Marcin Brański, Task Automation Developer in Warsaw, Poland
Marcin Brański

Task Automation Developer in Warsaw, Poland

Member since May 11, 2017
Marcin has spent a great deal of time working with Linux, virtualization, clouds, monitoring, CI/CD, and tools that help make deployment quicker and more reliable. From a developer's perspective, he has spent most of his time developing in Python. He's polite, professional, and communicates extremely well.
Marcin is now available for hire

Portfolio

  • Nutrino Health
    AWS, Terraform, AWS EC2, Amazon Virtual Private Cloud (VPC), AWS ElastiCache...
  • Lighthouse
    AWS Cloud Development Kit (CDK), Terraform, AWS, Node.js, AWS Security, ECS...
  • Cloud Posse
    AWS, Terraform, Kubernetes, Helm, Helmfile, Infrastructure as Code (IaC)...

Experience

Location

Warsaw, Poland

Availability

Part-time

Preferred Environment

DevOps, Cloud Native, AWS, Vim Text Editor, Terraform, Terragrunt, Google Cloud Platform (GCP), AWS Cloud Architecture

The most amazing...

...thing I've ever done was to embrace the cloud and take advantage of it.

Employment

  • Senior DevOps Engineer

    2021 - PRESENT
    Nutrino Health
    • Picked a solution to define the infrastructure as code suitable for multiple accounts in multiple regions and provided an interface for Terraform and Helm.
    • Defined and estimated the scope for migrating manually created AWS resources to infrastructure as code.
    • Defined the production infrastructure into infrastructure as code with Atmos and Terraform.
    Technologies: AWS, Terraform, AWS EC2, Amazon Virtual Private Cloud (VPC), AWS ElastiCache, AWS Lambda
  • Senior DevOps Engineer

    2021 - 2021
    Lighthouse
    • Built the infrastructure as code with CDK, TypeScript, and Terraform with Terraform Cloud.
    • Improved observability of the infrastructure and services in AWS.
    • Optimized the cost for ECS deployments by using Autoscaling, adjusting Fargate CPU and MEM size.
    Technologies: AWS Cloud Development Kit (CDK), Terraform, AWS, Node.js, AWS Security, ECS, AWS Fargate, HAProxy, TypeScript
  • Senior DevOps Engineer

    2020 - 2020
    Cloud Posse
    • Created a Terraform module to provision Opsgenie resources from YAML configurations using the Opsgenie provider, with automated tests. Code available at https://github.com/cloudposse/terraform-opsgenie-incident-management.
    • Created a PoC Terraform module to bootstrap Terraform cloud from YAML configuration and managed all Terraform resources there.
    • Designed the architecture for multi-account log streaming with Kinesis to ElasticSearch in VPC.
    • Worked on CloudPosse Terraform modules, adding tests, reviewing PRs, adding functionality, and more.
    Technologies: AWS, Terraform, Kubernetes, Helm, Helmfile, Infrastructure as Code (IaC), GitHub, GitHub Actions
  • DevOps Engineer

    2020 - 2020
    flyiin
    • Designed architecture utilizing Google Cloud and Aiven.
    • Moved to Infrastructure as Code with Terraform and Helm.
    • Migrated legacy environments to new architecture without downtime.
    Technologies: Terraform, Google Cloud Platform (GCP), Google Kubernetes Engine (GKE), DevOps, Aiven, Helm, Agile, Linux, DNS, Infrastructure as Code (IaC), Site Reliability Engineering (SRE), Kubernetes
  • DevOps Engineer

    2019 - 2020
    Critical Start
    • Improved the Splunk deployment architecture.
    • Upgraded Terraform to the 0.12 version.
    Technologies: Splunk, Relational Database Services (RDS), Event Sourcing, Terraform, ECS, Amazon Web Services (AWS), AWS CloudWatch, Git, Bash, Docker, AWS Route 53, AWS EC2, AWS EBS, Grafana, Continuous Monitoring, AWS ECS, DevOps, AWS Cloud Architecture, Agile, Linux, Redis, DNS, Infrastructure as Code (IaC), Site Reliability Engineering (SRE), New Relic, DevSecOps, AWS Fargate, HAProxy
  • DevOps Engineer

