Mihai Cindea

Professional googler: providing therapy to applications abused by their human owners

Synopsis

I am a geek with a hungry mind. I started playing with computers in 2003, and quickly became addicted to Linux. Built a Linux distribution focused on security with a couple of friends, based on Slackware. Since then I've worked in different environments, from remote sysadmin to telecommunications - while keeping security in mind.

Work Experience

Senior Cloud Engineer

Knab BV, Amsterdam, Netherlands (mostly Remote)
Oct 2023 - December 2024 (freelance); January 2025 - Present (internal employee)

Part of Developer Experience team - a mission to improve their experience and compliance.

  • Automate the boring parts of developer's work as much as possible using RenovateBot, Python, Bash & PowerShell.
  • Improve compliance using tools like OpsLevel where developers can see the level of all their apps: vulnerabilities, deployment frequency, etc.
  • Implemented various services to improve security by protecting our public LBs with Shield, CloudFront, WAF and Panorama.
  • Using RDS Blue/Green deployments we are now able to reduce downtime to 10 seconds for DB major version upgrades, for example.
  • Reduce tech debt and cognitive load by removing duplicate code, upgrading and cleaning up legacy Terraform code.
  • Improved security of our containers by migrating to chiseled/distroless images.

Technologies used:

  • AWS
  • AWS ECS
  • AWS ELB
  • AWS RDS
  • AWS CloudFront
  • AWS Shield
  • AWS SQS
  • AWS ElastiCache
  • AWS EventBridge
  • Azure AD
  • Azure DevOps
  • LocalStack
  • OpsLevel
  • OpsGenie
  • RenovateBot
  • NewRelic
  • Terraform
  • OWASP Zaproxy
  • .NET

Senior Cloud Engineer

LeasePlan BV - Freelance - Netherlands (Remote)
Aug 2022 - Sep 2023

Maintain and automate SAP OpenText hosted within AWS.

  • Automated configuration for OpenText instances with Terraform, Ansible (Tower), PowerShell and Bash.
  • Setup alerting system based on DataDog, including custom checks.

Technologies used:

  • Ansible
  • Ansible Tower
  • AWS LB
  • AWS EC2
  • AWS RDS
  • Docker
  • OpenText
  • PowerShell
  • Apache Tomcat
  • DataDog
  • SAP

Senior Cloud Engineer

Knab BV - Freelance, Amsterdam, Netherlands (Remote)
Nov 2020 - Aug 2022

Support developers with daily issues around by implementing new projects on our infrastructure hosted at Azure & AWS.

  • Manage our CI/CD pipelines that revolve around Azure DevOps combined with Terraform and some PowerShell sprinkled on top.
  • Implemented automated security scanners for our code like SonarCloud, Trivy and OWASP ZAP.
  • Proposed and implemented an automated release mechanism with automated change ticket creation.

Technologies used:

  • AWS
  • AWS ECS
  • AWS ELB
  • AWS RDS
  • Azure AD
  • Azure DevOps
  • Docker
  • Prometheus
  • PowerShell
  • Splunk
  • Terraform
  • Trivy
  • ZAP
  • .NET

Senior DevOps Engineer

3DHubs BV, Amsterdam, Netherlands
Oct 2019 - Nov 2020

Most of my work is focused around redesigning the infrastructure since the original architecture had everything in one place. Some example projects:

  • Wrote a custom GitHub action bot in TypeScript which coupled with Jenkins enabled us to automate our deployments.
  • Manage our IaC at AWS and GitHub through Terraform.
  • Wrote various scripts for deploying to AWS ECS, implemented AWS cross account policies for separated environments.
  • Migrated from a cloud CI/CD solution to self hosted Jenkins - managed through Puppet.
  • Redesign our infrastructure and code, so we can move towards isolated environments while also keeping the code env agnostic.

Technologies used:

  • AWS
  • AWS ECS
  • AWS ELB
  • AWS RDS
  • Ansible
  • CheckMK
  • HashiCorp Vault
  • Prometheus
  • FreeIPA
  • Jenkins
  • Grafana
  • Kibana
  • Python
  • RabbitMQ
  • OpenVPN
  • Terraform

Senior DevOps Engineer

Patchman BV, Enschede, Netherlands
Jun 2018 - Sep 2019

Most of the work involves developing the Puppet code that orchestrates our whole network hosted at Linode. Also involved monitoring and integrating apps in Zabbix or Grafana. During dev days I conducted pentesting for our network and worked on integrating Prometheus in our network.

