Cloud architecture is my playground—and AWS is where I build.
With 4.5 years of experience across industries like banking, healthcare, and aviation, I’ve immersed myself in designing, developing, and deploying cloud-native solutions that scale. Whether it’s spinning up EC2 instances, writing infrastructure as code with CloudFormation, or orchestrating containerized services via ECS and Docker, I’ve done it all—with a keen focus on automation, security, and reliability.
I’m an AWS Certified Solutions Architect – Associate, and my toolkit includes EC2, IAM, S3, CloudWatch, ELB, ECS with Fargate, AppFlow, Docker, and Secrets Manager, among others. I’m driven by a passion to streamline cloud operations, reduce manual interventions, and design future-ready infrastructure.
My goal? To evolve into a cloud solutions architect who bridges the gap between innovation and implementation, delivering secure, scalable, and cost-effective architectures.
• Launched and configured Amazon EC2 instances (both Linux and Windows) across multiple AWS regions, tailoring each setup to specific application requirements.
• Installed and configured security software on EC2 instances and managed EBS volume storage for high availability and performance.
• Provisioned infrastructure by building servers using AWS, including importing volumes, launching EC2 and RDS, configuring security groups, auto scaling, and deploying Elastic Load Balancers (ELBs) within Virtual Private Clouds (VPCs).
• Created and managed AWS IAM users for new projects, configured AWS CLI credentials, and managed S3 access permissions using CHMOD and ACLs.
• Created and maintained S3 buckets, defined bucket policies, and implemented IAM role-based access control for secure data management.
• Configured Amazon CloudWatch and SNS to set up monitors, alarms, and notifications for EC2 instances to ensure high availability and performance monitoring.
• Designed and managed VPCs, created subnets, configured inter-zone connectivity, and implemented network ACLs to block suspicious IPs/subnets.
• Administered DNS records using Amazon Route 53, ensuring accurate routing and high availability of hosted applications.
• Managed EC2 health checks, security groups, load balancers, AMI snapshots, and performed instance backups and restores using S3 volume snapshots and key pairs.
• Monitored production server health (CPU, memory, disk usage, and status checks) using Amazon CloudWatch, and deployed CloudWatch Agent on all servers to collect custom metrics.
• Performed patching and updates on both Linux and Windows servers, coordinating with the AWS Ops team to maintain compliance and security.
• Developed CloudFormation templates via AWS CLI to automate provisioning of infrastructure, including the deployment of AWS EMR Clusters