Fabio G. looks like a good fit?

We can organize an interview with Aldin or any of our 25,000 available candidates within 48 hours. How would you like to proceed?

Schedule Interview Now

Fabio G. Cloud, DevOps and Modern Frameworks

My name is Fabio G. and I have over 4 years of experience in the tech industry. I specialize in the following technologies: Terraform, CI/CD, Jenkins, Google Cloud Platform, Packer, etc.. I hold a degree in Bachelor of Science in Information Technology, Bachelor of Science (BS). Some of the notable projects I’ve worked on include: Deploy KoboTool Containers on Azure, Create Elastic Kubernetes Cluster on AWS and Deploy Applications, Packer Templates for Ubuntu, Kubernetes NGINX Ingress Controller with Let's Encrypt Certificates. I am based in San Antonio, United States. I've successfully completed 4 projects while developing at Softaims.

My expertise lies in deeply understanding and optimizing solution performance. I have a proven ability to profile systems, analyze data access methods, and implement caching strategies that dramatically reduce latency and improve responsiveness under load. I turn slow systems into high-speed performers.

I focus on writing highly efficient, clean, and well-documented code that minimizes resource consumption without sacrificing functionality. This dedication to efficiency is how I contribute measurable value to Softaims’ clients by reducing infrastructure costs and improving user satisfaction.

I approach every project with a critical eye for potential bottlenecks, proactively designing systems that are efficient from the ground up. I am committed to delivering software that sets the standard for speed and reliability.

Main technologies

  • Cloud, DevOps and Modern Frameworks

    4 years

  • Terraform

    3 Years

  • CI/CD

    2 Years

  • Jenkins

    2 Years

Additional skills

Direct hire

Potentially possible

Previous Company

Amazon

Ready to get matched with vetted developers fast?

Let's get started today!

Hire Remote Developer

Experience Highlights

Deploy KoboTool Containers on Azure

I was asked to deploy KoboToolbox as containers in a custom Azure VM. I implemented the above starting with a Packer project that did the following: - Built a custom Ubuntu 18.04 VM image on Azure. - Installed Docker. - Cloned the kobo-install repo that deploys KoboToolbox as containers. Then I implemented Terraform scripts that created the following in an Azure Resource Group: - Virtual Network with a public subnet. - A network security group to allow ssh and TCP traffic on the Network. - A static public IP for the VM. - A VM from the template created with Packer. - A secondary disk on which KoboToolbox will be installed. - A post-deploy step to move the kobo-install repo to the secondary disk. - A storage account for VM boot diagnostics. As a bonus, I created the following scripts to assist with initial setup in Azure: - A script that creates an Azure resource group used to hold VM images. - A script that creates an Azure service principal that can be used to run the Packer and Terraform scripts from an automation server. - A script that creates an Azure storage account to hold Terraform state files. Lastly, I created a README documenting how to run the above from start to finish.

Create Elastic Kubernetes Cluster on AWS and Deploy Applications

As a DevOps Lead, I was asked to do the following: - Provision an AWS Elastic Kubernetes Service (EKS) Cluster. - Create YAML files to deploy already-built container images into the EKS cluster. I implemented the above by creating a Terraform Script (Infrastructure as Code) that provisioned the following: - 1 x Virtual Private Cloud with NAT gateway enabled. - 3 x Public Subnets. - 3 x Private Subnets. - 3 x Security Groups. - 1 x EKS Cluster. Then I created the following Kubernetes Resources to deploy the Front End Application: - 1 x Deployment - 1 x Service - 1 x Ingress Then, I created the following Kubernetes Resources to deploy the API (backend) Application: - 1 x Deployment - 1 x Service - 1 x Storage Class for AWS EFS Static Service - 1 x Persistent Volume - 1 x Persistence Volume Claim Lastly, I created a README document with instructions on how to provision the whole thing.

Packer Templates for Ubuntu

As a HashiCorp Packer expert, I was asked to create 3 Packer templates to build the following: - A custom Ubuntu 2004 ISO image for VirtualBox. - A custom Ubuntu 2004 ISO image for VMware Workstation. - A custom Ubuntu 2004 ISO image for VMware vSphere. The goal of the above was to provide my client with different options to provision test environment for his developers, who worked primarily out of their workstations and out of an on-premise datacenter. The idea is that they could use the Packer templates to build a custom ISO that they can test on their workstation (using VirtualBox or VMware Workstation), and then they can build the same image for vSphere and be confident that it will work the same way as in their workstations. Without getting into too many details, I put this together as follows: - I used a standard Ubuntu 2004 server image that you can download from Canonical's website, - Then we created a series of custom scripts that installed Ubuntu packages, changed networking settings, and configured password-less SSH access. - Created Packer Projects for VirtualBox, VMware Workstation, and VMware vSphere. - Delivered the final code in a ZIP file.

Kubernetes NGINX Ingress Controller with Let's Encrypt Certificates

As the Kubernetes Solutions Architect, I was asked to setup an integration between Let's Encrypt TLS Certificates and NGINX Ingress Controller for a Production Kubernetes Cluster that was running on Azure. I was then asked to come up with a way to automatically renew those certificates upon getting closer to the expiration date. I deployed the NGINX Ingress Controller into the cluster. Then I installed cert-manager in the cluster to automatically issue new certificates for the ingress controller. Setting up the above was standard procedure. The difficulties that arose had more to do with the following: - Making sure that the Ingress Controller properly created an Azure Load Balancer (LB) that was accessible to the cluster. - Setting up the correct wildcard DNS records to point to the LB. - Testing to ensure that Cert Manager was created the TLS records properly and renewing them. - Deploying an application in the cluster that required an Ingress resources and ensuring that the application was securely accessible outside the cluster through the ingress. - Creating an automated pipeline that can install and configure the NGINX Ingress Controller with cert-manager on new clusters.

Education

  • University of Texas

    Bachelor of Science in Information Technology in

    2008-01-01-2012-01-01

  • The University of Texas at San Antonio

    Bachelor of Science (BS) in Electrical engineering

Languages

  • English
  • Spanish