┌──( raafeh@portfolio )-[ ~/career ]
$ git init
Initialized empty repository in /career
   ____             ____
  / __ \___  _   __/ __ \____  _____
 / / / / _ \| | / / / / / __ \/ ___/
/ /_/ /  __/| |/ / /_/ / /_/ (__  )
\\____/\\___/ |___/\\____/ .___/____/
                     /_/
        

Abdur Raafeh Mahmood

DevOps & Cloud Engineer

6+ years building cloud infrastructure
🌍 Multi-country experience: Pakistan → Turkey → Australia
🎓 Computer Engineering, Izmir Institute of Technology
🔧 Kubernetes • Terraform • Python • Multi-Cloud
CAREER PIPELINE:
INIT ━━▶ LOKI ━━▶ LOGO ━━▶ GOART ━━▶ FRAIM ━━▶ SYSTEMS
2017 ────────────────────────────────────────── 2025

┌──[ STAGE 1: LOKI ]──────────────────────────┐

Status: ✓ SUCCESS
Duration: 4 years
Artifacts: Network Security, Automation, SaaS Platform
└─────────────────────────────────────────────────┘

🏢 LOKI - Systems Engineer → Lead Backend

📍 Izmir, Turkey | 📅 July 2017 - August 2021

EXIT CODE:
0
$ cat build.log
├─ Started as voluntary intern; grew to sole backend owner after lead engineer left. Delivered custom Linux images and kernel builds for DPI traffic filtering on a physical UTM device.
├─ Built network automation for iptables, nftables, arptables, hostapd, Squid, and IPS/IDS; configured bridges, PPPoE, static IP, client isolation, and VPN. Wrote Python APIs and automation to generate and apply configs and ensure services ran on startup.
├─ Integrated hardware control board for LAN/Internet LED indicators and soft boot; implemented button-triggered firewall exception for time-limited SSH access to support servers, then restricted to established connections for security.
├─ Ported the stack to OpenWRT, Raspberry Pi, Orange Pi, and FreeBSD/pfSense with a unified interface so changes reflected in both native pfSense and our custom UI. Delivered Ubiquiti Edge integration for a client project.
├─ Built an ncurses terminal UI for techs: Redis worker queues, live log exploration, and user/settings inspection over SSH to simplify debugging in the field.
├─ Added GRUB-based hardware validation so the system would decrypt and boot only on authorized hardware, preventing tampering or unauthorized part swaps.
└─ Pivoted to a SaaS security platform on Hetzner: Terraform for provisioning, WireGuard/OpenVPN/IPsec for edge-to-cloud, custom Linux images and OAuth-like edge–cloud binding. Ran self-hosted Bitbucket, then GitLab and Confluence.
$ ls -la stack/
Python Flask REST Jinja2 Redis MariaDB Bash Linux Terraform WireGuard OpenVPN IPsec iptables nftables hostapd Squid GitLab Confluence
$ htop skills
Systems Engineering 0%
Python Backend 0%
Network Automation 0%
Infrastructure Automation 0%
Security & Hardening 0%
STAGE 1 OF 5
LOKI COMPLETE
NEXT: LOGO →

┌──[ STAGE 3: GOART ]──────────────────────────┐

Status: ✓ SUCCESS
Duration: ~1 year
Artifacts: Kubernetes, Real-Time Conferencing, Streaming
└─────────────────────────────────────────────────┘

🏢 GoArt - Infrastructure Engineer → Senior Infrastructure Engineer

📍 Turkey | 📅 2022 - 2023

EXIT CODE:
0
$ cat build.log
├─ Owned infrastructure for a browser-based virtual conferencing product: Unreal Engine–rendered stages, real-time interaction, reactions, and chat. Managed and maintained the Azure Kubernetes cluster and services.
├─ Used Azure DevOps for CI/CD and learned it on the job; orchestrated Ant Media servers and related services for streaming.
├─ Diagnosed a critical database connection exhaustion: 250 concurrent users drove 500+ connections and overloaded the dev database. Traced backend pod and service logs to the PHP backend opening new connections without timeouts or proper cleanup; recommended and implemented fixes to stabilize and scale.
└─ Proposed and drove migration from self-hosted Ant Media to AWS IVS for higher reliability and lower operational burden; coordinated front-end and backend work (Next.js, Nuxt, PHP) around the new pipeline.
$ ls -la stack/
Kubernetes Azure Azure DevOps AWS IVS PHP Next.js Nuxt Docker Ant Media
$ htop skills
Kubernetes 0%
CI/CD 0%
Cloud Infrastructure 0%
Debugging & Observability 0%
← PREVIOUS: LOGO
STAGE 3 OF 5
GOART COMPLETE
NEXT: FRAIM →