    2019 - 2019
    Owsy
    • Improved the infrastructure and application observability.
    • Managed and optimized the AWS infrastructure for multiple clients.
    • Migrated the old environments to Gruntwork.
    • Upgraded Terraform to 0.12 version with all Gruntwork modules.
    Technologies: Amazon Web Services (AWS), Gruntwork, Terraform, ECS, Docker, Grunt, AWS, AWS CloudWatch, Git, Bash, AWS Route 53, AWS EC2, AWS EBS, Terragrunt, Continuous Monitoring, AWS ECS, DevOps, AWS Cloud Architecture, Agile, Linux, Redis, DNS, Infrastructure as Code (IaC), AWS Fargate, HAProxy
  • Infrastructure Engineer

    2017 - 2019
    Voxnest
    • Operated a multiregional Kubernetes cluster on Amazon Web Services (AWS).
    • Implemented continuous deployment with Jenkins.
    • Embraced self-healing infrastructures and applications.
    • Implemented AWS infrastructure as code with Terraform.
    Technologies: ELK (Elastic Stack), Prometheus, Jenkins, Terraform, Packer, Ansible, Amazon Web Services (AWS), Kubernetes, AWS CloudWatch, System Administration, Git, Bash, Docker, AWS Route 53, AWS EC2, AWS EBS, Grafana, Continuous Monitoring, DevOps, AWS Cloud Architecture, Test-driven Development (TDD), Agile, Linux, Redis, DNS, Infrastructure as Code (IaC), Site Reliability Engineering (SRE), Python, AWS Lambda, HAProxy
  • DevOps Engineer | Python Developer

    2015 - 2017
    Daftcode
    • Developed a Python back end in TDD (test-driven development) fashion.
    • Upgraded the deployment pipeline.
    • Shortened the overall deployment time.
    • Migrated services from containers and deployed them on Mesos.
    • Built-up the infrastructure and security with Packer Terraform and AWS.
    • Migrated the system from no-configuration management to a code infrastructure with Salt.
    • Visualized the infrastructure and application state with Check_MK and ELK stack.
    Technologies: Packer, Nagios, ELK (Elastic Stack), Nginx, Linux, Docker, Terraform, Mesos, Amazon Web Services (AWS), Python, AWS CloudWatch, System Administration, Git, Bash, AWS Route 53, AWS EC2, AWS EBS, Grafana, Continuous Monitoring, DevOps, AWS Cloud Architecture, Test-driven Development (TDD), Agile, Redis, DNS, Infrastructure as Code (IaC), HAProxy
  • DevOps Engineer

    2013 - 2015
    TouK
    • Managed the infrastructure (pfSense, KVM, Mesos, AWS).
    • Created CI/CD pipelines with the developers.
    • Migrated from no-configuration management to a code infrastructure with Puppet.
    • Architected the cloud infrastructure for clients.
    • Monitored all the things with a combination of Syslog, Nagios, Check_MK, ELK, and Grafana with InfluxDB tied together.
    Technologies: Amazon Web Services (AWS), Atlassian Confluence, Jira, Nagios, InfluxDB, Kibana, Logstash, Elasticsearch, ELK (Elastic Stack), Puppet, Secure Automated Lending Technology (SALT), Terraform, Packer, Marathon, Mesos, OpenLDAP, OpenVPN, GitLab, Sonar, ZFS, Nginx, Iptables, KVM, Bash, Python, Jenkins, Docker, AWS, pfSense, Linux, System Administration, Git, AWS Route 53, AWS EC2, AWS EBS, Grafana, DevOps, AWS Cloud Architecture, Agile, Redis, DNS, Infrastructure as Code (IaC), HAProxy
  • System Administrator

    2010 - 2013
    SII
    • Managed the infrastructure (both hardware and virtual).
    • Automated the infrastructure with Puppet.
    • Set up the services, scaled them, and made them highly available.
    Technologies: VMware ESXi, Alfresco, Windows PowerShell, Windows Server, Acronis, Horizon, PostgreSQL, MySQL, DHCP, VMware, Puppet, Bash, Nagios, Jenkins, Linux, System Administration, Git, Docker, DNS

Experience

  • Prometheus Fake Exporter
    https://github.com/3h4x/prometheus-fake-exporter

    This project was created to test the Kubernetes horizontal pod autoscaler. It exports a fake_metric with a value fetched from http_endpoint.

  • Terraform Module to Provision Opsgenie Resources from YAML Configurations
    https://github.com/cloudposse/terraform-opsgenie-incident-management

    Terraform module to provision Opsgenie resources using the Opsgenie provider. The provider needs to be configured with the proper credentials before it can be used. It consists of a root module which is only here as an example but can be used as a combination of all submodules. Submodules can also be combined to abstract away the complexity of setting up for example a team escalation.