  • Created a dev environment from scratch based on Docker to mimic the actual environment we have in production/staging, where we later used in all of our DevOps CI/CD Puppet development.
  • Develop Puppet code to scale services like Redis, PostgreSQL & Nginx while maintaining them highly available using Keepalived and HAproxy.
  • Deploy a Graylog server and configure every service to send logs to centralization
  • Maintain and configure Teamcity for CI/CD.

Technologies used:

  • Bash
  • Celery
  • Graylog
  • HAProxy
  • Puppet
  • Python
  • PostgresSQL
  • RabbitMQ
  • Redis
  • Ruby
  • Zabbix

Senior DevOps Engineer

3Pillar Global - for CISCO, Timisoara, Romania
Jan 2017 - Jun 2018

Develop and provide support for a test-driven Python framework designed to automate the configuration of Cisco FirePower Next Generation Firewall software.

My role was mostly as a bug hunter, but within the company. The goal was to break the software and find bugs - that may or may not be security related.During this time I learned a lot about the inner workings of Cisco's solution, FirePower NGFW. I learned to install, configure and fully test if the IDS policies and configurations fully worked.

  • Create own environment using VMware, Docker and generate traffic using tools like TeraVM.
  • Worked on a framework that used pyVmomi on top of VMware to manage environments for CI/CD pipelines.
  • Create tests that were capable of deploying and configuring the FirePower product on platforms such as Azure ore Amazon AWS.
  • Maintain & develop automation environment, that is comprised of Docker, RabbitMQ, AngularJS & Selenium containers.
  • Certified as CISCO - Security Green Belt Ninja

Technologies used:

  • AWS
  • Azure
  • AngularJS
  • Docker
  • Cisco FirePower
  • Python
  • MongoDB
  • VMware
  • pyVmomi

Data Warehouse Analyst

Alcatel-Lucent/Nokia - Timisoara, Romania
Feb 2014 - Jun 2017

Providing therapy for applications/tools abused by their human owners.

Support global Nokia teams (NOC, QoS, Integration) in Europe/India/Americas by creating tools in JS, PHP, Python and Perl to ease the workload and calculate various KPIs.

  • Part of a team that developed an application which had a throughput of 500MB of Telecom statistics data every 15 minutes which was processed and stored in a huge MSSQL DB.
  • Design various protocols and automated solutions to extract data from different sources - SFTP/Email/DB using various protocols IPSec, VPNs, etc.
  • Maintain a local network of 10 Windows,4 Linux & 1 virtualized Supermicro which also hosts Windows & Linux with various services - Splunk, Tableau, Microsoft SQL Server.
  • Configure and maintain a Nagios server to monitor the local network for different alarms - check availability, jobs success rate, etc.
  • Created an application that was capable of exporting a website to Microsoft Powerpoint using PhantomJS.
  • Wrote complex queries depending on the project - Microsoft SQL Server/Oracle & maintaining these services.
  • Pentest the local network & installed various services in order to detect attacks - Suricata, PSAD, ARPon

Technologies used:

  • ARPon
  • PSAD
  • Nagios
  • Microsoft SSiS
  • Microsoft SQL Server
  • PhantomJS
  • PHP
  • Tableau
  • SAP Business Objects
  • Splunk

Network Analyst

Alcatel-Lucent - Timisoara, Romania
Apr 2013 - Feb 2014

The role was to monitor the Base GSM network (Belgium) - Ericsson/ZTE/LTE equipments 2G,3G & 4G from NOC.

  • Manage & coordinate network incidents, problems, changes, maintenance while following ITIL practices.
  • Provided support for the 4G rollout - migration to ZTE LTE.
  • I moved to India during the last months of the project to transfer knowledge to TechMahindra engineers.
  • * For fun and profit - wrote/debugged various scripts in Ericsson OSS (Solaris KSH/Bash, Perl and Python & Ericsson OPS scripting language) to ease the workload(with some degree of automation).
  • Technologies used:

    • Ericson OSS
    • IBM Tivoli
    • NetNummen ZTE/LTE
    • ITSM

System Administrator (Remote)

consultat/freelancer
Mar 2010 - Feb 2013

The main role was to clean & secure various web hosting servers from malware infection (PHP scripts, Rootkits etc).

