Designing, building, and operating production-grade cloud infrastructure at scale Specialized in multi-cloud automation, microservices orchestration, and zero-downtime delivery systems
5 Years Production Experience Β· 15+ Environments Managed Β· 99.7% Uptime SLA Β· 60% Faster Deployments
Production-focused DevOps Engineer with 5 years of hands-on experience architecting and operating cloud infrastructure for healthcare platforms and enterprise-grade microservices. Currently serving as the primary DevOps engineer for a telehealth platform on Azure, managing multi-tenant white-label infrastructure serving healthcare clients at scale.
Engineering Philosophy: Every manual process is technical debt. Infrastructure must be reproducible, version-controlled, observable, and self-healing. I build systems that operators trust and developers love.
What I bring to the table:
- End-to-end ownership of cloud infrastructure β from architecture design to production operations
- Deep expertise in both AWS and Azure ecosystems with production workloads
- Battle-tested CI/CD pipeline architecture reducing deployment cycles by 60%
- Monitoring-first mindset β if you can't observe it, you can't operate it
Primary DevOps Engineer β White-Label Healthcare SaaS Platform
Sole DevOps engineer responsible for designing, deploying, and operating the complete cloud infrastructure for a telehealth platform focused on weight-loss management and remote healthcare services. Built and maintained a multi-tenant white-label architecture supporting multiple healthcare clients with isolated infrastructure and shared deployment patterns.
π Key Responsibilities & Achievements (click to expand)
| Area | Details |
|---|---|
| Cloud Architecture | Designed and managed Azure cloud infrastructure for multiple white-label environments supporting different healthcare clients |
| Microservices | Deployed and maintained microservices architecture β Web, API, Batch Processing, and Chat services |
| Compute | Configured and managed Azure App Services and App Service Plans for backend APIs and web applications |
| Networking | Implemented Azure Front Door for global routing, load balancing, and secure access to application endpoints |
| Caching | Managed Azure Cache for Redis for high-performance caching and session management |
| Observability | Implemented centralized logging and monitoring using Azure Log Analytics Workspace and Application Insights |
| Alerting | Configured smart detection alerts, metric alerts, and action groups for application failure and performance monitoring |
| CI/CD | Built and maintained CI/CD pipelines using Jenkins to automate build, deployment, and release processes |
| Multi-Tenancy | Managed infrastructure for multiple clients with isolated resources while sharing common deployment patterns |
| Operations | Monitored system health, resolved production issues, and ensured high availability of telehealth services |
| Collaboration | Collaborated with development teams to streamline deployment workflows and improve release reliability |
Impact: Platform enables patients to access healthcare providers instantly through telehealth consultations β supporting weight-loss management, medication programs, and online patient engagement across multiple healthcare organizations.
Full Microservices Deployment on Amazon EKS β Production-Grade Kubernetes
End-to-end Kubernetes deployment of a 10-service e-commerce platform on Amazon EKS. Every manifest written, debugged, and verified working end to end.
Architecture:
Browser β AWS ELB β frontend (nginx) :80
βββ /api/catalogue/ β catalogue:8080 β mongodb:27017
βββ /api/cart/ β cart:8080 β redis:6379
βββ /api/user/ β user:8080 β mongodb:27017
βββ /api/shipping/ β shipping:8080 β mysql:3306
βββ /api/payment/ β payment:8080 β rabbitmq:5672
What makes this production-grade:
- β Liveness, Readiness, and Startup probes on all services
- β Resource requests and limits β Guaranteed QoS class
- β ConfigMaps for all environment configuration β no hardcoded values
- β nginx.conf stored in ConfigMap β mounted as volume, no image rebuilds
- β ClusterIP for all internal services, LoadBalancer only for frontend
- β RabbitMQ for async order processing β decoupled payment flow
- β Namespace isolation with proper labels and selectors
- β Distroless runtime images for Node.js, Java, and Python services
Tech: Kubernetes Amazon EKS eksctl ConfigMap Volumes Probes LoadBalancer ClusterIP k9s kubectl
Optimised Docker Images β Multi-Stage Builds for 8 Microservices
Production-optimised Dockerfiles for all Roboshop microservices using multi-stage builds, distroless runtime images, and security best practices.
Services:
βββ catalogue/ β Node.js β distroless/nodejs20
βββ cart/ β Node.js β distroless/nodejs20
βββ user/ β Node.js β distroless/nodejs20
βββ shipping/ β Java β distroless/java17 (maven builder)
βββ payment/ β Python β alpine (pip --prefix pattern)
βββ frontend/ β nginx β alpine (non-root nginx user)
βββ mongodb/ β custom β pre-loaded schema
βββ debug/ β AlmaLinux β full toolset for cluster debugging
What makes this production-grade:
- β Multi-stage builds β build tools never in final image
- β Distroless runtime images β no shell, minimal attack surface
- β Non-root users across all services
- β Exact image version pinning β reproducible builds
- β ENV removed β all config handled by Kubernetes ConfigMap
- β
Python
--prefix=/installpattern β solves platform dependency problem - β Dependency layer caching β faster rebuilds
Tech: Docker Multi-stage builds Distroless Node.js Java Python Maven nginx uwsgi Alpine
Production-Grade AWS Infrastructure with Terraform β Modular Multi-Tier Architecture
End-to-end infrastructure provisioning for a microservices e-commerce platform using Terraform with custom reusable modules.
