Menu
Production-minded DevOps • reliable releases • security-by-default

Shipping reliable releases and resilient cloud platforms.

DevOps Engineer (2021–Present) specializing in CI/CD automation and cloud-native delivery across AWS and Kubernetes. I build repeatable deployment pipelines, infrastructure automation, and monitoring/alerting for enterprise workloads — focused on delivery speed, reliability, and security.

Release execution (dev → pre-live → prod) EKS upgrades + platform maintenance Observability (Prometheus + Grafana)
Kubernetes (EKS/AKS) Jenkins Terraform Prometheus/Grafana

Snapshot

what I deliver
CI/CD pipelines (Jenkins) Release management (multi-env) Kubernetes ops (EKS/AKS) IaC (Terraform) Observability (Prometheus/Grafana) Security controls (access checks)
Reliable Releases

Scheduled deployments across environments

Cluster Ownership

EKS upgrades, maintenance, patching

Incident Response

Triage, remediation, stakeholder updates

Observability

Dashboards, alerting, runbooks

About

Short, specific, and recruiter-friendly. Ownership + outcomes + collaboration.

Professional summary

DevOps Engineer (2021–Present) specializing in CI/CD automation and cloud-native delivery across AWS and Kubernetes. Experienced building and operating reliable deployment pipelines, infrastructure automation, and monitoring/alerting for enterprise workloads. Known for strong ownership and cross-team collaboration during releases and incidents, with a focus on improving delivery speed, reliability, and security while continuously upskilling.

  • Executed scheduled deployments across dev, pre-live, and production to deliver reliable releases.
  • Owned Amazon EKS upgrades and platform maintenance to keep clusters secure, supported, and performant.
  • Built Prometheus/Grafana observability with alerting, reporting, and runbooks to reduce downtime.

How I work

I build and operate like an owner: plan safe releases, instrument systems for visibility, and treat incidents as feedback loops for continuous improvement.

  • Release discipline: coordinated windows, version rollouts, and change communication.
  • Operational rigor: pod health monitoring, triage, and remediation with clear stakeholder updates.
  • Security-first: access-control checks and SSH certificate validation where applicable.

Projects

Portfolio repos + production experience summaries. Replace metrics with your real numbers when you add them.

FedEx Class — DevOps Automation (Project)

CI/CD automation, Docker containerization, Kubernetes deployments, and observability support for release stability.

EKS · CI/CD · Monitoring
EKS Kubernetes Docker Prometheus Grafana
Git → CI/CD Pipeline
    ↓
Build/Test → Containerize (Docker)
    ↓
Deploy (Kubernetes/EKS)
    ↓
Monitor (Prometheus/Grafana)
    ↓
Triage/Remediation + Runbooks

FedEx GEMINI — ACCS Modernization

Release management, CI/CD, GitHub governance, and deployments across Tomcat and container platforms.

Releases · Governance · CI/CD
GitHub Jenkins Maven SonarQube Nexus
GitHub (policies/webhooks)
    ↓
Jenkins (build + quality gates)
    ↓
Maven (WAR/JAR)
    ↓
Nexus (snapshot/release)
    ↓
Deploy: Tomcat / Docker Swarm / Kubernetes

Terraform + AWS Baseline

Reusable cloud foundation: networking + IAM + secure defaults for repeatable environment provisioning.

IaC · Safe defaults
Terraform AWS VPC IAM
Terraform Modules
    ↓
VPC + Subnets + Routing
    ↓
IAM (least privilege)
    ↓
Reusable baseline outputs
    ↓
Consistent environment bring-up

Skills

Grouped like a delivery spec: what I can reliably ship and operate.

CI/CD & Release Engineering

  • Jenkins pipelines, build triggers (webhooks / Poll SCM)
  • Maven, MSBuild packaging (WAR/JAR)
  • Code quality gates (SonarQube)
  • Artifact management (Nexus)
  • Multi-environment release coordination

Kubernetes & Operations

  • Docker, Docker Swarm, Kubernetes
  • EKS/AKS operations, upgrades, maintenance
  • Pod health monitoring (restarts, not running), remediation
  • Prometheus + Grafana observability, alerting & runbooks
  • Scaling, capacity planning, reliability improvements

Infrastructure & Cloud

  • Terraform (IaC), environment baselines
  • AWS: EC2, VPC, ELB, EBS, S3, EKS
  • Ansible configuration management
  • Security controls: access checks, SSH certificate validation

Contact

Make it easy to reach out in 10 seconds.

Email: shankar@gowrishankar.dev · Phone: +91 9618510658

GitHub: gowrishankar-infra · I respond fastest on LinkedIn.