An erie morning! Prince's Street Park in Edinburgh at Christmas Malamutes at the Beach Main Server Room - Fibre Stealth Handler and Reverse Shell written in C Screw on a Table Graphics Card PCB Breadboard Spin me a Yarn (Battersea Power Station) Reflecting Light on the Water

ZEPHER ASHE

MORE ABOUT ME

About Me

Hello! I'm Zepher — a Systems Analyst turned DevSecOps / Platform Engineer in the making. I bring years of experience in infrastructure, disaster recovery, and security, and I’m now focused on secure automation, cloud-native platforms, and resilience engineering.

Cloud & Infrastructure as Code

AWS, Terraform, Ansible, CI/CD pipelines, Kubernetes, Docker

Core Infrastructure
  • Linux (AlmaLinux, RHEL, Debian, Ubuntu)
  • Windows Server & Active Directory
  • Virtualisation: Proxmox + Ceph, VMware
  • SAN storage (Dell ME series)
  • Networking: VLANs, L2/L3 switching, pfSense, SDN
Security & Resilience

MFA, LDAP/SSO, PKI, Backup & Disaster Recovery (3-2-1), Incident Response, Secure by Default

Programming & Scripting

Bash, PowerShell, Python, PHP/MySQL, HTML/CSS/JS

I hold a BSc (Hons) in Computing and IT from the Open University. Alongside my career, I’ve built a wide range of personal and professional projects — from cloud-native homelab deployments to security-first infrastructure — many of which are shared on GitHub and LinkedIn.

TECHNICAL SKILLS

My proficiency in each skill (drag to scroll)

Lowest possible value: 10% - Used for short period of time such as with a class project.

Highest possible value: 100% - Very extensive experience with this particular skill.


TIMELINE

  • September 2016 - September 2020

    Open University

    Studied Computing & IT

  • May 2018 - December 2019

    Signworks UK

    IT Specialist

  • Janurary 2021

    Graduated University

    BSc (Hons) Computing & IT

  • Janurary 2020 - August 2023

    Signworks UK

    Systems Architect

  • August 2023 - Present

    St George's University of London

    Systems Analyst/Administrator

Projects and Relevant Experience

Here are some examples of projects I have produced.

Infrastructure

Designing and implementing robust infrastructure solutions with Proxmox VE and Ceph for hyperconverged functionalities.

Proxmox VE Ceph Cluster

Hyperconverged Proxmox VE cluster with Ceph for distributed storage, HA, and full-mesh networking. Designed for homelab-scale production-like workloads.

Skills: Proxmox, Ceph, HA, SDN, Virtualisation

SAN Migration

Led a full-scale SAN data migration from legacy Dell EMC storage with minimal downtime, using LVM, rsync, and multipath for precision cutovers. Focus on resilience and DR.

Skills: SAN, EMC, Linux, Disaster Recovery

FortiAuth

A hardened, HA LDAP server for privileged IT users with MFA (Google Authenticator), centralised SSH key management, encrypted NFS home directories, and breakglass protocols.

Skills: Linux, LDAP, MFA, SSH, NFS, PAM

Cloud & DevOps

Demonstrating expertise in automating, optimising, and securing cloud and DevOps workflows to enhance operational efficiency and reliability.

Automated Cloud Infrastructure

Design and implementation of an automated cloud infrastructure using Terraform, AWS and GitHub Actions following best practices.

View Project on GitHub

Skills: Terraform, AWS, GitHub Actions, CI/CD

DevSecOps Self-Study Syllabus

A year-long structured roadmap to transition from SysAdmin to DevSecOps — covering Docker, Kubernetes, Terraform, Ansible, AWS, CI/CD, and SAST/DAST with security-first practices.

Skills: Terraform, Ansible, AWS, CI/CD, Kubernetes


Web Design & Other

Ever since I challenged myself to create a social media website similar to Facebook as a way of learning HTML, CSS, JavaScript, PHP, MySQL, etc... I have been intrigued by web technologies from a creativity and hacking perspective. Here are some of the projects I worked on both in and outside of my studies.

Valhalla2

Valhalla2 is a full scale social media website! Not only does it contain all the main functionality you get with the likes of Facebook or Twitter, but it also respects privacy!

Hardened using PBKDF2 and each user having a unique salt.

Twitter Clone

TwitterClone is clone of the social media website Twitter written with Node.JS, MongoDB and Socket.IO.

Features • Tweets • Likes, comments, and retweets • Profile pages • Following and followers • Instant Messaging in real-time • Group chat support* • Profile pictures • Cover photos

Doogle

Doogle is a search engine and web crawler which can search indexed websites and image, and then using keywords be searched later.

MonoBlockchain

MonoBlockchain discover the engineering ideas behind blockchain technology and build a blockchain-based cryptocurrency network.

Incidents and Disaster Recovery

Every outage tells a story – here are mine

In IT Infrastructure and DevSecOps, incidents are inevitable — how you respond is what counts.

These are real-world examples of the challenges I’ve faced, the lessons I’ve learned, and how they’ve shaped my approach to secure, resilient systems.

Dell Watchdog + Package Upgrade = Filesystem Corruption

During a routine yum upgrade, Dell’s watchdog timer forcibly rebooted the system mid-transaction. Critical system packages (e.g., networkmanager, yum) were left in a corrupted state — binaries reduced to 0 bytes, services masked, and the filesystem unstable.

Recovery required full out-of-band access, manual filesystem repair, and package reconstruction before the host could be stabilised. From this, we adopted stricter upgrade procedures, kernel parameter hardening, and enforced staged patching with rollback checkpoints.

Lesson: Even “routine” OS patching can leave a system unrecoverable if interrupted. A robust patching strategy must include not only staging and validation, but also clear rollback and full rebuild procedures to restore service if critical packages or filesystems are destroyed.

Fire Suppression Breaks the Data Centre

A gas-based fire suppression event unexpectedly triggered a site-wide I/O freeze. SAN controllers locked up, VMware hosts stalled on storage, and critical services cascaded into failure. Infrastructure components such as directory services, DNS/DHCP, and Wi-Fi went offline, alongside business-critical applications including finance, procurement, HR, and wider portfolio platforms. Several systems were unrecoverable despite restoration attempts.

I led the response: isolating workloads, coordinating with vendors, and performing emergency SAN migrations, filesystem repairs, and data validation. Recovery was triaged by business impact — restoring identity and authentication first, HR systems and then finance, followed by the wider portfolio of systems. Where recovery was not possible, I documented gaps and initiated planning for stronger backup and failover coverage.

Lesson: Disaster recovery must account for environmental chain reactions that extend beyond IT hardware. This event reinforced the need for SAN replication, rigorous 3-2-1 backup compliance, verified restore testing, and realistic failover strategies that assume the complete loss of core infrastructure.

Like what you see?

I'd love to hear from you!


GPG: Secure Communication

© safesploit.com . All rights reserved.