The Cloud Platform Executive is an execution-focused role responsible for the day-to-day administration and operational health of Ginesys's cloud infrastructure. The platform underpins the Ginesys One retail SaaS suite — a multi-tenant, business-critical environment spanning IaaS and PaaS resources on Microsoft Azure. This role owns planned deployment activity, monitoring response, and incident resolution, working under the guidance of the Cloud Platform Architect.
CORE FOCUS AREAS
1. Planned Activity — Deploy, Modify, Migrate :
Provision new cloud instances for Ginesys One product onboarding per approved runbooks.
Execute infrastructure modifications (resize, reconfigure, patch) within change windows.
Migrate workloads from on-premises or legacy environments to Azure following migration plans.
Apply application updates across cloud-hosted instances with pre-tested rollback plans.
Maintain configuration consistency across environments using IaC scripts and templates.
2. Monitoring & Alert Response
Monitor infrastructure health across compute, storage, network, and database layers via Azure Monitor and allied tooling.
Triage and respond to alerts within defined SLA — disk space, CPU/memory spikes, DB performance, network faults.
Investigate root causes using Azure Logs, Event Viewer, cloud monitoring dashboards, and DB admin logs.
Escalate unresolved or recurring incidents to L2/Architect with documented analysis.
Contribute to alert tuning to reduce noise and improve signal fidelity.
3. Incident Management
Disk / Storage: Identify top consumers, perform DB segment-wise size analysis when data is the primary driver.
Compute Spikes: Identify responsible process/application; correlate with Event Viewer and Azure Monitor.
DB Performance: Verify sessions, analyse admin logs and segment sizes.
Network / Access: Check connectivity, NSG/firewall rules, IP whitelisting, OS services.
4. Routine Operations
Daily health checks and reconciliation across all managed environments.
Periodic reports: utilisation, access, security feature status, OS user accounts.
Access management — RBAC, VM local users; enforce least-privilege.
Change logging through the approved ITSM process.
Runbook and SOP documentation; post-incident write-ups.