- company: AxiomQ
role: DevOps Engineer
period: January 2026 – March 2026
location: Novi Sad, Serbia
stack: Node.js, JavaScript, AWS EKS, Terraform, Terragrunt, GitLab CI, Amplify, Nx
responsibilities:
- company: Jaggaer
- Took ownership of the full deployment lifecycle for a Node.js monorepo platform — Nx orchestrated frontend and backend apps within a single repository, keeping builds consistent and cross-service dependency management clean.
- Designed and maintained GitLab CI pipelines end-to-end: React frontend shipped automatically to AWS Amplify on merge, while backend Node.js microservices were containerised, pushed to ECR, and rolled out to EKS — fully automated with no manual steps.
- Managed all cloud infrastructure with Terraform and Terragrunt, separating reusable module definitions from environment configs and keeping Kubernetes manifests in a dedicated repo. Every change was code-reviewed, versioned, and easy to roll back.
- Day-to-day tooling: k9s for live cluster inspection, Colima as a lightweight Docker Desktop alternative on macOS, CloudWatch and S3 for observability and artefact storage, Cursor AI inside VS Code to accelerate scripting and config work.
role: DevOps & MLOps Engineer
period: January 2024 – October 2025
location: Belgrade, Serbia
stack: Java, Python, AWS ECS Fargate, EKS, Jenkins, SageMaker, Bedrock, Splunk
responsibilities:
- company: HTEC
- Maintained CI/CD workflows with Jenkins across multiple production and non-production AWS EKS clusters, managing the full build, test, and deployment pipeline for Java microservices using Helm charts and Kubernetes manifests.
- Expanded into MLOps by deploying Python-based ML pipelines and model endpoints using AWS SageMaker AI Studio. Integrated AWS Bedrock with Anthropic Claude Sonnet as the LLM backbone for an internal AI feature — handling both the infrastructure side and pipeline wiring between services.
- Provisioned ECS Fargate clusters using Terraform and shell scripts; built and pushed Docker images to ECR through Jenkins. Managed all secrets centrally via AWS Secrets Manager.
- Daily tooling: Splunk for log analysis and alerting, SonarQube for code quality gates, Nexus as the artefact repository, and a broad set of AWS services: DynamoDB, SQS, IAM, ALB, EC2, S3, and EventBridge Scheduler.
role: DevOps Engineer
period: September 2022 – July 2023
location: Belgrade, Serbia
stack: Java, ReactJS, Azure DevOps, Docker, AWS EKS, Helm, Spinnaker, Nginx
projects:
- company: Noubis
- name: Java / ReactJS web application
notes:
- name: Java / ReactJS web application
- Built and maintained the CI/CD pipeline for a Java/React application using Azure DevOps — local development ran on docker-compose, while cloud deployments were fully automated through the pipeline, keeping releases consistent and auditable.
notes:
- Supported Kubernetes workloads on AWS EKS, maintaining Helm charts and raw manifests for reliable deployments. Used Spinnaker for advanced pipeline orchestration, Nginx as the ingress controller, and Box/Shield for secure secrets management.
role: DevOps Engineer
period: September 2020 – October 2022
location: Novi Sad, Serbia
stack: Python, Django, Node.js, React Native, AWS, Terraform, SaltStack, GitHub Actions
projects:
- company: Symlink
- name: Python / Django web application
notes:
- name: Node.js / React Native mobile application
- Led a monitoring migration from NewRelic to Splunk — deployed agents across all environments, defined metrics, detectors and distributed traces, and built dashboards for production and dev. Went from limited visibility to a proper observability setup in a single sprint.
- Extended SaltStack configuration management so every new server provisioned automatically included the full Splunk configuration, eliminating manual post-setup steps. Also identified and fixed several gaps in existing Terraform infrastructure definitions.
notes:
- name: Node.js web application
- Set up a fully automated deployment pipeline with GitHub Actions for a Node.js backend: build Docker image, push to ECR, update the ECS task definition — all triggered on every release branch merge. Infrastructure provisioned via CloudFormation. Stack included RDS MySQL, Nginx, Let's Encrypt, AWS Shield, and CloudWatch.
notes:
- name: Node.js / ReactJS web application
- Deployed the backend to AWS Elastic Beanstalk using CodePipeline and CodeBuild with a buildspec.yaml — build artefacts were pushed to S3, and static frontend assets were served and updated through the same pipeline, keeping the release process fully hands-off.
notes:
- Built GitHub Actions workflows to containerise and deploy a Node.js/React application to Ubuntu EC2 instances. CloudFormation covered all infrastructure provisioning; Nginx and CertBot handled HTTPS termination, and Redis was used for session caching.
role: DevOps Engineer
period: September 2018 – August 2020
location: Subotica, Serbia
stack: Node.js, React Native, .NET C#, AWS, GitHub Actions, Ansible, GitLab CI, CloudFormation
projects:
- name: Node.js / ReactJS serverless web application
notes:
- name: Node.js / React Native mobile application
- Designed the full AWS infrastructure from scratch using CloudFormation: VPC with subnets and route tables, Application Load Balancer, ECS Fargate, RDS Postgres, API Gateway, Lambda functions, and ACM for TLS certificates. Migrated CI/CD from AWS CodePipeline to GitHub Actions, and contributed to sprint regression and E2E testing.
notes:
- name: .NET C# web application
- Deployed Node.js backend and mobile app services to AWS — one environment ran on EC2 via docker-compose with GitHub Actions updating on every PR; a second service ran on ECS with GitHub Actions building the Docker image, pushing to ECR, and updating the task definition automatically. Both used CloudFormation, Nginx and Let's Encrypt for HTTPS, and RDS MySQL. The ECS setup also included AWS Shield and CloudWatch.
notes:
- Built and deployed containerised .NET C# services to AWS EC2 using GitLab CI. Configuration management was handled with Ansible playbooks — covering all required packages, dependencies, and service setup on each node. Managed SQL Server infrastructure running directly on EC2 instances.