morten/nordbye.it

Available · Oslo & remote

Morten Victor Nordbye

I am a Cloud Engineer.

Based in Oslo. I build and run Azure infrastructure for customer environments. Azure networking, AKS with GitOps, observability, and the platform pieces that keep a cluster running properly. Available through Orange Business and for direct engagements.

CKAAZ-3054+ yrs production cloudPublic & private · enterprise scale
  • control plane
  • worker node
  • gateway
  • — a cluster I run in production at home

About me.

How I got here, what I work with, and what I build after hours.

Skilled ICT Service Operator by trade. Started on the front line in an Operations Centre, monitoring alarms and running incidents across customer environments, then moved into platform and cloud engineering as the workloads followed. Scripting led to automation, automation led to infrastructure as code, and the work shifted from reacting to alerts to building the platforms that produce them.

Today I work as a Cloud Engineer at Orange Business, on Azure platforms for customers across a range of regulated sectors. On the side I run a homelab cluster that doubles as my proving ground for anything I want to try before it touches production.

4+

Years in production cloud

5

Active certifications

incl. CKA, AZ-305

33M+

Req / day peak

Betting platform on AKS

6

Node Talos cluster

Homelab, prod-grade

the stack

Platform & infrastructure

  • Linux
  • Kubernetes
  • Containerization
  • Network administration
  • Azure
  • AWS

Delivery & automation

  • CI/CD
  • Terraform
  • Ansible

Operations

  • Windows Server
  • Database management

Leadership

  • Team leadership

career

The route here.

the route

  1. 2018

    Programming Course Holder

    Oslo Municipality

  2. 2021

    Operations Technician

    Basefarm / Orange Business

    Hybrid estate, alarm gateway, full shift rotation.

  3. 2023

    System Consultant

    Orange Business

    Kubernetes and Linux for regulated customers.

  4. 2024

    Navy Instructor

    KNM Tordenskjold

    Incident response, taught calmly under load.

  5. 2025

    System Consultant

    Orange Business

    Healthcare and aviation, on-prem Kubernetes and RHEL.

  6. 2026now

    Cloud Engineer

    Orange Business

    Azure platforms, Terraform, GitOps, observability.

off the clock

Outside work.

Fitness

I train five times a week. Running, swimming, cycling and light weights, mostly. It keeps me sharp at work and makes the long days easier to handle. A lot of good conversations happen in the gym too.

Homelabbing

The homelab is where I try things out before they reach customers. New tools, new architectures, things I am not sure I understand yet. It is also where I keep services I rely on day to day.

Download résumé
Professional Experience
  1. Jan 2026 — Present

    Cloud Engineer

    Orange Business·Oslo

    Cloud engineer in Orange's engagement team, placed onto customer accounts under a consultancy delivery model. Currently on two engagements in parallel, a betting-platform customer's Azure migration and an internal Orange department's Azure platform I architect solo.

    On the betting-platform engagement, took over architect responsibility on the Orange side in April 2026 when the previous architect exited; all technical decisions on the account now go through me. Did the bulk of the Terraform module work across the platform (AKS, vWAN, Front Door, ACR, Log Analytics, Managed Grafana, ArgoCD core services), rewriting large parts as the architecture evolved, and built the observability stack from scratch with production alerts in Terraform against the AMBA baseline. Executed the service-by-service migration of roughly 30 microservices from Orange-hosted Windows Server and .NET onto AKS, with peaks above 33 million requests per day on betting days.

    Drove the post-migration architecture, including the ServiceBus migration into the customer's new subscription, policy-as-code rollout via EPAC, and a cold-redeploy DR plan for Azure region failure with runbooks for first-line. Also worked alongside the customer's team to stabilise production after migration, where a recurring .NET thread-pool starvation pattern was surfaced via observability, reproduced in a replication harness built from the customer's components, and resolved through an async refactor led by the customer's developers.

    During the migration, the betting-platform customer was moved off NGINX Ingress Controller onto Traefik with Gateway API. Serving multiple TLS certificates on a single listener required a hack (one listener name per cert), so I contributed the upstream patch that taught Gateway API to resolve multiple cert secrets on one listener natively. Merged and released in Traefik v3.7.0.

