Find the Best Cosmetic Hospitals

Explore trusted cosmetic hospitals and make a confident choice for your transformation.

“Invest in yourself — your confidence is always worth it.”

Explore Cosmetic Hospitals

Start your journey today — compare options in one place.

|

Director of Infrastructure: Role Blueprint, Responsibilities, Skills, KPIs, and Career Path

1) Role Summary

The Director of Infrastructure is accountable for the reliability, scalability, security, and cost effectiveness of the company’s production and corporate infrastructure. This role leads the teams and operating model that provide core compute, networking, storage, identity, platform tooling, and operational capabilities required to build and run software services.

This role exists in a software/IT organization to ensure that product engineering can ship and operate customer-facing services on a stable, well-governed infrastructure foundation—without infrastructure becoming a bottleneck. The Director of Infrastructure creates business value through higher service availability, faster delivery via automation and self-service, reduced operational risk, and disciplined capacity and cost management.

This is a Current role: it is widely established in modern SaaS, enterprise software, and IT organizations, and is central to cloud/hybrid operations, platform engineering, and reliability.

Typical interaction partners include: SRE/Platform Engineering, Application Engineering, Security, Architecture, IT Service Management (ITSM), Finance (FinOps), Procurement/Vendor Management, Compliance/Risk, Customer Support, and Product Leadership.


2) Role Mission

Core mission:
Deliver a resilient, secure, automated, and cost-efficient infrastructure ecosystem that enables engineering teams to build, deploy, and operate services reliably at scale.

Strategic importance:
Infrastructure is the substrate for product delivery, customer experience, and operational continuity. The Director of Infrastructure ensures that infrastructure capabilities (cloud foundations, runtime platforms, networking, identity, observability, incident response, DR) are designed and operated as a durable product—measured by reliability outcomes and developer productivity.

Primary business outcomes expected: – High availability and performance of production services with predictable reliability. – Reduced time-to-deliver through platform self-service and automation. – Strong security posture, audit readiness, and operational governance. – Cost transparency and continuous optimization across cloud and vendor spend. – Effective incident management that reduces customer impact and drives prevention. – A high-performing infrastructure organization with clear ownership, skills, and career paths.


3) Core Responsibilities

Strategic responsibilities

  1. Infrastructure strategy and multi-year roadmap: Define and maintain an infrastructure strategy aligned to company product and growth plans (e.g., cloud adoption, hybrid strategy, data center exit, platform modernization).
  2. Platform and reliability strategy: Establish target operating model across CloudOps/Platform Engineering/SRE/Network/IT Ops; clarify what is centralized vs. federated to product teams.
  3. Capacity and scalability planning: Lead forecasting for compute, storage, and network growth; ensure scaling plans are in place for peak events and product expansions.
  4. FinOps partnership and cost governance: Set measurable cost optimization goals; build cost allocation models (chargeback/showback) and enforce standards for resource tagging and spend accountability.
  5. Vendor and sourcing strategy: Select and govern strategic vendors (cloud providers, network/security tooling, managed services) with clear performance and cost outcomes.

Operational responsibilities

  1. Operational excellence and reliability outcomes: Own reliability targets (availability, latency SLOs/SLA commitments in partnership with SRE and product engineering).
  2. Incident management and on-call governance: Ensure effective on-call structures, escalation paths, incident command processes, and post-incident learning (blameless postmortems).
  3. Change management and release governance for infrastructure: Implement change controls appropriate to company maturity (from lightweight to regulated) to reduce change failure rate.
  4. Disaster recovery and business continuity readiness: Maintain DR architectures, runbooks, and tested recovery exercises (tabletops and live failovers).
  5. Service management and ITSM integration: Ensure infrastructure services are visible in a service catalog, have owners, have SLAs/OLAs, and are supported through consistent request and incident workflows.

