j
julian_coy

Julian C

@julian_coy

Cloud DevOps Engineer

Colombie
Espagnol, Anglais
Certaines informations sont présentées en anglais.
À propos de moi
Cloud DevOps Engineer with three AWS certifications (DevOps Professional, Solutions Architect Associate, Cloud Practitioner). Experienced in multi-tier AWS architectures with Terraform and CloudFormation, CI/CD pipelines using GitHub Actions and CodePipeline with blue/green, canary deployments and automated rollback. Skilled in Docker containers on ECS, security with AWS Organizations, Control Tower, least-privilege IAM, KMS encryption, and observability with CloudWatch. Focused on building secure, scalable, and highly available cloud solutions with cost optimization.... Plus d’infos

Compétences

j
julian_coy
Julian C
hors ligne • 
Temps de réponse moyen de 2 heures

Voir mes services

Infrastructure en tant que code
I will design and deploy AWS infrastructure using terraform
Infrastructure en tant que code
I will deploy a secure AWS ec2 instance using terraform

Expérience professionnelle

Fiverr

DevOps Engineer

Fiverr • Freelance

Oct 2024 - Present1 yr 7 mos

- Implemented end-to-end CI/CD pipelines using GitHub Actions and AWS CodePipeline with CodeBuild and CodeDeploy, configuring blue/green, canary, and in-place deployments with automated rollback based on CloudWatch alarms and Lambda hooks for pre/post-deployment validation. - Provisioned multi-tier VPC architectures using Terraform with reusable modules, including public/private subnets, NAT Gateways, VPC Endpoints for S3 and ECR, and CloudFormation cross-stack references with SSM Parameter Store. - Built and optimized Docker images using multi-stage builds and layer caching, deploying containerized workloads on ECS with Secrets Manager integration, IAM task roles, and target tracking Auto Scaling policies. - Enforced security across multi-account environments using AWS Organizations with SCPs, Control Tower for landing zone governance, IAM policies with conditions, KMS keys with automatic rotation, S3 lifecycle policies, and CloudTrail logging with integrity validation. - Built observability solutions using CloudWatch Logs with metric filters and dashboards, X-Ray for distributed tracing, and SNS fan-out with Lambda for incident notification and automated remediation. - Designed highly available and resilient architectures with Multi-AZ RDS, read replicas, ElastiCache Redis for session store, S3 cross-region replication, Route 53 failover routing, Auto Scaling with Spot integration, and SQS with dead-letter queues for event-driven processing using Lambda triggers