AWS Cloud Engineer and AWS Community Builder focused on secure AWS infrastructure, Terraform-driven automation, CI/CD delivery, cloud security, and operational reliability.
I build production-style AWS environments using VPC networking, IAM governance, infrastructure as code, event-driven services, observability, and controlled release workflows. My work is centered on reliable infrastructure, repeatable deployments, audit-ready security controls, and practical automation that supports real operational outcomes.
- AWS Infrastructure: VPC design, EC2, ECS, load balancing, Auto Scaling, Route 53, and multi-tier architecture
- Infrastructure as Code: Terraform and CloudFormation for repeatable, governed deployments
- CI/CD Automation: GitHub Actions, Jenkins, and structured beta-to-production release workflows
- Security & Governance: IAM, KMS, AWS Config, GuardDuty, Inspector, WAF, and least-privilege access design
- Observability: CloudWatch, CloudTrail, VPC Flow Logs, Prometheus, Grafana, Datadog, and Splunk
- Applied AI on AWS: Bedrock, Rekognition, Transcribe, Translate, and Polly integrated into event-driven workflows
Built and deployed a live resume platform at willsoto.tech using Amazon Bedrock, Lambda, API Gateway, DynamoDB, S3, CloudFront, ACM, and CloudFormation.
Automated review-first CI/CD promotion from beta to production using GitHub Actions, with isolated environments for controlled releases.
Stack: Amazon Bedrock · Lambda · API Gateway · DynamoDB · S3 · CloudFront · ACM · CloudFormation · GitHub Actions
Built an event-driven prompt execution pipeline that triggers Lambda from S3 object events and invokes Amazon Bedrock on demand.
Provisioned environment-scoped infrastructure with Terraform, including Lambda functions, IAM roles, S3 event notifications, CloudWatch logging, and GitHub Actions deployment workflows.
Stack: Terraform · Amazon Bedrock · Lambda · S3 · IAM · CloudWatch · GitHub Actions
Built a tag-governed Lambda workflow that stops approved non-production EC2 instances through EventBridge.
Implemented DynamoDB audit logging for shutdown events, capturing instance ID, tags, timestamp, and request metadata.
Exposed controlled on-demand shutdown through API Gateway to support cleanup without direct console access.
Stack: Lambda · EventBridge · DynamoDB · API Gateway · CloudFormation · GitHub Actions
VPC · Route Tables · NAT Gateway · Security Groups · NACLs · Route 53 · Transit Gateway
EC2 · ECS · Launch Templates · Auto Scaling · Elastic Load Balancing
IAM · RBAC · Permission Boundaries · KMS · Secrets Manager
RDS · DynamoDB · S3
GuardDuty · Security Hub · AWS Config · AWS WAF · Amazon Inspector
Lambda · EventBridge · API Gateway · Step Functions
CloudWatch · CloudTrail · VPC Flow Logs · Datadog · Prometheus · Grafana · Splunk
Terraform · CloudFormation · GitHub Actions · Jenkins · Python (Boto3) · Bash · PowerShell · Linux
Docker · Amazon ECS · Kubernetes · Docker Swarm
Amazon Bedrock · Rekognition · Transcribe · Translate · Polly
Used in event-driven AWS workflows for resume analysis, content processing, automation, and traceable cloud-native execution.
- AWS Certified Solutions Architect – Associate
- AWS Certified SysOps Administrator – Associate
- AWS Certified AI Practitioner
- CompTIA Security+
- CompTIA Network+
- AWS Community Builder — Cloud Operations
- LinkedIn: linkedin.com/in/iamwillsoto
- GitHub: github.com/iamwillsoto
- Technical Writing: medium.com/@wilmeralberto
- Live Resume: willsoto.tech

