Skip to content
View berkeleyo's full-sized avatar

Block or report berkeleyo

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
berkeleyo/README.md

Hi, I'm Berkeley πŸ‘‹

Profile Views Experience Lines of Code


πŸ§‘β€πŸ’» About Me

Cloud engineer focused on access governance, secure network architectures, and pragmatic automation.
I like clean runbooks, reversible cutovers, and evidence-first security.
I work primarily in Azure, with complementary projects in AWS and GCP where they deliver value.

  • πŸ›‘οΈ Identity & Access: JIT elevation, Conditional Access, PIM, external-ID federation (Azure β€’ AWS STS β€’ GCP WIF)
  • 🌐 Networking: Fortinet SD-WAN/IPsec in Azure, HA/BGP, MTU optimization, deterministic routing and secure egress patterns
  • βš™οΈ Automation: PowerShell/Bicep, Logic Apps, YAML pipelines, GitHub/Azure DevOps
  • πŸ–₯️ Endpoint & Governance: Intune configuration, remediation, and policy-driven enforcement
  • πŸ“Š Ops: Runbooks, cutover/rollback, observability, backup verification
  • ✍️ Documentation: concise, production-ready, redacted

Recent work also explores AI-driven automation and voice-based agents as operational interfaces for platform workflows and customer interaction systems.


πŸ€– AI Systems & Event-Driven Platforms

Exploration of AI-assisted automation and event-driven systems extending traditional platform engineering patterns into conversational and autonomous workflows.

Project Description Stack
AI Voice Agent Platform Event-driven AI voice agent platform handling enquiry intake, outbound calling workflows, structured data capture, and automation pipelines. πŸ€– AI Β· Azure Functions Β· Event-Driven

πŸ—οΈ Platform & Engineering Projects

Rather than isolated tooling, these repositories represent real operational problems, designed and implemented with production constraints in mind β€” security, rollback, observability, and long-term maintainability.

Projects are grouped by engineering domain to reflect how platforms are designed and operated in practice.


☁️ Migration & Platform Modernisation

Projects focused on moving legacy or operationally risky systems into secure, maintainable cloud architectures with controlled cutover and rollback strategies.

Project Description Stack
UniFi Controller Cloud Migration End-to-end migration from legacy hosting to Azure with DNS cutover strategy, version pinning, Entra App Proxy integration, MFA enforcement, and operational hardening. ☁️ Azure · 🐧 Linux · 🧰 PowerShell
Azure Public IP Migration Discovery and migration framework for retiring Basic SKU public IPs safely across subscriptions with inventory export, validation, and reversible migration workflow. 🧰 PowerShell · ☁️ Azure
Azure VPN (P2S) Runbook Real-world VPN deployment covering authentication models, DNS behaviour, and secure connectivity modernisation patterns. 🌐 Networking · ☁️ Azure
CSAT Remote Access Pattern (LB + NAT Gateway) Policy-compliant remote access pattern using Standard Load Balancer inbound NAT with controlled outbound egress via NAT Gateway. ☁️ Azure · Networking · Operations

πŸ” Identity & Access Platforms

Identity is treated as the primary control plane. These projects focus on removing standing privilege, enforcing least access, and making elevation auditable and time-bound.

Project Description Stack
Cloud Access Broker β€” JIT (Multi-Cloud) Multi-cloud just-in-time elevation across Azure, AWS and GCP with approval workflow, audit logging, and automatic revocation. ☁️ Azure Β· AWS Β· GCP Β· PowerShell
AWS JIT Access Temporary privilege elevation using AWS Identity Center and Step Functions with CloudTrail-backed auditability. ☁️ AWS Β· 🐍 Python Β· πŸ” IAM
Azure Access Automation Automated access workflows integrating Forms, Power Automate and Entra ID to provide controlled, time-bound access with policy enforcement. ☁️ Azure · ⚑ Power Automate
Access Governance Request Platform Access governance platform enabling request intake, approval workflows, time-bound group membership, automated expiry removal, and audit-ready evidence generation. ☁️ Azure · Identity · Automation

🌐 Cloud Networking & Secure Connectivity

Networking projects focused on deterministic routing, secure egress, and predictable failure modes across hybrid and cloud environments.

