Eelco Wesemann

Platform Engineer • SRE

Infrastructure as Craft

Barendrecht, Netherlands • linkedin.com/in/eelcowesemann/


Summary

I build calm, reliable platforms that teams can trust. I turn messy infrastructure into reproducible systems that stay predictable under pressure. I lead by example, automate repetitive work, and set thoughtful defaults so the right way becomes the easy way. The result: less noise, clearer ownership, and engineers freed to focus on real work.


Core strengths

Platform Engineering, SRE, Infrastructure as Code
Automation
: Ansible for ops automation, GitLab CI/CD, Python for data analysis and reporting (Pandas/Polars)
Elastic Stack: Elasticsearch, Logstash, Kibana (ELK), Elastic Cloud Enterprise (ECE)
Systems: Linux, OpenBSD, FreeBSD, Containers, KVM, ZFS
Ways of working: Reliability thinking, alerting hygiene, coaching, documentation, SAFe/Scrum


Highlights

  • Cut ansible-lint violations by 90% after moving from permissive to enforced checks in Dec 2024
  • Reworked review flow; -70% SecOps ticket volume, -70% waiting time for Platform Engineers, ~1 hour/day saved
  • Designed, deployed, and operated a central ECE platform now serving 14 teams; provisioning time dropped from months to hours, unified support behind one platform
  • Built a Flask-based infra insight tool; saved team leads ~1 day/fortnight; avoided ≥€20k vendor licence spend
  • Earlier career scale: ran redundant mail and antispam setup for 60k+ domains; led a zero-downtime FreeBSD to RHEL migration in a 600+ server estate

Experience

Platform Engineer, Logius

The Hague • Apr 2024 - Present

  • Own platform health across multiple Elasticsearch/ELK environments supporting national services; drive operational consistency
  • Codify deployment and run patterns in Ansible used across teams; reproducible and sensible defaults
  • Advocate reliability targets with product teams; align alerting to priorities and tune rules accordingly
  • Prepare for Elastic Cross-Cluster Replication (CCR) and multi-tenancy to broaden platform reach
  • Reduce toil and alert fatigue via targeted automation and cleaner observability signals
  • Unblock teammates and sister teams; keep delivery flow smooth

Key impacts:

  • Introduced ansible-lint in pipeline, permissive September 2024, enforced December 2024: -90% ansible-lint rule violations in merges
  • Redesigned the review process to optimise ticket flow: -70% SecOps ticket volume (~1 hour saved daily) and -70% waiting time for Platform Engineers

Senior Linux Specialist, Ministry of the Interior and Kingdom Relations (BZK)

Zoetermeer • Apr 2019 - Mar 2024

  • Designed, deployed, and operated a central Elastic Cloud Enterprise platform serving 14 teams
  • Built a Flask-based infra insight tool (MongoDB, Pandas, Pydantic, Celery, RabbitMQ) aggregating TOPdesk, Ansible, and Grafana; automated reporting and reduced errors
  • Re-architected a monolithic Ansible repo into a modular Galaxy structure
  • Authored and maintained a broad Ansible role library; automated deployments and reduced manual ops
  • Acting Tech Lead for 6 months: coordinated delivery, represented the team in ART/SI/PI ceremonies, coached engineers; documented recommendations and handed over cleanly
  • Managed and improved production Elasticsearch environments; stability, uptime, predictability

Key impacts:

  • Reduced cluster provisioning time from months to hours
  • Onboarded 14 teams (Feb 2024), consolidated support into a single platform
  • Automated reporting saved team leads ~1 day per fortnight via the Flask-based insight tool
  • Avoided ≥€20k in licence spend by replacing vendor reporting with internal tooling
  • Improved maintainability and reusability of the Ansible codebase, lowering maintenance burden

Senior Linux Specialist, Nationaal Cyber Security Centrum (NCSC-NL)

The Hague • Mar 2018 - Mar 2019

  • Operated and refreshed secure SINA infrastructure including PKI; delivered next-gen rollout with minimal disruption
  • Managed a mixed physical and virtual infrastructure footprint in a high-trust environment

