Bishoy is an innovative DevOps, DevSecOps, and software engineer with 7+ years of technical experience designing, implementing, securing, and managing CI/CD workflows, infrastructure, and microservices. He has deep experience with Kubernetes, cloud platforms (AWS), Linux-based systems, and cybersecurity. Bishoy is passionate about keeping up with new technologies and building efficient and reliable solutions.
Embedded vulnerability scans in CI pipelines for both application-level dependencies and container OS packages using OWASP Dependency-Track.
Set up AWS IoT MQTT message broker and authentication/authorization through IAM and client certificates.
Deployed Airflow over EKS and assisted with Amazon EMR and AWS Glue set up.
Set up AWS RDS (PostgreSQL) and Elasticsearch with controlled network access and IAM authentication.
Exposed back-end microservices running on EKS via an API gateway, with Amazon Cognito handling the authentication. Additionally, used CloudFront CDN to serve the front end stored in S3.
Created on-demand sandbox environments with Spinnaker, Jenkins, and Terraform, which enabled developers and QEs to isolate new feature changes, test them thoroughly, and perform repeatable performance tests.
Set up, hardened, and maintained the EKS and Kubernetes clusters. Managed accesses, resources, autoscaling, and availability of the services running within, all through Terraform.
Introduced infrastructure as code (IaC) using Terraform, with which the existing infrastructure was imported and managed.
Implemented CI/CD pipelines using Jenkins and Spinnaker, both modularly and with self-service.
Improved CI builds to enforce quality and security standards with static code analysis, duplication check, and test coverage rules.
Integrated Ethoca Alerts into the platform by implementing two independent microservices and refactored common logic into separate libraries, simplifying the development of new microservices.
Provided secure coding for features along with writing automated tests and peer code reviews.
Unified accesses through Okta and integrated it with AWS SSO, QuickSight, K8s dashboards, Cloudflare, and GitHub.
Set up Cloudflare's Zero Trust network to secure internet access for employees and authorize access to the VPCs on AWS.
Implemented role-based access control and encryption at rest for all persistent services: ElastiCache/Redis, RDS/Postgres, Elasticsearch, RabbitMQ, and S3.
Configured AWS security services: CloudTrail, GuardDuty, Inspector, WAFV2, and Config. Used SSM for authorizing and auditing access to EC2.
Set up monitoring, alerts, and centralized logs with CloudWatch and Datadog.
A proof of concept for a highly available PostgreSQL setup using Consul, HAProxy, and Kubernetes. Helm is used for packaging and installing the solution to Kubernetes. Moreover, a Travis CI build is set up, which installs Minikube, builds the Docker images, deploys the chart, and finally runs integration tests simulating different failure scenarios.
This project sets up an auto-scaling, highly available, and secure Jenkins cluster on AWS using Terraform. The standing feature behind this setup is the automatic scaling of the slaves' EC2 instances based on the build queue size.
Education
Master's Degree in Computer Science and Engineering