubernetes, as well as Kubernetes and cloud security. Sally embraces challenges, showcasing a passion for exploring new projects beyond her comfort zone.

Portfolio

Centiva Capital
RHEL, Ansible Playbooks, VMware, AWS Cloud Operations, Python 3, Shell...
Jefferies
Amazon EKS, Cloud Security, AWS Cloud Security, Splunk...
QuantPort
Puppet, Foreman, Google Cloud Platform (GCP)

Experience

  • AWS CLI - 10 years
  • Ansible Playbooks - 10 years
  • Python 3 - 8 years
  • Kubernetes Security - 5 years
  • Kubernetes - 5 years
  • AWS Cloud Security - 5 years
  • Helm - 5 years
  • Palo Alto Prisma Cloud - 4 years

Availability

Part-time

Preferred Environment

RHEL, Self-managed Kubernetes, Helm, Amazon EKS, Kubernetes Security, Palo Alto Prisma Cloud, AWS Cloud Security, AWS CloudFormation, Terraform

The most amazing...

...project I've worked on involved collaboration with SecOps and cloud engineers to operationalize the NIST Cybersecurity Framework for AWS.

Work Experience

Senior Infrastructure Engineer

2023 - 2024
Centiva Capital
  • Managed and built servers. Performed system audits for Windows and Linux machines. Standardized their configurations and created and maintained Ansible Playbooks.
  • Oversaw and monitored server resource utilization in networking, CPU, disk, and NetApp usage. Managed and remediated every issue and request in the operating system.
  • Managed AWS Direct Connect from the datacenter to AWS. Oversaw AWS Organizations, AWS Cloud WAN, virtual private clouds (VPCs), and IAMs. Created and maintained Terraform and CloudFormation codes. Configured and managed developer resources in AWS.
  • Installed and managed Lacework cloud security posture management (CSPM) tool for cloud security compliance.
  • Managed and supported developer needs and troubleshot issues in Jenkins, Docker, and EKS.
  • Monitored and remediated all cloud security alerts.
Technologies: RHEL, Ansible Playbooks, VMware, AWS Cloud Operations, Python 3, Shell, SolarWinds, VMware vCenter, Azure CLI, AWS CLI, Lacework, Docker, Jenkins, AWS Cloud Security, AWS CloudFormation, AWS IAM, Terraform

Cloud Security Engineer

2020 - 2023
Jefferies
  • Oversaw the CSPM module in Prisma Cloud. Collaborated with SecOps and cloud engineers to implement and remediate cloud security policies in the NIST Cybersecurity Framework.
  • Created runbooks and KBs in ServiceNow, enabling the SecOps team to handle cloud-related incidents.
  • Implemented and managed a compute module in Prisma Cloud for container and Kubernetes security. Communicated and collaborated with different groups to remediate vulnerabilities.
  • Planned and implemented the SNYK code security tool. Remediated security vulnerabilities in the coding stage and pipeline to shift left.
  • Created and managed Terraform codes for resources in AWS.
Technologies: Amazon EKS, Cloud Security, AWS Cloud Security, Splunk, Wiz Cloud Security Platform, Palo Alto Prisma Cloud, Containers, Container Management, Secure Containers, Kubernetes Security, REST APIs, Jenkins, Jenkins Pipeline, Python 3, Python API, Shell, Terraform, AWS CloudFormation, Serverless Framework

Cloud Engineer

2018 - 2020
QuantPort
  • Created and managed Puppet codes and utilized the Foreman lifecycle systems management tool. Identified and standardized server configurations. Created custom scripts to increase system efficiency and performance. Supported Linux and Windows.
  • Set up and managed the Google Cloud Platform (GCP) environment. Managed networking and resource needs in GCP, VPC Service Controls, and NetworkManager or Terraform automated deployment needs. Managed and supported requests for resources in GCP.
  • Established and managed the Aqua Security container security tool and DevOps tools such as Jenkins, JFrog, and GitLab. Supported Docker environment. Managed Lacework CSPM.
Technologies: Puppet, Foreman, Google Cloud Platform (GCP)

