Oliver Ewert, Software Developer in Wellington, New Zealand
Oliver Ewert

Software Developer in Wellington, New Zealand

Member since September 17, 2019
Oliver has over five years of experience with automation in the cloud—from automated firewall appliance provisioning to modern, serverless web applications. Along with a strong security and systems background, he's successfully worked as a full-stack developer. He started freelancing because he enjoys new challenges, helping people, and wanted more flexibility. Oliver is an active member in his local developer community, speaking at conferences and contributing to open source.
Oliver is now available for hire




Wellington, New Zealand



Preferred Environment

AWS CodeStar, PyCharm, Docker

The most amazing...

...thing I've done was automating the deployment of a legacy system that "couldn't be automated," saving us countless hours of pain and suffering.


  • Platform Engineer (Contract)

    2020 - PRESENT
    Westpac New Zealand, Limited
    • Migrated Java applications from a legacy infrastructure to a Kubernetes environment.
    • Implemented visibility and monitoring via metrics to Prometheus and Grafana and logs to the Elasticsearch cluster.
    • Improved the developer experience by prebuilding containers for local development and maintenance for legacy Java apps.
    Technologies: Elasticsearch, Grafana, Prometheus, Jenkins, Kubernetes
  • Security Engineer

    2015 - 2020
    • Contributed to Netflix's open-source tool, Security Monkey (now unfortunately discontinued) by implementing RBAC across the front end and back end.
    • Built a fully automated CI/CD pipeline that deployed applications into AWS ECS via AWS CodePipeline and CodeBuild.
    • Implemented auditing and compliance automation across a fleet of ~100 AWS accounts with Lambda, cross-account IAM roles.
    • Consulted with product teams on secure, best practices and cost savings in the AWS architecture.
    • Validated platform and application level security issues—command injection, cache poisoning, token misuse, server-side request forgery (SSRF), domain hijacking, and more.
    • Led development of DevSecOps practice at Xero, implementing various automated tools into the development pipeline to give Security and developers greater confidence in the security of their applications before deploying. Attended DevSecCon Seattle which was a great opportunity to talk to world leaders in the space.
    Technologies: Amazon Web Services (AWS), Jenkins, Python, Docker, AWS


  • IAM Action Tracker (Development)

    An app to track and manage available AWS IAM actions, services, and policies by scraping open-data sources. It has a serverless architecture hosted on GitHub pages. It was a collaboration with former colleagues written in Go with Bootstrap front end.


  • Languages

    Python 3, Python, Python 2, Bash, JavaScript, Ruby, C#
  • Tools

    AWS IAM, AWS ECS, AWS CloudFormation, Auth0, Jira, Xero, Amazon Virtual Private Cloud (VPC), AWS CloudWatch, Jenkins, Bitbucket, Slack, PyCharm, Grafana, Sentry, Helm, Nginx, ELK (Elastic Stack)
  • Platforms

    Docker, Amazon Web Services (AWS), AWS Lambda, Kubernetes, Mailgun, PagerDuty, Heroku
  • Industry Expertise

    Security, Network Security, IT Security
  • Other

    AWS, AWS DevOps, Akamai, Cloudflare, Web App Security, SecOps, Prometheus, Slackbot
  • Frameworks

  • Libraries/APIs

    Jenkins Pipeline, Xero API
  • Paradigms

    DevOps, DevSecOps, Continuous Delivery (CD), Continuous Integration (CI)
  • Storage

    AWS S3, AWS CodeStar, PostgreSQL, AWS RDS, Elasticsearch, AWS DynamoDB


  • Bachelor of Engineering degree in Network Engineering
    2013 - 2017
    Victoria University of Wellington - Wellington, New Zealand


  • Akamai Bot Manager Foundations
  • Akamai Kona Site Defender
  • Akamai Web Performance Foundations
    JULY 2018 - PRESENT
  • AWS Certified Solution Architect — Associate
    MARCH 2018 - MARCH 2021

To view more profiles

Join Toptal
Share it with others