
Andrew Pearce engineered and maintained the ministryofjustice/opg-modernising-lpa platform, delivering robust infrastructure, security, and automation solutions over twelve months. He implemented infrastructure-as-code with Terraform, automated CI/CD pipelines using GitHub Actions, and enhanced observability and security through AWS services such as CloudWatch, KMS, and IAM. Andrew’s work included building event-driven architectures, integrating API security, and standardizing resource tagging and encryption to support compliance and operational reliability. He addressed complex deployment, access control, and monitoring challenges using Python and Go, demonstrating depth in backend development and DevOps. His contributions resulted in scalable, maintainable systems with reduced operational risk.

October 2025 performance highlights for ministryofjustice repositories. Delivered security-focused infrastructure improvements, strengthened CI/CD reliability, and streamlined deployment operations. Implemented secure AWS credential handling, enhanced test gating, and simplified alerting while setting the stage for easier major-version upgrades and scalable parameter management.
October 2025 performance highlights for ministryofjustice repositories. Delivered security-focused infrastructure improvements, strengthened CI/CD reliability, and streamlined deployment operations. Implemented secure AWS credential handling, enhanced test gating, and simplified alerting while setting the stage for easier major-version upgrades and scalable parameter management.
Monthly summary for 2025-09 focusing on features delivered, bugs fixed, and overall impact across four repositories: ministryofjustice/opg-modernising-lpa, ministryofjustice/opg-lpa, ministryofjustice/opg-data-lpa, and ministryofjustice/opg-data-lpa-codes. The month delivered substantial automation, security, and platform improvements supporting safer, faster deployments and improved governance.
Monthly summary for 2025-09 focusing on features delivered, bugs fixed, and overall impact across four repositories: ministryofjustice/opg-modernising-lpa, ministryofjustice/opg-lpa, ministryofjustice/opg-data-lpa, and ministryofjustice/opg-data-lpa-codes. The month delivered substantial automation, security, and platform improvements supporting safer, faster deployments and improved governance.
August 2025 performance summary for ministryofjustice/opg-modernising-lpa. Delivered core features to enhance reliability, security, and maintainability, accelerated release cadence through CI automation, strengthened observability, and ensured region/provider compatibility. Resulted in faster incident detection, reduced risk of silent failures, and clearer governance for LPA-store integrations and AWS runtime images.
August 2025 performance summary for ministryofjustice/opg-modernising-lpa. Delivered core features to enhance reliability, security, and maintainability, accelerated release cadence through CI automation, strengthened observability, and ensured region/provider compatibility. Resulted in faster incident detection, reduced risk of silent failures, and clearer governance for LPA-store integrations and AWS runtime images.
July 2025 monthly summary for ministryofjustice/opg-modernising-lpa: Key features delivered include OpenSearch logs encryption with KMS integration, enhanced data-at-rest protection for Athena with S3 versioning and CMK encryption, cross-service KMS decrypt permissions for data-access IAM, a centralized CloudWatch security monitoring dashboard, Route 53 Resolver logging with retention, S3 batch job replication scheduler optimization, removal of ClamAV firewall rules, and Terraform cleanup for improved code quality and tfsec organization. These changes strengthen data security, access control, observability, and operational efficiency across AWS services.
July 2025 monthly summary for ministryofjustice/opg-modernising-lpa: Key features delivered include OpenSearch logs encryption with KMS integration, enhanced data-at-rest protection for Athena with S3 versioning and CMK encryption, cross-service KMS decrypt permissions for data-access IAM, a centralized CloudWatch security monitoring dashboard, Route 53 Resolver logging with retention, S3 batch job replication scheduler optimization, removal of ClamAV firewall rules, and Terraform cleanup for improved code quality and tfsec organization. These changes strengthen data security, access control, observability, and operational efficiency across AWS services.
June 2025 performance summary focusing on business value, reliability, and governance across three repositories. Key outcomes include strengthened security controls, automated and observable release processes, and scalable infrastructure improvements that reduce risk and accelerate delivery while improving user-facing localization and health-validated deployments.
June 2025 performance summary focusing on business value, reliability, and governance across three repositories. Key outcomes include strengthened security controls, automated and observable release processes, and scalable infrastructure improvements that reduce risk and accelerate delivery while improving user-facing localization and health-validated deployments.
