Middleware Engineer · AWS Enthusiast · Cloud & DevOps
3 years engineering enterprise-grade middleware platforms at Kyndryl. Currently building cloud-native skills with AWS, Docker, and Kubernetes.
I administer IBM WebSphere Application Server, Liberty Profile, and IBM HTTP Server environments across production, SIT, UAT, and Dev. My day-to-day includes SSL/TLS lifecycle management, fix pack upgrades, CVE remediation, JVM tuning, and 24x7 production support.
I'm actively expanding into cloud and DevOps — building hands-on capability with AWS (EC2, S3, VPC, IAM), Docker, and Kubernetes through self-driven labs and personal projects like this one.
WebSphere ND, Liberty, IHS, Plugin, JVM Tuning, Cluster Setup
AWS (EC2, S3, VPC, IAM, CloudWatch), Microsoft Azure (AZ-104), GCP
Docker, Kubernetes, Minikube, kubectl
SSL/TLS, KDB Keystores, IAM Policies, CVE Remediation
Linux (RHEL, Ubuntu), AIX, Bash, YAML, Git
ITIL v4, RCA, SOP, 24x7 Production Support
Administering enterprise-scale Java middleware platforms supporting business-critical applications across Production, SIT, UAT, and Dev environments. Responsible for runtime stability, SSL governance, fix-pack upgrades, and 24x7 incident response.
This portfolio runs in a Docker container on an AWS EC2 instance, fronted by Nginx with SSL/TLS termination via Let's Encrypt. Logs and metrics ship to AWS CloudWatch. The infrastructure (VPC, public subnet, IGW, security groups) is configured manually for learning.
Stack: Docker · Nginx · AWS EC2 · VPC · Let's Encrypt · CloudWatch
View on GitHub →