Accomplished Sr. DevOps/AWS Cloud Engineer at Archer Aviation, skilled in AWS, Terraform, and CI/CD automation. Expertly designed secure, scalable cloud architectures and optimized costs, enhancing operational efficiency. Proven ability to mentor teams and implement best practices, ensuring compliance and system reliability in dynamic environments.
Overview
5
5
years of professional experience
1
1
Certification
Work History
Sr. DevOps/AWS Cloud Engineer
archer aviation
12.2025 - Current
Designed and implemented a Golden AMI pipeline for Ubuntu 22.04 using Packer (amazon-ebs) to standardize and harden EC2 images across environments.
Integrated CIS Level 1 security benchmarks using Ansible (ansible-lockdown UBUNTU22-CIS role) to enforce OS-level security controls during AMI build time.
Customized CIS controls by selectively disabling non-applicable rules for cloud/AMI bake contexts, reducing false positives and improving build stability.
Built a GitHub Actions workflow to automate AMI creation, enabling manual and on-demand image builds using workflow_dispatch.
Implemented CI pipelines using self-hosted runners (RunsOn) instead of GitHub-hosted runners to reduce cost and gain deeper infrastructure control.
Configured GitHub Actions to run infrastructure workloads securely without long-lived credentials.
Integrated GitHub → AWS authentication using OIDC, eliminating static AWS access keys and enforcing short-lived, role-based access.
Created and validated IAM roles and policies to allow controlled EC2 lifecycle operations (instance launch, snapshot creation, AMI registration).
Deployed AWS infrastructure via CloudFormation to provision and manage CI runner environments in a repeatable, auditable manner.
Structured repositories using infrastructure-as-code best practices, separating Packer templates, Ansible playbooks, roles, and GitHub workflows.
Implemented Ansible Galaxy dependency management (requirements.yml) to install security roles dynamically during pipeline execution instead of vendoring large role trees.
Ensured builds are idempotent, reproducible, and auditable, suitable for regulated and security-sensitive environments.
Evaluated and selected RunsOn runners over GitHub-hosted runners to significantly reduce CI execution costs for compute-heavy workloads like AMI builds.
Balanced runner sizing (CPU/memory) against Packer build performance to optimize cost vs. execution time.
Senior Cloud Engineer / DevOps Engineer
Mercury Financial
Austin
01.2023 - 09.2025
Designed and managed AWS multi-account architecture with VPC, IAM, EC2, ALB, Auto Scaling, RDS, S3, KMS, CloudWatch, and Route 53.
Built Infrastructure as Code using Terraform modules and CloudFormation, enabling repeatable, secure deployments across environments.
Implemented CI/CD pipelines using GitHub Actions / Jenkins for application and infrastructure delivery.
Automated Golden AMI pipelines with Packer + Ansible, including CIS hardening, patching, and compliance validation.
Led observability initiatives using CloudWatch, Prometheus, Grafana, improving MTTR and system visibility.
Implemented security best practices: IAM least privilege policies, Encryption at rest and in transit (KMS, TLS), Secrets management using AWS Secrets Manager and SSM Parameter Store.
Golden AMI Automation Pipeline, Built CIS-hardened AMIs using Packer + Ansible. Integrated vulnerability remediation and compliance checks. Reduced patching time by 70%. Serverless Data Processing Pipeline, API Gateway → Lambda → S3 → Athena → SNS. Automated ingestion, validation, and alerting. Cloud Cost Optimization Initiative, Audited AWS accounts and implemented lifecycle rules. Reduced monthly spend by 25–30%.
"I Completed a 1-year Internship as a Cardiac Care at Technician at Fortis Hospital, BG Road, Bangalore.""I Completed a 1-year Internship as a Cardiac Care at Technician at Fortis Hospital, BG Road, Bangalore."