May 2025 performance summary: Delivered major business-value features and stability improvements across two repositories. In ministryofjustice/opg-modernising-lpa, I implemented standardized service-area tagging across Terraform environments to improve resource organization, enable accurate cost allocation, and strengthen governance. I also enabled and standardized CloudWatch Logs encryption using a KMS alias, ensuring robust data-at-rest protection and proper key management references. Additionally, OpenTelemetry Collector versions were upgraded and documented across runbooks and tooling to maintain current telemetry capabilities, and tooling, CI, and security configurations were refreshed to enhance security posture and pipeline reliability. In ministryofjustice/opg-data-lpa-store, I fixed CI/CD AWS credentials handling in the GitHub Actions workflow to restore proper authentication for Terraform operations and OPG metrics updates, addressing two issues related to aws-secret-access-key formatting and AWS access key ID casing. Overall, these changes reduce risk, improve security, governance, observability, and operational reliability, and demonstrate strong infra-as-code, security hygiene, and telemetry capability.
May 2025 performance summary: Delivered major business-value features and stability improvements across two repositories. In ministryofjustice/opg-modernising-lpa, I implemented standardized service-area tagging across Terraform environments to improve resource organization, enable accurate cost allocation, and strengthen governance. I also enabled and standardized CloudWatch Logs encryption using a KMS alias, ensuring robust data-at-rest protection and proper key management references. Additionally, OpenTelemetry Collector versions were upgraded and documented across runbooks and tooling to maintain current telemetry capabilities, and tooling, CI, and security configurations were refreshed to enhance security posture and pipeline reliability. In ministryofjustice/opg-data-lpa-store, I fixed CI/CD AWS credentials handling in the GitHub Actions workflow to restore proper authentication for Terraform operations and OPG metrics updates, addressing two issues related to aws-secret-access-key formatting and AWS access key ID casing. Overall, these changes reduce risk, improve security, governance, observability, and operational reliability, and demonstrate strong infra-as-code, security hygiene, and telemetry capability.
April 2025 – Strengthened security, reliability, and business value across the LPA platform. Delivered core permission hygiene, expanded observability and metrics coverage, modernized event schemas and routing to the OPG metrics destination, and improved CI/CD stability with dependency lockfiles and Terraform hygiene. Also removed deprecated components and implemented environment-aware routing to support regional API keys and future endpoints. Demonstrated strong IaC discipline, security hygiene, and data-driven observability to reduce risk and support faster delivery.
April 2025 – Strengthened security, reliability, and business value across the LPA platform. Delivered core permission hygiene, expanded observability and metrics coverage, modernized event schemas and routing to the OPG metrics destination, and improved CI/CD stability with dependency lockfiles and Terraform hygiene. Also removed deprecated components and implemented environment-aware routing to support regional API keys and future endpoints. Demonstrated strong IaC discipline, security hygiene, and data-driven observability to reduce risk and support faster delivery.
March 2025: Delivered reliability, security, and observability improvements across ministryofjustice/opg-modernising-lpa and ministryofjustice/opg-use-an-lpa. Key features delivered include CI/CD Workflow Cleanup and Maintenance reducing workflow complexity and potential failure points (commits include: remove egress checker lambda; fix runs-on; don't use workflow calls in dispatch; remove needs; remove conditions; skip ignore files for now; checkout for ignore files and workflow call actions; turn off vexd notices; use action directly), Image Vulnerability Reporting and Notifications enabling a vulnerability reporting pipeline with Slack notifications and ECR artifact pulls, and ECR Access and Image Scanning Roles updating to an ECR push role and image scan role for improved security. Additional improvements include Slack Message Payload Format Update and Output Rendering Enhancements for clearer, machine-friendly notifications, plus CI/Versioning and Summary URL workflow updates to adopt full semver and run summary URL outside of scans. Major bugs fixed include correct references for secrets and findings, PTL failure notification fixes, and security hardening such as unsetting AWS credentials before posting to Slack as part of the notification flow, as well as guards to process only non-empty input files. Overall impact: more reliable CI/CD, safer deployment pipelines, improved vulnerability visibility and response, and clearer stakeholder communications. Technologies/skills demonstrated: GitHub Actions optimization, AWS IAM/ECR integration, Slack integration and secure credential handling, semantic versioning, test-driven improvements, and proactive code cleanup and modernization.