Technical responsibilities

  1. Cloud foundation and landing zone governance: Oversee cloud account/subscription structure, identity boundaries, networking patterns, encryption standards, and baseline controls.
  2. Infrastructure as Code (IaC) and automation standards: Drive adoption and quality of IaC (e.g., Terraform) and config management; define module standards, code review expectations, and testing patterns.
  3. Compute/runtime platforms: Oversee container orchestration (e.g., Kubernetes), VM platforms, and managed runtimes; ensure secure baseline images and patching.
  4. Networking and connectivity: Own network architecture across VPC/VNet design, DNS, load balancing, WAF/CDN, private connectivity, and corporate network integration where applicable.
  5. Observability platform ownership: Ensure logs, metrics, traces, alerting, and dashboards are unified and actionable; reduce noise and improve detection.
  6. Identity and secrets integration (in partnership with Security): Ensure IAM patterns, secrets management, and privileged access are operationally usable and auditable.

Cross-functional or stakeholder responsibilities

  1. Enablement of product engineering: Provide self-service capabilities, clear documentation, golden paths, and support channels to reduce friction and improve developer productivity.
  2. Customer-impact alignment: Partner with Support/Customer Success for incident communications and operational commitments that affect customers (SLA reporting, maintenance windows).

Governance, compliance, or quality responsibilities

  1. Security, compliance, and audit readiness (shared accountability): Implement and operate controls for least privilege, encryption, retention, vulnerability remediation, and evidence collection; support audits (SOC 2/ISO 27001/PCI/HIPAA—context-dependent).
  2. Policy and standards ownership: Own infrastructure standards (tagging, naming, network segmentation, backup/retention, logging) and enforce them through automation and guardrails.

Leadership responsibilities

  1. Org leadership and talent development: Hire, develop, and retain managers and senior engineers; establish career ladders and skill development plans.
  2. Budget management: Own infrastructure budgets (cloud, tooling, vendor contracts) and align spend to business value.
  3. Operating rhythms and accountability: Set measurable goals, review mechanisms, and transparent reporting to executives and stakeholders.

4) Day-to-Day Activities

Daily activities

  • Review reliability and operational dashboards (availability, error rates, latency, saturation).
  • Triage escalations from on-call, Support, or product engineering; ensure appropriate severity classification and ownership.
  • Unblock teams on infrastructure issues (capacity constraints, permissions, networking, CI/CD failures, environment outages).
  • Review high-risk changes (network/firewall updates, cluster upgrades, IAM policy changes) and ensure rollback plans exist.
  • Monitor cost anomalies and investigate spikes (unexpected data transfer, mis-sized resources, runaway logs).

Weekly activities

  • Lead or participate in incident review forum; ensure action items are prioritized and tracked to completion.
  • Infrastructure leadership staff meeting: progress against roadmap, reliability trends, staffing, risks.
  • Cross-functional syncs with Security (controls, vulnerabilities), Engineering (platform needs), and Finance (forecast vs. actual).
  • Review infrastructure delivery pipeline: planned upgrades, deprecations, and standardization work.
  • Talent management: 1:1s with managers/tech leads; coaching on execution and stakeholder management.

Monthly or quarterly activities

  • Capacity planning and scaling readiness review; update forecasts and commit to scaling work.
  • Vendor performance reviews; renewals and procurement planning; validate SLAs and support effectiveness.
  • DR readiness review; tabletop exercises quarterly (typical) and live failovers at least annually (maturity-dependent).
  • Quarterly business review (QBR) to CTO/VP Engineering: reliability outcomes, cost posture, delivery progress, and risk register.
  • Update infrastructure policies/standards and roll out changes with enablement materials.

Recurring meetings or rituals

  • Operations review (weekly): incidents, change failure rate, top recurring issues, toil backlog.
  • Architecture review board (biweekly/monthly): validate major infrastructure designs, ensure standards compliance.
  • Roadmap planning (quarterly): reconcile engineering asks vs. infra strategy; prioritize with clear trade-offs.
  • Service ownership review (monthly): ensure services have owners, runbooks, and SLOs.

Incident, escalation, or emergency work

  • Serve as executive escalation point for SEV1/SEV2 incidents when customer impact or prolonged outages occur.
  • Activate incident command structure; ensure timely internal and external communications.
  • Make rapid trade-off decisions (disable non-critical features, scale up capacity, engage vendors).
  • Ensure post-incident analysis is completed within agreed timelines and corrective actions are resourced.

