๐ Hyderabad, India โข ๐ง mdwaseem.cloudops@gmail.com GitHub / LinkedIn: (add your profile links)
Dynamic and results-driven DevOps & Cloud Engineer with 4 years of hands-on experience designing, building, and operating cloud-native infrastructure and CI/CD platforms. I specialize in automating infrastructure with Infrastructure-as-Code, deploying and operating containerized workloads on Kubernetes, and building secure, observable, and cost-efficient cloud environments. I partner with engineering teams to reduce toil, accelerate delivery, and improve reliability.
Key focus areas:
- Platform engineering & Kubernetes orchestration
- CI/CD automation, GitOps workflows, and pipeline security
- Infrastructure-as-Code (Terraform & modules)
- Observability (Prometheus / Grafana / OpenTelemetry)
- DevSecOps: policy-as-code, secrets management, IAM hygiene
- Cost optimization and operations runbooks
- Reduced deployment time from hours to minutes by designing repeatable CI/CD pipelines and release strategies.
- Implemented Terraform-based IaC and reusable modules for multi-environment AWS provisioning.
- Improved incident response and reduced MTTR by ~60% through SLO-driven monitoring, alerting, and runbooks.
- Achieved ~40% infrastructure cost savings via rightsizing, spot instance strategies, and automation.
- Delivered training sessions for teams on Terraform, Ansible, and Git best practices to uplift platform-owned knowledge.
| Category | Tools & Technologies |
|---|---|
| Cloud Services | AWS (EC2, VPC, IAM, CloudWatch, CloudTrail) |
| Containerization & Orchestration | Docker, Kubernetes, Helm |
| IaC & Configuration | Terraform, Terraform Modules, Ansible |
| CI / CD | Jenkins, GitLab CI, Argo CD, GitHub Actions |
| Scripting & Automation | Bash, Shell scripting, Python (basics) |
| Observability | Prometheus, Grafana, Loki, OpenTelemetry |
| Security & Policy | IAM, Vault, OPA / Gatekeeper, Secrets Management |
| Artifact & Build | Nexus, Maven |
| Ticketing & Collaboration | Jira, ServiceNow, Git, GitHub |
| OS & Platforms | Linux (Ubuntu), Windows |
- Architected and maintained CI/CD pipelines using Jenkins, Git, and Ansible, enabling safe, repeatable deployments across environments.
- Wrote Ansible playbooks to automate server provisioning, patching, and package management โ cutting manual interventions and standardizing configurations.
- Managed AWS infrastructure with Terraform: EC2 instances, networking (VPC, subnets), security groups, and IAM roles; enforced infrastructure consistency across dev/QA/prod.
- Built Terraform modules to encapsulate reusable patterns for networking, compute, and observability resources.
- Implemented containerization best practices and Kubernetes deployment patterns including health checks, resource requests/limits, and HPA.
- Implemented monitoring and alerting with CloudWatch and Prometheus; designed dashboards and automated alerts for critical service metrics.
- Created shell-based node health checks and scheduled remediation scripts for proactive operations.
- Participated in DR planning and executed recovery drills to validate RTO and RPO targets.
- Led knowledge-sharing workshops and onboarding sessions focused on IaC, Git workflows, and safe release strategies.
- Ensured security compliance by managing IAM policies, role separation, and audit trails.
- Platform-as-a-Service (PaaS) for microservices: Built a GitOps-driven platform on Kubernetes using ArgoCD, Helm charts, and Terraform for infra provisioning.
- Multi-environment IaC: Designed Terraform modules and a Terragrunt-friendly layout to provision repeatable environments (dev/qa/prod).
- Observability overhaul: Migrated to Prometheus + Grafana + Loki with Alertmanager for centralized metrics/logs and alerting.
- Cost optimization initiative: Automated rightsizing reports and scheduled non-prod shutdowns, recovering ~40% of monthly cloud spend.
- Bachelorโs Degree (Computers) โ June 2018 โ June 2021
- Deep focus on automation, reliability engineering, and security-by-design.
- Strong collaborator: effective communicator, mentor, and workshop lead.
- Pragmatic problem-solver: balance short-term fixes with long-term platform stability.
- Rapid learner: continuously upskill on cloud services, observability, and security tooling.
To make the README more engaging, I included an animated toolbelt/GIF section. Add an animated GIF to assets/busy-waseem.gif and it will render inline here.
If you prefer an interactive Lottie animation, grab a Lottie JSON and embed with a small HTML snippet (or convert to GIF for GitHub). Below are recommended options to create/upload the GIF:
Recommended approaches:
- LottieFiles: search "developer", "programmer" or "working" โ export GIF.
- Canva / Kapwing / Adobe Express: compose a scene (desk, multiple screens, code, alerts) โ export GIF.
- Record a short video (webcam + screen quick loop) and convert to GIF with ffmpeg (commands below).
ffmpeg conversion (local):
- ffmpeg -i assets/source/busy-waseem.mp4 -vf "fps=15,scale=680:-1:flags=lanczos" -loop 0 assets/busy-waseem.gif
- gifsicle -O3 --colors 128 -o assets/busy-waseem-optimized.gif assets/busy-waseem.gif
If you prefer automation, add a source MP4 to assets/source/ and run the provided GitHub Action (.github/workflows/generate-gif.yml) to auto-generate assets/busy-waseem.gif and commit it back to the repo.
(If you want, I can add this workflow file for you โ see the companion file in this PR.)
- Replace placeholders (GitHub/LinkedIn links) with your profiles.
- Add real project names, dates, and measurable impact where applicable.
- Drop a GIF into assets/ or let the action generate one.
- Use the "Notable Projects" section to link to repos or case studies for recruiters/hiring managers.
- Email: mdwaseem.cloudops@gmail.com
- Location: Hyderabad, India
I declare that the information above is true to the best of my knowledge.