Skip to content
View umairibnauyyub's full-sized avatar

Block or report umairibnauyyub

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
umairibnauyyub/README.md

👋 Hey there, I'm Umair Khan!

Typing SVG

🌐 About Me:

I’m Umair Khan, an enthusiastic DevOps Engineer currently working at FiatPe (Fintech Company) in Nagpur, India. I specialize in designing and maintaining secure, scalable cloud infrastructure.

🔐 Currently leading PCI DSS Compliance Project as the primary owner—ensuring secure system design, policy control, evidence submission, and ASV scan remediations.

🚀 Strong experience in:

  • 🔁 Automating deployments using Jenkins & Docker Compose
  • 🛡️ Setting up AWS WAF, Redis (secure configs), AWS Transfer Family (SFTP)
  • 🌐 Managing secure reverse proxies with Nginx
  • 📁 Creating audit-compliant documentation, evidence reports, and risk analysis

📚 Exploring Kubernetes & Terraform (theory cleared, hands-on coming up next)


🧠 Tech Stack & Tools:


🔥 Current Focus:

  • ✅ AWS infra provisioning (IAM, S3, EC2, WAF, SNS, GuardDuty, CloudTrail)
  • ✅ Setting up audit logs and centralized monitoring (PCI DSS standards)
  • ✅ Configuring secure Docker + Redis containers with auto-restart & health checks
  • ✅ Reverse proxy & secure headers with Nginx for internal/external apps

🛠️ Projects & Contributions:

  1. AWS Transfer Family SFTP Setup (PCI DSS Scope)

    • Configured user-based SFTP access using IAM, CloudTrail, and CloudWatch
    • Submitted real-time monitoring evidence for PCI DSS audit
  2. Redis Server Setup on ASV-Scanned Instance

    • Hardened Redis with secure passwords, port whitelisting, and restart policies
    • Passed all ASV scan requirements
  3. Docker Compose-Based Jenkins CI/CD Pipeline

    • Integrated with GitHub, deployed Node & Python containers
    • Auto build + deploy to production EC2
  4. WAF Security Rule Set for AWS Infrastructure

    • Blocking RCE/XSS/SQLi attacks using managed rule groups + custom rules

📚 Learning & Researching:

  • 🧩 Terraform (modular repo design, cloud provisioning)
  • ☸️ Kubernetes (services, deployment, ingress, volumes)
  • 📝 Git-based documentation for infra tracking & employee onboarding

📈 GitHub Highlights:


📫 Connect With Me:


Pinned Loading

  1. umairibnauyyub umairibnauyyub Public

    Config files for my GitHub profile.