My Projects

Filter Projects

Showing all projects
SRE & Observability

AegisTickets - AWS EKS Reliability Platform

Engineered a reliability-focused production system using SLIs, SLOs, error budgets, and golden-signal monitoring to guide autoscaling and operational decisions. Built on AWS EKS with Terraform infrastructure as code, implementing comprehensive observability stack with Prometheus and Grafana for real-time monitoring and alerting. The platform achieved 99.95% uptime through proactive incident prevention and automated scaling based on service level objectives.

AWS EKS Terraform Prometheus Grafana SLIs/SLOs Error Budgets Observability SRE
AI/ML Platform

Building an Enterprise AI/ML Platform That Actually Works in Production

Applied SRE principles to AI workloads, implementing observability, alerting, and cost-performance trade-off controls, reducing inference costs by ~60 percent. Built comprehensive monitoring for AI/ML pipelines with custom metrics, drift detection, and automated scaling based on service level objectives. Integrated FinOps practices to optimize resource utilization and cost efficiency while maintaining model performance and reliability.

AI/ML SRE Observability Alerting FinOps Cost Optimization
Cloud-Native Application

Building a Cloud-Native Job Portal That Actually Works

Built a resilient AWS application with health-checked deployments, automated recovery workflows, and zero-downtime delivery. Implemented comprehensive health monitoring, automated failover mechanisms, and rolling update strategies to ensure continuous availability. The platform features proactive health checks, automated remediation, and resilient architecture patterns that maintain service continuity during deployments and infrastructure failures.

AWS Health Checks Automated Recovery Zero Downtime Resilience
Security & Penetration Testing

AWS Cloud Penetration Test

Conducted comprehensive penetration testing and real-world risk assessment on production-grade AWS infrastructure. Identified critical vulnerabilities across IAM configurations, network security groups, storage permissions, and application layers. Delivered detailed redacted report with prioritized remediation recommendations aligned with industry security standards and AWS best practices.

AWS Penetration Testing IAM Security Risk Assessment Compliance Security Audit
Platform Engineering

FinBankOps: Secure, Multi-Region Kubernetes Infrastructure for Fintech

This project implements a production-grade, secure Kubernetes infrastructure for fintech using Amazon EKS. It supports multi-region deployment, blue/green releases, and GitOps-driven workflows via ArgoCD. Istio handles ingress traffic and internal service mesh routing, while security is reinforced using External Secrets Operator and kube-bench/kubescape audits. Observability is ensured via Prometheus, Grafana, and CloudWatch. The platform enables PCI-DSS-aligned compliance while providing scalable deployment for containerized microservices stored in Amazon ECR.

AWS EKS ArgoCD Istio Secrets Mgmt Prometheus Grafana KubeBench
ML & DevOps

DevOps-Enabled Real-Time ML Fraud Detection System

This project showcases the complete pipeline for a real-time fraud detection system using a containerized microservices architecture on AWS. Ingestion, inference, and action microservices are deployed to Amazon ECS (Fargate), and their Docker images are stored in ECR. Machine learning inference is based on a trained model that detects anomalous financial transactions in real-time. Infrastructure is managed with Terraform, CI/CD is orchestrated via GitHub Actions, and observability is achieved through Amazon CloudWatch. Fraud alerts are published via Amazon SNS, and the architecture is extensible to support compliance audit logging using Amazon RDS.

AWS ECS Fargate GitHub Actions Amazon RDS SNS Terraform CloudWatch ML
Application Platform

Secure Three-Tier Web Application on Kubernetes

This project focused on deploying a secure, scalable three-tier web application using AWS and Kubernetes. I provisioned a robust EKS cluster and built Docker containers for both frontend and backend services, hosted securely via AWS ECR. To route traffic efficiently, I configured an ALB Ingress Controller. For observability, I enabled CloudWatch control plane logs to track API server activities, authenticator logs, and audits. The infrastructure was designed to scale dynamically, with IAM roles enforcing principle of least privilege across services.