┌──[ STAGE 4: FRAIM ]──────────────────────────┐

Status: ✓ SUCCESS
Duration: ~1 year
Artifacts: IaC, CI/CD, SOC2, Feature Flags
└─────────────────────────────────────────────────┘

🏢 Fraim - Cloud Engineer

📍 Australia | 📅 2023 - 2024

EXIT CODE:
0
$ cat build.log
├─ Owned all cloud management and automation. Introduced clear dev, staging, and production separation; primary workloads on GCP serverless (Cloud Run, Cloud Tasks, Cloud Functions) with AI models on Azure.
├─ Transformed a single manually deployed environment into Terraform-managed IaC: imported existing state, then added automated staging and production. Cut deployment time from about a week to hours; learned and adopted GitHub Actions for lint, build, test, deploy, and infrastructure changes.
├─ Introduced TypeScript database migrations (Kysely) and containerized migration pipelines to validate backward compatibility so schema changes and upgrades/downgrades could be applied safely.
├─ Set up Android and iOS build and release to store and test tracks via EAS; integrated LaunchDarkly for feature flags so releases could gate and roll out features and disable them from the dashboard without new builds.
├─ Drove SOC2 Type 1 readiness: status pages, backup and disaster recovery, and business continuity documentation and processes.
└─ Managed Google Workspace, user onboarding/offboarding, and MDM for the company.
$ ls -la stack/
GCP Cloud Run Cloud Tasks Cloud Functions Azure Terraform GitHub Actions TypeScript Kysely EAS LaunchDarkly Docker
$ htop skills
Terraform 0%
CI/CD 0%
Cloud Architecture 0%
SOC2 / Compliance 0%
← PREVIOUS: GOART
STAGE 4 OF 5
FRAIM COMPLETE
NEXT: SYSTEMS →

┌──[ STAGE 5: SYSTEMS ]──────────────────────────┐

Status: ✓ SUCCESS
Duration: Present
Artifacts: Multi-Cloud Kubernetes, Zero-Trust, Self-Service
└─────────────────────────────────────────────────┘

🏢 Systems Ltd - DevOps Consultant

📍 Pakistan | 📅 2025 - Present

EXIT CODE:
0
$ cat build.log
├─ Building reproducible Kubernetes platforms on AWS and Azure with modular blueprints, input validation, and guardrails for consistent cluster creation, upgrades, and teardown.
└─ Enabling self-service via Helm add-ons, templates, and documentation; applying zero-trust security defaults and Azure DevOps pipelines for infrastructure and application delivery.
$ ls -la stack/
Kubernetes AWS Azure Terraform Helm Azure DevOps
$ htop skills
Platform Engineering 0%
Multi-Cloud 0%
← PREVIOUS: FRAIM
STAGE 5 OF 5
SYSTEMS COMPLETE

┌──[ ARTIFACTS: SKILLS MATRIX ]──────────────────────────┐

Cloud & Infrastructure

Kubernetes 0%
Terraform 0%
AWS 0%
Azure 0%
GCP 0%
Linux 0%
Docker 0%
Helm 0%

CI/CD & Automation

GitHub Actions 0%
Azure DevOps 0%
GitLab CI 0%
Bash / Scripting 0%

Languages & Backend

Python 0%
TypeScript 0%
PHP 0%
Flask 0%
REST APIs 0%

Networking & Security

WireGuard 0%
OpenVPN / IPsec 0%
iptables / nftables 0%
Debian Packaging 0%
Nuitka / C toolchain 0%

Data & Observability

Redis 0%
MariaDB / MySQL 0%
Kysely 0%
Prometheus / Grafana 0%

Monitoring & Security

SOC2 / Compliance 0%
LaunchDarkly 0%
EAS (Expo Application Services) 0%
└─────────────────────────────────────────────────┘

┌──[ CREDENTIALS ]──────────────────────────┐

└─────────────────────────────────────────────────┘

┌──[ PROJECTS ]──────────────────────────┐

└─────────────────────────────────────────────────┘