Dionyz is an enterprising Python Backend Developer with 3+ years of expertise in the design and implementation of backend web APIs, applications, AWS-specific solutions, data scraping and deployment of servers on different host solutions. He has extensive experience working with startups; delivering 50+ projects to-date for clients.
Maintained and improved a DRF-based API hosted on Heroku to serve Newchip’s iOS app.
Worked on improvements/optimizations of the legacy codebase - both in terms of speed (10x improvement on some endpoints) and robustness/reliability reducing downtimes during deployments/high loads.
Efficiently maintained the original Django web app and added a simple dashboard for paid clients.
Offered technical expertise for the architecting and implementation of a robust, flexible ETL process/Data warehouse solution for the client.
Designed the key components of the architecture for the Data Warehouse system.
Oversaw the integration of over 43 data sources to the new Data Warehouse solutions; made up of open data platforms, custom APIs, and websites which needed to be scraped.
Created a simple web application for reporting/exporting statistics about stocks sourced from (https://www.netfonds.no) a platform that allows users to buy and sell shares from the US, Canada, Germany, Norway and the rest of the Nordic region; providing all the tools, services and products users need to follow the stock markets and trade wherever they are.
Designed and implemented the whole Django-based portfolio site as a pet project. The solution is integrated with Upwork to pull down a lot of content from my profile (descriptions, skills, job score, client’s feedback) for display on the site.
It uses a HTML template based off a devportfolio-template by Ryan Fitzgerald with a Python-upwork which is a Python 3 wrapper around the Upwork API.
Wrote a script (ended up being my most starred repo) which goes through a local lastpass account (password manager) and safely runs the truncated credentials through the haveibeenpwned.com API. It produces a report at the end detailing stolen credentials. The script logs into LastPass and retrieves its vault, goes through your entries and checks passwords through the haveibeenpwned API (actual plain passwords are not sent anywhere), compiles the results into a report for users to see if they have actually been pwned.