Chigozie Nnadi
Cloud & DevOps Engineer

I design and build cloud-native infrastructure across AWS and Azure. Specialising in serverless architecture, Infrastructure as Code, and automated deployment pipelines — provider-agnostic by design.

01 featured projects
Serverless Document Processor LIVE

End-to-end cloud-native PDF extraction pipeline. Users upload documents via presigned S3 URLs, async processing via SQS and Lambda, results served through a React dashboard. Full Terraform IaC across 6 modules.

AWS Lambda API Gateway S3 SQS DynamoDB Cognito Terraform Python React CloudWatch
// architecture — async document processing pipeline
REACT SPA Amplify Hosting JWT API GATEWAY HTTP API + JWT Auth API LAMBDA Presigned URL gen PUT S3 RAW Encrypted + Private event SQS QUEUE + DLQ (3 retries) trigger WORKER λ pypdf extraction S3 RESULTS .txt output DYNAMODB Job status + TTL COGNITO User Pool + JWT CLOUDWATCH 6 alarms + SNS SNS → EMAIL Alert fan-out TERRAFORM 6 modules S3 state backend ── sync - - async event
Serverless Container API IaC

Production-grade Python API on AWS ECS Fargate with zero-downtime deployments, Application Load Balancing, and a fully automated CI/CD pipeline via Terraform and GitHub Actions with OIDC authentication.

AWS ECS Fargate Docker ALB Terraform GitHub Actions Python ECR VPC
// architecture — containerised api with blue/green deployment
GH ACTIONS OIDC + push trigger build ECR Docker image pull ECS FARGATE task blue active task green standby private subnet · no public IP ALB Target groups INTERNET HTTPS only TERRAFORM full IaC
Cloud Resume Challenge LIVE

Serverless portfolio with S3/CloudFront frontend and Lambda/DynamoDB visitor counter. Full CI/CD via GitHub Actions with OIDC, zero long-lived credentials. 100% infrastructure as code with Terraform.

S3 CloudFront Lambda DynamoDB Route 53 ACM Terraform GitHub Actions
// architecture — serverless static site with visitor counter
GITHUB OIDC push GH ACTIONS terraform apply S3 BUCKET static files CLOUDFRONT CDN + ACM TLS BROWSER resume.domain JS fetch API GW HTTP API LAMBDA get/incr DYNAMODB visitor count Route 53 → CNAME → CloudFront · ACM cert (us-east-1) · Terraform state: S3 + DynamoDB lock
DevSecOps Pipeline

Security integrated into a Kubernetes CI/CD pipeline using Jenkins and Helm. Automated vulnerability scanning with Trivy, runtime monitoring with Prometheus and Grafana, policy enforcement with OPA.

Kubernetes Jenkins Helm Trivy Prometheus Grafana Docker
// architecture — jenkins ci/cd with security gates and k8s deployment
GITHUB webhook JENKINS EC2 · port 8080 Jenkinsfile pipeline stages node exporter // security gates (fail-fast) SONARQUBE SAST · Docker TRIVY file + image scan OWASP DC dependency check DOCKER build + tag + push DOCKERHUB image registry ARGOCD GitOps sync KUBERNETES Netflix clone pod NodePort 30007 Helm charts node-exporter observability: Prometheus scrapes Jenkins + K8s nodes → Grafana dashboards · Email alerts on build failure
Microservices on Kubernetes

Orchestrated a multi-service application on AWS EKS using Docker and Kubernetes. Configured inter-service communication via ClusterIP services, automated deployments with Helm charts, and exposed services via an Ingress controller.

AWS EKS Kubernetes Docker Helm DockerHub Ingress ClusterIP
// architecture — multi-service kubernetes deployment on eks
INTERNET HTTPS // AWS EKS cluster INGRESS nginx controller FRONTEND SVC ClusterIP · 3000 API SVC ClusterIP · 5000 DB SVC ClusterIP · 5432 FRONTEND POD React · Docker API POD Node · Docker DB POD Postgres · PVC HELM chart deploys DOCKER HUB
02 skills & technologies
CLOUD PLATFORMS
  • AWS
  • Azure
  • Oracle Cloud
INFRASTRUCTURE AS CODE
  • Terraform
  • CloudFormation
  • AWS CDK
CONTAINERS & ORCHESTRATION
  • Docker
  • Kubernetes / EKS
  • ECS Fargate
  • Helm
CI/CD & AUTOMATION
  • GitHub Actions
  • Jenkins
  • OIDC auth
SERVERLESS
  • AWS Lambda
  • API Gateway
  • SQS / SNS
  • DynamoDB
OBSERVABILITY
  • CloudWatch
  • Prometheus
  • Grafana
  • Loki
OPEN-SOURCE SECURITY
  • Keycloak (IAM / SSO)
  • Psono (secrets mgmt)
  • Trivy (vuln scanning)
  • SonarQube (SAST)
  • OPA / Gatekeeper
LANGUAGES
  • Python
  • Bash
  • HCL (Terraform)
  • JavaScript
NETWORKING & SECURITY
  • VPC / Subnets / SGs
  • IAM least-privilege
  • TLS / ACM
  • Secrets Manager
03 about

I'm Chigozie — a Systems Engineering graduate and Cloud/DevOps engineer with a focus on building infrastructure that is secure, observable, and fully automated from day one.

Every project I build is end-to-end: architecture design, IaC with Terraform, application code, CI/CD pipelines, and monitoring. I don't just provision resources — I think through failure modes, cost, and operational complexity at every layer.

Currently deepening expertise in serverless patterns, platform engineering, and open-source security tooling. Open to senior DevOps, Cloud Engineering, and Platform Engineering roles across AWS and Azure environments.

LOCATION Nigeria · Open to remote
FOCUS AWS · Azure · Serverless · IaC · Platform Eng
CERTIFICATIONS AWS · Azure · studying for more
CONTACT LinkedIn  ·  GitHub
AVAILABILITY Open to opportunities_