Marcin Brański, Serverless Developer in Warsaw, Poland
Marcin Brański

Serverless Developer in Warsaw, Poland

Member since June 5, 2017
Marcin has spent a great deal of time working with architecting in clouds, monitoring/SRE, CI/CD, infrastructure as code, and tools that help make deployment quicker and more reliable. From a developer's perspective, he has spent most of his time developing in Python and TypeScript. He's polite, professional, and communicates extremely well.
Marcin is now available for hire

Portfolio

  • Intelligent Lilli
    Terraform, AWS, Site Reliability Engineering (SRE), Amazon Web Services (AWS)...
  • Casefleet
    Docker, Terraform, DevOps, AWS, GitHub...
  • Lighthouse
    Terraform, TypeScript, React, Next.js, AWS, Datadog, Sentry

Experience

Location

Warsaw, Poland

Availability

Full-time

Preferred Environment

DevOps, Cloud Native, Vim Text Editor, Terraform, Terragrunt, Google Cloud Platform (GCP), AWS Cloud Architecture, Amazon Web Services (AWS), Blockchain

The most amazing...

...thing I've done is to improve observability of the infrastructure and services in AWS.

Employment

  • Senior Cloud DevOps Engineer—SRE

    2022 - 2022
    Intelligent Lilli
    • Managed infrastructure as code for all manually provisioned AWS resources.
    • Restructured and refactored Terraform code to support the AWS multi-account set up.
    • Migrated all already running applications to AWS Fargate.
    • Improved observability with AWS Prometheus, Grafana, and Sentry.
    Technologies: Terraform, AWS, Site Reliability Engineering (SRE), Amazon Web Services (AWS), Amazon ECS (Amazon Elastic Container Service), Git, Linux, PostgreSQL, Docker, AWS Lambda, AWS IAM, GCP, CI/CD Pipelines, Grafana, MQTT, Redis, Apache Kafka, Kubernetes
  • Senior DevOps Engineer

    2022 - 2022
    Casefleet
    • Migrated processing workers from EC2 to serverless architecture with ECS Fargate.
    • Improved observability by reconfiguring Datadog, refactoring logs, and exposing necessary metrics.
    • Improved the stability of the document processing pipeline.
    Technologies: Docker, Terraform, DevOps, AWS, GitHub, Amazon ECS (Amazon Elastic Container Service)
  • Senior DevOps Engineer and Full-stack Developer

    2022 - 2022
    Lighthouse
    • Developed the front end and back end in TypeScript with the Next.js framework.
    • Performed security audit of AWS IAM and other AWS resources.
    • Migrated and secured AWS ElasticSearch to elastic.co ElasticSearch.
    Technologies: Terraform, TypeScript, React, Next.js, AWS, Datadog, Sentry
  • Senior DevOps Engineer

    2021 - 2021
    Nutrino Health
    • Picked a solution to define the infrastructure as code (IaC) suitable for multiple accounts in various regions and provided an interface for Terraform and Helm.
    • Defined and estimated the scope for migrating AWS resources created manually to IaC.
    • Defined the production infrastructure into IaC with Atmos and Terraform.
    Technologies: AWS, Terraform, Amazon EC2 (Amazon Elastic Compute Cloud), Amazon Virtual Private Cloud (VPC), Amazon ElastiCache, AWS Lambda, Container Orchestration, CI/CD Pipelines, Containers, Continuous Integration (CI), Bash Script, Shell Scripting, Cloud Services, Cloud Architecture, AWS Kinesis, Amazon Web Services (AWS), Serverless, AWS IAM, Boto 3, Sentry
  • Senior DevOps Engineer

    2021 - 2021
    Lighthouse
    • Built the infrastructure as code with CDK, TypeScript, and Terraform with Terraform Cloud.
    • Improved observability of the infrastructure and services in AWS.
    • Optimized the cost for ECS deployments by using Autoscaling, adjusting Fargate CPU and MEM size.
    Technologies: AWS Cloud Development Kit (CDK), Terraform, AWS, Node.js, AWS Security, ECS, AWS Fargate, HAProxy, TypeScript, Container Orchestration, CI/CD Pipelines, Containers, Continuous Integration (CI), Bash Script, Shell Scripting, Cloud Services, Cloud Architecture, GitLab, Amazon Web Services (AWS), JavaScript, AWS IAM, Datadog, Sentry
  • Senior DevOps Engineer

