Profile Picture

Hi, I'm Allfin Ahsan

System Administrator • Cloud Architect • Security Enthusiast • Automation Engineer

Future DevOps

About Me

The Spark

Ever since I was a kid, tech felt less like a hobby and more like an adventure waiting to unfold. Sitting cross-legged on the floor, flipping through my dad's web development book, trying to piece together enough HTML to make my very first website. When that humble site came alive on the screen, I knew I'd found something special.

Finding My Calling

Pure coding never truly felt like my calling. What really captured my imagination was the magic behind automation, the thrill of setting something in motion and watching it work seamlessly. Remote management fascinated me—controlling systems miles away felt like wielding superpowers. Security became my obsession.

Building Skills

I pursued a Bachelor's degree in Computer Science and Engineering, then stepped into IT and operations. I jumped headfirst into any project that sparked curiosity, diving deep into Python, Bash, and PowerShell, slowly turning what once felt daunting into second nature.

The AI Revolution

Then came AI. Initially, I turned to it to simplify tasks, but soon it became my teacher. AI tools became companions in my journey, patiently unpacking logic and reinforcing understanding. This sparked a shift from simply using tech to genuinely learning and growing through it.

What's Next

I'm seeking a new adventure—a place filled with challenges rather than barriers, where embracing fresh ideas and groundbreaking technology is the norm. Somewhere I can grow personally and lift those around me. If your team thrives on innovation and isn't afraid to explore new possibilities, I can't wait to build the future together.

Automation First

Everything that can be automated, should be

Team Growth

Empowering peers to grow alongside me

Security Minded

Every layer adds satisfying complexity

Skills

Networking & Security

  • VLAN Segmentation
  • Firewall Rule Crafting
  • Ubiquiti UniFi (UDM Pro SE)
  • WireGuard & PiVPN
  • VPN Configuration & Troubleshooting

Virtualization & Containerization

  • Proxmox VE (KVM/QEMU, LXC)
  • VMware
  • vSphere
  • Docker & Docker Compose
  • Kubernetes (Minikube, Helm)
  • Container Orchestration
  • Portainer Stack Management

Monitoring & Observability

  • UniFi Poller / Prometheus Exporter
  • InfluxDB Time-Series Databases
  • Grafana Dashboarding
  • Log Aggregation (ELK Stack, Splunk Basics)
  • Custom Metrics & Alerting

DevOps, CI/CD & IaC

  • Bash & Shell Scripting
  • Terraform Infrastructure as Code
  • Git, GitHub & GitHub Actions
  • YAML Configuration Management

Programming & Automation

  • Python Basics
  • JavaScript (ES6+, DOM API, React)
  • HTML5 & CSS3 (Flexbox/Grid, Responsive Design)
  • SQL & ORM (SQLite, SQLAlchemy)
  • API Integration & JSON

Cloud & Platform Skills

  • Azure Administrator
  • DDNS / Dynamic DNS Configuration
  • Container Hosting on Cloud Platforms

Collaboration & Workflow

  • Git Branching & Pull Requests
  • GitHub Issues & Wiki Documentation
  • Markdown Reporting & SOP Creation
  • Agile / Iterative Development Practices

Key Competencies

  • Infrastructure Documentation & SOP Writing
  • Rapid Prototyping & Fail-Fast Debugging
  • Cross-Functional "Dev+Ops" Mindset
  • Continuous Upskilling & Experimentation

System Administration & Infrastructure

  • Windows Server 2016/2019/2022 Administration
  • Active Directory (AD) & Group Policy (GPO)
  • PowerShell Scripting & Automation
  • Microsoft Exchange & Office 365
  • WSUS & Patch Management
  • DNS/DHCP Configuration
  • Hyper-V & VMware vSphere
  • Backup & Disaster Recovery
  • SCCM & System Deployment
  • Network Troubleshooting & TCP/IP
  • ITIL Framework & Incident Response

Projects

Advanced Home Network Segmentation & Monitoring Lab

Designed and implemented a robust, multi-VLAN home network leveraging Ubiquiti UniFi, Proxmox virtualization, and modern monitoring stacks. Features 5 VLANs with strict segmentation, WireGuard VPN, and real-time Grafana dashboards for network visibility.