Architecture:
βββ infra/ β Environment-specific infrastructure definitions
βββ modules/
β βββ terraform-aws-vpc/ β Custom VPC module (multi-AZ, public/private subnets)
β βββ terraform-aws-sg/ β Security group module (least-privilege network policies)
βββ roboshop-infra.drawio β Architecture diagram
What makes this production-grade:
- β Custom Terraform modules for VPC and Security Groups β not off-the-shelf, purpose-built
- β Multi-AZ deployment with proper subnet segmentation (public, private, database tiers)
- β Remote state management with state locking for team collaboration
- β Environment separation through Terraform workspaces
- β Architecture documented with draw.io diagrams
Tech: Terraform AWS VPC EC2 Security Groups S3 Backend DynamoDB State Lock Multi-AZ
Enterprise Ansible Role Architecture β 11-Service Microservices Deployment
Production-ready Ansible automation with proper role-based architecture for deploying a complete microservices application stack.
Architecture:
βββ roles/
β βββ frontend/ β Nginx reverse proxy + static assets
β βββ cart/ β Cart microservice (Node.js)
β βββ catalogue/ β Product catalog service (Node.js)
β βββ user/ β User authentication service (Node.js)
β βββ shipping/ β Shipping calculation service (Java)
β βββ payment/ β Payment processing service (Python)
β βββ mongodb/ β Document store for catalog/user data
β βββ mysql/ β Relational DB for shipping/orders
β βββ redis/ β Session cache + cart storage
β βββ rabbitmq/ β Async message queue for order processing
β βββ common/ β Shared tasks and handlers
βββ group_vars/ β Environment-specific variables
βββ inventory.ini β Host inventory
βββ roboshop.yaml β Master orchestration playbook
What makes this production-grade:
- β Role-based structure with clear separation of concerns across 11 services
- β Jinja2 templating for environment-specific configurations
- β Idempotent playbooks β safe to run repeatedly
- β Handler-based service management for optimized restarts
- β Group variables for multi-environment deployment support
Tech: Ansible YAML Jinja2 Roles Handlers Node.js Java Python MongoDB MySQL Redis RabbitMQ
Terraform Deep-Dive β State Management, Modules, Workspaces & Advanced Patterns
Comprehensive Terraform implementation covering enterprise infrastructure patterns from fundamentals to advanced state architecture.
What's covered:
- β Remote state with S3 + DynamoDB locking β team-safe infrastructure management
- β Layered state architecture separating network, compute, and application layers
- β Production VPC design with multi-AZ, public/private subnet architecture
- β Modular, reusable components following DRY principles
- β Workspace-based environment separation (dev β staging β prod)
- β Data sources for cross-stack references and output-driven integration
Tech: Terraform AWS VPC S3 DynamoDB IAM Workspaces Modules
| Certification | Issuer | Issued | Verify | |
|---|---|---|---|---|
| Microsoft Certified: Azure Fundamentals (AZ-900) | Microsoft | Apr 2022 | π Verify | |
| Foundation of Ethical Hacking | Udacity | Jan 2025 | π Verify | |
| Foundations of Cybersecurity | Mar 2026 | π Verify |
| Metric | Result |
|---|---|
| Deployment Time Reduction | 60% faster through infrastructure automation |
| Production Environments | 15+ managed across multiple healthcare clients |
| Application Uptime | 99.7% SLA for mission-critical telehealth services |
| Mean Time to Detection | < 5 minutes with proactive monitoring systems |
| Infrastructure Migrations | Executed with zero downtime |
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β β
β AUTOMATION FIRST β If you do it twice, automate it β
β IMMUTABLE INFRA β Servers are cattle, not pets β
β OBSERVABILITY β Can't improve what you can't measure β
β SECURITY BY DESIGN β Least privilege. Secrets never in code β
β DISASTER RECOVERY β Backup everything. Test restores often β
β INFRASTRUCTURE = CODE β Version-controlled, tested, reviewed β
β β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
- Infrastructure as Code β All infrastructure changes through version-controlled, peer-reviewed code
- GitOps Workflows β Git as the single source of truth for infrastructure state
- CI/CD Pipeline Design β Automated build, test, and deployment to production
- Monitoring-First Operations β Proactive alerting with actionable runbooks
- Incident Management β Defined response procedures, blameless post-mortems, continuous improvement
- Cost Optimization β Resource right-sizing, tagging strategies, and waste elimination
| Technology | Focus Area |
|---|---|
| Advanced Kubernetes | Operators, Custom Controllers, CRDs |
| Service Mesh | Istio, Linkerd |
| GitOps | ArgoCD, FluxCD |
| Infrastructure Testing | Terratest, Kitchen-Terraform |
| Cloud FinOps | Cost optimization at scale |
| Multi-Cloud | Hybrid networking architectures |
I'm always open to discussing cloud architecture challenges, infrastructure automation strategies, and DevOps best practices. Whether you're scaling infrastructure, building CI/CD pipelines, or optimizing cloud costs β let's talk.
"Infrastructure is code. Code is tested. Code is reviewed. Therefore, infrastructure is reliable."