Project Description Stack
Fortinet SD-WAN + IPsec (Azure) Enterprise hub-and-spoke SD-WAN architecture with HA, BGP routing, MTU optimisation, and operational validation patterns. 🧱 Fortinet · ☁️ Azure
Cloud-Secure Egress Policy Centralised outbound control using firewall chaining and enforced egress paths with documented cutover and rollback strategy. πŸ” Network Security Β· ☁️ Azure
Azure Firewall Multi-Site Publishing Secure ingress architecture publishing multiple internal applications through Azure Firewall using DNAT and isolated backend patterns. πŸ”₯ Azure Firewall Β· ☁️ Azure
Azure Hub-Spoke Hybrid Routing Pattern Hybrid routing design steering partner traffic over VPN gateway using UDR prefix routing and gateway transit patterns. 🌐 Networking · ☁️ Azure

βš™οΈ Platform Automation & Governance

Automation projects focused on scale, repeatability, and reducing operational risk across large cloud estates.

Project Description Stack
Azure Governance Baseline Framework Governance baseline implementing naming standards, tag enforcement, policy-as-code scaffolding, drift detection, and controlled remediation workflows. ☁️ Azure · Policy · PowerShell
Azure Cost & Tagging Governance Automation enforcing tagging standards and cost attribution models across subscriptions with reporting and remediation workflows. ☁️ Azure · Governance · Automation
Azure Budget Governance Budget enforcement and alerting automation using cost management APIs and operational reporting patterns. ☁️ Azure · FinOps · Automation
Intune Kyocera Print Governance Endpoint governance automation enforcing compliant printer usage and removing unmanaged drivers through Intune remediation. πŸ–₯️ Intune Β· 🧰 PowerShell

πŸ“Š Observability & Operations

Operational tooling focused on visibility, health validation, and ensuring systems remain observable after deployment.

Project Description Stack
LogicMonitor Hybrid Monitoring Hybrid monitoring model spanning Hyper-V, AWS and GCP with unified alerting and operational dashboards. πŸ“Š LogicMonitor Β· ☁️ AWS Β· ☁️ GCP
Observability (Grafana + Kibana) Centralised observability stack for metrics and log analysis across hybrid environments. πŸ“Š Grafana Β· Kibana Β· Monitoring
M365 Security Alerts to Teams Logic App workflow aggregating security alerts and publishing operational summaries to Teams using adaptive cards. ☁️ Azure · Security · Automation
Datto Grafana Monitoring Monitoring dashboards and alerting patterns designed for operational visibility and infrastructure validation. πŸ“Š Grafana Β· Monitoring

🧠 Engineering Focus

  • Identity-first platform design and least-privilege access models
  • Deterministic cloud networking and secure ingress/egress architecture
  • DevOps practices aligned with operational ownership
  • Governance and repeatability across multi-subscription environments
  • Automation driven by operational need rather than tooling preference
  • Documentation designed for operational handover

πŸš€ Professional Impact

  • Removed standing privilege through identity-driven elevation models across cloud environments.
  • Delivered production migrations and cutovers with pre-defined rollback paths and controlled change patterns.
  • Standardised network and access patterns reducing operational drift across environments.
  • Built automation replacing manual access provisioning and configuration workflows.
  • Produced operational runbooks enabling predictable support and incident response.

🧭 How I Work

  • Design for rollback first.
  • Prefer small, reversible changes over high-risk deployments.
  • Treat identity as the primary security boundary.
  • Document systems so someone else can operate them at 3am.
  • Automate only after the manual process is fully understood.

πŸ” Security Philosophy

  • Identity over network trust.
  • Short-lived access over standing privilege.
  • Evidence over assumptions.
  • Safe defaults over permissive convenience.
  • Production systems should fail predictably.

πŸ” Currently Exploring

  • Workload identity federation patterns across cloud providers
  • Zero-trust network segmentation models
  • Policy-as-code for access governance and platform controls
  • Platform engineering workflows for repeatable environments

🧩 Redaction & Security Statement

🧾 All documentation and code samples are redacted for confidentiality.
No secrets, IP addresses, or tenant identifiers are included.

Pinned Loading

  1. azure-public-ip-migration azure-public-ip-migration Public

    Discover and migrate Basic to Standard Public IPs at scale.

    PowerShell

  2. fortinet-azure-sdwan-ipsec fortinet-azure-sdwan-ipsec Public

    Fortinet SD-WAN and IPsec on Azure with runbooks and IaC.

    PowerShell