    For the internal Orange department, designed and delivered the Azure platform under their IAM and Microsoft 365 automation app, covering the WAF Application Landing Zone subscription layout, ACR and Container Apps for hosting, Azure DNS, and the GitHub repository with Terraform pipelines so the receiving team runs it themselves.

    Daily stack: Azure (AKS, vWAN, Front Door, Key Vault, ACR, AMW, LAW, Managed Grafana), Terraform, ArgoCD, Helm, Kustomize, External Secrets Operator, cert-manager, OpenTelemetry Collector, Traefik.

  2. Aug 2025 — Jan 2026

    System Consultant / Technical Account Manager

    Orange Business·Oslo

    Returned to Orange Service Delivery 3 in the same System Consultant and TAM role after national service, working a parallel portfolio of managed customers. Carried TAM on a B2B SaaS customer and a patient-facing healthcare customer, de facto technical owner of the aviation customer's RHEL fleet where the assigned TAM was Windows-focused, and team-member responsibilities on two healthcare Kubernetes clusters.

    On the aviation customer's PCI fleet, owned the RHEL major-version programme. ClamAV reaching end-of-life on RHEL7 (under extended support) while the application could not be redeployed within the available window forced an in-place upgrade of the roughly 40-host PCI fleet to RHEL8. IPA does not survive in-place, so the IPA nodes were rebuilt as a fresh install on new VMs landing on RHEL9, with the auth layer switching from password sync to AD trust against the PCI Windows AD domain. Rebuilt CIS hardening as an Ansible role to restore the baseline that in-place upgrade had partially reset, and as a parallel track rolled out the Sumologic OpenTelemetry agent across all 150 RHEL hosts via Ansible.

    On two healthcare customers, ran coordinated rolling upgrade programmes across three layers (Kubernetes, OS, and core services including Traefik and Fluent Bit) on stage and prod environments at each, while keeping NHN-connected clinical workloads online. Norsk Helsenett (NHN, the regulated clinical network with strict peering and compliance controls) was an active dependency at both customers.

    Daily stack: RHEL 7/8/9, Kubernetes, Ansible, PostgreSQL, F5 BIG-IP, Sumologic with OpenTelemetry, IPA, Active Directory.

  3. Aug 2024 — Aug 2025

    SSS Fire & Accident Instructor

    Royal Norwegian Navy·KNM Tordenskjold

    Mandatory national service at the Royal Norwegian Navy's smoke-diving and damage-control school at KNM Tordenskjold. Certified as a solo instructor after a six-month qualification programme. Taught recruits, officers, coast-guard and naval-officer trainees through live-fire drills, smoke dives and damage-control simulations.

    Designed and rolled out the security baseline for the unit's digital examination workstation fleet, which had been operating without centralised Group Policy and with end-user accounts running with local administrator rights. Implemented a GPO-driven hardening profile (privileged-access removal, account lockout enforcement, password policy enforcement) via PowerShell, bringing the fleet in line with standard workstation policy. Replaced manual account provisioning and status reporting with automated PowerShell tooling that the unit owns going forward.

    Kept a self-hosted Kubernetes, GitOps and CI platform running across the conscript year as continued engineering practice, building the foundation the current Homelab platform sits on.

  4. Aug 2023 — Aug 2024

    System Consultant / Technical Account Manager

    Orange Business·Oslo

    System Consultant on Orange Service Delivery 3, holding a parallel consulting portfolio across roughly seven clients in aviation (PCI and non-PCI), transport, healthcare (two), B2B SaaS and public sector. TAM on two of them, de facto technical owner on others where the engagement model required it. Consulting work centred on Linux and RHEL platforms, Kubernetes, automation and networking, extending to Windows Server and full infra-team scope where the customer required it. Norsk Helsenett (NHN, the regulated clinical network with strict peering and compliance controls) integrations for clinical data exchange were a recurring cross-customer dependency.

    Migrated a transport-sector customer's production Kubernetes platform off a major public cloud provider to on-prem Kubernetes for GDPR and data-residency compliance. Chose a blue-green strategy with storage rebuilt on NetApp NFS, covering the two clusters (test and prod) that made up the internal developer platform and resulting in a clean cutover. The customer fleet under operational management was five clusters of six nodes each.

    Ran a Puppet-to-Ansible configuration management migration at a B2B SaaS customer, writing all Ansible roles solo, stored in GitLab on-prem and deployed via Jenkins, replacing mail, application, jump-host and Postgres servers. Ran a parallel RHEL7-to-RHEL8/9 blue-green redeploy of the application fleet at the same time. Both tracks ran concurrently through the pre-service engagement.

