Platform Engineer • SRE
Infrastructure as Craft
Barendrecht, Netherlands • linkedin.com/in/eelcowesemann/
Summary
I build calm, reliable platforms that teams can trust. I turn messy infrastructure into reproducible systems that stay predictable under pressure. I lead by example, automate repetitive work, and set thoughtful defaults so the right way becomes the easy way. The result: less noise, clearer ownership, and engineers freed to focus on real work.
Core strengths
Platform Engineering, SRE, Infrastructure as Code
Automation: Ansible for ops automation, GitLab CI/CD, Python for data analysis and reporting (Pandas/Polars)
Elastic Stack: Elasticsearch, Logstash, Kibana (ELK), Elastic Cloud Enterprise (ECE)
Systems: Linux, OpenBSD, FreeBSD, Containers, KVM, ZFS
Ways of working: Reliability thinking, alerting hygiene, coaching, documentation, SAFe/Scrum
Highlights
- Cut ansible-lint violations by 90% after moving from permissive to enforced checks in Dec 2024
- Reworked review flow; -70% SecOps ticket volume, -70% waiting time for Platform Engineers, ~1 hour/day saved
- Designed, deployed, and operated a central ECE platform now serving 14 teams; provisioning time dropped from months to hours, unified support behind one platform
- Built a Flask-based infra insight tool; saved team leads ~1 day/fortnight; avoided ≥€20k vendor licence spend
- Earlier career scale: ran redundant mail and antispam setup for 60k+ domains; led a zero-downtime FreeBSD to RHEL migration in a 600+ server estate
Experience
Platform Engineer, Logius
The Hague • Apr 2024 - Present
- Own platform health across multiple Elasticsearch/ELK environments supporting national services; drive operational consistency
- Codify deployment and run patterns in Ansible used across teams; reproducible and sensible defaults
- Advocate reliability targets with product teams; align alerting to priorities and tune rules accordingly
- Prepare for Elastic Cross-Cluster Replication (CCR) and multi-tenancy to broaden platform reach
- Reduce toil and alert fatigue via targeted automation and cleaner observability signals
- Unblock teammates and sister teams; keep delivery flow smooth
Key impacts:
- Introduced ansible-lint in pipeline, permissive September 2024, enforced December 2024: -90% ansible-lint rule violations in merges
- Redesigned the review process to optimise ticket flow: -70% SecOps ticket volume (~1 hour saved daily) and -70% waiting time for Platform Engineers
Senior Linux Specialist, Ministry of the Interior and Kingdom Relations (BZK)
Zoetermeer • Apr 2019 - Mar 2024
- Designed, deployed, and operated a central Elastic Cloud Enterprise platform serving 14 teams
- Built a Flask-based infra insight tool (MongoDB, Pandas, Pydantic, Celery, RabbitMQ) aggregating TOPdesk, Ansible, and Grafana; automated reporting and reduced errors
- Re-architected a monolithic Ansible repo into a modular Galaxy structure
- Authored and maintained a broad Ansible role library; automated deployments and reduced manual ops
- Acting Tech Lead for 6 months: coordinated delivery, represented the team in ART/SI/PI ceremonies, coached engineers; documented recommendations and handed over cleanly
- Managed and improved production Elasticsearch environments; stability, uptime, predictability
Key impacts:
- Reduced cluster provisioning time from months to hours
- Onboarded 14 teams (Feb 2024), consolidated support into a single platform
- Automated reporting saved team leads ~1 day per fortnight via the Flask-based insight tool
- Avoided ≥€20k in licence spend by replacing vendor reporting with internal tooling
- Improved maintainability and reusability of the Ansible codebase, lowering maintenance burden
Senior Linux Specialist, Nationaal Cyber Security Centrum (NCSC-NL)