UniFi Proxmox WireGuard Grafana
Click to expand for full details...

Overview

Designed and implemented a robust, multi-VLAN home network leveraging Ubiquiti UniFi, Proxmox virtualization, Docker containers, and modern monitoring stacks. This end-to-end project showcases advanced skills in network design, security enforcement, VPN connectivity, and real-time performance visualization.

Hardware & Infrastructure

UDM Pro SE running UniFi OS 4.1.22 as the primary gateway and controller. Proxmox VE server hosting Grafana dashboard VM, InfluxDB time-series database VM, UniFi Poller service, and Prometheus PVE exporter/Telegraf agent. Raspberry Pi with Docker/Portainer for lightweight services and secondary monitoring nodes. Cisco Catalyst 2960X (planned) for L3 switching offload.

Network Topology & Segmentation

Implemented strict VLAN segmentation to isolate traffic and enhance security across 5 VLANs: Servers (VLAN 1), Personal (VLAN 10), Guest (VLAN 20), IoT (VLAN 30), and Management (VLAN 72). Configured firewall rules where VLAN 10 ⇄ VLAN 1 traffic is allowed while others are blocked, with VLANs 20, 30, 72 restricted to internet-only access.

VPN & Remote Access

Primary PiVPN server at home and secondary PiVPN at remote location for connectivity troubleshooting. WireGuard implemented on UDM Pro SE with AllowedIPs = 192.168.0.0/16, 172.27.27.0/24. Dynamic DDNS using homelovelu.duckdns.org for secure remote client access with granular LAN/VLAN routing controls.

Monitoring & Logging

UniFi Poller and Prometheus PVE exporter collect network and host metrics every 30s, storing time-series data in InfluxDB. Grafana dashboards visualize VLAN throughput & utilization, VPN client connections & data usage, device health (CPU, memory, disk) on Proxmox, and rogue AP/anomaly alerts.

Technologies & Tools

Networking: Ubiquiti UniFi, VLANs, WireGuard, PiVPN, Cisco L3 switching
Virtualization: Proxmox VE, KVM/QEMU, LXC
Containerization: Docker, Portainer
Monitoring: UniFi Poller, Prometheus, InfluxDB, Grafana
Automation: Bash, YAML configurations, Terraform

Key Achievements

Achieved segmented network security with zero inter-VLAN leakage, real-time observability of network and host metrics across the lab, and demonstrated ability to integrate heterogeneous hardware and open-source software seamlessly. Developed CLI and rule-based tests for firewall enforcement and configured Proxmox Backup pruning policies with full restore SOPs.

TryHackMe Cybersecurity Labs

Completed 20+ hands-on cybersecurity labs covering threat detection, network enumeration, privilege escalation, and SOC analysis. Built custom detection rules, automated patch scripts, and gained experience with both offensive and defensive security techniques.

Nmap Metasploit ELK Stack BloodHound
Click to expand for full details...

Overview & Motivation

Diving into TryHackMe's labs was my way of stepping out of the theory and into real-world cyber battlegrounds. I wanted to feel the thrill of tracking down a hidden threat, understand what keeps SOC analysts up at night, and build muscle memory for spotting weaknesses under pressure. Plus, completing these labs gave me confidence that I can move from clicking tutorials to truly thinking like both attacker and defender.

Lab Modules & What I Learned

Threat Detection & SIEM Workflow: I rolled up my sleeves in a simulated SOC dashboard, writing detection rules for everything from brute-force logins to sneaky PowerShell backdoors. Tuning the alerts taught me patience—too many false positives bury the real threats, so I learned to balance sensitivity with accuracy.

