Hi, I’m Aniekan Essiet, a cloud engineer with over a decade of experience delivering secure, scalable infrastructure on AWS and across DevOps ecosystems. I enjoy partnering with software, security, and product teams to design cloud solutions that are reliable, cost-efficient, and compliant with AWS Well-Architected best practices. I’ve supported both commercial and federal workloads, and I’m always focused on simplifying operations while improving security and performance. My strengths include IaC (Terraform/CloudFormation), container orchestration (EKS/ECS/Kubernetes), CI/CD automation (GitHub Actions, Jenkins, GitLab CI/CD, CodePipeline), and cloud security (IAM, KMS, GuardDuty, Config, Macie, WAF). I also emphasize observability with CloudWatch, Datadog, Splunk, ELK, and Grafana, plus ongoing FinOps-driven cost optimization to maximize value without compromising reliability.

Aniekan Essiet

Hi, I’m Aniekan Essiet, a cloud engineer with over a decade of experience delivering secure, scalable infrastructure on AWS and across DevOps ecosystems. I enjoy partnering with software, security, and product teams to design cloud solutions that are reliable, cost-efficient, and compliant with AWS Well-Architected best practices. I’ve supported both commercial and federal workloads, and I’m always focused on simplifying operations while improving security and performance. My strengths include IaC (Terraform/CloudFormation), container orchestration (EKS/ECS/Kubernetes), CI/CD automation (GitHub Actions, Jenkins, GitLab CI/CD, CodePipeline), and cloud security (IAM, KMS, GuardDuty, Config, Macie, WAF). I also emphasize observability with CloudWatch, Datadog, Splunk, ELK, and Grafana, plus ongoing FinOps-driven cost optimization to maximize value without compromising reliability.

Available to hire

Hi, I’m Aniekan Essiet, a cloud engineer with over a decade of experience delivering secure, scalable infrastructure on AWS and across DevOps ecosystems. I enjoy partnering with software, security, and product teams to design cloud solutions that are reliable, cost-efficient, and compliant with AWS Well-Architected best practices. I’ve supported both commercial and federal workloads, and I’m always focused on simplifying operations while improving security and performance.

My strengths include IaC (Terraform/CloudFormation), container orchestration (EKS/ECS/Kubernetes), CI/CD automation (GitHub Actions, Jenkins, GitLab CI/CD, CodePipeline), and cloud security (IAM, KMS, GuardDuty, Config, Macie, WAF). I also emphasize observability with CloudWatch, Datadog, Splunk, ELK, and Grafana, plus ongoing FinOps-driven cost optimization to maximize value without compromising reliability.

See more

Experience Level

Expert
Expert
Expert
Expert

Work Experience

Cloud Engineer at Essex Management
June 1, 2020 - Present
Designed and operated production AWS infrastructure (EC2, VPC, RDS, Lambda, S3, CloudFront, Route 53, and load balancers) to support scalable applications with strong uptime and predictable performance. Standardized environments using Terraform and CloudFormation, creating reusable modules/templates, enforcing naming/tagging conventions, and reducing configuration drift to improve deployment consistency and audit readiness across accounts. Built and maintained CI/CD pipelines with GitHub Actions to automate build, validation, and deployment steps, reducing manual release effort. Implemented containerized delivery with Docker and Kubernetes on EKS to improve scalability and parity across development, test, and production. Strengthened security by enforcing least-privilege IAM, tightening Security Groups/NACLs, enabling encryption with KMS, and implementing secure parameter handling. Established continuous monitoring with CloudWatch, ELK Stack, Datadog, and GuardDuty, improving alerting
Cloud Engineer (Federal Programs) at Booz Allen Hamilton / Army Research Laboratory (ARL)
December 1, 2018 - June 1, 2020
Built and maintained AWS resources (EC2, S3, CloudFront, Lambda, and VPC) to support high-availability federal workloads with controlled access and stable performance. Developed and supported Jenkins-driven CI/CD pipelines, integrating source control workflows and automated deployment steps to reduce release friction and improve consistency across environments. Implemented security monitoring and compliance tooling using AWS Config, GuardDuty, and Macie, supporting policy enforcement, drift visibility, and improved detection of risky configurations and sensitive data exposure. Automated recurring operational tasks with Python and Bash, cutting manual effort and reducing operational overhead by ~30%. Supported containerized workloads using Docker and ECS/Kubernetes, enabling portable deployments with clearer resource utilization and improved environment standardization. Integrated GitLab with container workflows to improve build traceability and deployment cycle times while maintaining
Linux / AWS Systems Administrator at Netgear
April 1, 2018 - December 1, 2018
Administered Linux systems supporting internal services, handling account access, OS configuration, system monitoring, and incident troubleshooting to maintain stable day-to-day operations. Supported hybrid workflows where AWS resources were used for targeted workloads, assisting with environment provisioning, baseline monitoring, and operational support tasks. Built and refined Bash automation for repeatable system tasks, reducing manual touchpoints and improving reliability. Assisted teams with performance troubleshooting and remediation, including log review and service validation to restore service quickly and reduce recurring issues. Implemented basic security hygiene steps (patch cadence, access reviews, configuration checks) aligned to operational standards. Documented procedures and runbooks to improve team continuity and reduce reliance on tribal knowledge.
Linux Systems Administrator at Johns Hopkins University – Applied Physics Laboratory (APL)
May 1, 2015 - April 1, 2018
Deployed and managed RHEL systems across virtual and physical environments to support research workloads, maintaining stability, access controls, and operational readiness. Administered VMware vSphere resources and supported capacity management, system reliability improvements, and environment standardization practices. Developed Bash scripts to automate routine administration (backup routines, configuration checks, system validation), improving operational efficiency and reducing manual execution errors. Supported ticket-based operations by diagnosing Linux/infra issues, coordinating fixes, and documenting outcomes. Assisted with performance and availability troubleshooting through log analysis and metrics review. Worked with stakeholders to schedule maintenance activities and reduce disruptions, supporting production change management. Maintained technical documentation, build notes, and runbooks to standardize support practices.

Education

Master of Information Systems (Information Security Management Concentration) at Strayer University
January 1, 2016 - January 1, 2018

Qualifications

AWS Certified Solutions Architect – Associate
January 11, 2030 - January 22, 2026
AWS Certified SysOps Administrator – Associate
January 11, 2030 - January 22, 2026
Certified Kubernetes Administrator (CKA)
January 11, 2030 - January 22, 2026
HashiCorp Certified: Terraform Associate (003)
January 11, 2030 - January 22, 2026
Google Cloud Certified – Cloud Digital Leader
January 11, 2030 - January 22, 2026

Industry Experience

Software & Internet, Government, Professional Services