The Hague • Mar 2018 - Mar 2019
- Operated and refreshed secure SINA infrastructure including PKI; delivered next-gen rollout with minimal disruption
- Managed a mixed physical and virtual infrastructure footprint in a high-trust environment
DevOps Engineer, Hoppinger
Rotterdam • Oct 2014 - Feb 2018
- Transformed Puppet 2.7 legacy into modular Puppet 5 (r10k/Hiera); enabled multi-dev workflows and cleaner environments
- Standardised change with Git Flow and GitLab CI/CD; enforced quality gates
- Designed a Docker-based hosting platform deployable on OpenStack or bare metal; abstracted infra differences
- Built ZFS-backed Ubuntu building blocks (KVM, Docker, central backup) to lower hosting TCO
- Modernised the network stack with MikroTik CCR/CRS, VLAN segmentation, and CAPsMAN Wi-Fi
Selected personal projects
Homelab Engineer, Home.arpa Enterprises
Barendrecht • 1997 - Present
- Arch Linux KVM host with rotating OpenBSD/FreeBSD guests; OpenBSD DNS for private zones
- Container services via Portainer: Nextcloud, Vaultwarden, Ghost CMS, static sites
- Raspberry Pi fleet offering LDAP, NTP, privacy-filtered DNS, CalDAV
- Off-site OpenBSD guest via WireGuard to expose public projects safely
- Segmented networks across Private, Generic Services, IoT, DMZ VLANs
- Off-site incremental ZFS + Restic backups protecting ~35 TB
- Patterns proven here later applied to ELK and ECE platforms in production
Founder, Loeniks
Capelle aan den IJssel • Jul 2009 - Jun 2014 (part-time, concurrent with Snow)
- Bootstrapped and operated a lean VPS platform: XenServer virtualisation, Bacula backups, sensible defaults; automated provisioning and base images; handled comms and incidents
Older experience
Senior UNIX/Linux Consultant, Snow BV (selected engagements)
Geldermalsen • Oct 2007 - Sep 2014
- Deltares: kept national flood-forecasting platforms running; introduced maintenance windows; designed scalable FreeBSD + ZFS storage (20+ TB starting point)
- Mirabeau: automated ov-chipkaart.nl infrastructure with Puppet
- ASML: extended Perl tooling to consume the RHEV API
Senior UNIX & Linux Systems Administrator, ProServe
Alblasserdam • Apr 2006 - Sep 2007
- Designed and implemented HA server environments with 99.9% SLAs; led zero-downtime FreeBSD 4.11 to CentOS/RHEL migration
- Built internal automation for updates, backups, and backup-health visualisation; third-line escalation point across a 600+ server landscape
Linux Systems Administrator, Netnation Europe
Rotterdam • Apr 2004 - Mar 2006
- Designed and operated redundant mail and DNS clusters for 60k+ domains; standardised automation for backups and quotas across ~900 servers
Support Engineer, Sitecom
Rotterdam • Apr 2003 - Mar 2004
- Technical support for consumer networking products
Junior Systems Administrator, Wirehub! Internet
Rotterdam • Dec 2000 - Aug 2002
- Managed Apache virtual hosts across FreeBSD, Linux, and Windows NT; built internal tools in PHP/Perl/Bash; supported web and DB ops
Skilled Frontdesk Operative, Wirehub! Internet
Rotterdam • Jul 2000 - Dec 2000
- Provided technical support by phone and email for business customers
Certifications
- Red Hat Certified Engineer (RHCE)
- Red Hat Certified System Administrator (RHCSA)
- PCEP Certified Entry-Level Python Programmer
- SNIA Certified Storage Professional
- Puppet Certified Professional
- Sun Certified System Administrator for Solaris 10
- LPIC-2, LPIC-1
- Novell Certified Linux Administrator
- Novell Data Center Technical Specialist
- ITIL v3 Foundations
Recent courses
- Enterprise Python
- Data Analysis with Kibana
- Advanced Python
- Red Hat Enterprise Performance Tuning (RH442)
Education
Hogeschool Rotterdam: Computer Science
Thomas More: PABO
St. Montfort College: HAVO
Languages
Dutch: Native
English: Native or bilingual proficiency