Owen Park Cloud Engineer
Charlotte, NC • cloud@gmail.com • +1 7045-2222
Profile Summary
- Cloud Engineer with 6 years of experience designing and operating cloud platforms across financial services, ride-sharing, and SaaS workloads, specializing in cloud architecture, infrastructure as code, and cost optimization.
- Solid technical background across clouds (AWS, Azure, GCP), IaC tools (Terraform, CloudFormation), and compute (EKS, Lambda, ECS Fargate) with strong fundamentals in Python and Bash automation.
- Deep expertise in Well-Architected Framework, multi-account organizations, defense-in-depth security, and zero-downtime migrations, leveraging methodologies such as landing zones and GitOps to drive scalable, resilient, and cost-aware cloud platforms.
- Engaged collaborator working cross-functionally with Application, Security, and Finance teams in Agile environments, contributing to architecture reviews, RFC discussions, and incident retrospectives with a pragmatic, ownership-first mindset.
- Emerging leader who shares technical excellence and fosters a culture of operational excellence and cost discipline through PR reviews and runbooks, while leading cloud guild sessions and authoring widely adopted Terraform module templates.
Technical Skills
- Cloud Platforms:
- AWS (EC2, EKS, Lambda, RDS, S3, IAM), Azure (AKS, Functions), GCP (GKE)
- Infrastructure as Code:
- Terraform, CloudFormation, Pulumi, Bicep, Ansible
- Compute & Containers:
- EKS, Lambda, ECS Fargate, Docker, Kubernetes
- Networking & CDN:
- VPC, Transit Gateway, Direct Connect, Route 53, CloudFront, VPN
- Security & Identity:
- IAM, KMS, Secrets Manager, GuardDuty, SOC 2, PCI DSS
- Storage & Databases:
- S3, EFS, RDS Aurora, DynamoDB, ElastiCache, Backup & DR
- Observability & FinOps:
- CloudWatch, Datadog, Cost Explorer, Savings Plans, tagging policies
- Automation & CI/CD:
- GitHub Actions, Jenkins, Spinnaker, Python, Bash
Education
Work Experience
- Owned the cloud platform design for a multi-account AWS Organization spanning 180+ accounts, leading end-to-end engineering across architecture reviews, infrastructure as code, and cost and reliability under the Well-Architected Framework.
- Authored a Terraform module library for account scaffolding and shared services, shipping reusable account-bootstrap modules, policy-as-code guardrails, and GitOps pipelines via Atlantis across 180+ AWS accounts, reducing per-team account provisioning lead time from 3 weeks to 2 days.
- Standardized a multi-runtime compute platform using EKS, Lambda, and ECS Fargate with placement rules for EKS for stateful services, Lambda for event-driven workloads, and Fargate for batch jobs, onboarding 220+ services and cutting compute spend by 34%.
- Designed a multi-region VPC architecture using Transit Gateway peering, Direct Connect circuits, and centralized egress through inspection VPCs, connecting 180+ accounts at 62ms p95 cross-region latency with zero unplanned network outages over 18 months.
- Drove the FinOps program through org-wide tagging policy enforcement, a Reserved Instance and Savings Plan portfolio, and rightsizing automation via Compute Optimizer, cutting annual cloud spend by 22% (~$8.4M) while holding all production SLOs.
- Built a unified observability stack on CloudWatch and Datadog, defining SLO dashboards, alert routing, and on-call runbooks for 60+ critical services, reducing mean time to detect from 14 minutes to 90 seconds.
- Led the migration of 40+ legacy applications from on-prem to AWS, applying lift-and-shift to EC2, replatform to ECS Fargate, and refactor to event-driven serverless depending on workload, including a refactor of the card-issuance platform that cut infrastructure cost by 46% and lifted deployment frequency by 6x.
- Designed the AWS IAM and KMS strategy across 60+ accounts, implementing least-privilege role hierarchies, customer-managed KMS keys, and centralized secrets rotation, hardening the platform against SOC 2 Type II and PCI DSS controls and reducing audit findings from 34 to 0 across two consecutive audits.
- Owned the managed-database fleet including RDS Aurora, DynamoDB, and ElastiCache, implementing cross-region replication, point-in-time recovery, and automated failover drills, cutting database-related production incidents by 58% year over year.
- Built the team's cloud deployment platform on CI/CD using Spinnaker pipelines, canary analysis with Kayenta, and auto-rollback on SLO breach, operating 180+ pipelines and cutting commit-to-prod lead time from 3 hours to 14 minutes.
- Worked closely with Application, Security, and SRE teams across 9 product domains to negotiate cloud-account topology, shared-service ownership, and incident response runbooks, authoring 11 cloud-architecture RFCs that shaped the org's landing-zone standard and onboarding 14 cloud engineers.