5) Key Deliverables

  • Infrastructure strategy and roadmap: 12–24 month roadmap with sequencing, dependencies, and resourcing.
  • Target architecture and standards: Cloud landing zone reference architecture, network segmentation model, identity patterns, encryption standards.
  • Service catalog and ownership model: Defined infrastructure services, owners, SLAs/OLAs, request pathways.
  • Reliability framework: SLO/SLI definitions (in partnership), error budgets, alerting principles, operational readiness checklists.
  • Incident management system: Runbooks, severity definitions, escalation paths, incident comms templates, postmortem format.
  • DR and BCP artifacts: DR tiers, RTO/RPO targets, recovery runbooks, test plans, evidence of exercises.
  • Observability platform baseline: Standard dashboards, alert routing rules, logging retention policies, tracing adoption guidance.
  • IaC and automation library: Approved Terraform modules, CI pipelines for infra code, policy-as-code guardrails.
  • Cost governance model: Tagging strategy, cost allocation, dashboards, optimization backlog, reserved capacity strategy (context-dependent).
  • Vendor and contract portfolio: Vendor inventory, renewal calendar, performance SLAs, negotiated terms, support escalation plans.
  • Security and compliance evidence packs: Access reviews, audit trails, change records, vulnerability remediation reporting.
  • Org design and workforce plan: Team topology, role definitions, hiring plan, on-call rotations, training plans.
  • Executive reporting dashboards: Monthly reliability and cost reports with trend analysis and key decisions needed.

6) Goals, Objectives, and Milestones

30-day goals

  • Establish relationships and operating cadence with Engineering, Security, ITSM, and Finance.
  • Assess current-state infrastructure: topology, critical services, incident history, tooling, cost profile, and key risks.
  • Validate on-call and incident processes; identify immediate gaps that increase customer risk (e.g., missing runbooks, noisy alerts).
  • Review vendor contracts and support models; identify urgent renewal or risk items.

60-day goals

  • Publish a current-state assessment and prioritized improvement plan (90–180 days) covering reliability, security, cost, and developer experience.
  • Implement or refine reliability reporting: top services, top incident drivers, operational KPIs.
  • Create a consolidated infrastructure backlog with clear ownership and prioritization.
  • Align with Security on control requirements and audit timelines; identify automation opportunities for evidence collection.

90-day goals

  • Deliver an approved infrastructure roadmap with clear investment cases (risk reduction, cost savings, faster delivery).
  • Reduce top operational pain points: alert noise, recurring incident classes, capacity hotspots.
  • Establish standardized change practices for infrastructure (peer review, automated testing, staged rollouts).
  • Formalize service ownership and escalation paths; ensure critical services have documented runbooks.

6-month milestones

  • Demonstrate measurable reliability improvement: reduced incident frequency and faster detection/restore (MTTD/MTTR improvements).
  • Launch or mature self-service platform capabilities (golden paths): environments, networking patterns, observability defaults, secrets patterns.
  • Implement baseline FinOps practices: tagging compliance, monthly cost reviews, optimization backlog, unit cost reporting (where feasible).
  • Complete at least one DR exercise with documented outcomes and funded remediation.
  • Build leadership bench: fill key management/lead roles and implement consistent performance management.

12-month objectives

  • Achieve infrastructure reliability targets aligned to customer commitments (availability/SLO attainment).
  • Standardize infrastructure provisioning and policy enforcement using IaC and guardrails across major domains.
  • Mature observability and incident response into a predictable, low-toil system.
  • Demonstrate cost governance maturity: forecast accuracy, reduction in waste, improved unit economics.
  • Reach audit-ready operational maturity (if applicable): evidence collection, access controls, change management, vulnerability remediation SLAs.

Long-term impact goals (18–36 months)

  • Infrastructure operates as a product: self-service, paved roads, measurable developer productivity gains.
  • Proven ability to scale to new regions/tenants/enterprise customers without step-function operational overhead.
  • Strong resilience posture: multi-AZ/region strategies where required, tested recoveries, minimized single points of failure.
  • Sustainable operating model: low burnout on-call, stable retention, strong internal customer satisfaction.