Network Enumeration: With Nmap, Netcat, and Wireshark as my digital scouts, I mapped out network layouts like a treasure hunter marking Xs on a map. Documenting open ports and services gave me a hacker's-eye view of attack surfaces—and the mindset to document and share findings clearly, just like in a real incident report.

Privilege Escalation: Exploiting small misconfigurations felt like unlocking secret doors. Whether it was abusing sudo rights on Linux or exploiting leftover services on Windows, I practiced safe, repeatable techniques—then wrote scripts to patch them, sharpening my ability to flip between offense and defense seamlessly.

SOC-Level Analysis & Incident Triage: Jumping into a mock ticketing system, I became both investigator and communicator: triaging alerts, writing concise incident reports, and collaborating with a virtual blue team. It drove home how technical skills must pair with clear communication to actually resolve threats.

Adversary Simulation & Red Teaming: Building phishing lures, deploying reverse shells, and establishing persistence gave me respect for an attacker's creativity. Then switching hats to hunt my own implants helped me understand detection blind spots—fueling ideas for more robust defensive playbooks.

Why It Matters & How It Helps

1. Bridges Theory to Practice: Reading about CVEs is one thing—exploiting them in a controlled lab cements the concepts.
2. Builds Real-World Habits: Regularly toggling between attack and defense hones a security mindset—I now instinctively look for misconfigurations in my own network projects.
3. Enhances Collaboration Skills: Simulated SOC exercises reinforce that incident response is a team sport; clear, prompt communication is as vital as technical know-how.
4. Prepares for Live Environments: Hands-on labs accelerate readiness for on-the-job challenges, from writing Sigma rules in Splunk to running post-exploitation tools without hesitation.

Tools & Techniques

Reconnaissance: Nmap, Netcat, Wireshark
Exploitation: Metasploit, custom PowerShell scripts, Linux one-liners
Post-Exploitation: LinPEAS, WinPEAS, BloodHound
Detection & Logging: ELK stack, Splunk basics, Sigma rules
Reporting & Teamwork: Markdown lab reports, TheHive ticket simulations

Highlights & Impact

15+ Customized Detection Rules: Reduced noise in lab alerts and focused on true indicators of compromise.
20+ Comprehensive Labs Completed: Achieved a 100% success rate, building confidence to tackle live pen tests.
Automated Patch Scripts: Saved an estimated 50% of remediation time by scripting fixes for common vulnerabilities.

Skills Gained

Thinking like both attacker and defender, rapid threat hunting and precise log analysis, incident communication under time constraints, and scripting for automation and remediation.

KodeKloud DevOps Training (In Progress)

Hands-on DevOps curriculum bridging scripting skills to full CI/CD pipelines. Completed Linux fundamentals and Docker modules, currently working on Kubernetes and Jenkins with Terraform upcoming. Building real projects step by step.

Docker Kubernetes Jenkins Terraform
Click to expand for full details...

Overview & Motivation

I've embarked on KodeKloud's hands-on DevOps curriculum to bridge the gap between foundational scripting skills and full-scale CI/CD pipelines. My goal is to internalize best practices for automation, infrastructure-as-code, and container orchestration by building real projects step by step.

Modules Completed & Ongoing

Linux Fundamentals & Shell Scripting (Completed): Wrote bash scripts for file manipulation, user management, and service health checks, reinforcing core automation techniques.

Docker & Container Workflows (Completed): Built and optimized Docker images, managed containers via Docker CLI and Compose, and explored multi-stage builds for lean images.

Kubernetes Essentials (In Progress): Deploying pods, Services, and Deployments on a minikube cluster. Currently automating rollouts and rollbacks using kubectl and YAML manifests.

CI/CD with Jenkins (In Progress): Configuring Jenkins pipelines as code, integrating GitHub webhooks, and practicing blue–green deployments. Next up: adding rollback logic and testing stages.