  • Manage Linux/FreeBSD-based servers (firewalls, proxy, www, dns, smtp).
  • Implementing IDS system (Tripwire/Snort), on FreeBSD/Linux platforms.
  • Achieved skills & experience in VPN protocols, and software like OpenVPN.
  • Studied various VOIP systems integrated with PHP/Bash/C++ for open source projects.
  • Configured VoIP software like Asterisk, Vicidial and Cisco iOS

Technologies used:

  • Asterisk
  • C++
  • FreeBSD
  • OpenVPN
  • Tripwire
  • Snort
  • PHP
  • VoIP

System Administrator volunteer

MOLSCI - Molecular Sciences Institute (Remote)
May 2006 - Mar 2010

Responsible for configuring, maintaining, and monitoring all servers (2 Web, 2 NS, 2 Mail, 1 MySQL, and general-purpose) and maintaining user workstations.

Technologies used:

  • Bind
  • DNS
  • MySQL
  • Named

Software developer volunteer

Decebal Linux Distribution
Sep 2004 - Apr 2006

Worked on creating a 100% romanian built from scratch Open Source Linux distribution. It was focused on security mostly.

  • Decebal Linux was a project started with 3 friends of mine, open source-based distribution with tightened security built from scratch. It included ProPolice, Stack-Smashing-Protector, GRsecurity kernel patches & others. It was designed mainly for hardened security servers.
  • My main work was for the packet manager (something similar to apt-get/yum) written completely in Bash. It was Gentoo like, with the ability to recompile everything from scratch optimised for the current system HW configuration.
  • During this time I learned a lot about how Linux works, and mostly what an operating system is under the hood.

Technologies used:

  • Bash
  • Slackware
  • Compilers

System Administrator

Weberz (Remote)
Aug 2002 - Sep 2004

Main work was to secure and clean the servers from malware (Huge webhosting servers are attacked most of the times due to buggy PHP software).

  • Patched, secured, configured and maintained over 300 GNU/Linux x86 systems, including dual-booting laptops and desktops, and various other systems.
  • My main work was for the packet manager (something similar to apt-get/yum) written completely in Bash. It was Gentoo like, with the ability to recompile everything from scratch optimised for the current system HW configuration.
  • During this time I learned a lot about how Linux works, and mostly what an operating system is under the hood.
  • Wrote tools that helped in case of DoS or bruteforcing attacks: just blocked IPs after a few logged entries, something to what Fail2Ban does nowadays.

Technologies used:

  • Apache
  • Dovecot
  • Exim
  • Qmail
  • WebSphere
  • Plesk
  • Grub
  • MySQL
  • PostgreSQL

Skills & Tools

  • Bash
  • Networking
  • Terraform
  • Docker
  • AWS
  • SQL
  • Puppet
  • Ansible
  • Saltstack
  • Python
  • Azure DevOps
  • PowerShell
  • C/C++

Others

  • Apache
  • Ansible
  • Apache Tomcat
  • AWS
  • BGP
  • CheckMK
  • Cisco FirePower
  • ClickHouse
  • DataDog
  • DigitalOcean
  • DNS
  • ElasticSearch
  • FreeBSD
  • FreeIPA
  • Graylog
  • Grafana
  • HAProxy
  • Keepalived
  • Kubernetes
  • Linode
  • Microsoft SQL Server
  • Microsoft SSiS
  • MongoDB
  • Nagios
  • NewRelic
  • Nginx
  • OpenText
  • OpenVPN
  • pfSense
  • PFsense
  • Postfix
  • PostgreSQL
  • OpsLevel
  • Ollama
  • Terraform
  • QEMU
  • Qmail
  • RabbitMQ
  • Redis
  • Salt
  • SIP
  • SMTP
  • Snort
  • WireGuard
  • Zabbix

Education

  • BSC in Computer Science
    Universitatea Oradea, Romania
    2013 - 2017

Certifications

  • CISCO - Security Green Belt Ninja
  • CCNA 1 - Networking Basics
  • CCNA 2 - Routers and Routing Basics
  • CCNA 3 - Switching Basics and Intermediate Routing
  • IP Protocol & Routers - Alcatel-Lucent
  • Alcatel-Lucent - Multiprotocol Label Switching (MPLS)
  • Alcatel-Lucent - Alcatel-Lucent 7750 SR

Language

  • Romanian (Native)
  • English (Fluent)
  • French (Conversational level)

Interests

  • Cycling
  • Pentesting
  • Cooking
  • Snowboarding