Mark {Void}Message
Available for contractRemote (EU) · Overlap with US business hours · PDT / CET

Mark{Void}

Senior DevOps / SRE / Platform Engineer

Kubernetes on cloud & your metal · Multi-cloud · IaC · FinOps · ML Ops

I build and run Kubernetes and the platforms around it—on AWS, Azure, GCP, and on your own metal when policy or regulators rule out cloud-only. Delivery, observability, spend, security, and audit-ready evidence: hands-on in your repos and clusters, not slide decks.

What I work on
[Industries]
  • iGaming
  • News & media
  • Affiliate
  • E-commerce

Services

What I work on

Skim in seconds—the messy reality and proof points sit in Solutions below.

  • 01

    Platforms & Kubernetes

    Clusters in cloud, private DC, or hybrid—networking, storage, hardening, and patterns teams can reuse.

  • 02

    Delivery & infrastructure as code

    CI/CD you can trust, environments defined in code, rollouts matched to how much risk you can take.

  • 03

    Observability & reliability

    Signals that explain production, SLO-aligned alerting, and shorter paths from page to root cause.

  • 04

    FinOps & cost control

    Visibility, rightsizing, and guardrails so engineering can answer finance without a fire drill.

  • 05

    DevSecOps & certification readiness

    Structured reviews of pipelines and infra; technical measures and evidence toward GDPR-style and similar audits.

Solutions

From the problem to the outcome

Typical pain points teams bring—each card is: what's wrong, how I engage, what changes on the ground.

  • 01

    Fragile releases

    The situation

    Deploys are slow, manual, or scary—rollbacks hurt, and every release burns team energy.

    What I do

    I tighten CI/CD, environments as code, and Kubernetes rollout patterns to match how much risk you can take.

    You get

    Shorter lead time to production, repeatable releases, and rollbacks that stop being a crisis.

  • 02

    Platform sprawl

    The situation

    Every team reinvents clusters, networking, and guardrails; standards don’t stick and ops debt grows.

    What I do

    I define reusable platform defaults—Helm/Terraform baselines, mesh or Cilium where it earns its keep, hardening that teams can adopt without heroics.

    You get

    One coherent platform shape: easier onboarding, fewer snowflakes, operations people can reason about.

  • 03

    Self-hosted & compliance pressure

    The situation

    You must run on owned hardware, in a private datacenter, or meet strict security and data-residency rules—lift-and-shift to public cloud isn’t allowed or isn’t enough.

    What I do

    I build and operate Kubernetes and the full platform stack on your nodes: networking, storage, secrets, observability, and CI/CD that feel cloud-native but stay under your control and audit trail.

    You get

    A production-grade platform security and compliance teams can sign off on—without sentencing engineering to manual runbooks and snowflake servers.

  • 04

    Blind, noisy production

    The situation

    Incidents drag on because signals are fragmented; on-call gets alert floods instead of answers.

    What I do

    I wire metrics, logs, and tracing end-to-end—Prometheus, Grafana, ELK or VictoriaMetrics, Sentry—tied to how you actually run services.

    You get

    Faster detection, shorter MTTR, and a calmer on-call with noise you can turn down.

  • 05

    Cloud bill & late security

    The situation

    Finance asks questions engineering can’t answer; security findings appear right before release.

    What I do

    I put FinOps basics in place—rightsizing, scheduling, tagging and visibility—and cost guardrails around Kubernetes and cloud estates so ownership of spend is clear.

    You get

    Spend you can explain and defend, fewer budget surprises, and finance conversations that don’t ambush engineering at quarter-end.

  • 06

    DevSecOps reviews & certification readiness

    The situation

    Audits, GDPR-style privacy obligations, or customer security questionnaires are coming—and it’s unclear whether pipelines, clusters, and data flows actually support what legal and sales claim.

    What I do

    I run a structured DevSecOps analysis: how software ships, where secrets and data live, IAM and network boundaries, retention and logging suitable for evidence. Then I harden infra and CI/CD (IaC, pipeline gates, observability) in line with your risk appetite—working alongside security and, where needed, legal/DPO—not replacing them.

    You get

    Prioritized gaps, concrete technical fixes, and infrastructure and delivery that are materially closer to passing scrutiny—evidence you can show, not panic the week before an audit.

Stack

Tools & platforms

Grouped how they show up in real systems—happy to follow your standards.

Cloud & estates

  • AWS
  • Azure
  • GCP
  • On-prem · private DC
  • VMware
  • Hybrid · bare metal

Kubernetes & containers

  • Kubernetes (self-managed & cloud)
  • Docker
  • Helm
  • Istio
  • Cilium

Infrastructure as code

  • Terraform
  • Ansible
  • CloudFormation

CI/CD

  • Jenkins
  • GitLab CI
  • Azure Pipelines
  • Bitbucket Pipelines
  • TeamCity

Security & compliance

  • DevSecOps reviews
  • Pipeline & supply-chain hardening
  • Secrets · IAM · data-flow mapping
  • GDPR-oriented technical measures
  • Audit evidence (IaC, logs, access)

Observability

  • Prometheus
  • Grafana
  • ELK
  • VictoriaMetrics
  • Sentry
  • Zabbix

Data & streaming

  • PostgreSQL
  • MySQL
  • Redis
  • Kafka
  • MongoDB
  • ClickHouse

Scripting

  • Bash
  • Python
  • PowerShell

Operating systems

  • Linux (Debian, RHEL, OpenBSD)
  • Windows Server