Oluwatosin Jegede

Portfolio

Detailed case studies across production AWS and GCP platforms: Kubernetes (EKS), Terraform infrastructure as code, GitHub Actions and Jenkins CI/CD, observability and SRE, DevSecOps and compliance, ML operations, and automation. Use search and stack filters to narrow results—each card spells out scope, tooling, and outcomes for recruiters and technical reviewers.

Showing all 18 projects

AIOps & SRE

Autonomous DevOps Incident Response Agent

Production-style AIOps system for first-line incident triage: FAISS-backed retrieval over runbooks and logs, LangGraph agents with guardrails, and structured JSON APIs for safe automation. Shipped with FastAPI services, n8n orchestration, Gradio and Next.js operator UIs, containerised on AWS ECS with Terraform, CloudWatch observability, and GitHub Actions CI/CD—targeting sub-30-second first responses and clearer root-cause narratives for SRE teams.

aimlsreawskubernetesterraformcicdmonitoringfastapilanggraphrag

SRE & Observability

AegisTickets — AWS EKS Reliability Platform

Reliability engineering for a three-tier production workload on Amazon EKS: defined SLIs and SLOs, error budgets, and golden-signal monitoring to steer autoscaling and release decisions. Infrastructure and observability stacks are codified with Terraform; Prometheus and Grafana provide service-level visibility so teams can reason about user-facing availability, latency, and saturation before incidents escalate.

awskubernetesmonitoringsreterraformprometheusgrafanaeks

AI/ML Platform

Enterprise AI/ML Platform (Production)

Operated ML inference and training paths like any other production service: SRE-style service level objectives, dashboards, and alerting on latency, errors, and cost; FinOps-style controls on GPU/CPU spend and autoscaling behaviour. The outcome was roughly 60% lower inference cost alongside more predictable capacity and faster incident detection for data science and platform stakeholders.

aimlsremonitoringawsfinopskubernetesobservability

Cloud-Native Application

Cloud-Native Job Portal

End-to-end resilient AWS application patterns: health-checked deployments, automated recovery workflows, and zero-downtime style rollouts so job seekers and employers see continuous availability. Work spans compute, load balancing, data stores, and CI/CD so releases are repeatable and failures are contained without manual firefighting.

awscicdmonitoringhigh-availabilityterraformdevops

Security

AWS Cloud Penetration Test

Structured security assessment of a production-style AWS estate: identity (IAM), network segmentation and security groups, object storage policies, encryption posture, and application-layer exposure. Deliverables prioritised findings by exploitability and blast radius, with concrete remediation guidance so engineering teams could harden accounts without guesswork.

awssecuritymonitoringiamcompliancerisk

Platform Engineering

FinBankOps — Multi-Region EKS (Fintech)

Fintech-grade Kubernetes platform on AWS EKS across regions: Istio service mesh, GitOps delivery with Argo CD, and PCI-aligned controls woven into pipelines and clusters. Observability uses Prometheus and Grafana alongside deployment patterns that support controlled rollouts—giving security, platform, and application teams a shared picture of compliance, cost, and reliability.

awskubernetescicdsecuritymonitoringistioargopci

ML & DevOps

Real-Time ML Fraud Detection (AWS)

Real-time fraud scoring on AWS using ECS Fargate microservices, Terraform-defined infrastructure, and GitHub Actions pipelines from commit to release. Amazon CloudWatch metrics and SNS notifications tie model and service health to on-call workflows so latency-sensitive inference stays observable and incidents surface quickly.

awsmlcicdmonitoringecsterraformmicroservicessns

Application Platform

Secure Three-Tier Web App on Kubernetes

Production-minded three-tier web architecture on Amazon EKS: container images in ECR, ALB Ingress for HTTP routing, CloudWatch for control-plane and workload signals, and least-privilege IAM across tiers. The design emphasises network boundaries, secrets handling, and operational visibility so security and SRE concerns are baked in—not bolted on after go-live.