Role success definition

The role is successful when engineering teams can deliver and run services with high reliability, strong security posture, and controlled cost, with infrastructure changes being routine and safe rather than fragile and high-risk.

What high performance looks like

  • Reliability is improving quarter-over-quarter with transparent reporting and systematic prevention.
  • Infrastructure roadmaps are consistently delivered with stakeholder alignment and clear trade-offs.
  • Costs are explainable and optimized; major spend is attributable to business value.
  • Teams have high clarity, strong technical standards, and healthy on-call rotations.
  • Stakeholders trust infrastructure leadership and see it as an enabler, not a gate.

7) KPIs and Productivity Metrics

The Director of Infrastructure should use a balanced measurement system that includes delivery outputs, production outcomes, operational quality, cost efficiency, and stakeholder satisfaction.

KPI framework table

Metric name What it measures Why it matters Example target / benchmark Frequency
Service availability (critical services) Uptime for Tier-0/Tier-1 services Direct customer impact and SLA performance 99.9%–99.99% depending on product commitments Weekly / Monthly
SLO attainment rate % of services meeting SLOs Indicates reliability health and engineering maturity >90% services meeting SLOs (maturity-dependent) Monthly
Error budget consumption Reliability risk vs. planned changes Drives balanced velocity vs. stability decisions Keep within agreed budgets; investigate chronic burn Weekly
SEV1/SEV2 incident count Number of high-severity incidents Tracks operational stability Downward trend QoQ; absolute target varies Weekly / Monthly
Mean time to detect (MTTD) Time from fault to detection Faster detection reduces impact <5–10 minutes for Tier-0 (context-dependent) Monthly
Mean time to restore (MTTR) Time to recover service Measures resilience and response effectiveness Reduce by 20–30% over 2–3 quarters Monthly
Change failure rate (infra) % of changes causing incidents/rollback Key DevOps metric; indicates release safety <5–15% (varies by maturity) Monthly
Deployment frequency (infra platform) Frequency of safe infra releases Indicates ability to improve iteratively Weekly cadence or better for most changes Monthly
Postmortem completion SLA % of incidents with timely postmortems Institutional learning and accountability 95% completed within 5 business days Monthly
Action item closure rate % of postmortem actions completed on time Ensures prevention work happens >80% closed by due date Monthly
Alert noise ratio Alerts per incident / % unactionable alerts Reduces burnout and improves signal Reduce unactionable alerts to <20–30% Monthly
On-call load (pages per shift) Page volume per engineer Burnout indicator; staffing/quality signal Target varies; keep sustainable and trending down Monthly
Infra request lead time Time to fulfill common requests Developer productivity and internal customer experience Improve by 20% over 2 quarters Monthly
Self-service adoption % of provisioning via approved automation Measures platform leverage >70% for standard resources Quarterly
IaC coverage % of infra managed via IaC Reduces drift and improves repeatability >85–95% for core domains Quarterly
Configuration drift rate Resources diverging from desired state Risk and operational overhead Near-zero drift for managed domains Monthly
Patch compliance (baseline images/nodes) % patched within SLA Security and stability 95% within 30 days (example) Monthly
Vulnerability remediation SLA Time to remediate critical CVEs Security posture Critical within 7–14 days (context-dependent) Monthly
Backup success rate Successful backups / restore tests Data protection readiness >99% backup success; restore test pass rate high Monthly
DR test success Pass/fail + RTO/RPO achievement Business continuity readiness Annual live test; meet RTO/RPO for Tier-0 Quarterly / Annual
Cost variance vs. forecast Accuracy of spend forecasting Financial predictability Within ±5–10% monthly Monthly
Unit cost metrics Cost per customer/tenant/request Shows efficiency at scale Improve trend; set baseline then reduce Quarterly
Waste reduction Savings from right-sizing, cleanup Demonstrates active optimization 5–15% annualized savings (maturity-dependent) Monthly / Quarterly
Vendor SLA compliance Vendor performance vs. contracted SLAs Ensures reliability and value from vendors >95% SLA compliance Quarterly
Stakeholder satisfaction (Engineering) Survey/NPS for platform services Measures enablement effectiveness Maintain >8/10 or positive NPS Quarterly
Audit findings (infra-related) Number/severity of audit issues Compliance and risk Zero critical/high findings; timely remediation Per audit cycle
Team retention / engagement Attrition, engagement scores Sustainability and leadership effectiveness Healthy attrition benchmarks; improve engagement Quarterly
Hiring plan attainment Roles filled vs. plan Execution capacity Meet plan within agreed timelines Monthly

