Safer Infrastructure Changes
Terraform plan review, policy checks, blast-radius analysis, GitHub Actions, approval gates, and audit trails for changes that need discipline before apply.
Product-Minded AWS Infrastructure Engineer
AWS Cloud Engineer | Infrastructure, Automation & Platform Engineering
I design secure AWS infrastructure, automation, and internal platforms that reduce manual work, improve reliability, and turn messy operational problems into production-style systems.
Public AWS portfolio across Terraform, ECS Fargate, EKS/GitOps, Lambda/serverless, CloudOps governance, and business workflow automation.
Engineering Philosophy
Operational systems for real business workflows.
My background as a business operator gives me an owner's view of engineering: infrastructure is not the end goal; better workflows, safer releases, lower costs, clearer visibility, and faster execution are.
What I Solve
Terraform plan review, policy checks, blast-radius analysis, GitHub Actions, approval gates, and audit trails for changes that need discipline before apply.
CloudOps control planes, observability, audit logging, dashboards, request replay, answer provenance, and cost review for systems that need trusted visibility.
ECS Fargate, EKS/GitOps, Lambda/serverless, private networking, RDS, Cognito, WAF, CloudFront, and monitoring with practical operating paths.
Lead intake, public-record research, CRM/API workflows, document processing, AI-assisted workflows, and structured data handoff for real teams.
Featured Engineering Projects
Each project is framed around the operational problem, the implementation path, and the value a team could get from the system.
Platform-style risk gate
A platform-style tool for safer infrastructure change review.
Infrastructure PRs are hard to review manually, especially when risk, cost, security, and blast radius are unclear.
Built an AI-assisted Terraform PR review platform using FastAPI, Next.js, PostgreSQL, LangGraph, Terraform plan JSON parsing, deterministic policy checks, GitHub checks/comments, sensitive-value redaction, audit persistence, and approval-gated actions.
Improves release discipline, reduces infrastructure review risk, and gives teams clearer governance before changes are applied.
Governed CloudOps control plane
A governed CloudOps control plane for incident triage, access requests, ticket workflows, and cost-review governance.
Cloud operations can become fragmented across tickets, dashboards, policies, and tribal knowledge.
Built a live self-hosted CloudOps AI control plane on AWS using Next.js, FastAPI, Cognito/JWKS auth, OPA/Rego, Bedrock routing, DynamoDB, AWS Cost Explorer, OpenTelemetry, MCP tools, and Terraform.
Improves auditability, request visibility, trusted-source grounding, policy enforcement, and operational control.
Fargate business workflow API
A production-style ECS Fargate API built around real business workflow requirements.
Lead intake, source quality, county resolution, and acquisition workflows require structured data pipelines and reliable APIs.
Built a FastAPI lead-intelligence service using ECS Fargate, Docker, ALB, CloudFront/WAF, private RDS PostgreSQL through RDS Proxy, Secrets Manager, CloudWatch alarms, modular Terraform, tests, Checkov validation, and teardown documentation.
Connects real business workflow requirements with secure, production-style AWS infrastructure.
Validated Kubernetes platform
A validated Kubernetes/GitOps platform on AWS.
Teams need repeatable, observable platform deployments with clear tenant separation and GitOps workflows.
Validated an EKS/GitOps platform using Terraform, ECR, Helm, ArgoCD app-of-apps, tenant namespaces, External Secrets backed by SSM, Prometheus, Grafana, tenant ALB ingress, and Cloudflare frontend integration.
Demonstrates Kubernetes platform engineering, GitOps delivery, observability, and teardown discipline.
Additional Cloud Projects
Governed media search with Bedrock, Lambda, S3, DynamoDB, SQS ingest, Cognito groups, and Terraform-managed observability.
Cloudflare Pages frontend with AWS serverless retrieval, Cognito-protected API routes, DynamoDB cache/audit records, and S3 transcript index.
Invoice processing workflow with presigned S3 intake, API Gateway, Step Functions, Textract async analysis, Lambda parsing, DynamoDB, and SQS DLQ.
Private event photo workflow with Cognito auth, API Gateway, Lambda, S3 presigned uploads/previews, Rekognition comparison, and DynamoDB records.
Cost-aware transcription app using browser-to-S3 uploads, Lambda/API Gateway, Amazon Transcribe async jobs, EventBridge completion, and DynamoDB tracking.
Python data pipeline that transforms public market data into compact static JSON artifacts for city, ZIP, and county comparison on low-cost hosting.
Technical Skills
Operator Background
My engineering path started by building systems I needed to run real businesses: lead intake, public-record research, CRM/API workflows, client-facing websites, automation, and structured data handoff.
That operator experience now informs how I design cloud systems: practical, reliable, cost-aware, and built around actual workflows.
Resume / Contact
I am open to cloud infrastructure, platform engineering, DevOps, and AWS engineering roles where ownership, reliability, automation, and business context matter.