AWS Cloud · DevOps · Infrastructure as Code

AWS Infrastructure Built to Scale Without Surprises

Most cloud outages trace back to infrastructure that was clicked together, not coded. I build AWS environments in CDK or Terraform — version-controlled, reproducible, and monitored before they go live.

  • 99.9% uptime across all deployed production services
  • Everything in code — AWS CDK or Terraform, no console cowboys
  • ~40% average cost reduction on first infrastructure review
  • CI/CD pipelines with auto-rollback on test failure

No commitment to enquire · Reply within 24 hours · Worldwide

99.9%

Uptime target maintained across all AWS-deployed production services

~40%

Average AWS cost reduction achieved on first infrastructure review

<5min

Median deploy time after CI/CD pipeline setup with GitHub Actions

0

Production credential leaks after secrets migration to AWS Secrets Manager

AWS EC2 / ECSLambda / API GWRDS / AuroraDockerNode.jsPostgreSQL

AWS Expertise

What I Build on AWS

Production infrastructure that holds up when traffic spikes, engineers leave, and requirements change.

EC2 & ECS Production Infrastructure

VPCs with public/private subnets, auto-scaling groups, Application Load Balancers, and containerised workloads on ECS Fargate. Built with Terraform or AWS CDK so it's version-controlled, reproducible, and not held together with hope.

EC2ECS FargateALBVPC

Serverless APIs with Lambda

Event-driven Lambda functions, API Gateway with custom authorisers, SQS/SNS queues, and DynamoDB for low-latency lookups. Cold-start optimised, typed with TypeScript, and wired to CloudWatch for observability.

LambdaAPI GatewaySQSDynamoDB

Managed Databases — RDS & Aurora

PostgreSQL on RDS or Aurora Serverless v2 — Multi-AZ for production, read replicas for reporting workloads, automated backups, and parameter group tuning for sub-100ms query times.

RDSAuroraPostgreSQLMulti-AZ

CDN & Static Assets with CloudFront + S3

CloudFront distributions in front of S3 origins, Lambda@Edge for request manipulation, OAC bucket policies, cache policies per content type, and signed URLs for private media.

CloudFrontS3Lambda@EdgeOAC

Infrastructure as Code with CDK & Terraform

Every resource in code — no manual console clicks, no config drift. AWS CDK for TypeScript-first shops, Terraform for multi-cloud or greenfield infra. Environments are reproducible and team-reviewable.

AWS CDKTerraformGitHub ActionsIaC

Observability — CloudWatch, Alarms & Dashboards

Structured JSON logs, CloudWatch metric filters, composite alarms on p95 latency and error rates, and SNS alerts to Slack or PagerDuty. You know something is wrong before your users do.

CloudWatchX-RaySNSSentry

Why Hire Me

The Difference Between AWS Experience and AWS Discipline

Anyone can spin up an EC2 instance. The gap shows when the team grows, traffic spikes, and the bill arrives.

Everything in code — no console cowboys

I don't click around the AWS console and call it done. Every resource is Terraform or CDK, every change is a pull request, and every environment can be torn down and rebuilt in minutes.

Security as a first-class requirement

Least-privilege IAM roles, secrets in Secrets Manager (never env vars), VPC isolation, Security Groups as allowlists, and dependency scanning in CI. The boring stuff that prevents the 3am call.

Cost-aware architecture from day one

Right-sizing matters. Reserved instances for steady-state workloads, Spot for batch, S3 lifecycle policies, and CloudFront to cut data transfer. Most projects reduce their AWS bill 30–50% in the first review.

Full-stack context — not just infrastructure

I'm also a backend and frontend developer. That means the infrastructure I design matches how the application actually behaves — no hand-off gap between dev and ops.

Common Questions

Before You Reach Out

The questions every client asks — answered honestly.

Are you AWS certified?

I work with AWS daily in production and have deep hands-on experience across the core services. I prioritise real-world delivery over certification badges — though I'm in the process of formalising that with the SAA exam.

Can you migrate our existing infrastructure to AWS?

Yes. I start with a discovery audit of your current setup, produce a migration plan with a risk-ranked change order, and run migrations environment-by-environment with zero-downtime cutovers where possible.

Terraform or CDK — which do you recommend?

CDK when your team is primarily TypeScript/JavaScript — you get type safety and reuse patterns from the language you already know. Terraform when you need multi-cloud flexibility or have existing Terraform state. Both are fine choices; I've shipped production infra with each.

Can you reduce our AWS bill without breaking anything?

Usually yes, significantly. Common wins: over-provisioned EC2 instances, missing lifecycle policies on S3 and RDS snapshots, CloudFront not in front of S3, and Lambda functions with default 1GB memory when 256MB is enough. Most audits find 30–50% in recoverable spend.

Do you handle the deployment pipeline as well?

Yes — GitHub Actions CI/CD, Docker builds, ECR pushes, and ECS/Lambda deploys are all part of the setup. Preview environments per PR and a production deploy gate on passing tests are the standard configuration.

How long does a typical AWS infrastructure setup take?

A basic setup — VPC, EC2/ECS, RDS, S3, CloudFront, and CI/CD — runs 1–2 weeks. A full production-grade infra with multiple environments, monitoring, alerting, and IaC takes 2–4 weeks. Complex multi-region or multi-account setups are scoped per engagement.

Available for AWS projects

Ready to hire an AWS developer who ships to production?

Send your brief. I'll reply with a free architecture review or a written proposal — scope, timeline, and price — within 24 hours.