Mitchell Chhay

Professional Summary

Cloud and infrastructure-focused technologist with hands-on experience designing, deploying, and operating AWS environments using Terraform and CI/CD pipelines. Built production-style cloud labs emphasizing infrastructure as code, secure access via IAM and SSM, automated deployments, and observability with CloudWatch/CloudTrail. Proven ability to diagnose failures across networking, permissions, services, and deployment workflows, with strong documentation and operational discipline. Currently expanding depth in AWS architecture and DevOps practices while leveraging a background in regulated, high-accountability environments.

Skills

Cloud & Infrastructure

  • AWS (EC2, S3, Lambda, IAM, CloudWatch, CloudTrail, SSM)
  • Networking (VPC, subnets, routing, security groups)

Automation & DevOps

  • Infrastructure as Code: Terraform
  • CI/CD: GitHub Actions
  • Linux system administration, Bash, Git

Observability & Security

  • Metrics, logging, alarms; log groups and centralized log shipping
  • IAM, hardening, least privilege

Tools

  • Git, Docker, VS Code

Projects

Cloud Support Lab
AWS • Terraform • GitHub Actions

Built a production-style AWS environment using Infrastructure as Code and operational best practices. Provisioned a VPC with public subnet routing through an Internet Gateway, deployed an EC2 instance bootstrapped with NGINX via user data, and managed access securely using an IAM instance role and AWS Systems Manager (SSM) for remote administration (no persistent SSH dependency).

  • Infrastructure as Code: Terraform-managed VPC, networking, security groups, EC2, and IAM role/profile.
  • Secure Operations: SSM-based management and least-privilege IAM permissions for system access and automation.
  • CI/CD Pipeline: GitHub Actions packages an artifact, uploads to S3, and triggers deployment via SSM Run Command.
  • Observability: CloudWatch log groups with application/deploy logs shipping for troubleshooting and auditability; CloudTrail enabled.
  • Incident-Driven Learning: Documented failure scenarios (e.g., IAM permission loss, service outage, deployment issues) with root cause, fix, and validation steps.

Tech: AWS (EC2, VPC, IAM, S3, SSM, CloudWatch, CloudTrail), Terraform, GitHub Actions, Bash, NGINX, Linux

Cloud Resume Challenge (AWS)
S3 • CloudFront • Lambda • DynamoDB • GitHub Actions

Building a serverless resume website on AWS with automated deployments and a visitor counter. Focused on secure public delivery, infrastructure-as-code patterns, and operational readiness.

  • Frontend: Static resume site hosted on S3 and delivered via CloudFront.
  • Backend: Visitor counter API using Lambda + DynamoDB.
  • CI/CD: GitHub Actions deploys website updates and backend changes automatically.
  • Security: Least-privilege IAM, HTTPS-only delivery, and restricted S3 access through CloudFront.
  • Operational Practices: Logging/metrics for troubleshooting and basic reliability checks.

Tech: AWS (S3, CloudFront, Lambda, DynamoDB, IAM), GitHub Actions, HTML/CSS, JavaScript

Experience

Senior Manager, Pharmacovigilance – Jobot Consulting / BioAtla
Mar 2024 – Present
  • Lead PV operations across case processing, signal detection, and aggregate reporting in a regulated environment.
  • Manage vendor selection and oversight (CROs, call centers, safety database vendors), including SLAs, quality reviews, and issue escalation.
  • Own safety data exchange and reconciliation processes with partners/distributors; support PV agreements and SOP development to ensure compliance and on-time delivery.
  • Review protocol and ICF safety content; maintain reference safety information (SmPC/IB/Core Safety Data Sheet) and track compliance metrics/CAPA actions.
Manager, Pharmacovigilance – CTI BioPharma / SOBI
Mar 2023 – Mar 2024
  • Executed time-sensitive operational workflows for intake, validation, and reporting of safety events; ensured accuracy and adherence to defined timelines and standards.
  • Produced recurring deliverables and status reporting (aggregate reports and submissions), coordinating inputs across teams to meet deadlines.
  • Monitored compliance metrics and supported corrective actions by identifying gaps, improving procedures, and strengthening documentation.
  • Managed data quality controls including standardized coding (MedDRA/WHO-DD) and reconciliation between safety and clinical systems to maintain consistency.
  • Supported vendor/partner data exchange processes and periodic reconciliations, escalating issues and documenting resolutions for repeatability.

Education

Bachelor of Science in Biology – University of Colorado Denver (2012)

Certifications

AWS Certified Cloud Practitioner (2026)
AWS Certified Solutions Architect – Associate (in progress)

Views: -