ABHOY

Portfolio

0%

Hi, I'm

AbhoyMondal

</>
DevOps Engineer

Production-grade AWS infrastructure. Zero-downtime deployments. Everything automated.

AWSAWSCI/CDCI/CDKubernetesKubernetesDockerDockerDevSecOpsDevSecOpsGitOpsGitOpsTerraformTerraform💲FinOps

WHO AM I?

DevOps Engineer with 3+ years building and maintaining production-grade infrastructure on AWS. I design, build, and manage end-to-end cloud infrastructure from the ground up.

From ECS and EKS deployments to AI-powered PR reviews, I've delivered 10+ production implementations with a strong focus on security, automation, and cost efficiency.

0+

Implementations

0+

CI/CD Pipelines

0+

Years Experience

0%

Log Cost Reduced

Technical Expertise

Skills & Technologies

Cloud & AWS

13 technologies

ECS FargateEKSECRALBRoute 53ACMCloudWatchBedrockEventBridgeSecrets ManagerIAMS3SNS / SQS

Infrastructure as Code

2 technologies

TerraformHelm

CI/CD

5 technologies

GitHub ActionsAWS CodePipelineAWS CodeBuildArgoCDGitOps

Containers & Orchestration

3 technologies

DockerKubernetesKyverno

Security & DevSecOps

6 technologies

GitleaksTrivySemgrepSonarCloudCheckovOIDC Keyless Auth

Observability

5 technologies

PrometheusGrafanaCloudWatch DashboardsSNS AlertsCost Anomaly Detection

AI & Automation

4 technologies

AWS BedrockClaude SonnetLiteLLMKong Gateway

Work History

Experience

DevOps Engineer

February 2023 – Present

REVERSIDE GLOBAL SERVICES PRIVATE LIMITED

Kolkata, India

CI/CD & Automation

  • Built CI/CD pipelines for 15+ services using CodePipeline, CodeBuild, and GitHub Actions — enabling fully automated, zero-touch deployments across all microservices
  • Replaced S3 polling with EventBridge instant triggers across 7 pipelines and engineered a custom S3-based CI/CD workaround for AWS regional service gaps

Infrastructure & Networking

  • Kong Gateway with host-based routing on ECS Service Connect
  • Deployed Keycloak, LiteLLM, Kong Gateway, and Camunda 8 on ECS Fargate and EC2 — enabling secure auth, AI routing, and workflow automation at scale

Security & DevSecOps

  • Full DevSecOps pipeline on EKS with SAST, SCA, IaC scanning, GitOps, and Kyverno enforcement — ensuring zero unscanned workloads ever reach production

Observability & Cost

  • Built full observability stack — CloudWatch, Prometheus, Grafana, SNS alerts, and cost anomaly detection — providing real-time visibility across all production services
  • Reduced CloudWatch log ingestion by ~95% through log level tuning — significantly cutting monthly logging costs across all services

MY WORK

Projects

01
AWS BedrockClaude Sonnet 4GitHub ActionsOIDCReusable Workflows

AI-Powered PR Review Pipeline

Automated PR review system that triggers on every pull request via GitHub Actions. The runner authenticates to AWS using OIDC (no stored keys), fetches the PR diff, and sends it to Claude Sonnet via AWS Bedrock. Claude acts as a senior code reviewer — catching bugs, security vulnerabilities, performance issues, and logic errors — and posts structured findings directly as a PR comment. Built as a reusable workflow: any repo in the org adds a 7-line trigger file and inherits the full review automatically.

Impact: Every PR auto-reviewed before a human looks at it — runs 24/7 across all repos for under $2/month

02
Kong GatewayECS FargateALBService ConnectTerraform

Kong Gateway on AWS ECS

Company Project

Deployed Kong Gateway as a unified ALB entry point routing traffic to internal ECS services by hostname using AWS Service Connect. Kong handles host-based routing rules — each service is reachable through a single domain with no port exposure.

Impact: Single entry point for all services — simplified routing, reduced ALB costs, and zero port exposure across the entire ECS cluster

03
EKSArgoCDKyvernoTerraformTrivySonarCloudCheckovGitleaksHelmPrometheusGrafanaOIDC

DevSecOps Pipeline on AWS EKS

End-to-end DevSecOps pipeline securing OWASP Juice Shop from code commit to production on AWS EKS. 6-stage GitHub Actions pipeline: Gitleaks (secrets), SonarCloud (SAST), Trivy (SCA + image scan), Checkov (IaC), Docker build, and ECR push — image is only pushed if all gates pass. ArgoCD detects the new image tag and deploys via GitOps. Kyverno enforces admission policies (no latest tags, no root containers, resource limits required). Infrastructure provisioned via Terraform. Prometheus + Grafana for observability. OIDC auth throughout — no stored AWS credentials anywhere.

Impact: Zero unscanned workload reaches the cluster — every commit gates through 6 automated security stages before deployment

Credentials

Certifications

In Progress

AWS Certified Solutions Architect – Associate

Amazon Web Services

More certifications
coming soon

Get In Touch

Contact

Let's work together

Open to DevOps roles, infrastructure consulting, and collaboration. Whether it's AWS, DevSecOps pipelines, or a new opportunity — reach out.