Jake Hindman.
Cloud & Systems Engineer
Copied!
Available for cloud engineering roles

Jake
Hindman.

Cloud & Systems Engineer with 5+ years architecting high-availability AWS infrastructure, leading enterprise incident response, and building automation systems from the ground up — most recently at CloudHesive (2021–2026).

Certifications
Solutions Architect – AssociateAWS
AI PractitionerAWS
Cloud PractitionerAWS
Azure Fundamentals AZ-900Azure
Advanced Networking – SpecialtyIn Progress
Cisco CCNAIn Progress
Terraform AssociateIn Progress
0+ yrs
Engineering
0TB
Migrated · Zero Loss
0×
AWS Certified
24/7
On-Call Rotation
2021–26
CloudHesive
Remote
US-Based
01Key Projects

Featured work.

End-to-end cloud engineering initiatives delivered across enterprise managed-service accounts — each requiring full ownership from architecture through production.

01 / 04

Enterprise Data Migration

Led the zero-downtime migration of 6 TB of mission-critical data from EBS to Amazon FSx for Windows File Server using AWS DataSync. Configured DataSync tasks with bandwidth throttling, mapped SMB share structures to match existing NTFS permissions, applied lifecycle policies for cold-tier tiering, and validated end-to-end integrity via checksum verification — delivering a high-performance shared storage layer for hundreds of distributed end users.

AWS DataSyncAmazon FSxEBSSMB SharesLifecycle PoliciesZero Data Loss
02 / 04

Scalable VDI Architecture

Architected a fault-tolerant VDI environment integrating Windows Server Manager with AWS Auto Scaling Groups and Amazon WorkSpaces. Defined scaling policies tied to CPU utilization and session thresholds so instances provision and terminate automatically based on real-time demand — eliminating static over-provisioning and ensuring desktop availability for a globally distributed remote workforce.

Auto Scaling GroupsAmazon WorkSpacesWindows ServerVDISession-Based Scaling
03 / 04

Golden Image Pipeline & EC2 Rescue

Designed a standardized Golden Image pipeline: apply patches via Systems Manager, run Sysprep, snapshot an AMI, then promote into the fleet's Launch Template — keeping all ASG instances on a consistently hardened baseline. Separately built an EC2 Rescue runbook: detach the root EBS volume, attach to a recovery instance, remediate directly, reattach and restart — avoiding full instance replacement and cutting recovery time significantly.

AMI PipelineEC2 RescueSystems ManagerLaunch TemplatesRoot Volume Recovery
04 / 04

Governance & Compliance Automation

Built a multi-layered governance framework across an AWS Organization: deployed Config managed and custom Lambda-backed rules to detect non-compliant IAM users, over-permissive security groups, and unencrypted resources. Enforced regional lockdown via SCPs at the OU level. Automated IAM key rotation, patch compliance reporting, and AMI snapshot lifecycle enforcement with Lambda + EventBridge — eliminating weekly manual tasks entirely.

AWS ConfigLambda + EventBridgeSCPsIAM GovernanceAWS Organizations
02Experience

Career timeline.

Five years of full-stack cloud ownership — from helpdesk triage to executive incident bridges and enterprise architecture delivery.

Nov 2021 — Apr 2026
Cloud & MSP Support Engineer
CloudHesive · Fort Lauderdale, FL (Remote)
  • Served as the primary technical point of contact across a portfolio of enterprise managed-service accounts, owning cloud engineering deliverables and end-user IT support — responsibilities typically split across two separate roles.
  • Led Severity-1 and Severity-2 incident response bridges, coordinating real-time troubleshooting across engineering, networking, and application teams while delivering structured status communication to C-level stakeholders throughout.
  • Conducted AWS Well-Architected Framework reviews, identifying architectural risks and delivering remediation plans that reduced recurring incidents, strengthened RTO/RPO postures, and eliminated single points of failure across managed accounts.
  • Mentored junior engineers through structured pairing and code review, building team competency in AWS fundamentals, incident escalation protocols, and infrastructure troubleshooting methodology.
  • Owned 24/7 on-call coverage: IAM access key lifecycle management, automated OS and application patch management via Systems Manager, AMI snapshot retention governance, and continuous compliance monitoring via AWS Config across multi-account fleets.
  • Architected and delivered end-to-end cloud projects — data migrations, VDI environments, Golden Image pipelines, serverless compliance automation — from requirements gathering through production handoff and knowledge transfer.
2018 — 2021
Education & Technical Foundations
Rogers State University · Tri County Tech
  • Earned a B.S. in Business Information Technology — Network Administration from Rogers State University, Claremore, OK. Built a strong foundation in enterprise networking, systems design, and IT governance.
  • Completed a Certificate in Computer Repair & Networking at Tri County Tech (May 2018) — hands-on skills in hardware diagnostics, TCP/IP configuration, and structured helpdesk operations.
  • Developed early expertise in Windows Server administration, Active Directory, subnetting, and hypervisor-based virtualization — directly foundational to current cloud engineering practice.
03Technical Skills

