About Me
I'm a passionate and skilled DevOps, DevSecOps, SRE, and Cloud Engineer with a solid foundation in infrastructure provisioning, automation, and system monitoring. I hold multiple certifications in AWS, Azure, Kubernetes, Terraform, and Linux.
With hands-on experience using tools like Jenkins, Terraform, and Ansible, I've streamlined CI/CD workflows and automated deployments for faster, more reliable software delivery. I specialize in managing and monitoring scalable cloud environments on AWS and maintaining high availability across Kubernetes clusters.
I've implemented robust monitoring and observability stacks using ELK, Grafana, and Datadog to ensure real-time visibility and performance tuning. I also leverage GitOps practices to manage infrastructure as code efficiently.
My background includes integrating automated testing into CI/CD pipelines and developing custom scripts to reduce manual effort and increase operational efficiency.
Armed with a Bachelor's degree in Computer Science and a strong GPA, I'm committed to continuous learning and always staying ahead in the cloud and DevOps space. I'm currently seeking opportunities to contribute to impactful projects in DevOps, SRE, and cloud engineering.
Certifications
// Projects
Enterprise Cloud Security Governance with Policy-as-Code
Personal ProjectEnterprise Cloud Security Governance with Policy-as-Code enforces automated AWS security using OPA/Rego in GitHub Actions to block non-compliant deployments. AWS Config, Security Hub, and Conformance Packs provide continuous compliance, while EventBridge and SSM auto-remediate drift to maintain secure, audit-ready infrastructure.
Building and Deploying an AI-Powered Threat Detection System on AWS
Personal ProjectThis project focuses on building and deploying an AI-powered Cybersecurity Threat Detection System using Amazon SageMaker. The solution is designed to detect anomalous network activity that may indicate potential cyberattacks, such as DDoS attacks, unauthorized access attempts, or phishing activities. The system leverages a machine learning pipeline that fully automates data ingestion, preprocessing, model training, deployment, and real-time inference, ensuring scalability and operational efficiency.
IAM Key Rotation Storage Deletion Terraform GitHub Actions AWS Lambda
Personal ProjectThis project consists of two AWS Lambda functions and supporting infrastructure. The first Lambda, rotate-and-deactivate-keys, creates a new access key for a target IAM user, deactivates the old key, stores the new key securely in AWS Secrets Manager, and notifies stakeholders via Amazon SNS. The second Lambda, purge-deactivated-keys, is responsible for deleting previously inactive access keys for the same IAM user. Terraform is used to provision all required resources, including IAM roles and policies, the Secrets Manager secret, the SNS topic and subscription, and optional EventBridge schedules for automation. For CI/CD, two GitHub Actions workflows are implemented: infra-provision.yml, which validates, plans, and applies the infrastructure using an S3 + DynamoDB remote backend, and ci-cd-lambda.yml, a multi-job pipeline (lint → test → build → deploy) that creates or updates both Lambda functions with safe AWS waiters to avoid deployment conflicts.
CI/CD Pipeline Project Using AWS Native SDLC Automation Tools
Personal ProjectA production‑grade CI/CD pipeline built entirely with AWS native services. It automates the SDLC from code ➜ build ➜ test/quality ➜ artifacting ➜ deploy ➜ observe/notify. The stack is cost‑efficient, scalable, and suitable for EC2 workloads (adaptable to ECS/EKS/Lambda).
Production Grade Complete CICD Pipeline with Jenkins
Personal ProjectEnd-to-end pipeline on AWS us-east-1 that takes code from commit to production with safety and visibility. A GitHub CI webhook triggers Jenkins to run Maven builds, Checkstyle, and SonarQube quality gates, then publish versioned artifacts to Nexus. Ansible handles deployments to Dev and Staging automatically, with a manual approval gate for Production. Slack posts status at every stage. Prometheus (metrics) and Splunk (logs) feed Grafana dashboards for real-time monitoring and alerting. Integrated with Jira for traceability across the release flow.
Multi-Cloud Weather Tracker App with Disaster Recovery using Terraform
Personal ProjectThis project involves deploying a weather tracker application across AWS and Azure, incorporating disaster recovery capabilities. The app’s front-end (HTML, CSS, JS) is hosted statically on AWS S3 (with CloudFront for CDN) and Azure Blob Storage.
Showing 6 of 30 projects
// Services / Offers:
I offer a wide range of services to ensure you have the best infrastructure and stay ahead in the competition.
CI/CD Pipeline Implementation
Automate your entire software delivery process with robust CI/CD pipelines using Jenkins, GitLab CI, or GitHub Actions.
Infrastructure as Code (IaC)
Manage your infrastructure using Terraform and CloudFormation for consistent, repeatable, and version-controlled deployments.
Monitoring & Observability
Implement comprehensive monitoring solutions with Prometheus, Grafana, and ELK stack for real-time insights and alerting.
DevSecOps Implementation
Integrate security into every phase of your DevOps pipeline with automated security scanning and compliance checks.
Cloud Security & Compliance
Secure your cloud infrastructure with best practices, IAM policies, encryption, and compliance frameworks implementation.
Cloud Cost Optimization
Reduce your cloud spending by up to 40% through resource optimization, reserved instances, and automated cost management.
// Testimonials
Don't just take our word for it - see what actual users of our service have to say about their experience.
Let's Talk
We'd love to help
Ready to transform your infrastructure? Let's discuss how I can help automate, scale, and optimize your cloud environment.