    At a patient-facing healthcare customer, built a custom Prometheus-to-TICK access-log bridge that fed the customer's preferred Prometheus data model into the centralised TICK stack. Also deployed eight new VMs alongside the existing fleet and redeployed the F5 WAF with policy migration onto a cleaner network segment.

    On two other healthcare customers, owned the Postgres host stack with a full RHEL7-to-RHEL9 redeploy followed by a TLS connection-string migration with certificates, and ran the Kubernetes core services (Traefik, Fluent Bit) plus OS-level cluster operations (CoreDNS overrides, ulimit tuning) across their environments. NHN integration for clinical data exchange was an active dependency at both.

    For a Norwegian public-sector customer, owned the self-hosted Atlassian platform (Jira, Confluence, MySQL), delivered major version upgrades, and ran the surrounding F5 and Cisco network edge with TICK-based monitoring.

    Daily stack: Kubernetes, RHEL, Ansible, Jenkins, ArgoCD, Terraform, PostgreSQL, F5 BIG-IP, TICK (Telegraf, InfluxDB, Chronograf, Kapacitor), GitLab (on-prem). Python, Bash and PowerShell where needed.

  5. Aug 2021 — Aug 2023

    Operations Technician

    Basefarm / Orange Business·Oslo

    Operations Center role at Basefarm, later Orange Business. First line for around 250 customers across Norway, Sweden and the Netherlands, covering incidents, change requests, alarms, and the full ITIL event, incident, change and service-request flow across the OSI model.

    Within five months of joining, took on the Incident Team (INO) lead role (a rotating internal role on the OC team), later also Change Team (CNO) lead. In the final phase of the role, moved into the senior shift rotation, which meant sole first-line responsibility overnight across all 250 customers.

    Front-line operational exposure to customer environments spanning on-prem, Azure and AWS, covering platform monitoring, alarm response and change execution across the 250-customer estate.

    Carried multiple internal responsibilities beyond the shift desk, including maintenance manager for larger CAB-approved infra changes overnight (roll-back decisions, escalation calls and hourly status reporting), CMDB administration, and onboarding plus CNO-team intro training for around 25 new hires.

    Standalone deliverables across the period included an AWS-hosted shared-secret tool adopted across the operations centre (replacing a manual handoff process), a Squid forward proxy built from scratch via Ansible while on loan to an internal development department, and a fallback SMS provider sourced and integrated to remove a single-provider dependency on RSA-token delivery and password resets.

    Daily stack: Linux and Windows Server, VMware ESXi, NetApp and Rubrik, Cisco firewalls and switches, F5 BIG-IP, SolidDNS, Digicert, Squid, Ansible, Azure and AWS. AWS Fundamentals certification during the period.

  6. 2018 — 2019

    Programming Course Holder

    Oslo Municipality·Oslo

    Part-time programming instructor for Oslo Municipality's after-school programme (Utdanningsetaten), while still in lower-secondary school. Taught fifth-grade groups basic programming through guided game-building exercises at four schools across Oslo, paired with another instructor. First time teaching technology, and a lesson in how much explaining something simply actually helps.

Portfolio.

Selected case studies from client engagements and the homelab. Each one carries the design rationale, the trade-offs, and what shipped. Filter by client or homelab to scope the list.

Services I provide.

Three engagement shapes. Each one is grounded in something that has already shipped — case studies linked from each card.

/01

Kubernetes & Containerization

Cluster design, workload migration and platform hardening for teams running Kubernetes in production.

Shipped

Migrated ~30 microservices to AKS · 33M+ requests/day at peak

Read the case study
/02

GitOps & Ansible

Infrastructure as code your team can trust. Version-controlled, reviewed, reversible.

Shipped

Built the GitOps platform on Talos · ArgoCD app-of-apps, 6-node cluster

Read the case study
/03

Technical Consulting

Technical consulting for teams going through cloud migrations, infrastructure rebuilds or fast growth.

Shipped

.NET thread-pool starvation RCA · async refactor stabilised production

Read the case study

Available · Oslo & remote

Contact.

Reach out about cloud engineering, platform work or consulting engagements. I read everything that lands in the inbox and reply within a couple of working days.