The full stack.

Cloud infrastructure, security governance, automation engineering, observability, and systems administration — built through years of hands-on enterprise delivery.

Cloud Infrastructure
EC2 EBS S3 RDS VPC Auto Scaling AMI Amazon FSx WorkSpaces Lambda Systems Manager ECS
Networking & Security
VPC Design IAM MFA SCPs GuardDuty Security Hub AWS Organizations Zero Trust ACM
IaC & Automation
Terraform EventBridge PowerShell Bash AWS CLI VM Import/Export
Monitoring & Observability
CloudWatch CloudTrail Log Insights Metric Alarms SNS AWS Config
IT Systems & Leadership
Windows Server Active Directory Linux Virtualization ITSM Incident Command Mentorship
How I use key services
EC2 & AMI

Build Golden Image pipelines, define Launch Templates for ASG consistency, and perform root-volume rescue operations on unresponsive instances — without instance replacement.

IAM & SCPs

Author least-privilege IAM policies and enforce organizational guardrails with SCPs at the OU level — blocking dangerous API calls and preventing region sprawl across multi-account fleets.

Lambda & EventBridge

Build serverless automation triggered by scheduled rules or resource change events — automating IAM key rotation, snapshot enforcement, and patch compliance reporting without managing servers.

CloudWatch & Alarms

Configure metric and log alarms feeding into SNS for real-time alerting. Write Log Insights queries to investigate incidents, correlate error patterns, and build dashboards that surface fleet health.

Amazon FSx & EBS

Migrated 6 TB from EBS to FSx for Windows File Server via DataSync — SMB shares, NTFS permissions, storage tiering. Manage EBS snapshot schedules and lifecycle rules across multi-account fleets.

VPC & Networking

Design public/private subnet architectures, configure routing tables, layer security groups and NACLs, manage VPC peering. Troubleshoot at the routing, security group, and DNS resolution layers.

04About & Certifications

More than
infrastructure.

I'm a Cloud & Systems Engineer with a genuine passion for the craft of cloud infrastructure — not just as a job, but as a field I find endlessly fascinating. The way modern cloud platforms let you design systems that are resilient, self-healing, and globally scalable is something I find exciting every time I work on it.

I spent nearly five years at CloudHesive (2021–2026) at the intersection of deep cloud architecture and enterprise IT operations — leading Severity-1 incident bridges, building automation systems from scratch, and mentoring the next generation of engineers. That chapter gave me a level of operational depth that's rare to develop anywhere else.

What drives me is the idea that well-designed infrastructure is invisible to the people who depend on it. Nobody calls you to say the servers are up. My goal is to make sure nobody has to call at all — and when they do, I'm already on the bridge.

I'm currently deepening expertise with the AWS Advanced Networking Specialty, Cisco CCNA, and HashiCorp Terraform Associate — not because they're required, but because understanding the full network and automation picture makes me a better engineer across everything I do.

0+
Years Experience
0TB
Data Migrated
0
Certs Earned
24/7
On-Call Coverage
Certifications
AWS Certified Solutions Architect – AssociateEarned
AWS Certified AI PractitionerEarned
AWS Certified Cloud PractitionerEarned
Microsoft Azure Fundamentals (AZ-900)Earned
AWS Advanced Networking – SpecialtyIn Progress
Cisco CCNAIn Progress
HashiCorp Terraform AssociateIn Progress
Currently Learning
ActiveAWS Advanced Networking – Specialty
ActiveCisco CCNA Routing & Switching
ActiveHashiCorp Terraform Associate

Let's
build
something.

Open to senior cloud engineering, infrastructure architecture, and MSP leadership roles. Deep AWS expertise, enterprise operational experience, and a track record of delivering under pressure.

View Projects ↑