AWS Docker EKS Terraform CloudWatch IAM
CI/CD & Infrastructure

Three-Tier Web App with GitHub Actions CI/CD

In this project, I built a fully automated, environment-aware deployment pipeline for a three-tier web application. The frontend was hosted on S3 while the backend (Node.js) ran on EC2 within a VPC. GitHub Actions orchestrated CI/CD pipelines across dev and prod branches. Infrastructure was provisioned with Terraform, including private/public subnets and NAT gateways. For monitoring, I installed the CloudWatch agent and configured AWS Managed Grafana dashboards with real-time CPU, memory, and disk usage metrics. Alerts were created for SLA-sensitive events. This setup exemplifies production-grade DevOps and cloud architecture.

AWS EC2 Terraform GitHub Actions S3 CloudWatch Managed Grafana
Full DevOps Pipeline

End-to-End DevOps Pipeline with EKS & ELK Stack

This project implemented a full-stack DevOps solution using GitHub Actions for CI, Terraform for infrastructure automation, and Kubernetes on AWS EKS for orchestration. Dockerized applications were built and deployed with Kubernetes manifests. Logs were centralized using the ELK stack, while Prometheus and Grafana enabled detailed performance monitoring and alerting. Security was reinforced through IAM policies, encrypted storage, and TLS via ACM certificates.

AWS Terraform GitHub Actions Docker EKS Prometheus Grafana ELK Stack
Disaster Recovery

Automated Cloud Disaster Recovery Solution

This disaster recovery project leveraged AWS infrastructure to build a resilient architecture that could handle regional failover, backup, and restoration. Using Terraform for reproducible infrastructure and GitHub Actions for automation, I integrated Datadog for system observability and alerting to ensure readiness in business continuity scenarios.

AWS Terraform GitHub Actions EC2 S3 Route 53 Datadog
Containerization

Containerized WebApp with CI/CD & Monitoring

This project involved containerizing a Node.js web app, deploying it using a CI/CD pipeline built with GitHub Actions, and configuring Prometheus and Grafana to provide visibility into app health and performance. The goal was to streamline releases and provide real-time monitoring of container behavior and HTTP requests.

Docker GitHub Actions Node.js Prometheus Grafana
ML Deployment

ML Model Deployment with Flask on AWS

I deployed a Flask-based ML model as a production API on EC2 using Terraform and GitHub Actions. AWS CloudFormation and S3 were used for configuration and storage. Monitoring was integrated with Prometheus and Grafana, and AWS Security Hub was configured for compliance audits and vulnerability detection.

AWS Flask ML Model CloudFormation S3 EC2 Prometheus Grafana Security Hub
Serverless CI/CD

Scalable Web App CI/CD with AWS Amplify

This project centered on building a CI/CD pipeline for a React-based web application. The frontend was deployed using AWS Amplify, and backend logic was handled with AWS Lambda. CodePipeline and CodeBuild automated deployments, and CloudWatch monitored performance metrics and logs.

AWS Amplify Terraform AWS Lambda RDS CodePipeline CloudWatch
GCP Platform

Full-Stack Application CI/CD on Google Cloud

I deployed a full-stack application on GCP using Docker containers, Terraform for infra provisioning, and GitHub Actions for CI/CD. Monitoring and alerting were set up using the Google Cloud Operations Suite, providing clear visibility into deployments and runtime behavior.

GCP Docker Terraform GitHub Actions Cloud Run Monitoring
Jenkins Pipeline

Node.js CI/CD with Jenkins & S3 Artifacts

This project focused on implementing an efficient Jenkins-based CI/CD pipeline for a Node.js application. Artifacts were managed and stored using S3. GitHub served as the version control system, and automated builds ensured fast feedback loops.

Node.js GitHub Jenkins Amazon S3
Compliance Automation

AWS Infrastructure Compliance Audit System

This compliance audit system utilized AWS Config to evaluate resource conformance across services. Lambda functions were triggered on non-compliant rules, enabling proactive remediation and alerting via SNS.

AWS Config Lambda Compliance IAM
Security Dashboard

AWS Cloud Security Dashboard

I designed a web-based dashboard to visualize and monitor key AWS security metrics, including IAM role usage, open security groups, and policy violations, offering centralized oversight for cloud posture management.

AWS IAM S3 Lambda CloudWatch

Ready to Build Something Amazing?

These projects represent real-world solutions that delivered measurable business value. If you're looking to implement similar infrastructure improvements, optimize costs, enhance security, or build reliable platforms, I'd love to discuss how we can work together.