Marcin Brański, Developer in Warsaw, Poland
Marcin is available for hire
Hire Marcin

Marcin Brański

Verified Expert  in Engineering

Serverless Developer

Location
Warsaw, Poland
Toptal Member Since
June 5, 2017

Marcin has spent a great deal of time working with architecting in clouds, monitoring/SRE, CI/CD, infrastructure as code, and tools that help make deployment quicker and more reliable. From a developer's perspective, he has spent most of his time developing in Python and TypeScript. He's polite, professional, and communicates extremely well.

Portfolio

Intelligent Lilli
Terraform, Site Reliability Engineering (SRE), Amazon Web Services (AWS)...
Casefleet
Docker, Terraform, DevOps, Amazon Web Services (AWS), GitHub...
Lighthouse
Terraform, TypeScript, React, Next.js, Amazon Web Services (AWS), Datadog...

Experience

Availability

Part-time

Preferred Environment

DevOps, Cloud Native, Vim Text Editor, Terraform, Terragrunt, Google Cloud Platform (GCP), AWS Cloud Architecture, Amazon Web Services (AWS), Blockchain

The most amazing...

...thing I've done is to improve observability of the infrastructure and services in AWS.

Work Experience

Senior Cloud DevOps Engineer—SRE

2022 - 2022
Intelligent Lilli
  • Managed infrastructure as code for all manually provisioned AWS resources.
  • Restructured and refactored Terraform code to support the AWS multi-account set up.
  • Migrated all already running applications to AWS Fargate.
  • Improved observability with AWS Prometheus, Grafana, and Sentry.
Technologies: Terraform, Site Reliability Engineering (SRE), Amazon Web Services (AWS), Amazon Elastic Container Service (Amazon ECS), Git, Linux, PostgreSQL, Docker, AWS Lambda, AWS IAM, Google Cloud Platform (GCP), CI/CD Pipelines, Grafana, MQTT, Redis, Apache Kafka, Kubernetes

Senior DevOps Engineer

2022 - 2022
Casefleet
  • Migrated processing workers from EC2 to serverless architecture with ECS Fargate.
  • Improved observability by reconfiguring Datadog, refactoring logs, and exposing necessary metrics.
  • Improved the stability of the document processing pipeline.
Technologies: Docker, Terraform, DevOps, Amazon Web Services (AWS), GitHub, Amazon Elastic Container Service (Amazon ECS)

Senior DevOps Engineer and Full-stack Developer

2022 - 2022
Lighthouse
  • Developed the front end and back end in TypeScript with the Next.js framework.
  • Performed security audit of AWS IAM and other AWS resources.
  • Migrated and secured AWS ElasticSearch to elastic.co ElasticSearch.
Technologies: Terraform, TypeScript, React, Next.js, Amazon Web Services (AWS), Datadog, Sentry

Senior DevOps Engineer

2021 - 2021
Nutrino Health
  • Picked a solution to define the infrastructure as code (IaC) suitable for multiple accounts in various regions and provided an interface for Terraform and Helm.
  • Defined and estimated the scope for migrating AWS resources created manually to IaC.
  • Defined the production infrastructure into IaC with Atmos and Terraform.
Technologies: Terraform, Amazon EC2, Amazon Virtual Private Cloud (VPC), Amazon ElastiCache, AWS Lambda, Container Orchestration, CI/CD Pipelines, Containers, Continuous Integration (CI), Bash Script, Shell Scripting, Cloud Services, Cloud Architecture, Amazon Kinesis, Amazon Web Services (AWS), Serverless, AWS IAM, Boto 3, Sentry

Senior DevOps Engineer

2021 - 2021
Lighthouse
  • Built the infrastructure as code with CDK, TypeScript, and Terraform with Terraform Cloud.
  • Improved observability of the infrastructure and services in AWS.
  • Optimized the cost for ECS deployments by using Autoscaling, adjusting Fargate CPU and MEM size.
Technologies: AWS Cloud Development Kit (CDK), Terraform, Node.js, Security, ECS, AWS Fargate, HAProxy, TypeScript, Container Orchestration, CI/CD Pipelines, Containers, Continuous Integration (CI), Bash Script, Shell Scripting, Cloud Services, Cloud Architecture, GitLab, Amazon Web Services (AWS), JavaScript, AWS IAM, Datadog, Sentry