DevOps Engineer, Hoppinger

Rotterdam • Oct 2014 - Feb 2018

  • Transformed Puppet 2.7 legacy into modular Puppet 5 (r10k/Hiera); enabled multi-dev workflows and cleaner environments
  • Standardised change with Git Flow and GitLab CI/CD; enforced quality gates
  • Designed a Docker-based hosting platform deployable on OpenStack or bare metal; abstracted infra differences
  • Built ZFS-backed Ubuntu building blocks (KVM, Docker, central backup) to lower hosting TCO
  • Modernised the network stack with MikroTik CCR/CRS, VLAN segmentation, and CAPsMAN Wi-Fi

Selected personal projects

Homelab Engineer, Home.arpa Enterprises

Barendrecht • 1997 - Present

  • Arch Linux KVM host with rotating OpenBSD/FreeBSD guests; OpenBSD DNS for private zones
  • Container services via Portainer: Nextcloud, Vaultwarden, Ghost CMS, static sites
  • Raspberry Pi fleet offering LDAP, NTP, privacy-filtered DNS, CalDAV
  • Off-site OpenBSD guest via WireGuard to expose public projects safely
  • Segmented networks across Private, Generic Services, IoT, DMZ VLANs
  • Off-site incremental ZFS + Restic backups protecting ~35 TB
  • Patterns proven here later applied to ELK and ECE platforms in production

Founder, Loeniks

Capelle aan den IJssel • Jul 2009 - Jun 2014 (part-time, concurrent with Snow)

  • Bootstrapped and operated a lean VPS platform: XenServer virtualisation, Bacula backups, sensible defaults; automated provisioning and base images; handled comms and incidents

Older experience

Senior UNIX/Linux Consultant, Snow BV (selected engagements)

Geldermalsen • Oct 2007 - Sep 2014

  • Deltares: kept national flood-forecasting platforms running; introduced maintenance windows; designed scalable FreeBSD + ZFS storage (20+ TB starting point)
  • Mirabeau: automated ov-chipkaart.nl infrastructure with Puppet
  • ASML: extended Perl tooling to consume the RHEV API

Senior UNIX & Linux Systems Administrator, ProServe

Alblasserdam • Apr 2006 - Sep 2007

  • Designed and implemented HA server environments with 99.9% SLAs; led zero-downtime FreeBSD 4.11 to CentOS/RHEL migration
  • Built internal automation for updates, backups, and backup-health visualisation; third-line escalation point across a 600+ server landscape

Linux Systems Administrator, Netnation Europe

Rotterdam • Apr 2004 - Mar 2006

  • Designed and operated redundant mail and DNS clusters for 60k+ domains; standardised automation for backups and quotas across ~900 servers

Support Engineer, Sitecom

Rotterdam • Apr 2003 - Mar 2004

  • Technical support for consumer networking products

Junior Systems Administrator, Wirehub! Internet

Rotterdam • Dec 2000 - Aug 2002

  • Managed Apache virtual hosts across FreeBSD, Linux, and Windows NT; built internal tools in PHP/Perl/Bash; supported web and DB ops

Skilled Frontdesk Operative, Wirehub! Internet

Rotterdam • Jul 2000 - Dec 2000

  • Provided technical support by phone and email for business customers

Certifications

  • Red Hat Certified Engineer (RHCE)
  • Red Hat Certified System Administrator (RHCSA)
  • PCEP Certified Entry-Level Python Programmer
  • SNIA Certified Storage Professional
  • Puppet Certified Professional
  • Sun Certified System Administrator for Solaris 10
  • LPIC-2, LPIC-1
  • Novell Certified Linux Administrator
  • Novell Data Center Technical Specialist
  • ITIL v3 Foundations

Recent courses

  • Enterprise Python
  • Data Analysis with Kibana
  • Advanced Python
  • Red Hat Enterprise Performance Tuning (RH442)

Education

Hogeschool Rotterdam: Computer Science
Thomas More: PABO
St. Montfort College: HAVO

Languages

Dutch: Native
English: Native or bilingual proficiency