Open to Work

Hi, my name is

Hritik Munde

DevOps & Platform Engineer

Platform engineer specializing in cloud-native infrastructure, GitOps, and DevSecOps. Building self-service IDPs, zero-trust CI/CD pipelines, and production-grade observability platforms across AWS, Azure, and Kubernetes.

voldemort@macbook: ~
voldemort@macbook:~$

01.Technical Arsenal

CI/CD & GitOps

GitHub ActionsJenkinsGitLab CICircleCIArgoCDAzure DevOpsProgressive Delivery

Containers & Orchestration

DockerKubernetes (EKS, AKS, GKE)HelmKustomizeMicroservicesMulti-cluster management

Cloud & IaC

AWS (EC2, S3, IAM, VPC, RDS)AzureGCPTerraformCrossplaneAnsible

Observability & Reliability

PrometheusGrafanaLokiOpenTelemetryDatadogDynatraceIstio Service MeshSLO/Error Budgeting

Security & DevSecOps

OPA GatekeeperCosignSBOM (Syft)TrivySnykLitmus ChaosHashiCorp Vault

Deployment Strategies

Blue-GreenCanaryRolling UpdatesAutomated RollbacksSelf-Healing Infrastructure

Languages & Scripting

Python (Django, FastAPI)GoJavaTypeScriptBash/ShellSQL

Networking & Security

NginxTraefikFirewallsIAMVPNSSL/TLS

Databases & Storage

PostgreSQLMongoDBRedisEtcdS3

02.Featured Deployments

Shipyard IDP — Internal Developer Platform

A self-service Internal Developer Platform built on Backstage that reduces cloud-native service provisioning from 3-day tickets to under 3 minutes, with full GitOps automation and observability.

Backstage scaffolding templates auto-provision GitHub repos, Actions CI/CD pipelines, and AWS RDS databases via Crossplane on every developer request.
ArgoCD App of Apps GitOps pattern for zero-touch Kubernetes deployments across microservices.
Full observability via Prometheus ServiceMonitors and Grafana dashboards.
BackstageCrossplaneArgoCDTerraformKubernetesPrometheus

Zero-Trust CI/CD Supply Chain Pipeline

A hardened software supply chain pipeline that blocks 100% of unverified images from production Kubernetes using policy enforcement, image signing, and automated vulnerability scanning.

OPA Gatekeeper admission policies reject unsigned or unregistered container images at deploy time.
SBOMs generated with Syft and images signed with Cosign per build for supply chain integrity.
Trivy vulnerability scanning integrated into GitHub Actions to surface critical CVEs before merge.
GitHub ActionsCosignSyftOPA GatekeeperTrivyKubernetes

Self-Healing Kubernetes Platform

An automated remediation platform that detects failures and rolls back to healthy releases without human intervention, validated under real failure conditions.

Prometheus detects error rate threshold breaches, AlertManager fires a webhook, and ArgoCD automatically rolls back to the last healthy release.
Validated under real failure conditions by injecting pod crashes and traffic spikes.
Confirmed sub-5-minute automated recovery with tuned SLI alert thresholds.
KubernetesPrometheusAlertManagerArgoCDGrafanaPython

FinOps Governance Agent

An automated cloud cost governance agent that detects spend overruns, identifies cost drivers, and delivers real-time breakdowns to engineering teams via Slack.

Python agent detects daily forecast overruns, identifies top cost drivers, and scans for untagged resources.
Automated Slack notifications with per-service AWS cost breakdowns.
CloudWatch budget alerts and tagging policy enforcement to reduce unplanned cloud spend.
PythonAWS Cost ExplorerBoto3Slack APICloudWatchLambda

GitOps Multi-Environment Pipeline

A structured dev/staging/prod promotion pipeline using ArgoCD ApplicationSets with automated health gates and full Git audit trail across all environments.

Code merged to main auto-deploys to dev, passes automated health gates, promotes to staging, then requires manual approval for production.
Automatic rollback on failed health checks with Kustomize per-environment overlays.
Full Git audit trail for every environment change eliminates manual deployment coordination.
ArgoCDApplicationSetsKustomizeGitHub ActionsKubernetes

LLM Inference Platform

Production-grade LLM serving infrastructure on Kubernetes with autoscaling on request queue depth, GitOps deployment, and full observability across GPU replicas.

Built LLM serving with vLLM on Kubernetes with horizontal pod autoscaling on request queue depth.
GitOps deployment via ArgoCD with Terraform-provisioned EKS on AWS.
Implemented deployment health gates and automated rollback triggers.
vLLMKubernetesArgoCDPrometheusGrafanaTerraformGitHub Actions

Automated Honeypot Farm

A Kubernetes-native honeypot deployment system designed to capture and analyze automated network attacks using multiple personas (Web Server, Edge Router, Domain Controller).