Senior DevOps Engineer

2020 - 2020
Cloud Posse
  • Created a Terraform module to provision Opsgenie resources from YAML configurations using the Opsgenie provider, with automated tests. Code available at https://github.com/cloudposse/terraform-opsgenie-incident-management.
  • Created a PoC Terraform module to bootstrap Terraform cloud from YAML configuration and managed all Terraform resources there.
  • Designed the architecture for multi-account log streaming with Kinesis to ElasticSearch in VPC.
  • Worked on CloudPosse Terraform modules, adding tests, reviewing PRs, adding functionality, and more.
Technologies: Terraform, Kubernetes, Helm, Helmfile, Infrastructure as Code (IaC), GitHub, GitHub Actions, Container Orchestration, CI/CD Pipelines, Containers, Continuous Integration (CI), Bash Script, Shell Scripting, Cloud Services, Cloud Architecture, Amazon Web Services (AWS), Serverless, AWS IAM, Boto 3, DevSecOps, Datadog

DevOps Engineer

2020 - 2020
flyiin
  • Designed architecture utilizing Google Cloud and Aiven.
  • Moved to Infrastructure as Code with Terraform and Helm.
  • Migrated legacy environments to new architecture without downtime.
Technologies: Terraform, Google Cloud Platform (GCP), Google Kubernetes Engine (GKE), DevOps, Aiven, Helm, Agile, Linux, DNS, Infrastructure as Code (IaC), Site Reliability Engineering (SRE), Kubernetes, Container Orchestration, CI/CD Pipelines, Containers, Continuous Integration (CI), Bash Script, Shell Scripting, Cloud Services, Cloud Architecture, Serverless, Sentry

DevOps Engineer

2019 - 2020
Critical Start
  • Audited the infrastructure security code written in Terraform.
  • Upgraded Terraform to the 0.12 version from the 0.11 version.
  • Improved the Splunk deployment architecture to be more robust.
Technologies: Splunk, Relational Database Services (RDS), Event Sourcing, Terraform, ECS, Amazon Web Services (AWS), Amazon CloudWatch, Git, Bash, Docker, Amazon Route 53, Amazon EC2, Amazon EBS, Grafana, Continuous Monitoring, Amazon Elastic Container Service (Amazon ECS), DevOps, AWS Cloud Architecture, Agile, Linux, Redis, DNS, Infrastructure as Code (IaC), Site Reliability Engineering (SRE), New Relic, DevSecOps, AWS Fargate, HAProxy, Containers, Continuous Integration (CI), Bash Script, Cloud Services, Cloud Architecture, Serverless, AWS IAM, Boto 3, Security, Sentry

DevOps Engineer

2019 - 2019
Owsy
  • Improved the infrastructure and application observability.
  • Managed and optimized the AWS infrastructure for multiple clients.
  • Migrated the old environments to Gruntwork.
  • Upgraded Terraform to 0.12 version with all Gruntwork modules.
Technologies: Amazon Web Services (AWS), Gruntwork, Terraform, ECS, Docker, Grunt, Amazon CloudWatch, Git, Bash, Amazon Route 53, Amazon EC2, Amazon EBS, Terragrunt, Continuous Monitoring, Amazon Elastic Container Service (Amazon ECS), DevOps, AWS Cloud Architecture, Agile, Linux, Redis, DNS, Infrastructure as Code (IaC), AWS Fargate, HAProxy, Containers, Continuous Integration (CI), Bash Script, Cloud Services, Cloud Architecture, Serverless, AWS IAM, Boto 3, CircleCI, Sentry

Infrastructure Engineer

2017 - 2019
Voxnest
  • Operated a multiregional Kubernetes cluster on AWS.
  • Implemented continuous integration and continuous deployment with Jenkins.
  • Embraced self-healing infrastructures and applications.
  • Implemented AWS infrastructure as code with Terraform.
Technologies: ELK (Elastic Stack), Prometheus, Jenkins, Terraform, Packer, Ansible, Amazon Web Services (AWS), Kubernetes, Amazon CloudWatch, System Administration, Git, Bash, Docker, Amazon Route 53, Amazon EC2, Amazon EBS, Grafana, Continuous Monitoring, DevOps, AWS Cloud Architecture, Test-driven Development (TDD), Agile, Linux, Redis, DNS, Infrastructure as Code (IaC), Site Reliability Engineering (SRE), Python, AWS Lambda, HAProxy, Containers, Continuous Integration (CI), Cloud Services, Cloud Architecture, Serverless, Jenkins Pipeline, Groovy Scripting, AWS IAM, Boto 3

