Skip to content
View berkeleyo's full-sized avatar

Block or report berkeleyo

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
berkeleyo/README.md

Hi, I'm Berkeley πŸ‘‹

Profile Views Experience Lines of Code


πŸ§‘β€πŸ’» About Me

Cloud engineer focused on access governance, secure network architectures, and pragmatic automation.
I like clean runbooks, reversible cutovers, and evidence-first security.
I work primarily in Azure, with complementary projects in AWS and GCP where they deliver value.

  • πŸ›‘οΈ Identity & Access: JIT elevation, Conditional Access, PIM, external-ID federation (Azure β€’ AWS STS β€’ GCP WIF)
  • 🌐 Networking: Fortinet SD-WAN/IPsec in Azure, HA/BGP, MTU optimization
  • βš™οΈ Automation: PowerShell/Bicep, Logic Apps, YAML pipelines, GitHub/Azure DevOps
  • πŸ“Š Ops: Runbooks, cutover/rollback, observability, backup verification
  • ✍️ Documentation: concise, production-ready, redacted

πŸ—οΈ Featured Projects (10)

Project Description Stack
Cloud Access Broker β€” JIT (Multi-Cloud) Time-bound least-privilege elevation across Azure, AWS & GCP with approvals, audit, and auto-revocation. ☁️ Azure Β· AWS Β· GCP Β· PowerShell/Bash
AWS JIT Access Identity Center + Step Functions flow for temporary AWS elevation with auto-expiry & CloudTrail logging. ☁️ AWS Β· 🐍 Python Β· πŸ” IAM
Azure Access Automation Forms β†’ SharePoint β†’ Power Automate β†’ Entra ID group β†’ Conditional Access (time-boxed outside-country access). ☁️ Azure Β· ⚑ Power Automate
Fortinet SD-WAN + IPsec (Azure) Hub-and-spoke SD-WAN/IPsec topology with HA/BGP, MTU hardening, and route health validation. 🧱 Fortinet · ☁️ Azure
Azure Public IP Migration Discover Basic SKU IPs, export inventory CSV, and migrate safely to Standard SKU. 🧰 PowerShell · ☁️ Azure
Azure VPN (P2S) Runbook Real-world Azure P2S VPN rollout: OpenVPN/Entra ID vs IKEv2, DNS strategy, and secure defaults. 🌐 Networking · ☁️ Azure
Cloud-Secure Egress Policy Lock down outbound Internet egress via central firewall/NVA chain with cutover & rollback docs. πŸ” Network Security Β· ☁️ Azure
LogicMonitor Hybrid (Hyper-V β€’ AWS β€’ GCP) Hybrid observability with collectors/agents and cloud integrations; CPU/Memory/Uptime alerting. πŸ“Š LogicMonitor Β· ☁️ AWS Β· ☁️ GCP
UniFi Controller Cloud Migration Migration from legacy hosting to cloud VM with DNS cutover, version pinning, Entra App Proxy (MFA/CA), and SSH host key audit controls. ☁️ Cloud · 🧰 PowerShell · 🐧 Linux
Intune Kyocera Print Governance Intune automation to enforce Kyocera-only printers, removing unmanaged drivers and enforcing compliance. πŸ–₯️ Intune Β· 🧰 PowerShell

🧠 Highlights & Focus

  • Identity & Access Governance (Multi-Cloud) β€” Designing and operating secure, auditable JIT access models across Entra ID PIM, AWS STS AssumeRole, and GCP Workload Identity Federation.
  • Cloud Networking & Security β€” Enterprise SD-WAN / IPsec with HA & BGP, MTU tuning, hub-and-spoke design, firewall chaining, and deterministic egress patterns.
  • Platform & Access Automation β€” PowerShell-driven automation for access workflows, infrastructure provisioning, Intune remediation, and operational tooling.
  • Security Automation & SOC Integration β€” Sentinel and M365 playbooks for enrichment, triage, and routing alerts into operational channels (Teams / ticketing).
  • Governance & Cost Control β€” Policy enforcement, tagging hygiene, drift detection, and accountability across cloud estates.
  • Operational Resilience β€” Production-grade runbooks, health checks, backup validation, controlled cutovers, and deterministic rollback procedures.

πŸš€ Professional Impact

  • Designed and implemented identity-first access models that removed standing privileges across multi-cloud environments.
  • Led multiple production migrations and cutovers (DNS, network, platform) using reversible change patterns and pre-validated rollback paths.
  • Standardised cloud networking architectures (hub-and-spoke, firewall chaining, VPN / SD-WAN) to reduce operational risk and configuration drift.
  • Built automation replacing manual access provisioning, onboarding flows, and environment configuration tasks.
  • Authored operational runbooks used for on-call support, incident response, and long-term platform handover.

🧭 How I Work

  • Design for rollback first.
  • Prefer small, reversible changes over high-risk deployments.
  • Treat identity as the primary security boundary.
  • Document systems so someone else can operate them at 3am.
  • Automate only after the manual process is fully understood.

πŸ” Security Philosophy

  • Identity over network trust.
  • Short-lived access over standing privilege.
  • Evidence over assumptions.
  • Safe defaults over permissive convenience.
  • Production systems should fail predictably.

πŸ” Currently Exploring

  • Workload identity federation patterns across cloud providers
  • Zero-trust network segmentation models
  • Policy-as-code for access governance and platform controls
  • Platform engineering workflows for repeatable environments

🧩 Redaction & Security Statement

🧾 All documentation and code samples are redacted for confidentiality.
No secrets, IP addresses, or tenant identifiers are included.

Pinned Loading

  1. azure-public-ip-migration azure-public-ip-migration Public

    Discover and migrate Basic to Standard Public IPs at scale.

    PowerShell

  2. fortinet-azure-sdwan-ipsec fortinet-azure-sdwan-ipsec Public

    Fortinet SD-WAN and IPsec on Azure with runbooks and IaC.

    PowerShell