
Lev Gorbunov engineered robust cloud infrastructure and automation solutions across the ministryofjustice/operations-engineering and related repositories, focusing on cost governance, security, and operational resilience. He delivered features such as automated dormant user detection with Slack integration, centralized cost data exports, and secure S3 storage with KMS encryption and replication. Leveraging Python, Terraform, and AWS services, Lev modernized CI/CD pipelines, improved observability with EventBridge and CloudWatch, and enforced infrastructure as code best practices. His work demonstrated depth in backend development and DevOps, addressing real-world governance and compliance needs while streamlining deployment workflows and reducing maintenance overhead for critical cloud platforms.

May 2025 monthly summary for ministryofjustice/aws-root-account: Key deliverables include centralized cost data integration with the CDDO central account and DSIT partner rollout, along with an infrastructure reliability fix for Terraform module sources. These efforts provide centralized cost visibility, enable standardized reporting, and reduce deployment risk across central accounts.
May 2025 monthly summary for ministryofjustice/aws-root-account: Key deliverables include centralized cost data integration with the CDDO central account and DSIT partner rollout, along with an infrastructure reliability fix for Terraform module sources. These efforts provide centralized cost visibility, enable standardized reporting, and reduce deployment risk across central accounts.
April 2025 performance highlights: Delivered secure, environment-isolated S3 storage and automated data export capabilities across COAT workloads, with encryption, replication, versioning, and governance enhancements. Implementations spanned two repos and included new buckets, replication policies, data export configurations, and CI/CD access controls, resulting in improved data durability, cross-environment data flows, and faster, auditable deployments.
April 2025 performance highlights: Delivered secure, environment-isolated S3 storage and automated data export capabilities across COAT workloads, with encryption, replication, versioning, and governance enhancements. Implementations spanned two repos and included new buckets, replication policies, data export configurations, and CI/CD access controls, resulting in improved data durability, cross-environment data flows, and faster, auditable deployments.
March 2025: Delivered a set of cross-repo capabilities that enhance cost governance, security, and deployment reliability. Key features include the COAT Dashboard for cost/emissions/energy metrics and a templating filter by application, centralized Terraform state management with a dedicated S3 bucket and updated IAM for AWS secrets, and security hardening across environments (encryption, transport security, and clearer naming). Additional improvements include Terraform state with S3+DynamoDB for robust locking/versioning, and the establishment of a GPX output bucket with encrypted storage, alongside tightened S3 bucket access policies for moj-cur-reports-v2-hourly. These changes collectively improve cost transparency, operational resilience, and security governance, while enabling repeatable, auditable deployments across three repositories.
March 2025: Delivered a set of cross-repo capabilities that enhance cost governance, security, and deployment reliability. Key features include the COAT Dashboard for cost/emissions/energy metrics and a templating filter by application, centralized Terraform state management with a dedicated S3 bucket and updated IAM for AWS secrets, and security hardening across environments (encryption, transport security, and clearer naming). Additional improvements include Terraform state with S3+DynamoDB for robust locking/versioning, and the establishment of a GPX output bucket with encrypted storage, alongside tightened S3 bucket access policies for moj-cur-reports-v2-hourly. These changes collectively improve cost transparency, operational resilience, and security governance, while enabling repeatable, auditable deployments across three repositories.
February 2025 monthly highlights focusing on observability, modernization, and reliability across the Ministry of Justice platforms. Delivered streaming and observability capabilities, streamlined legacy pipelines, and hardened security posture while enabling scalable analytics and monitoring.
February 2025 monthly highlights focusing on observability, modernization, and reliability across the Ministry of Justice platforms. Delivered streaming and observability capabilities, streamlined legacy pipelines, and hardened security posture while enabling scalable analytics and monitoring.
January 2025: Delivered end-to-end automation for identifying dormant GitHub users within ministryofjustice/operations-engineering, including monthly scans, mapping usernames to emails, filtering active users, and flagging inactive committers. Implemented Slack-based alerts via a scheduled cron trigger with secure environment configuration (admin Slack token, AWS credentials), enabling timely governance notifications while cleaning up old experimental processes. Normalized case-insensitive user handling to improve accuracy and reduce false-positives.
January 2025: Delivered end-to-end automation for identifying dormant GitHub users within ministryofjustice/operations-engineering, including monthly scans, mapping usernames to emails, filtering active users, and flagging inactive committers. Implemented Slack-based alerts via a scheduled cron trigger with secure environment configuration (admin Slack token, AWS credentials), enabling timely governance notifications while cleaning up old experimental processes. Normalized case-insensitive user handling to improve accuracy and reduce false-positives.
December 2024 monthly summary: Delivered cleanup of legacy infrastructure and DNS configurations to reduce maintenance burden and risk while enabling future architecture changes. In ministryofjustice/operations-engineering, deprecated obsolete GitHub repos, Terraform configurations, and automated reporting tooling, with commits archiving unit test generator/devcontainer, archiving maintenance pages, removing Terraform from standards repo, removing standards job, and removing unit tests. In ministryofjustice/dns, performed DNS cleanup by removing delegation for civil eligibility calculator and deleting nomisqc records in the justice.gov.uk hosted zone. Overall, reduced operational overhead, minimized exposure to deprecated resources, improved security/compliance posture, and demonstrated strong IaC discipline and cross-repo collaboration.
December 2024 monthly summary: Delivered cleanup of legacy infrastructure and DNS configurations to reduce maintenance burden and risk while enabling future architecture changes. In ministryofjustice/operations-engineering, deprecated obsolete GitHub repos, Terraform configurations, and automated reporting tooling, with commits archiving unit test generator/devcontainer, archiving maintenance pages, removing Terraform from standards repo, removing standards job, and removing unit tests. In ministryofjustice/dns, performed DNS cleanup by removing delegation for civil eligibility calculator and deleting nomisqc records in the justice.gov.uk hosted zone. Overall, reduced operational overhead, minimized exposure to deprecated resources, improved security/compliance posture, and demonstrated strong IaC discipline and cross-repo collaboration.
November 2024 performance summary focused on delivering business value through feature delivery, reliability, and governance improvements across DNS and Operations Engineering platforms. Implemented automated monitoring, data hygiene, cross-org data integrity, and security/enh identity enhancements, complemented by expanded testing and code quality improvements.
November 2024 performance summary focused on delivering business value through feature delivery, reliability, and governance improvements across DNS and Operations Engineering platforms. Implemented automated monitoring, data hygiene, cross-org data integrity, and security/enh identity enhancements, complemented by expanded testing and code quality improvements.
Concise monthly summary for 2024-10 focusing on security tooling and CI reliability in ministryofjustice/operations-engineering.
Concise monthly summary for 2024-10 focusing on security tooling and CI reliability in ministryofjustice/operations-engineering.
Overview of all repositories you've contributed to across your timeline