Skip to content
View anubhav-ojha's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report anubhav-ojha

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
anubhav-ojha/README.md

Typing SVG



πŸ§‘β€πŸ’» About Me

name:        Anubhav Ojha
location:    Mumbai, India
role:        Solutions Engineer @ Sumo Logic | Ex-Cognizant DevOps
experience:  5+ years designing and delivering AWS cloud solutions
focus:
  - Multi-account AWS architectures & Landing Zones
  - Serverless & event-driven microservices
  - Fintech data migration & cloud security
  - Infrastructure as Code β€” every resource is Terraform, no ClickOps
currently:   Building enterprise integrations & observability pipelines on AWS
open_to:     Freelance engagements via Upwork

πŸ† AWS Certifications

Β 


⚑ Tech Arsenal


πŸ” Full Stack Breakdown
Domain Tools & Services
AWS Core EC2, Lambda, ECS Fargate, EKS, S3, RDS/Aurora, DynamoDB, VPC
Security & Identity IAM, KMS, Secrets Manager, WAF, GuardDuty, IAM Identity Center, Okta SSO
Serverless & Events Lambda, API Gateway, Step Functions, SQS, SNS, EventBridge
Data & Observability CloudWatch, X-Ray, CloudTrail, Prometheus, Grafana, Databricks
IaC & CI/CD Terraform, CloudFormation, GitHub Actions, CodePipeline, Packer
Containers Docker, ECR, ECS Fargate, Kubernetes, Microservices
Languages Python (Boto3), Bash, HCL, JavaScript/Node.js, SQL

🎯 What I Build

πŸ—οΈ Cloud Architecture

Multi-account AWS landing zones, hub-and-spoke VPC topologies, Transit Gateway networking, PrivateLink, and cross-account IAM patterns built to AWS Well-Architected standards.

πŸ” Security & Compliance

KMS encryption strategies, Secrets Manager rotation, WAF rule sets, VPC segmentation, GuardDuty + SecurityHub pipelines β€” security baked in, not bolted on.

βš™οΈ Infrastructure as Code

Modular, reusable Terraform β€” versioned modules, remote state, workspace-based multi-env deployments. Zero drift between environments.

πŸ“Š Data Migration & Pipelines

Fintech-grade data migration pipelines on AWS: Step Functions orchestration, Lambda workers, S3 staging, RDS/Aurora targets, Databricks integration.


πŸ“ˆ Key Achievements


πŸš€ Featured Projects

πŸ€– Bedrock RAG PDF Bot

Serverless RAG pipeline β€” upload PDFs, query with LLMs via Amazon Bedrock. S3-triggered Lambda processing with semantic search.



πŸ›‘οΈ SentinelNotify

Serverless intrusion detection system β€” Lambda-based alert pipeline with DynamoDB, Step Functions orchestration, and full Terraform IaC with GitHub Actions CI/CD.

πŸ“„ PDFExtractor

Serverless PDF processor β€” S3-triggered Lambda, Docker + ECR containerization, deployed to ECS Fargate with auto-scaling.

πŸ”„ Enterprise Integration Pipeline

Sumo Logic integrations with ADP, Greenhouse, Jira β€” event-driven ingestion pipelines into Databricks via Step Functions, Lambda, S3, and RDS.


πŸ“Š GitHub Stats

Β 


πŸ… Contribution Overview


πŸ“… Contribution Activity


πŸ“ Upcoming Blog Posts

  • Building Modular Terraform for Multi-Environment AWS Deployments
  • ECS Fargate vs Lambda β€” Choosing the Right Serverless Runtime
  • IAM Identity Center + Okta SSO: Enterprise AWS SSO Setup Guide
  • Full Observability Stack: Prometheus + Grafana + X-Ray on AWS ECS

Pinned Loading

  1. S3-Lambda-Dynamo-CSV-Processor S3-Lambda-Dynamo-CSV-Processor Public

    The S3-Lambda-Dynamo-CSV-Processor is a project that uses AWS services to automatically process and store data from CSV files. It uses S3 for storage, Lambda for processing, DynamoDB for data stora…

    Python 4