Infrastructure-as-Code with Terraform (Upcoming): Planning to define AWS resources (VPC, EC2, S3) declaratively and provision them via Terraform modules.

Tools & Technologies

Linux & Bash: Core scripting for automation and orchestration
Docker & Docker Compose: Container lifecycle management and multi-container application setup
Kubernetes (Minikube): Orchestrating container deployments with YAML manifests and Helm charts
Jenkins: Building, testing, and deploying applications through scripted pipelines
Git & GitHub: Version control, branches, and pull request workflows
Terraform: Declarative provisioning of cloud infrastructure (upcoming)

Current Status & Next Steps

1. Kubernetes: Finalize helm chart creation and resource autoscaling tests
2. Jenkins: Implement robust rollback strategies and integrate automated test suites
3. Terraform: Kick off AWS IaC labs, parameterizing modules and state management

Excited to refine these skills and apply them to real-world infra projects—feel free to ask for live demos or code walkthroughs!

Curiosity-Driven Development Explorer (In Progress)

Personal coding playground for building interactive web widgets, responsive designs, and full-stack applications. From to-do lists to Flask APIs with databases, exploring both frontend and backend development driven by pure curiosity.

JavaScript Flask React SQLite
Click to expand for full details...

Why I Play in Code

I still remember the thrill of building my first to‑do list—seeing a blank page come alive with checkboxes and tasks was like magic. This project is my playground, driven by pure curiosity: "What happens if I tweak this style?" or "How can I make this widget smarter?"

What I Build and Why

Interactive Web Widgets: I whip up tiny apps—think a to‑do list that remembers my items or a weather widget pulling live data—using vanilla JavaScript and the DOM API. Every error is a puzzle, and solving it sharpens my debugging detective skills.

Responsive Design Trials: I take snippets of elegant landing pages and bend them to mobile, tablet, and desktop using CSS Grid and Flexbox. These mini challenges teach me how to make layouts that feel intuitive on any device.

API Playground: I spin up a simple Flask API for managing notes—CRUD routes, JSON serialization, modular structure. There's something deeply satisfying about seeing front‑end forms whisper to a back‑end service and get a reply.

Database Experiments: Using SQLite and SQLAlchemy, I store and fetch user data, write migrations, and even dive into raw SQL queries. It's a hands‑on way to learn how data truly lives inside an application.

Framework Explorations: I kicked off a React mini‑app to compare component‑driven magic against plain JavaScript. Implementing hooks, routing, and reusable components gives me a feel for how frameworks speed up—and sometimes slow down—development.

What I Get Out Of It

Hands‑On Fundamentals: Tiny projects force me to wrestle with the basics, so higher‑level tools make sense later.
Fail Fast, Learn Faster: When something breaks, the rush to fix it cooks lessons into my muscle memory.
Glue Between Dev & Ops: Juggling front‑end quirks and back‑end plumbing makes me a more versatile engineer.
Never Stop Growing: Each experiment is a stepping stone—stagnation isn't an option.

Tools of the Trade

Frontend: HTML5, CSS3 (Flexbox & Grid), JavaScript (ES6+)
Backend: Python, Flask, SQLite, SQLAlchemy
Workflow: Git, GitHub, VS Code, Postman

What's Next

1. Dockerize the Notes API: Host it on a free tier so I can demo it from anywhere
2. Blog the Journey: Share my wins—and my faceplants—because we all learn faster when we learn together

This sandbox keeps my curiosity burning. Always experimenting, always upgrading, and always happy to share the code or walk you through my process!

Certifications

Each certification here tells a story. Security+ because I wanted to understand threats from the ground up. Azure because cloud skills aren't optional anymore. The ones in progress? Because I'm not done learning, and honestly, I probably never will be.

CompTIA Security+

Valid through 2027

I chose Security+ as my first step into cybersecurity because it gave me a solid foundation — not just in theory, but in practical security principles. It helped me understand how real-world threats work, and how to approach defense with both logic and structure. This cert laid the groundwork for every security decision I make now.

