Platform build with Kubernetes, Crossplane, and GitOps
Design and delivery of an internal platform with self-service infrastructure and GitOps governance.
Read platform engineering case study →I help teams adopt Kubernetes and cloud native platforms through platform engineering, Crossplane based infrastructure automation, GitOps workflows, and SRE practices. Remote, worldwide.
Engagements typically focus on one of the following areas.
Short call and review of current stack, constraints, and desired outcomes.
Target architecture, delivery roadmap, risks, and trade-offs aligned to your teams.
Implementation and productionization with documentation, runbooks, and handover prep.
Training, enablement, and next-step planning so teams can operate independently.
Internal Developer Platform architect focused on platform reliability, delivery workflows, and infrastructure automation.
Built observability platforms and operated multi-cloud Kubernetes infrastructure for production workloads.
Technical referent for Kubernetes foundations supporting critical financial services.
Led containerization initiatives and early GitOps adoption for legacy application modernization.
Selected engagements and architecture patterns.
Design and delivery of an internal platform with self-service infrastructure and GitOps governance.
Read platform engineering case study →Secure observability foundation with tenant isolation, certificate automation, and reliability guardrails.
Read observability case study →
Problem: Bare-metal provisioning needed the same declarative workflows as cloud resources.
Approach: Built a Crossplane provider and compositions to expose MAAS resources as Kubernetes APIs.
Result: Consistent infrastructure requests and reusable abstractions for platform teams.
Problem: Teams needed self-service infrastructure with guardrails and consistent delivery.
Approach: Defined platform building blocks, GitOps governance, and Crossplane abstractions.
Result: Faster onboarding and repeatable platform patterns across environments.
Problem: Teams needed observability with isolation, secure access, and consistent SLOs.
Approach: Designed tenant-aware telemetry pipelines with strong identity and mTLS.
Result: Reliable dashboards, trusted telemetry, and clear operational ownership.
The Linux Foundation / CNCF
ID: LF-svrxqtbxri • Oct 2021
Verify CKA on Credly →Sorbonne Paris-Nord
Sep 2017 – 2021