Cloud Architecture
Designing and deploying multi-region, highly available AWS architectures from scratch using best practices.
Open to Cloud Engineering opportunities
I build secure, scalable infrastructure on AWS — entirely with code. Certified in Terraform & AWS, and focused on automation-first engineering.
The tools and disciplines I deploy to architect production-grade cloud systems.
Designing and deploying multi-region, highly available AWS architectures from scratch using best practices.
Version-controlled, repeatable infrastructure using Terraform and modular design patterns.
Applying least-privilege IAM, network segmentation, encryption-at-rest, and compliance posture hardening across all layers.
Building and deploying web applications using modern front-end and back-end technologies.
Designing and troubleshooting cloud and on-premise network topologies for security and performance.
End-to-end monitoring and alerting for production workloads to ensure reliability and fast incident response.
Validated expertise. Industry-recognised proof of architectural knowledge.
Amazon Web Services
Associate (SAA-C03)
Design and deploy well-architected applications on AWS. Validates expertise in compute, networking, storage, and database AWS services.
HashiCorp
Exam 004
Validates the fundamental concepts and skills associated with HashiCorp Terraform. Prove competency using IaC for cloud provisioning.
Amazon Web Services
CLF-C02
Foundational, high-level understanding of AWS Cloud, services, and terminology. Includes basic cloud security and architecture principles.
Real cloud architecture decisions, documented as case studies.
A production-grade, highly available three-tier application infrastructure on AWS. Built and version-controlled entirely in Terraform — no point-and-click. The architecture separates concerns cleanly across presentation, application, and data layers, with each tier isolated in its own subnet.
Public/private subnet isolation, security groups, NACLs, and encrypted RDS instances.
Multi-AZ deployment with Auto Scaling Groups and Application Load Balancer.
Modular Terraform codebase with remote state in S3 and state locking via DynamoDB.
GitHub Actions pipeline that lints Terraform, runs plan in staging, and applies approved changes to production — with Slack notifications at every gate.
Custom VPC with public, private, and isolated subnets across 2 AZs. Defense-in-depth using Security Groups, NACLs, and VPC Flow Logs.
This portfolio deployed as a static site on AWS S3, served globally via CloudFront CDN with custom domain, ACM SSL certificate, and Route 53 DNS.
I am a Cloud and DevOps Engineer and a recent BSIT graduate from Southwestern University PHINMA (Class of 2025). I specialize in designing highly available, secure, and scalable infrastructure. My focus is on automating the heavy lifting so development teams can ship faster and safer.
I approach every system with a security-first mindset — because resilience is not an afterthought, it's an architecture decision made on day one. I believe the best infrastructure is invisible to developers: it just works, scales, and recovers.
Every architecture decision accounts for the principle of least privilege, encryption, and network segmentation by default.
If it's done more than once, it should be automated. I build pipelines that reduce human error and increase deployment velocity.
Multi-AZ, self-healing systems that recover automatically. Uptime is a feature, not a bonus.
Actively looking for Cloud Engineering and DevOps opportunities. Open to full-time roles, freelance infrastructure work, and architectural consulting.