Microsoft Certified: Azure Fundamentals (AZ-900)

I went for this cert to truly understand the cloud — not just buzzwords, but how Azure operates under the hood. It helped me build a mental map of services, pricing models, SLAs, and resource management. It was my launchpad into the Azure ecosystem and cloud thinking in general.

Microsoft Certified: Azure Administrator Associate (In Progress – Expected 2025)

This cert is part of my transition from traditional sysadmin work to modern cloud administration. I'm learning how to manage identities, resources, storage, and networks in Azure — with real-world labs and hands-on practice. It's not just to have a cert — I want to be ready for any hybrid or cloud-native environment.

Microsoft Certified: Azure AI Fundamentals (AI-900) (In Progress)

I took this to understand how AI is being used in real businesses. It gave me a clean overview of machine learning models, computer vision, and natural language tools — all running on Azure. It's not about becoming a data scientist, but about being fluent enough to integrate and support AI-powered solutions in the infrastructure I manage.

Microsoft Certified: Power Platform Fundamentals (PL-900) (In Progress)

I'm working on this because automation is everything right now. With tools like Power Automate and Power Apps, I'm learning how to reduce human error, move faster, and build tools that help teams work smarter — not harder. It's about creating solutions that scale, without writing a ton of code.

Experience

Windows System Administrator Titan America – Miami, FL | Oct 2023 – Present

At Titan America, I stepped in as the go-to Windows System Administrator, modernizing our identity and device management stack while collaborating directly with Executive Board members in a high-pressure environment—where solutions often needed to be delivered in minutes. I led the migration of 350+ user accounts into Azure Active Directory and onboarded them with Microsoft Intune, cutting manual provisioning by 40% and boosting patch compliance by 30%. Using PowerShell and custom scripts, I automated routine tasks—like user onboarding and license assignment—so support hand-offs ran 50% smoother. To fortify our network perimeter, I introduced a WireGuard VPN alongside VLAN segmentation on our UniFi UDM Pro SE, which reduced unauthorized access attempts by half. Finally, I architected real-time monitoring dashboards with InfluxDB and Grafana, slashing mean time to resolution for critical alerts by 45%. Throughout, I maintained a 98% SLA compliance rate and achieved 85% first-contact resolution, expertly triaging a mix of Tier 1 (70%), Tier 2 (25%), and escalated Tier 3 (5%) tickets to keep business operations humming.

Jr. System Administrator Innovative IT Solutions, Inc. – Miami, FL | Mar 2021 – Oct 2023

In this role, I owned the day-to-day health of our Windows server and workstation fleet. I managed Active Directory and crafted Group Policy objects to enforce security baselines for 200+ endpoints with 99% accuracy. By deploying Windows Deployment Services and building golden images, I slashed new PC setup times from two hours down to just 30 minutes—empowering rapid team growth without backlogs. I also configured VPN clients and fine-tuned firewall rules to ensure secure remote access, proactively applied patches to maintain 95% system uptime, and drove a 30% reduction in escalations. My collaboration on documented runbooks and standard operating procedures improved intern and tier-1 response times by 25%, fostering a culture of shared knowledge.

IT Support Specialist Tech Solutions Inc. – Orlando, FL | Dec 2019 – Feb 2021

As the first point of contact for 300+ endpoints, I resolved an average of 25 help-desk tickets per day (300+ per month), achieving an 85% first-contact resolution rate and reducing Tier 2 escalations by 30%. My day-to-day covered hardware installations, software troubleshooting, and network printer setups, always delivering friendly, jargon-free guidance so users felt supported, not lectured. I co-built an internal knowledge base to capture common fixes, which cut resolution times by 20% and freed up the team for higher-impact projects. I also managed vendor relationships to replace failing equipment quickly, ensuring business continuity and keeping downtime under 2%.