Cloud infrastructure and security engineering work.
Project 01 — Featured
This Portfolio — DevSecOps in Practice
This site demonstrates DevSecOps principles end-to-end. Containerized with Docker as a golden image, infrastructure provisioned via Terraform, auto-deployed via GitHub Actions on every push. Zero-downtime deployments, SSL via Let's Encrypt, and security headers baked in.
TerraformDockerGitHub ActionsAWS ECREC2Let's Encrypt
View on GitHub →
1# golden image pipeline
2FROM nginx:alpine
3COPY ./website /usr/share/nginx/html
4EXPOSE 80 443
5
6# push -> deploy -> https
Project 02
Multi-Account AWS Architecture
Designed and implemented a secure multi-account AWS architecture using Organizations, Control Tower, and Transit Gateway for a retirement finance client. Full compliance alignment.
AWS OrganizationsControl TowerTransit GatewayTerraform
Project 03
Hybrid Cloud — AWS + VMware
Implemented a hybrid AWS-VMware solution for seamless workload migration between on-premises and cloud. Hub-and-spoke network with Transit Gateways across dev, prod, and shared services.
VMware CloudAWSTransit GatewayVPN
Project 04
DR Solution — 30min RTO
Architected a disaster recovery solution using AWS services achieving a 30-minute RTO for critical business applications. Automated failover with Route53 health checks and cross-region replication.
AWSRoute53RDSTerraform
Project 05
GitHub Actions OIDC Federation
Eliminated long-lived IAM access keys from the CI/CD pipeline by implementing OIDC federation between GitHub Actions and AWS IAM. GitHub now requests a short-lived token scoped to the exact repo and branch at runtime. Trust policy and IAM role fully automated via Terraform. Previously implemented for enterprise clients in production.
OIDCIAM FederationGitHub ActionsTerraformAWS STS
View writeup →
Project 06
Rerkt.AI — AI Portfolio Assistant
Built and deployed an AI assistant at ai.rerktserver.com on the same $6.50/mo EC2 infrastructure. A Node.js proxy container holds the API key server-side, rate limits requests per IP, and validates request origin before forwarding to the Anthropic API. The chat UI, proxy, and SSL cert are all deployed through the same GitHub Actions pipeline.
Claude APINode.jsDockernginxEC2GitHub Actions
Try it live →
Project 07
Infrastructure AI Agent — 4-Layer AIOps
Built a production-grade AI agent that understands live AWS infrastructure. Four-layer architecture: natural language request analysis (Claude), real-time state discovery (boto3 scans EC2, VPCs, SGs, ECR), intelligent planning (Claude reasons over current state to generate phased execution plans), and a human-gated executor. WebSocket-based chat UI streams each layer’s output in real time. Mutating operations require explicit approval before anything changes.
PythonFastAPIClaude APIboto3WebSocketDockernginxEC2
Try it live →
Project 08
Centralized Log Observability — Grafana + Loki
Deployed a dedicated observability stack on a separate EC2 instance. Promtail collects Docker container logs from the portfolio EC2 and ships them to Loki over a private VPC connection. Grafana visualizes real-time logs from all containers (portfolio, rerkt-ai, agent-ai) at grafana.rerktserver.com. Access restricted to whitelisted IP via AWS Security Group.
GrafanaLokiPromtailDocker ComposeEC2VPCnginxTerraform
ⓘ This instance is stopped when not in use to save cost. Reach out if you'd like a live demo.
View dashboard →
Project 09
Zero Hardcoded Infrastructure — SSM Parameter Store
Eliminated all hardcoded IPs and instance IDs from GitHub secrets and CI/CD pipelines. EC2 instance IDs and Elastic IPs are now written to AWS SSM Parameter Store by Terraform on every apply. GitHub Actions workflows query SSM at runtime to discover targets dynamically — no manual secret rotation when infrastructure is destroyed and recreated. The Grafana security group automatically locks to the portfolio EC2’s current EIP, and Promtail reads the Loki endpoint from SSM at boot. Zero static credentials, zero manual updates.
AWS SSM Parameter StoreTerraformGitHub ActionsIAMDynamic Config