I build cloud infrastructure that's secure, observable, and recovers from failure automatically.
My GitHub proves I can operate systems, not just deploy them. Every project includes working code, screenshots, and documentation. 12 production-grade projects across Kubernetes, AWS, Terraform, GitOps, security, and SRE practices.
Available for full-time DevOps, Cloud Engineering, and SRE roles. Also open to freelance and contract work on Upwork.
Complete incident response system: chaos injection → alerting → auto-healing → runbook documentation.
PodCrashLooping and NodeCPUSaturationDeclarative Kubernetes deployments via Git. Proved automated sync, self-healing (pod restored in 10 seconds), and drift correction. No manual kubectl apply in the deployment workflow.
Full autoscaling cycle proved end to end. CPU exceeded 50% threshold, HPA scaled from 1 to 3 replicas automatically. Load removed, scaled back to 1 after cooldown.
Least-privilege RBAC and default-deny network policies. Proved yes/no/no with kubectl auth can-i. Blocked cross-namespace traffic then restored selective access with allow rule.
Full observability platform: metrics, logs, dashboards, and alerting. Deployed via Helm on Minikube. Dashboards showing pod health, resource usage, and application metrics.
Zero hardcoded credentials. Vault agent injects secrets at runtime into the pod filesystem. No Kubernetes secrets, no env vars, no credentials in Git. Scoped least-privilege policy.
99% availability SLO with error budget tracking and multi-window burn rate alerts. Simulated SLO breach and measured error budget consumption in real time. SRE practices in production.
Self-hosted GitHub Actions runners on Kubernetes using Actions Runner Controller. Jobs execute inside the cluster — no secrets leaving internal infrastructure. Ephemeral runners per job.
Production-grade AWS infrastructure entirely in code. Custom VPC, EC2 behind ALB, least-privilege IAM roles. Reproducible in any region with a single terraform apply.
Three isolated environments (dev, staging, prod) from a shared VPC module with S3 remote state and versioning. Each has its own CIDR range and state file. No hardcoded values anywhere.
End-to-end pipeline from commit to production in minutes. GitHub Actions triggers the chain — Jenkins tests, Docker containerises, Kubernetes orchestrates. Zero-downtime with automated rollback.
Shift-left security. Trivy scans every image for CVEs — critical vulnerabilities block deployment automatically. Detected and remediated OpenSSL heap buffer overflow before it reached production.
Live site auto-deployed on every push. The pipeline itself is the demo.
Full-time DevOps · SRE · Cloud Engineering roles · Freelance & contract work · Cloud setup and migration · DevOps audits · Kubernetes deployments · Ongoing cloud operations on AWS and Azure