March 2025: Delivered reliability, security, and observability improvements across ministryofjustice/opg-modernising-lpa and ministryofjustice/opg-use-an-lpa. Key features delivered include CI/CD Workflow Cleanup and Maintenance reducing workflow complexity and potential failure points (commits include: remove egress checker lambda; fix runs-on; don't use workflow calls in dispatch; remove needs; remove conditions; skip ignore files for now; checkout for ignore files and workflow call actions; turn off vexd notices; use action directly), Image Vulnerability Reporting and Notifications enabling a vulnerability reporting pipeline with Slack notifications and ECR artifact pulls, and ECR Access and Image Scanning Roles updating to an ECR push role and image scan role for improved security. Additional improvements include Slack Message Payload Format Update and Output Rendering Enhancements for clearer, machine-friendly notifications, plus CI/Versioning and Summary URL workflow updates to adopt full semver and run summary URL outside of scans. Major bugs fixed include correct references for secrets and findings, PTL failure notification fixes, and security hardening such as unsetting AWS credentials before posting to Slack as part of the notification flow, as well as guards to process only non-empty input files. Overall impact: more reliable CI/CD, safer deployment pipelines, improved vulnerability visibility and response, and clearer stakeholder communications. Technologies/skills demonstrated: GitHub Actions optimization, AWS IAM/ECR integration, Slack integration and secure credential handling, semantic versioning, test-driven improvements, and proactive code cleanup and modernization.
February 2025 focused on production readiness, security, analytics, and deployment stability across multiple repositories. Delivered infrastructure cleanup and resource refactor, enhanced data analytics capabilities with Athena, strengthened security and reliability (GuardDuty and DLQ alerts), expanded event-driven automation (bucket naming, notifications, and EventBridge), and improved deployment governance (Terraform versioning and CI/CD hygiene). The work reduced risk, improved data visibility, and enables safer, faster production changes.
February 2025 focused on production readiness, security, analytics, and deployment stability across multiple repositories. Delivered infrastructure cleanup and resource refactor, enhanced data analytics capabilities with Athena, strengthened security and reliability (GuardDuty and DLQ alerts), expanded event-driven automation (bucket naming, notifications, and EventBridge), and improved deployment governance (Terraform versioning and CI/CD hygiene). The work reduced risk, improved data visibility, and enables safer, faster production changes.
January 2025 — Delivered foundational upgrades, security enhancements, and release-engineering improvements that strengthen reliability, security posture, and maintainability of the OPG Modernising LPA platform. Key features include Terraform provider/module upgrades, new egress checker role, API/access improvements, and CI/CD/observability enhancements. Addressed critical build and path/override bugs to ensure more predictable releases and clearer configuration.
January 2025 — Delivered foundational upgrades, security enhancements, and release-engineering improvements that strengthen reliability, security posture, and maintainability of the OPG Modernising LPA platform. Key features include Terraform provider/module upgrades, new egress checker role, API/access improvements, and CI/CD/observability enhancements. Addressed critical build and path/override bugs to ensure more predictable releases and clearer configuration.
December 2024 delivered security hardening, network reliability, and deployment improvements for ministryofjustice/opg-modernising-lpa. The team focused on tightening access controls, upgrading networking capabilities, and improving Lambda-based tooling, while also enhancing tagging, encryption, and versioning to support safer, faster deployments.
December 2024 delivered security hardening, network reliability, and deployment improvements for ministryofjustice/opg-modernising-lpa. The team focused on tightening access controls, upgrading networking capabilities, and improving Lambda-based tooling, while also enhancing tagging, encryption, and versioning to support safer, faster deployments.
Month: 2024-11 summary for ministryofjustice/opg-modernising-lpa focusing on security hardening, governance, and reliability improvements, delivering end-to-end data protection, safer deployments, and clearer operational hygiene across the repository.
Month: 2024-11 summary for ministryofjustice/opg-modernising-lpa focusing on security hardening, governance, and reliability improvements, delivering end-to-end data protection, safer deployments, and clearer operational hygiene across the repository.
Overview of all repositories you've contributed to across your timeline