    2020 - 2020
    Cloud Posse
    • Created a Terraform module to provision Opsgenie resources from YAML configurations using the Opsgenie provider, with automated tests. Code available at https://github.com/cloudposse/terraform-opsgenie-incident-management.
    • Created a PoC Terraform module to bootstrap Terraform cloud from YAML configuration and managed all Terraform resources there.
    • Designed the architecture for multi-account log streaming with Kinesis to ElasticSearch in VPC.
    • Worked on CloudPosse Terraform modules, adding tests, reviewing PRs, adding functionality, and more.
    Technologies: AWS, Terraform, Kubernetes, Helm, Helmfile, Infrastructure as Code (IaC), GitHub, GitHub Actions, Container Orchestration, CI/CD Pipelines, Containers, Continuous Integration (CI), Bash Script, Shell Scripting, Cloud Services, Cloud Architecture, Amazon Web Services (AWS), Serverless, AWS IAM, Boto 3, DevSecOps, Datadog
  • DevOps Engineer

    2020 - 2020
    flyiin
    • Designed architecture utilizing Google Cloud and Aiven.
    • Moved to Infrastructure as Code with Terraform and Helm.
    • Migrated legacy environments to new architecture without downtime.
    Technologies: Terraform, Google Cloud Platform (GCP), Google Kubernetes Engine (GKE), DevOps, Aiven, Helm, Agile, Linux, DNS, Infrastructure as Code (IaC), Site Reliability Engineering (SRE), Kubernetes, Container Orchestration, CI/CD Pipelines, Containers, Continuous Integration (CI), Bash Script, Shell Scripting, Cloud Services, Cloud Architecture, Serverless, Sentry
  • DevOps Engineer

    2019 - 2020
    Critical Start
    • Audited the infrastructure security code written in Terraform.
    • Upgraded Terraform to the 0.12 version from the 0.11 version.
    • Improved the Splunk deployment architecture to be more robust.
    Technologies: Splunk, Relational Database Services (RDS), Event Sourcing, Terraform, ECS, Amazon Web Services (AWS), Amazon CloudWatch, Git, Bash, Docker, Amazon Route 53, Amazon EC2 (Amazon Elastic Compute Cloud), Amazon EBS, Grafana, Continuous Monitoring, Amazon ECS (Amazon Elastic Container Service), DevOps, AWS Cloud Architecture, Agile, Linux, Redis, DNS, Infrastructure as Code (IaC), Site Reliability Engineering (SRE), New Relic, DevSecOps, AWS Fargate, HAProxy, Containers, Continuous Integration (CI), Bash Script, Cloud Services, Cloud Architecture, AWS, Serverless, AWS IAM, Boto 3, Security, Sentry
  • DevOps Engineer

    2019 - 2019
    Owsy
    • Improved the infrastructure and application observability.
    • Managed and optimized the AWS infrastructure for multiple clients.
    • Migrated the old environments to Gruntwork.
    • Upgraded Terraform to 0.12 version with all Gruntwork modules.
    Technologies: Amazon Web Services (AWS), Gruntwork, Terraform, ECS, Docker, Grunt, AWS, Amazon CloudWatch, Git, Bash, Amazon Route 53, Amazon EC2 (Amazon Elastic Compute Cloud), Amazon EBS, Terragrunt, Continuous Monitoring, Amazon ECS (Amazon Elastic Container Service), DevOps, AWS Cloud Architecture, Agile, Linux, Redis, DNS, Infrastructure as Code (IaC), AWS Fargate, HAProxy, Containers, Continuous Integration (CI), Bash Script, Cloud Services, Cloud Architecture, Serverless, AWS IAM, Boto 3, CircleCI, Sentry
  • Infrastructure Engineer

    2017 - 2019
    Voxnest
    • Operated a multiregional Kubernetes cluster on AWS.
    • Implemented continuous integration and continuous deployment with Jenkins.
    • Embraced self-healing infrastructures and applications.
    • Implemented AWS infrastructure as code with Terraform.
    Technologies: ELK (Elastic Stack), Prometheus, Jenkins, Terraform, Packer, Ansible, Amazon Web Services (AWS), Kubernetes, Amazon CloudWatch, System Administration, Git, Bash, Docker, Amazon Route 53, Amazon EC2 (Amazon Elastic Compute Cloud), Amazon EBS, Grafana, Continuous Monitoring, DevOps, AWS Cloud Architecture, Test-driven Development (TDD), Agile, Linux, Redis, DNS, Infrastructure as Code (IaC), Site Reliability Engineering (SRE), Python, AWS Lambda, HAProxy, Containers, Continuous Integration (CI), Cloud Services, Cloud Architecture, AWS, Serverless, Jenkins Pipeline, Groovy Scripting, AWS IAM, Boto 3
  • DevOps Engineer | Python Developer