DevOps Engineer | Python Developer

2015 - 2017
Daftcode
  • Developed a Python back end in TDD (test-driven development) fashion.
  • Upgraded the deployment pipeline.
  • Shortened the overall deployment time.
  • Migrated services from containers and deployed them on Mesos.
  • Built-up the infrastructure and security with Packer Terraform and AWS.
  • Migrated the system from no-configuration management to a code infrastructure with Salt.
  • Visualized the infrastructure and application state with Check_MK and ELK stack.
Technologies: Packer, Nagios, ELK (Elastic Stack), NGINX, Linux, Docker, Terraform, Mesos, Amazon Web Services (AWS), Python, Amazon CloudWatch, System Administration, Git, Bash, Amazon Route 53, Amazon EC2, Amazon EBS, Grafana, Continuous Monitoring, DevOps, AWS Cloud Architecture, Test-driven Development (TDD), Agile, Redis, DNS, Infrastructure as Code (IaC), HAProxy, Containers, Continuous Integration (CI), Shell Scripting, Cloud Services, Serverless, AWS IAM, Boto 3

DevOps Engineer

2013 - 2015
TouK
  • Managed the infrastructure (pfSense, KVM, Mesos, AWS).
  • Created CI/CD pipelines with the developers.
  • Migrated from no-configuration management to a code infrastructure with Puppet.
  • Architected the cloud infrastructure for clients.
  • Monitored all the things with a combination of Syslog, Nagios, Check_MK, ELK, and Grafana with InfluxDB tied together.
Technologies: Amazon Web Services (AWS), Confluence, Jira, Nagios, InfluxDB, Kibana, Logstash, Elasticsearch, ELK (Elastic Stack), Puppet, Secure Automated Lending Technology (SALT), Terraform, Packer, Marathon, Mesos, OpenLDAP, OpenVPN, GitLab, Sonar, ZFS, NGINX, Iptables, KVM, Bash, Python, Jenkins, Docker, pfSense, Linux, System Administration, Git, Amazon Route 53, Amazon EC2, Amazon EBS, Grafana, DevOps, AWS Cloud Architecture, Agile, Redis, DNS, Infrastructure as Code (IaC), HAProxy, Containers, Continuous Integration (CI), Shell Scripting, Cloud Services, Jenkins Pipeline, Groovy Scripting, AWS IAM, Sentry

System Administrator

2010 - 2013
SII
  • Managed the infrastructure (both hardware and virtual).
  • Automated the infrastructure with Puppet.
  • Set up the services, scaled them, and made them highly available.
Technologies: VMware ESXi, Alfresco, Windows PowerShell, Windows Server, Acronis, Horizon, PostgreSQL, MySQL, DHCP, VMware, Puppet, Bash, Nagios, Jenkins, Linux, System Administration, Git, Docker, DNS, Containers, Continuous Integration (CI), Shell Scripting

Prometheus Fake Exporter

https://github.com/3h4x/prometheus-fake-exporter
This project was created to test the Kubernetes horizontal pod autoscaler. It exports a fake_metric with a value fetched from http_endpoint. This makes it possible to scale HPA according to what's presented via HTTP, for example, in GitHub Gist.

Terraform Module to Provision Opsgenie Resources from YAML Configurations

https://github.com/cloudposse/terraform-opsgenie-incident-management
Terraform module to provision Opsgenie resources using the Opsgenie provider. The provider needs to be configured with the proper credentials before it can be used. It consists of a root module which is only here as an example but can be used as a combination of all submodules. Submodules can also be combined to abstract away the complexity of setting up for example a team escalation.

Prometheus on ECS PoC

https://github.com/3h4x/terraform-prometheus-ecs/
Created possible Prometheus integration with ECS using Terraform. My main goal was to improve observability by introducing node monitoring with Node Exporter and cAdvisor and ingesting application metrics exposed by ephemeral containers.

Migration of DNS from GoDaddy to GCP Cloud DNS

https://3h4x.github.io/tech/2020/03/14/dns-migration
Company Flyyin had DNS domains registered before GCP cloud adoption. To fully utilize GCP environment migration to Cloud DNS was necessary. This included staging domains but also production domains and was done without any downtime. I described steps and wrote some helpers in Python for such an operation to be smooth and wrote a blog post about it afterward.