Deployed on AWS EKS using Terraform for Infrastructure as Code.
Implemented centralized logging and visualization with Loki, Promtail, and Grafana.
Secured with NetworkPolicies and AWS Security Groups for strict isolation.
KubernetesAWS EKSTerraformGrafana/LokiCowrie

Distributed Logging & Alerting

A lightweight, real-time logging pipeline for Kubernetes that captures error logs via Fluent Bit, bridges them to an Etcd cluster, and triggers alerts.

Built custom Go microservices (Bridge & Watcher) for log processing and alerting.
Utilized Fluent Bit for efficient, low-overhead log forwarding and filtering.
Leveraged Etcd for consistent, distributed storage of alert states.
GoKubernetesEtcdFluent BitDistributed Systems

Library Catalog Monolith

A full-stack Spring Boot application demonstrating modern DevOps practices including containerization, CI/CD, and cloud deployment.

Containerized Java Spring Boot application using Docker.
Implemented secure role-based authentication and CRUD operations.
Automated build and test pipelines via GitHub Actions.
Java Spring BootDockerCI/CDRenderPostgreSQL

Scalable Thumbnail Generator

A production-style, cloud-native system for parallel image processing using Kubernetes HPA and custom metrics.

Architected a scalable pipeline with Flask, Celery, and Redis for asynchronous task processing.
Implemented Horizontal Pod Autoscaling (HPA) based on custom Redis queue depth metrics.
Provisioned AWS EKS infrastructure using Terraform.
Kubernetes HPATerraformAWS EKSPython/CeleryRedis

03.Career & Certifications

Work History

Graduate Teaching Assistant (Part-time)

Indiana University, Dept. of Computer Science
Aug 2025 - Present
Bloomington, IN
  • Spearheaded a self-service Linux sandbox environment for 100+ students using automated shell scripts and network isolation, reducing setup overhead for instructors by 20 hours per week.
  • Engineered an automated grading pipeline using Shell scripts and Autograder to validate code submissions, creating a CI/CD-like feedback loop that reduced grading turnaround time by 40%.

DevOps Engineer — Infrastructure Platform

UST
Jul 2022 - Jul 2024
Pune, India
  • Cut delivery cycles 93% (4hrs to 15min) for 40+ microservices via ArgoCD/Jenkins/Helm GitOps; implemented Blue-Green/Canary for zero-downtime upgrades for a Tier-1 US telecom.
  • Reduced MTTR 50% (under 90min) via Prometheus/Grafana/Loki stack; utilized Istio Service Mesh for traffic management and SLI/SLO dashboards to catch 80% of issues before user impact.
  • Eliminated 90% configuration drift across 200+ K8s nodes via Ansible/Terraform provisioning; reduced server setup time from hours to 30 minutes.
  • Engineered automated DR runbooks, achieving an 87% RTO improvement (4hrs to 30min) and ensuring 100% compliance during quarterly security and enterprise audits.
  • Architected migration to Azure (AKS), leveraging HPA and Cluster Autoscalers to handle 30% peak traffic surges without manual intervention.
  • Led shift-left security integration of Trivy/SonarQube into CI/CD pipelines, reducing production vulnerabilities by 40% across all cloud-native and microservice environments.

Software Engineer Intern

Tata Motors
Aug 2021 - May 2022
Pune, India
  • Engineered 3+ production-level Python scripts to automate recurring operational workflows, resulting in a 60% reduction in manual toil for the engineering team.
  • Collaborated with the core engineering team to optimize SQL queries and backend API endpoints, improving internal dashboard load times by 25%.

Certifications

Red Hat Certified System Administrator (RHCSA)

Red Hat

Issued 2022

HashiCorp Certified: Terraform Associate (003)

HashiCorp

Issued 2023

Education

Indiana University Bloomington

Master of Science in Computer Science

Aug 2024 - May 2026

GPA: 3.9/4. Focusing on Cloud Computing, Distributed Systems, and Network Security.

MIT Academy of Engineering, Pune

Bachelor of Technology in Computer Engineering

Aug 2018 - May 2022

GPA: 3.65/4. Specialized in Software Development, Database Management, and Network Security.

Initialize Connection?

I'm currently looking for new opportunities in DevOps and Cloud Engineering. Whether you have a question about my stacks, infrastructure, or just want to ping me — my inbox is always open (port 25).

Designed & Deployed by Hritik Munde © 2026