- Built the core GitOps platform managing the full lifecycle for 30 microservices. By centralizing container patching, scaling, and ingress via ArgoCD, we reduced developer interaction to purely pushing code.
- Wrote the Terraform Infrastructure as Code (IaC) modules used to bootstrap our GCP projects from scratch. This automated IAM, DNS, and HashiCorp Vault authentication across 8+ GKE clusters and 1,000+ nodes.
- Built the HashiCorp Vault deployment from scratch, eliminating static credentials across 3 environments. This PKI-based mTLS and KV v2 secrets architecture handled 500+ requests per second from all 30 microservices.
- Designed a Vault-backed zero-trust architecture. Every secret is now audited, traced, and encrypted at rest and in transit.
- Maintained the GitLab CI/CD pipelines for 30 product teams. To enforce quality standards, I built shared pipeline templates and 24 custom base images incorporating strict Snyk and SonarQube quality gates.
- Owned the Prometheus and VictoriaMetrics observability stack. I designed a central, multi-tenant metrics cluster with HA storage and auto-scaling ingestion, secured via the Vault mTLS service mesh.
- Engineered an internal, mTLS-based alternative to Google Identity-Aware Proxy (IAP). This removed the burden of custom Java authentication libraries from developers, centralizing auth into the SRE service mesh.
- Worked within a 5-person SRE team following Google’s SRE methodology. I actively participated in quarterly PI planning to drive infrastructure initiatives from stakeholder requirements to production.
Summary
I am a Senior Site Reliability Engineer focused on making infrastructure invisible to the teams that use it. I drove a 5-person SRE team to ensure the stability and deployment of 30 microservices across 8+ Kubernetes (GKE) clusters scaling beyond 1,000+ nodes. I built the company’s HashiCorp Vault deployment from scratch – PKI-based mTLS, zero static credentials, all powering a custom service mesh that ensures every secret is audited, traced, and encrypted.
The engineering skills I bring are grounded in my Personal Cloud Platform, a distributed systems R&D environment where I operate closer to the metal. I run a highly available Talos Linux Kubernetes cluster on Proxmox QEMU/KVM. The platform is backed by Ceph CSI distributed storage, a Dual-Stack IPv6 three-tier network fabric utilizing FRRouting (FRR), and Cilium eBPF networking. It is a production-grade stack managed entirely through ArgoCD GitOps, built from the kernel up and enshrined as code.