awskubernetessecuritymonitoringeksdockeralbiam

CI/CD & Infrastructure

Three-Tier Web App — GitHub Actions CI/CD

Full-stack AWS delivery with a static frontend on S3, application tier on EC2 inside a VPC, and Terraform for reproducible networking and compute. GitHub Actions automates build, test, and deploy stages; the CloudWatch agent and Amazon Managed Grafana back operational dashboards—so releases are traceable and production behaviour is visible to developers and ops alike.

awscicdmonitoringsecurityterraformgithub-actionsvpcgrafana

Full DevOps Pipeline

End-to-End DevOps — EKS & ELK

From repository to running workloads on EKS: GitHub Actions for CI, Terraform for clusters and supporting AWS resources, Docker images for services, and Prometheus/Grafana plus ELK for metrics and log analytics. IAM hardening and ACM-managed TLS round out a pipeline where security and observability are first-class—not optional extras.

awskubernetescicdmonitoringsecurityterraformelkprometheus

Disaster Recovery

Automated Cloud Disaster Recovery

Disaster recovery and business continuity patterns on AWS expressed as code: Terraform modules and GitHub Actions workflows for failover drills and environment promotion. Datadog (or equivalent) observability backs rehearsal runs so RTO/RPO assumptions are validated with data, not slide decks.

awscicdmonitoringterraformdrresilienceautomation

Containerization

Containerized WebApp — CI/CD & Monitoring

Node.js application packaged in Docker images, released through GitHub Actions with versioned artefacts and environment promotion. Prometheus scrapes service and HTTP metrics; Grafana dashboards expose golden signals and container health so teams catch regressions before users do.

cicdmonitoringdockernodejsprometheusgrafanagithub-actions

ML Deployment

ML Model Deployment — Flask on AWS

Serving an ML model behind a Flask API on EC2 with Terraform-defined infrastructure, GitHub Actions delivery pipelines, and supporting AWS services (including CloudFormation/S3 patterns where applicable). Prometheus, Grafana, and AWS Security Hub checks align model uptime with security baselines so inference endpoints stay both available and auditable.

awsmlcicdmonitoringsecurityterraformflaskec2

Serverless CI/CD

Scalable Web App CI/CD — AWS Amplify

Scalable web application delivery on AWS Amplify with React front ends, Lambda-backed APIs, and managed CI/CD via CodePipeline and CodeBuild. RDS for relational data, CloudWatch for runtime signals, and Terraform where infrastructure-as-code adds repeatability—suited to teams that want fast frontend iteration without sacrificing backend governance.

awscicdmonitoringserverlesslambdaamplifyterraformreact

GCP Platform

Full-Stack CI/CD on Google Cloud

Full-stack delivery on Google Cloud: containerised services, Terraform for GCP resources, GitHub Actions for build and deploy, and Cloud Run for scalable request handling. Google Cloud Operations (formerly Stackdriver) ties logs and metrics together so developers get one place to debug latency, errors, and dependency failures across the stack.

gcpcicdmonitoringterraformcloud-rundockergithub-actions

Jenkins Pipeline

Node.js CI/CD — Jenkins & S3

Classic Jenkins pipeline automation for a Node.js service: declarative or scripted stages for build, test, and artefact publication, with Amazon S3 as durable storage for release binaries. GitHub remains the source of truth; Jenkins orchestrates repeatable promotions so releases are auditable and rollback-friendly.

cicdawsjenkinsnodejss3devops

Compliance

AWS Config Compliance Automation

Continuous compliance posture using AWS Config rules, AWS Lambda remediation hooks, and SNS notifications when resources drift from approved baselines. The design turns policy into automated feedback loops—security and platform teams see violations quickly and can auto-correct or ticket issues before auditors or attackers find them first.

awssecuritycicdlambdaconfigcompliancesnsautomation

Security Dashboard

AWS Cloud Security Dashboard

Operator-facing web dashboard aggregating AWS security signals: IAM privilege hotspots, overly open security groups, and common policy violations in one view. Built to speed up cloud security reviews and onboarding—so engineering leads can triage posture without exporting dozens of console screens to spreadsheets.

awssecuritymonitoringiamdashboardcloud-security