Cloud & Systems Engineer with 5+ years architecting high-availability AWS infrastructure, leading enterprise incident response, and building automation systems from the ground up — most recently at CloudHesive (2021–2026).
End-to-end cloud engineering initiatives delivered across enterprise managed-service accounts — each requiring full ownership from architecture through production.
Led the zero-downtime migration of 6 TB of mission-critical data from EBS to Amazon FSx for Windows File Server using AWS DataSync. Configured DataSync tasks with bandwidth throttling, mapped SMB share structures to match existing NTFS permissions, applied lifecycle policies for cold-tier tiering, and validated end-to-end integrity via checksum verification — delivering a high-performance shared storage layer for hundreds of distributed end users.
Architected a fault-tolerant VDI environment integrating Windows Server Manager with AWS Auto Scaling Groups and Amazon WorkSpaces. Defined scaling policies tied to CPU utilization and session thresholds so instances provision and terminate automatically based on real-time demand — eliminating static over-provisioning and ensuring desktop availability for a globally distributed remote workforce.
Designed a standardized Golden Image pipeline: apply patches via Systems Manager, run Sysprep, snapshot an AMI, then promote into the fleet's Launch Template — keeping all ASG instances on a consistently hardened baseline. Separately built an EC2 Rescue runbook: detach the root EBS volume, attach to a recovery instance, remediate directly, reattach and restart — avoiding full instance replacement and cutting recovery time significantly.
Built a multi-layered governance framework across an AWS Organization: deployed Config managed and custom Lambda-backed rules to detect non-compliant IAM users, over-permissive security groups, and unencrypted resources. Enforced regional lockdown via SCPs at the OU level. Automated IAM key rotation, patch compliance reporting, and AMI snapshot lifecycle enforcement with Lambda + EventBridge — eliminating weekly manual tasks entirely.
Five years of full-stack cloud ownership — from helpdesk triage to executive incident bridges and enterprise architecture delivery.
Cloud infrastructure, security governance, automation engineering, observability, and systems administration — built through years of hands-on enterprise delivery.
Build Golden Image pipelines, define Launch Templates for ASG consistency, and perform root-volume rescue operations on unresponsive instances — without instance replacement.
Author least-privilege IAM policies and enforce organizational guardrails with SCPs at the OU level — blocking dangerous API calls and preventing region sprawl across multi-account fleets.
Build serverless automation triggered by scheduled rules or resource change events — automating IAM key rotation, snapshot enforcement, and patch compliance reporting without managing servers.
Configure metric and log alarms feeding into SNS for real-time alerting. Write Log Insights queries to investigate incidents, correlate error patterns, and build dashboards that surface fleet health.
Migrated 6 TB from EBS to FSx for Windows File Server via DataSync — SMB shares, NTFS permissions, storage tiering. Manage EBS snapshot schedules and lifecycle rules across multi-account fleets.
Design public/private subnet architectures, configure routing tables, layer security groups and NACLs, manage VPC peering. Troubleshoot at the routing, security group, and DNS resolution layers.
I'm a Cloud & Systems Engineer with a genuine passion for the craft of cloud infrastructure — not just as a job, but as a field I find endlessly fascinating. The way modern cloud platforms let you design systems that are resilient, self-healing, and globally scalable is something I find exciting every time I work on it.
I spent nearly five years at CloudHesive (2021–2026) at the intersection of deep cloud architecture and enterprise IT operations — leading Severity-1 incident bridges, building automation systems from scratch, and mentoring the next generation of engineers. That chapter gave me a level of operational depth that's rare to develop anywhere else.
What drives me is the idea that well-designed infrastructure is invisible to the people who depend on it. Nobody calls you to say the servers are up. My goal is to make sure nobody has to call at all — and when they do, I'm already on the bridge.
I'm currently deepening expertise with the AWS Advanced Networking Specialty, Cisco CCNA, and HashiCorp Terraform Associate — not because they're required, but because understanding the full network and automation picture makes me a better engineer across everything I do.
Open to senior cloud engineering, infrastructure architecture, and MSP leadership roles. Deep AWS expertise, enterprise operational experience, and a track record of delivering under pressure.
View Projects ↑