    2015 - 2017
    Daftcode
    • Developed a Python back end in TDD (test-driven development) fashion.
    • Upgraded the deployment pipeline.
    • Shortened the overall deployment time.
    • Migrated services from containers and deployed them on Mesos.
    • Built-up the infrastructure and security with Packer Terraform and AWS.
    • Migrated the system from no-configuration management to a code infrastructure with Salt.
    • Visualized the infrastructure and application state with Check_MK and ELK stack.
    Technologies: Packer, Nagios, ELK (Elastic Stack), NGINX, Linux, Docker, Terraform, Mesos, Amazon Web Services (AWS), Python, Amazon CloudWatch, System Administration, Git, Bash, Amazon Route 53, Amazon EC2 (Amazon Elastic Compute Cloud), Amazon EBS, Grafana, Continuous Monitoring, DevOps, AWS Cloud Architecture, Test-driven Development (TDD), Agile, Redis, DNS, Infrastructure as Code (IaC), HAProxy, Containers, Continuous Integration (CI), Shell Scripting, Cloud Services, AWS, Serverless, AWS IAM, Boto 3
  • DevOps Engineer

    2013 - 2015
    TouK
    • Managed the infrastructure (pfSense, KVM, Mesos, AWS).
    • Created CI/CD pipelines with the developers.
    • Migrated from no-configuration management to a code infrastructure with Puppet.
    • Architected the cloud infrastructure for clients.
    • Monitored all the things with a combination of Syslog, Nagios, Check_MK, ELK, and Grafana with InfluxDB tied together.
    Technologies: Amazon Web Services (AWS), Confluence, Jira, Nagios, InfluxDB, Kibana, Logstash, Elasticsearch, ELK (Elastic Stack), Puppet, Secure Automated Lending Technology (SALT), Terraform, Packer, Marathon, Mesos, OpenLDAP, OpenVPN, GitLab, Sonar, ZFS, NGINX, Iptables, KVM, Bash, Python, Jenkins, Docker, AWS, pfSense, Linux, System Administration, Git, Amazon Route 53, Amazon EC2 (Amazon Elastic Compute Cloud), Amazon EBS, Grafana, DevOps, AWS Cloud Architecture, Agile, Redis, DNS, Infrastructure as Code (IaC), HAProxy, Containers, Continuous Integration (CI), Shell Scripting, Cloud Services, Jenkins Pipeline, Groovy Scripting, AWS IAM, Sentry
  • System Administrator

    2010 - 2013
    SII
    • Managed the infrastructure (both hardware and virtual).
    • Automated the infrastructure with Puppet.
    • Set up the services, scaled them, and made them highly available.
    Technologies: VMware ESXi, Alfresco, Windows PowerShell, Windows Server, Acronis, Horizon, PostgreSQL, MySQL, DHCP, VMware, Puppet, Bash, Nagios, Jenkins, Linux, System Administration, Git, Docker, DNS, Containers, Continuous Integration (CI), Shell Scripting

Experience

  • Prometheus Fake Exporter
    https://github.com/3h4x/prometheus-fake-exporter

    This project was created to test the Kubernetes horizontal pod autoscaler. It exports a fake_metric with a value fetched from http_endpoint. This makes it possible to scale HPA according to what's presented via HTTP, for example, in GitHub Gist.

  • Terraform Module to Provision Opsgenie Resources from YAML Configurations
    https://github.com/cloudposse/terraform-opsgenie-incident-management

    Terraform module to provision Opsgenie resources using the Opsgenie provider. The provider needs to be configured with the proper credentials before it can be used. It consists of a root module which is only here as an example but can be used as a combination of all submodules. Submodules can also be combined to abstract away the complexity of setting up for example a team escalation.

  • Prometheus on ECS PoC
    https://github.com/3h4x/terraform-prometheus-ecs/

    Created possible Prometheus integration with ECS using Terraform. My main goal was to improve observability by introducing node monitoring with Node Exporter and cAdvisor and ingesting application metrics exposed by ephemeral containers.

  • Migration of DNS from GoDaddy to GCP Cloud DNS
    https://3h4x.github.io/tech/2020/03/14/dns-migration

    Company Flyyin had DNS domains registered before GCP cloud adoption. To fully utilize GCP environment migration to Cloud DNS was necessary. This included staging domains but also production domains and was done without any downtime. I described steps and wrote some helpers in Python for such an operation to be smooth and wrote a blog post about it afterward.