Speaker at Confitura Conference on How to Deploy Applications Quicker

https://www.youtube.com/watch?v=rfuACOn4WLQ
In 2014 my friend and I were speakers at Confitura Conference. We touched on the topic of how to quickly deploy applications and deliver faster. Technologies that were introduced in the presentation were Docker, Vagrant, Cloud, Packer but also some automation and provisioning tools like Puppet, Chef, Ansible, and Salt.

Libraries/APIs

Terragrunt, Amazon EC2 API, OpenLDAP, Node.js, Jenkins Pipeline, React

Tools

Grunt, AWS CloudFormation, Ansible, Amazon Virtual Private Cloud (VPC), Terraform, Amazon EBS, Amazon CloudWatch, Amazon Elastic Container Service (Amazon ECS), AWS IAM, Sentry, Google Kubernetes Engine (GKE), Helm, Helmfile, Check_MK, Git, Vim Text Editor, Boto 3, Packer, Puppet, Nagios, Boto, Jenkins, GitLab, GitLab CI/CD, Grafana, Kibana, AWS Fargate, PyCharm, Sonar, OpenVPN, Logstash, Jira, Confluence, VMware, Alfresco, Vagrant, Chef, GitHub, AWS Cloud Development Kit (CDK), Amazon ElastiCache, NGINX, SaltStack, ELK (Elastic Stack), pfSense, Mesos, CircleCI, Splunk, MQTT

Paradigms

DevOps, Test-driven Development (TDD), Lambda Architecture, Agile, DevSecOps, Continuous Deployment, Continuous Delivery (CD), Continuous Integration (CI), Event Sourcing

Platforms

Cloud Native, Amazon EC2, Docker, Amazon Web Services (AWS), Kubernetes, Linux, AWS Lambda, Google Cloud Platform (GCP), Blockchain, Windows Server, New Relic, KVM, Apache Kafka

Storage

Amazon S3 (AWS S3), Redis, Datadog, Elasticsearch, InfluxDB, MySQL, PostgreSQL, Google Cloud

Other

AWS DevOps, AWS Cloud Architecture, Monitoring, Infrastructure as Code (IaC), Amazon Route 53, Container Orchestration, Cloud Services, Cloud Architecture, ECS, Serverless, Lambda Functions, Site Reliability Engineering (SRE), Opsgenie, Security, Prometheus, Continuous Monitoring, System Administration, Task Automation, CI/CD Pipelines, Containers, Shell Scripting, Amazon Kinesis, AWS Transit Gateway, AWS CodePipeline, ZFS, Secure Automated Lending Technology (SALT), DHCP, Horizon, Acronis, VMware ESXi, Gruntwork, Relational Database Services (RDS), Aiven, DNS, Cloud Security, IT Security, Cloud, GitHub Actions, Iptables, HAProxy, Groovy Scripting

Languages

Python, Python 3, Python 2, Bash, Bash Script, YAML, TypeScript, JavaScript

Frameworks

Marathon, Windows PowerShell, Django, Next.js

2005 - 2008

Completed Credits towards a Bachelor's Degree in Electrical Engineering

Politechnika Warszawska - Warsaw, Poland

JUNE 2020 - JUNE 2023

AWS Certified DevOps Engineer – Professional

Amazon Web Services

APRIL 2020 - APRIL 2023

AWS Certified Security – Specialty

Amazon Web Services

JANUARY 2020 - JANUARY 2023

AWS Certified Advanced Networking Specialty

Amazon Web Services (AWS)

NOVEMBER 2019 - NOVEMBER 2022

GCP Associate Cloud Engineer

GCP

MAY 2019 - MAY 2022

AWS Certified Cloud Practitioner

Amazon Web Services (AWS)

MAY 2019 - JUNE 2024

AWS Solution Architect Professional

Amazon Web Services (AWS)

APRIL 2019 - JUNE 2023

AWS Certified SysOps Administrator Associate

AWS

APRIL 2017 - MAY 2022

AWS Certified Solutions Architect Associate

AWS

Collaboration That Works

How to Work with Toptal

Toptal matches you directly with global industry experts from our network in hours—not weeks or months.

1

Share your needs

Discuss your requirements and refine your scope in a call with a Toptal domain expert.
2

Choose your talent

Get a short list of expertly matched talent within 24 hours to review, interview, and choose from.
3

Start your risk-free talent trial

Work with your chosen talent on a trial basis for up to two weeks. Pay only if you decide to hire them.

Top talent is in high demand.

Start hiring