Essential Work Habits
I demonstrate strong attention to detail and a methodical approach when building and managing cloud infrastructure using Terraform and AWS. I consistently break down complex problems to analyze systems from multiple perspectives, especially in distributed and Kubernetes environments. I stay current on vulnerabilities, security practices, and standards such as NIST and CIS to ensure secure and compliant solutions. I am adaptable, results-driven, and able to complete tasks efficiently in fast-paced environments.
Artifacts: Terraform AWS projects, DevSecOps labs aligned to NIST/CIS, Kubernetes troubleshooting exercises

Soft Skills
I communicate complex technical concepts clearly to both technical and non-technical audiences through documentation, presentations, and discussions. I actively listen to requirements and translate them into practical solutions, ensuring alignment with stakeholder needs. I work effectively in team environments, contributing ideas and collaborating to achieve shared goals.
Artifacts: Cybersecurity presentations, technical write-ups, team-based infrastructure projects

Solid Technical Foundation
I have a strong foundation in operating systems, networking, and cloud infrastructure, with hands-on experience in Linux and Windows environments. I use Python and shell scripting for automation and have a solid understanding of networking concepts such as routing, switching, firewalls, and load balancing. I design and deploy scalable AWS architectures using services like EC2, S3, Lambda, and CloudWatch, applying Infrastructure as Code with Terraform.
Artifacts: AWS Terraform projects, automation scripts, networking and system labs

Detailed Knowledge of Key Technologies
I have experience with Linux systems, Active Directory, and Windows Server, along with cloud-native and open-source technologies such as Kubernetes and containerization. I understand web application architecture and monitoring using tools like Prometheus, Grafana, and Splunk. I am also familiar with network security practices, access control, and broader cybersecurity concepts including social engineering and physical security.
Artifacts: Kubernetes labs, observability stack projects, Active Directory configurations, cloud monitoring implementations