Mihai Cindea
Synopsis
I am a geek with a hungry mind. I started playing with computers in 2003, and quickly became addicted to Linux. Built a Linux distribution focused on security with a couple of friends, based on Slackware. Since then I've worked in different environments, from remote sysadmin to telecommunications - while keeping security in mind.
Work Experience
Senior Cloud Engineer
Part of Developer Experience team - a mission to improve their experience and compliance.
- Automate the boring parts of developer's work as much as possible using RenovateBot, Python, Bash & PowerShell.
- Improve compliance using tools like OpsLevel where developers can see the level of all their apps: vulnerabilities, deployment frequency, etc.
- Implemented various services to improve security by protecting our public LBs with Shield, CloudFront, WAF and Panorama.
- Using RDS Blue/Green deployments we are now able to reduce downtime to 10 seconds for DB major version upgrades, for example.
- Reduce tech debt and cognitive load by removing duplicate code, upgrading and cleaning up legacy Terraform code.
- Improved security of our containers by migrating to chiseled/distroless images.
Technologies used:
- AWS
- AWS ECS
- AWS ELB
- AWS RDS
- AWS CloudFront
- AWS Shield
- AWS SQS
- AWS ElastiCache
- AWS EventBridge
- Azure AD
- Azure DevOps
- LocalStack
- OpsLevel
- OpsGenie
- RenovateBot
- NewRelic
- Terraform
- OWASP Zaproxy
- .NET
Senior Cloud Engineer
Maintain and automate SAP OpenText hosted within AWS.
- Automated configuration for OpenText instances with Terraform, Ansible (Tower), PowerShell and Bash.
- Setup alerting system based on DataDog, including custom checks.
Technologies used:
- Ansible
- Ansible Tower
- AWS LB
- AWS EC2
- AWS RDS
- Docker
- OpenText
- PowerShell
- Apache Tomcat
- DataDog
- SAP
Senior Cloud Engineer
Support developers with daily issues around by implementing new projects on our infrastructure hosted at Azure & AWS.
- Manage our CI/CD pipelines that revolve around Azure DevOps combined with Terraform and some PowerShell sprinkled on top.
- Implemented automated security scanners for our code like SonarCloud, Trivy and OWASP ZAP.
- Proposed and implemented an automated release mechanism with automated change ticket creation.
Technologies used:
- AWS
- AWS ECS
- AWS ELB
- AWS RDS
- Azure AD
- Azure DevOps
- Docker
- Prometheus
- PowerShell
- Splunk
- Terraform
- Trivy
- ZAP
- .NET
Senior DevOps Engineer
Most of my work is focused around redesigning the infrastructure since the original architecture had everything in one place. Some example projects:
- Wrote a custom GitHub action bot in TypeScript which coupled with Jenkins enabled us to automate our deployments.
- Manage our IaC at AWS and GitHub through Terraform.
- Wrote various scripts for deploying to AWS ECS, implemented AWS cross account policies for separated environments.
- Migrated from a cloud CI/CD solution to self hosted Jenkins - managed through Puppet.
- Redesign our infrastructure and code, so we can move towards isolated environments while also keeping the code env agnostic.
Technologies used:
- AWS
- AWS ECS
- AWS ELB
- AWS RDS
- Ansible
- CheckMK
- HashiCorp Vault
- Prometheus
- FreeIPA
- Jenkins
- Grafana
- Kibana
- Python
- RabbitMQ
- OpenVPN
- Terraform
Senior DevOps Engineer
Most of the work involves developing the Puppet code that orchestrates our whole network hosted at Linode. Also involved monitoring and integrating apps in Zabbix or Grafana. During dev days I conducted pentesting for our network and worked on integrating Prometheus in our network.
- Created a dev environment from scratch based on Docker to mimic the actual environment we have in production/staging, where we later used in all of our DevOps CI/CD Puppet development.
- Develop Puppet code to scale services like Redis, PostgreSQL & Nginx while maintaining them highly available using Keepalived and HAproxy.
- Deploy a Graylog server and configure every service to send logs to centralization
- Maintain and configure Teamcity for CI/CD.
Technologies used:
- Bash
- Celery
- Graylog
- HAProxy
- Puppet
- Python
- PostgresSQL
- RabbitMQ
- Redis
- Ruby
- Zabbix
Senior DevOps Engineer
Develop and provide support for a test-driven Python framework designed to automate the configuration of Cisco FirePower Next Generation Firewall software.
My role was mostly as a bug hunter, but within the company. The goal was to break the software and find bugs - that may or may not be security related.During this time I learned a lot about the inner workings of Cisco's solution, FirePower NGFW. I learned to install, configure and fully test if the IDS policies and configurations fully worked.
- Create own environment using VMware, Docker and generate traffic using tools like TeraVM.
- Worked on a framework that used pyVmomi on top of VMware to manage environments for CI/CD pipelines.
- Create tests that were capable of deploying and configuring the FirePower product on platforms such as Azure ore Amazon AWS.
- Maintain & develop automation environment, that is comprised of Docker, RabbitMQ, AngularJS & Selenium containers.
- Certified as CISCO - Security Green Belt Ninja
Technologies used:
- AWS
- Azure
- AngularJS
- Docker
- Cisco FirePower
- Python
- MongoDB
- VMware
- pyVmomi
Data Warehouse Analyst
Providing therapy for applications/tools abused by their human owners.
Support global Nokia teams (NOC, QoS, Integration) in Europe/India/Americas by creating tools in JS, PHP, Python and Perl to ease the workload and calculate various KPIs.
- Part of a team that developed an application which had a throughput of 500MB of Telecom statistics data every 15 minutes which was processed and stored in a huge MSSQL DB.
