Loading...
Loading...


I didn't plan to become a cloud engineer. I was just curious why Linux servers worked the way they did. That curiosity ate me alive until I understood every layer — from kernel to container to cluster. Now I build infrastructure that scales, self-heals, and doesn't page me at 3 AM.
Terminal session log — every role, every build, every impact
Architecture, challenges, and impact
Kubernetes Certificate Lifecycle Operator
Certificate management in Kubernetes is fragmented. cert-manager handles issuance, but distribution to consuming services — especially across clusters and external systems like Azure Key Vault and AWS ACM — requires brittle manual scripting that doesn't scale beyond a few services.
What makes this hard
How it works
Designed a Custom Resource Definition (CRD) called CertificateBinding that declaratively describes where certificates should go. The operator watches CRD events via informers and runs a controller-runtime reconciliation loop. It syncs TLS secrets across namespaces, Azure Key Vault, and AWS ACM. Uses leader election for HA deployments, exposes Prometheus metrics, and implements health probes with TLS-secured webhook validation.
Tech Stack
Impact
Zero-touch certificate lifecycle | Enterprise-scale multi-cluster distribution | Prometheus metrics + health probes | HA with leader election | Apache 2.0 licensed
Key Decisions
Skills
Technologies I've mastered — each claim backed by real project proof
Certificate lifecycle automation | 99.9% uptime | 4hrs→12min deploys
9+ production projects containerized — Go, Python, ML, ETL
Serverless ETL (Glue+Lambda+Athena) + Bedrock RAG pipeline
AKS + Azure DB + VMs via Terraform for CI/CD platform
Multi-cloud IaC: Azure AKS, AWS EKS, databases, serverless
eBPF, Cilium, seccomp for CKS | 10+ years terminal-deep
Multi-tier deployments with integrated security scanning
Reverse proxy for LLM-Wall + production TLS termination
Reproducible multi-VM dev environments for cluster testing
8hrs→25min deploys at Bipolar Factory, 50+ daily builds at Finfactor
SonarQube+Nexus+Trivy on AKS | 80% vulnerability reduction
Multi-environment CI/CD for Finfactor + AI DevOps Agent
GitOps microservice deployment at Finfactor
Declarative infra with automated drift detection
100+ repos | GSSoC Global Rank 11 (top 0.1%)
7 production systems: LLM-Wall, bot, RAG, ETL, trading, lakehouse
CertAuto operator + SSH honeypot with Qwen2.5 deception
Kernel interfaces, memory management, process control at CDAC
STL, templates, multi-threaded application design
50+ automation scripts: cluster setup, CI/CD, monitoring
Custom exporters + alerting for Finfactor and Bipolar Factory clusters
AI-driven backup/restore agent + multi-service dashboards
Metrics + logs + tracing | alert before users notice
Multi-agent K8s auditor — Engineer, Expert, Tools agents
Guardian Engine, MCP ecosystem, Bedrock RAG pipeline
Fine-tuned Qwen2.5 | 5-agent Guardian Engine | ensemble ML trading
REST APIs for ETL dashboard, chat, insurance engine
Event streaming for distributed data pipelines
Finfactor, healthTracker, OUR-chat, LibreChat storage
Multi-tier apps, metadata management, ETL storage
Certified Kubernetes Administrator — production K8s expertise
Certified Kubernetes Security Specialist — cluster hardening
Secure-by-default pipelines with automated security gates
MOD UK recognized | enterprise cloud hardening
Internal platforms reducing deployment effort across teams
Seccomp, Cilium, RBAC, network policies | defense in depth
Automated ETL + AI pipelines — zero server management
Hybrid search (keyword + semantic) for enterprise Q&A
Multi-region cluster isolation with Cilium network policies
End-to-end automation: commit to production
ML models from notebooks to production inference pipelines
Automated scanning + hardened deployments | threat modeling
If I do it twice, it becomes a script
Scalable infrastructure across AWS and Azure
Resilient systems designed to survive failures
Certifications and recognition from the industry
Awarded by the UK Ministry of Defence for responsible disclosure of a critical security vulnerability
Achieved global rank 11 in GirlScript Summer of Code out of thousands of participants
The Linux Foundation / CNCF
2025Highest Kubernetes security certification. Validates expertise in cluster hardening, runtime security, network policies, and supply chain security.
The Linux Foundation / CNCF
2025Core Kubernetes administration certification covering cluster architecture, installation, workload scheduling, networking, and troubleshooting.
Amazon Web Services
2024Foundational cloud certification validating understanding of AWS services, architecture best practices, security, and pricing.
KodeKloud / CNCF
2025Certification for Prometheus monitoring and observability skills.
Built RAG-based knowledge assistant using Amazon Bedrock for enterprise document Q&A
2025Published 18 articles on Kubernetes, eBPF, Cilium, and cloud-native infrastructure
2023-PresentActive in open source and tech communities. Contributed to cloud-native projects and infrastructure tools.
2024-PresentDeep dives into infrastructure, Kubernetes, eBPF, and cloud-native engineering
Why your container images are probably too large and insecure. A practical guide to distroless base images combined with multi-stage builds for production-grade Docker images.
The most frustrating Kubernetes debugging journey — when everything looks right but nothing works. A systematic approach to diagnosing mysterious 5xx errors.
When do you need a Cluster Mesh (Cilium), a Service Mesh (Istio), or both? A practical comparison with real deployment scenarios.
How Cilium uses eBPF to replace traditional kube-proxy with identity-based security. Understanding the shift from IP-based to identity-based network policies.
The technology behind Cilium, Falco, and modern Kubernetes networking. A deep dive into eBPF's architecture and how it enables programmable kernel-level observability.
Connecting Kubernetes clusters across regions with Cilium Cluster Mesh. Service discovery, network policies, and load balancing across cluster boundaries.
Live from GitHub
Real feedback from people I've worked with
“Sanmarg has been an honest, hardworking and ambitious individual. He has proved to be a diligent young guy with attention to detail. He has excelled at whatever he takes on and would be an asset to have on any team.”
“Had the chance to work with Sanmarg, and he was an absolute asset to the team. Super quick to pick things up, always curious, and took real ownership — from infra to CI/CD and monitoring. Solid teammate and someone I'd happily vouch for!”
Your recommendation here
Edit in Recommendations.tsx
Your recommendation here
Edit in Recommendations.tsx
I'm open to platform engineering, cloud infrastructure, and DevOps roles — or freelance projects involving Kubernetes, CI/CD, and automation.