  • Speaker at Confitura Conference on How to Deploy Applications Quicker
    https://www.youtube.com/watch?v=rfuACOn4WLQ

    In 2014 my friend and I were speakers at Confitura Conference. We touched on the topic of how to quickly deploy applications and deliver faster. Technologies that were introduced in the presentation were Docker, Vagrant, Cloud, Packer but also some automation and provisioning tools like Puppet, Chef, Ansible, and Salt.

Skills

  • Libraries/APIs

    Terragrunt, Amazon EC2 API, OpenLDAP, Node.js, Jenkins Pipeline, React
  • Tools

    Grunt, AWS CloudFormation, Ansible, Amazon Virtual Private Cloud (VPC), Terraform, Amazon EBS, Amazon CloudWatch, Amazon ECS (Amazon Elastic Container Service), AWS IAM, Sentry, Google Kubernetes Engine (GKE), Helm, Check_MK, Git, Vim Text Editor, Boto 3, Packer, Puppet, Nagios, Boto, Jenkins, GitLab, GitLab CI/CD, Grafana, Kibana, AWS Fargate, PyCharm, Sonar, OpenVPN, Logstash, Jira, Confluence, VMware, Alfresco, Vagrant, Chef, GitHub, Amazon ElastiCache, NGINX, SaltStack, ELK (Elastic Stack), pfSense, Mesos, CircleCI, Splunk, MQTT
  • Paradigms

    DevOps, Test-driven Development (TDD), Lambda Architecture, Agile, DevSecOps, Continuous Deployment, Continuous Delivery (CD), Continuous Integration (CI), Event Sourcing
  • Platforms

    Cloud Native, Amazon EC2 (Amazon Elastic Compute Cloud), Docker, Amazon Web Services (AWS), Kubernetes, Linux, AWS Lambda, Google Cloud Platform (GCP), AWS Kinesis, Blockchain, Windows Server, New Relic, KVM, Apache Kafka
  • Storage

    Amazon S3 (AWS S3), Redis, Datadog, Elasticsearch, InfluxDB, MySQL, PostgreSQL, Google Cloud
  • Other

    AWS, AWS DevOps, AWS Cloud Architecture, Monitoring, Infrastructure as Code (IaC), Amazon Route 53, Container Orchestration, Cloud Services, Cloud Architecture, ECS, Serverless, Lambda Functions, Helmfile, Site Reliability Engineering (SRE), Opsgenie, Prometheus, Continuous Monitoring, System Administration, Task Automation, CI/CD Pipelines, Containers, Shell Scripting, AWS Transit Gateway, AWS CodePipeline, ZFS, Secure Automated Lending Technology (SALT), DHCP, Horizon, Acronis, VMware ESXi, Gruntwork, Relational Database Services (RDS), Aiven, DNS, Cloud Security, Cloud, GitHub Actions, AWS Cloud Development Kit (CDK), AWS Security, Iptables, HAProxy, Groovy Scripting, GCP
  • Languages

    Python, Python 3, Python 2, Bash, Bash Script, YAML, TypeScript, JavaScript
  • Industry Expertise

    Security, IT Security
  • Frameworks

    Marathon, Windows PowerShell, Django, Next.js

Education

  • Completed Credits towards a Bachelor's Degree in Electrical Engineering
    2005 - 2008
    Politechnika Warszawska - Warsaw, Poland

Certifications

  • AWS Certified DevOps Engineer – Professional
    JUNE 2020 - JUNE 2023
    Amazon Web Services
  • AWS Certified Security – Specialty
    APRIL 2020 - APRIL 2023
    Amazon Web Services
  • AWS Certified Advanced Networking Specialty
    JANUARY 2020 - JANUARY 2023
    Amazon Web Services (AWS)
  • Google Cloud Certified — Associate Cloud Engineer
    NOVEMBER 2019 - NOVEMBER 2021
    Google
  • AWS Certified Cloud Practitioner
    MAY 2019 - MAY 2022
    Amazon Web Services (AWS)
  • AWS Solution Architect Professional
    MAY 2019 - JUNE 2024
    Amazon Web Services (AWS)
  • AWS Certified SysOps Administrator Associate
    APRIL 2019 - APRIL 2022
    Amazon Web Services (AWS)
  • AWS Solutions Architect Associate
    APRIL 2017 - APRIL 2019
    Amazon Web Services, Inc.

To view more profiles

Join Toptal
Share it with others