Skip to content
View NonsoAmadi10's full-sized avatar
๐Ÿ 
Working from home
๐Ÿ 
Working from home

Block or report NonsoAmadi10

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
NonsoAmadi10/README.md

Hello! ๐Ÿ‘‹ I'm Chinonso Amadi

๐Ÿš€ Senior Site Reliability Engineer | Security Engineer | Cryptography & ZK Systems Builder

LinkedIn Twitter GitHub followers

About Me

I build secure, reliable, and cryptographically sound systems. My background in Site Reliability Engineering and infrastructure gives me a strong foundation for designing and scaling distributed systems that prioritize trust, verifiability, and resilience.

Now, Iโ€™m diving deep into applied cryptography โ€” focusing on Zero-Knowledge Proofs, secure computation, and privacy-preserving infrastructure for the next generation of internet protocols.

  • ๐Ÿงฐ Current Role: Senior SRE at Bitnob โ€” building Bitcoin & Lightning infrastructure for Africa
  • ๐Ÿงฑ Focus Areas: Cryptography, Zero-Knowledge Systems, Secure Infrastructure
  • ๐Ÿงฉ Background: Cloud, Kubernetes, DevOps, Infrastructure Security
  • ๐ŸŒ Location: Abuja, Nigeria โ†’ Preparing for relocation to Europe/Canada (2026)
  • ๐ŸŽฏ Goal (2025โ€“2026): Transition into Security & Cryptography Engineering, specializing in ZK Infrastructure and Proof Systems

๐Ÿ’ป What I Do

Iโ€™m focused on bringing cryptographic guarantees into real-world distributed systems. That means blending infrastructure engineering with applied research and practical system design.

  • ๐Ÿ” Applied Cryptography: Zero-Knowledge Proofs (zk-SNARKs, zk-STARKs), MPC, signatures
  • ๐Ÿงฉ Security Engineering: Threat modeling, key management, supply-chain hardening
  • ๐Ÿ”ง Infrastructure as Code (Terraform, Helm)
  • ๐Ÿงฑ Infrastructure: Kubernetes, Terraform, Helm, ArgoCD
  • ๐Ÿš€ CI/CD Pipelines
  • ๐Ÿ” Infrastructure Security & Compliance
  • ๐Ÿง  Blockchain Systems: Bitcoin, Lightning, EVM & zkEVM ecosystems
  • ๐Ÿงฎ Programming: Go, Python, Rust (learning), Bash
  • ๐Ÿงฐ Tooling: Prometheus, Grafana, Datadog, OpenTelemetry

๐Ÿ† Achievements

  • ๐Ÿ”ญ Building Bitcoin + Lightning infrastructure at scale (Bitnob)
  • ๐Ÿงน Migrated legacy infrastructure to Kubernetes with zero downtime
  • ๐Ÿ”ญ Built observability pipelines for high-fidelity alerting
  • ๐Ÿ” Supported compliance readiness for PCI-DSS, SOC 2, ISO standards
  • ๐Ÿง  Implemented internal security automation in CI/CD pipelines
  • ๐Ÿงฎ Currently researching Zero-Knowledge Proofs and cryptographic primitives for infrastructure security

๐Ÿ› ๏ธ Tech Stack

Kubernetes Terraform Octopus Deploy Bitcoin Postgres AWS Azure DigitalOcean Google Cloud Visual Studio Code

๐Ÿ”ฌ Current Focus

  • ๐Ÿงฉ Cryptography

    • Studying Zero-Knowledge Proofs (Groth16, Plonk, Halo2)

    • Experimenting with zk circuits and verifiable computation

    • Exploring cryptographic infrastructure for privacy-preserving systems

  • ๐Ÿ” Security & Reliability

    • Hardening CI/CD pipelines against supply-chain threats

    • Building secure build & signing systems

    • Applying cryptography to infrastructure observability

  • ๐Ÿ’ก Research & Writing

    • Writing about the intersection of cryptography, reliability, and systems engineering

    • Documenting experiments in zk libraries (Arkworks, Circom, Noir, Halo2)

    • Publishing open-source infra & ZK research tools

๐Ÿ“ˆ GitHub Stats

GitHub Stats GitHub Stats GitHub Stats

๐Ÿค Let's Connect!

I'm always open to discussing new technologies, exciting projects, or potential collaborations. Feel free to reach out!

Pinned Loading

  1. setup setup Public

    Shell

  2. abobi abobi Public

    A go command line tool that parses your environment variables written in a file into a kubernetes base64 encoded secrets

    Go 1

  3. mempool-fee-analysis mempool-fee-analysis Public

    An API and cli that helps users decide what amount of fee to pay for bitcoin transaction based on mempool analysis

    Go 4

  4. Heimdall Heimdall Public

    Heimdall is a monitoring tool designed to help Bitcoin/Lightning node operators keep their nodes up and running by providing real-time information on the performance and availability of their nodes.

    Go 1

  5. jamaljsr/polar jamaljsr/polar Public

    One-click Bitcoin Lightning networks for local app development & testing

    TypeScript 838 169

  6. zwis zwis Public

    An in-memory cache system in Go that supports expirable cache entries and various cache eviction policies including Least Frequently Used (LFU), Least Recently Used (LRU), and Adaptive Replacement โ€ฆ

    Go