DevOps Architect

2017 - 2018
Wiley
  • Set up an AWS environment for the organization and established AWS Direct Connect with the data center to the cloud. Created AWS CloudFormation and AWS Service Catalog in Jenkins for development teams to manage their environments.
  • Established infrastructure as code (IaC) in Ansible for EC2, virtual machines (VMs), and standalone machines to standardize server creation and configuration.
  • Managed release build and deployment, supported and provisioned for development efforts.
  • Managed application migrations from on-premise servers to AWS, leveraging cloud elasticity with Elastic Load Balancing (ELB), Application Load Balancer (ALB), Amazon CloudFront, AWS Certificate Manager, and AWS S3.
  • Implemented cross-region setup for AWS Elastic Disaster Recovery (DRS).
Technologies: AWS NLB, Jenkins Pipeline, Jenkins, Jenkins Plugins, AWS CloudFormation, AWS Service Catalog, Amazon S3 (AWS S3), Amazon S3 Cross-Region Replication (CRR), Ansible Playbooks, Terraform, Apache Tomcat, JBoss AS, IBM WebSphere

Experience

Prisma Cloud CSPM and Container Security

Operationalized Prisma Cloud CSPM and container security. I integrated the NIST Cybersecurity Framework, CIS controls, and custom policies with automation and orchestration in ServiceNow to detect, prioritize, and respond to vulnerabilities and threats.

IaC Code Security

Collaborated with DevOps and different engineering teams to bring awareness and culture change of security posture vulnerabilities in IaC codes. I implemented the SNYK code security platform in DevOps workflows to ensure IaC code qualities in AWS CloudFormation, Terraform, Dockerfile, Ansible, Kubernetes manifests, Helm, etc. Finally, I remediated the security vulnerabilities found before resources were created.

Education

1992 - 1996

Bachelor's Degree in Chemistry

Bowdoin College - Brunswick, ME, USA

Certifications

JANUARY 2023 - JANUARY 2025

Prisma Certified Cloud Security Engineer

Palo Alto Networks

OCTOBER 2021 - OCTOBER 2023

CKS: Certified Kubernetes Security Specialist

The Linux Foundation

MAY 2021 - MAY 2024

AWS Certified Security - Specialty

Amazon Web Services Training and Certification

MARCH 2021 - MARCH 2024

CKAD: Certified Kubernetes Application Developer

The Linux Foundation

FEBRUARY 2021 - FEBRUARY 2024

CKA: Certified Kubernetes Administrator

The Linux Foundation

SEPTEMBER 2019 - SEPTEMBER 2021

Google Cloud Certified Professional Cloud Architect

Google Cloud

MAY 2018 - MAY 2020

AWS Certified Solutions Architec - Associate

Amazon Web Services Training and Certification

Skills

Libraries/APIs

Jenkins Pipeline, ConfigMap, REST APIs, Python API

Tools

Shell, Jenkins, Amazon EKS, AWS CloudFormation, Terraform, AWS IAM, VMware, SolarWinds, Puppet, AWS SDK, Apache Tomcat, Helm, Prisma, AWS CLI, Logging, Splunk, AWS Service Catalog, Bitbucket, Checkmarx, Checkov

Languages

Python, Python 3

Frameworks

Serverless Framework

Paradigms

DevSecOps, Role-based Access Control (RBAC)

Platforms

Kubernetes, Docker, AWS Lambda, Google Cloud Platform (GCP), AWS NLB, IBM WebSphere

Storage

JBoss AS, Ingres, Amazon S3 (AWS S3)

Other

Palo Alto Prisma Cloud, Prisma Cloud Administration, RHEL, Self-managed Kubernetes, Kubernetes Security, AWS Cloud Security, Cloud Architecture, Containers, Security Architecture, Cloud Workload Protection Platform, APIs, Container Management, AWS Cloud Operations, AWS Cloud Architecture, AWS Certified Solution Architect, Ansible Playbooks, VMware vCenter, Lacework, Cloud Security, Secure Containers, AWS Security Hub, AWS Config, Cloud, Custom Resource, Troubleshooting, Open Source, Scheduling, Orchestration, Site Reliability, Data Security, Critical Security Controls (CIS Controls), Security Management, Application Security, Containerization, Containerd, Scientific Data Analysis, Azure CLI, Wiz Cloud Security Platform, Foreman, Jenkins Plugins, Amazon S3 Cross-Region Replication (CRR), RQL, ServiceNow, SNYK

Collaboration That Works

How to Work with Toptal

Toptal matches you directly with global industry experts from our network in hours—not weeks or months.

1

Share your needs

Discuss your requirements and refine your scope in a call with a Toptal domain expert.
2

Choose your talent

Get a short list of expertly matched talent within 24 hours to review, interview, and choose from.
3

Start your risk-free talent trial

Work with your chosen talent on a trial basis for up to two weeks. Pay only if you decide to hire them.

Top talent is in high demand.

Start hiring