AWS-certified DevOps engineer focused on CI/CD pipelines, container platforms, and cloud infrastructure. I spent 3 years fixing the same classes of problems manually. Then I automated the fixing.
Currently open to DevOps / Platform / Cloud Engineering roles in San Diego County or remote.
Cloud — AWS (EC2, ECS, ECR, S3, RDS, DynamoDB, EKS, IAM, VPC, Lambda, CloudWatch, SNS, SQS, CloudTrail, Bedrock) IaC & Config — Terraform, Ansible CI/CD & GitOps — GitHub Actions, GitLab CI, Jenkins, ArgoCD, Git AI Tools — AWS Bedrock, Claude API Containers — Docker, Kubernetes, Helm Observability — Prometheus, Grafana, CloudWatch Languages — Python, Bash, SQL Systems & Networking — Linux, RHEL, CentOS, TCP/IP, DNS Security — Trivy, Checkov, Gitleaks Cert — AWS Certified Solutions Architect - Associate
| Repo | What it is |
|---|---|
| Claude-IaC-Reviewer | Terraform security reviewer built on Claude API — catches IAM wildcards, missing encryption, public S3, and hardcoded secrets before they reach prod |
| Autopsy | AI-powered RCA generator — ingests CloudWatch logs and GitHub Actions deploy history, drafts structured postmortems using Claude |
| EKS-Platform | Production-ready EKS cluster — IRSA, split Terraform state, LB controller subnet tags, kube-prometheus-stack out of the box |
| AWS-Incident-Automation | Python CLI for ECS incident triage — surfaces task failures, ALB health, and CloudWatch error rates in one command |
| Platform-Runbooks | On-call runbooks and postmortem templates for AWS/ECS incidents — severity levels, escalation paths, triage steps |
| Terraform-AWS-Infra | Modular Terraform for ECS, ECR, Lambda, S3, DynamoDB, and networking on AWS |