  • Prometheus on ECS PoC
    https://github.com/3h4x/terraform-prometheus-ecs/

    Created possible Prometheus integration with ECS using Terraform. My main goal was to improve observability by introducing node monitoring with Node Exporter and cAdvisor and ingesting application metrics exposed by ephemeral containers.

  • Migration of DNS from GoDaddy to GCP Cloud DNS
    https://3h4x.github.io/tech/2020/03/14/dns-migration

    Company Flyyin had DNS domains registered before GCP cloud adoption. To fully utilize GCP environment migration to Cloud DNS was necessary. This included staging domains but also production domains and was done without any downtime. I described steps and wrote some helpers in Python for such an operation to be smooth and wrote a blog post about it afterward.

  • Speaker at Confitura Conference on How to Deploy Applications Quicker
    https://www.youtube.com/watch?v=rfuACOn4WLQ

    In 2014 my friend and I were speakers at Confitura Conference. We touched on the topic of how to quickly deploy applications and deliver faster. Technologies that were introduced in the presentation were Docker, Vagrant, Cloud, Packer but also some automation and provisioning tools like Puppet, Chef, Ansible, and Salt.

Skills

  • Libraries/APIs

    Terragrunt, AWS EC2 API, OpenLDAP, Node.js
  • Tools

    Grunt, Ansible, Amazon Virtual Private Cloud (VPC), Terraform, AWS EBS, AWS CloudWatch, AWS ECS, AWS CloudFormation, Check_MK, Git, Boto 3, Packer, Puppet, Nagios, Boto, Jenkins, GitLab, GitLab CI/CD, Grafana, Kibana, AWS Fargate, PyCharm, Sonar, OpenVPN, Logstash, Jira, Atlassian Confluence, VMware, Alfresco, Google Kubernetes Engine (GKE), Helm, Vagrant, Chef, GitHub, AWS ElastiCache, Nginx, SaltStack, ELK (Elastic Stack), Vim Text Editor, pfSense, Mesos, CircleCI, Splunk
  • Paradigms

    DevOps, Test-driven Development (TDD), Lambda Architecture, Agile, DevSecOps, Continuous Deployment, Continuous Delivery (CD), Continuous Integration (CI), Event Sourcing
  • Platforms

    AWS EC2, Docker, Amazon Web Services (AWS), Kubernetes, Linux, AWS Lambda, Cloud Native, Windows Server, New Relic, KVM, Google Cloud Platform (GCP)
  • Storage

    AWS S3, Redis, Elasticsearch, InfluxDB, MySQL, Datadog, PostgreSQL, Google Cloud
  • Other

    AWS, Monitoring, Infrastructure as Code (IaC), AWS Route 53, ECS, AWS Cloud Architecture, Serverless, Lambda Functions, Helmfile, Site Reliability Engineering (SRE), Opsgenie, Prometheus, Continuous Monitoring, System Administration, Task Automation, ZFS, Secure Automated Lending Technology (SALT), DHCP, Horizon, Acronis, VMware ESXi, Gruntwork, Relational Database Services (RDS), AWS DevOps, Aiven, DNS, Cloud Security, Cloud, GitHub Actions, AWS Cloud Development Kit (CDK), AWS Security, Iptables, HAProxy
  • Languages

    Python, Python 3, Python 2, Bash, YAML, TypeScript
  • Industry Expertise

    Security, IT Security
  • Frameworks

    Marathon, Windows PowerShell, Django

Education

  • Completed credits towards a bachelor's degree in Electrical Engineering
    2005 - 2008
    Politechnika Warszawska - Warsaw, Poland

Certifications

  • AWS Certified DevOps Engineer – Professional
    JUNE 2020 - JUNE 2023
    Amazon Web Services
  • AWS Certified Security – Specialty
    APRIL 2020 - APRIL 2023
    Amazon Web Services
  • AWS Certified Advanced Networking Specialty
    JANUARY 2020 - JANUARY 2023
    Amazon Web Services (AWS)
  • Google Cloud Certified — Associate Cloud Engineer
    NOVEMBER 2019 - NOVEMBER 2021
    Google
  • AWS Certified Cloud Practitioner
    MAY 2019 - MAY 2022
    Amazon Web Services (AWS)
  • AWS Solution Architect Professional
    MAY 2019 - MAY 2022
    Amazon Web Services (AWS)
  • AWS Certified SysOps Administrator Associate
    APRIL 2019 - APRIL 2022
    Amazon Web Services (AWS)
  • AWS Solutions Architect Associate
    APRIL 2017 - APRIL 2019
    Amazon Web Services, Inc.

To view more profiles

Join Toptal
Share it with others