- Design various protocols and automated solutions to extract data from different sources - SFTP/Email/DB using various protocols IPSec, VPNs, etc.
- Maintain a local network of 10 Windows,4 Linux & 1 virtualized Supermicro which also hosts Windows & Linux with various services - Splunk, Tableau, Microsoft SQL Server.
- Configure and maintain a Nagios server to monitor the local network for different alarms - check availability, jobs success rate, etc.
- Created an application that was capable of exporting a website to Microsoft Powerpoint using PhantomJS.
- Wrote complex queries depending on the project - Microsoft SQL Server/Oracle & maintaining these services.
- Pentest the local network & installed various services in order to detect attacks - Suricata, PSAD, ARPon
Technologies used:
- ARPon
- PSAD
- Nagios
- Microsoft SSiS
- Microsoft SQL Server
- PhantomJS
- PHP
- Tableau
- SAP Business Objects
- Splunk
Network Analyst
The role was to monitor the Base GSM network (Belgium) - Ericsson/ZTE/LTE equipments 2G,3G & 4G from NOC.
- Manage & coordinate network incidents, problems, changes, maintenance while following ITIL practices.
- Provided support for the 4G rollout - migration to ZTE LTE.
- I moved to India during the last months of the project to transfer knowledge to TechMahindra engineers.
- * For fun and profit - wrote/debugged various scripts in Ericsson OSS (Solaris KSH/Bash, Perl and Python & Ericsson OPS scripting language) to ease the workload(with some degree of automation).
- Ericson OSS
- IBM Tivoli
- NetNummen ZTE/LTE
- ITSM
Technologies used:
System Administrator (Remote)
The main role was to clean & secure various web hosting servers from malware infection (PHP scripts, Rootkits etc).
- Manage Linux/FreeBSD-based servers (firewalls, proxy, www, dns, smtp).
- Implementing IDS system (Tripwire/Snort), on FreeBSD/Linux platforms.
- Achieved skills & experience in VPN protocols, and software like OpenVPN.
- Studied various VOIP systems integrated with PHP/Bash/C++ for open source projects.
- Configured VoIP software like Asterisk, Vicidial and Cisco iOS
Technologies used:
- Asterisk
- C++
- FreeBSD
- OpenVPN
- Tripwire
- Snort
- PHP
- VoIP
System Administrator volunteer
Responsible for configuring, maintaining, and monitoring all servers (2 Web, 2 NS, 2 Mail, 1 MySQL, and general-purpose) and maintaining user workstations.
Technologies used:
- Bind
- DNS
- MySQL
- Named
Software developer volunteer
Worked on creating a 100% romanian built from scratch Open Source Linux distribution. It was focused on security mostly.
- Decebal Linux was a project started with 3 friends of mine, open source-based distribution with tightened security built from scratch. It included ProPolice, Stack-Smashing-Protector, GRsecurity kernel patches & others. It was designed mainly for hardened security servers.
- My main work was for the packet manager (something similar to apt-get/yum) written completely in Bash. It was Gentoo like, with the ability to recompile everything from scratch optimised for the current system HW configuration.
- During this time I learned a lot about how Linux works, and mostly what an operating system is under the hood.
Technologies used:
- Bash
- Slackware
- Compilers
System Administrator
Main work was to secure and clean the servers from malware (Huge webhosting servers are attacked most of the times due to buggy PHP software).
- Patched, secured, configured and maintained over 300 GNU/Linux x86 systems, including dual-booting laptops and desktops, and various other systems.
- My main work was for the packet manager (something similar to apt-get/yum) written completely in Bash. It was Gentoo like, with the ability to recompile everything from scratch optimised for the current system HW configuration.
- During this time I learned a lot about how Linux works, and mostly what an operating system is under the hood.
- Wrote tools that helped in case of DoS or bruteforcing attacks: just blocked IPs after a few logged entries, something to what Fail2Ban does nowadays.
Technologies used:
- Apache
- Dovecot
- Exim
- Qmail
- WebSphere
- Plesk
- Grub
- MySQL
- PostgreSQL
Skills & Tools
-
Bash
-
Networking
-
Terraform
-
Docker
-
AWS
-
SQL
-
Puppet
-
Ansible
-
Saltstack
-
Python
-
Azure DevOps
-
PowerShell
-
C/C++
Others
- Apache
- Ansible
- Apache Tomcat
- AWS
- BGP
- CheckMK
- Cisco FirePower
- ClickHouse
- DataDog
- DigitalOcean
- DNS
- ElasticSearch
- FreeBSD
- FreeIPA
- Graylog
- Grafana
- HAProxy
- Keepalived
- Kubernetes
- Linode
- Microsoft SQL Server
- Microsoft SSiS
- MongoDB
- Nagios
- NewRelic
- Nginx
- OpenText
- OpenVPN
- pfSense
- PFsense
- Postfix
- PostgreSQL
- OpsLevel
- Ollama
- Terraform
- QEMU
- Qmail
- RabbitMQ
- Redis
- Salt
- SIP
- SMTP
- Snort
- WireGuard
- Zabbix
Education
-
BSC in Computer ScienceUniversitatea Oradea, Romania2013 - 2017
Certifications
-
CISCO - Security Green Belt Ninja
-
CCNA 1 - Networking Basics
-
CCNA 2 - Routers and Routing Basics
-
CCNA 3 - Switching Basics and Intermediate Routing
-
IP Protocol & Routers - Alcatel-Lucent
-
Alcatel-Lucent - Multiprotocol Label Switching (MPLS)
-
Alcatel-Lucent - Alcatel-Lucent 7750 SR
Language
- Romanian (Native)
- English (Fluent)
- French (Conversational level)
Interests
- Cycling
- Pentesting
- Cooking
- Snowboarding