Notes on benchmarks: targets vary significantly by company stage and regulatory needs. Early-stage companies may prioritize stabilization and IaC adoption; later-stage and regulated environments may emphasize change governance, audit evidence, and DR rigor.


8) Technical Skills Required

Must-have technical skills

  1. Cloud infrastructure architecture (Critical)
    Description: Designing and operating cloud environments (networking, compute, storage, IAM) using best practices.
    Use: Landing zones, shared services, scaling, resilience design, governance patterns.
  2. Infrastructure reliability & operations (Critical)
    Description: Running production systems with incident management, capacity planning, and operational excellence.
    Use: On-call governance, SEV response, operational KPIs, reducing recurring incidents.
  3. Networking fundamentals (Critical)
    Description: DNS, routing, load balancing, firewalls/security groups, VPN/private connectivity, CDN/WAF patterns.
    Use: VPC/VNet architecture, connectivity between services, customer-facing performance and security.
  4. Infrastructure as Code (IaC) (Critical)
    Description: Declarative provisioning and lifecycle management (e.g., Terraform) with code review and testing.
    Use: Standard modules, repeatable environments, auditability, reduced configuration drift.
  5. Observability fundamentals (Critical)
    Description: Metrics/logs/traces, alert design, SLI/SLO measurement, dashboards, incident detection.
    Use: Improve MTTD/MTTR, reduce alert fatigue, enable service health reporting.
  6. Security fundamentals for infrastructure leaders (Critical)
    Description: IAM, encryption, key management, secrets, vulnerability management, secure baselines.
    Use: Partner with Security while ensuring controls are operable and enforced through guardrails.
  7. Operating model and service ownership (Important)
    Description: Clear boundaries between platform/infra and product teams; service catalog and SLAs.
    Use: Reduce ambiguity, improve speed, create accountability.

Good-to-have technical skills

  1. Containers and orchestration (Important)
    Description: Kubernetes/ECS/AKS/GKE operational considerations, upgrades, cluster security.
    Use: Platform runtime leadership and standardization.
  2. CI/CD systems for infrastructure delivery (Important)
    Description: Pipelines for IaC testing, policy checks, staged rollouts.
    Use: Safe change delivery, reduce change failure rate.
  3. Configuration management (Optional)
    Description: Tools like Ansible/Chef/Puppet for OS-level management.
    Use: Patching, baseline enforcement, legacy environments.
  4. Database and storage operational understanding (Optional)
    Description: Backups, replication, performance basics for common datastores.
    Use: DR planning, risk reviews, incident support.
  5. FinOps practices (Important)
    Description: Cost allocation, reserved capacity strategy, unit economics, anomaly detection.
    Use: Budget governance and optimization leadership.

Advanced or expert-level technical skills

  1. Resilience engineering and DR architecture (Critical)
    Description: Multi-AZ/region strategies, failover patterns, chaos testing concepts.
    Use: Meet RTO/RPO, reduce blast radius, plan regional expansions.
  2. Large-scale network/security architecture (Important)
    Description: Zero trust concepts, segmentation, private endpoints, service-to-service controls.
    Use: Secure scaling and regulated customer requirements.
  3. Performance and capacity modeling (Important)
    Description: Forecasting, workload profiling, saturation analysis, scaling strategies.
    Use: Prevent outages and cost blowouts under growth.
  4. Policy-as-code and guardrails (Important)
    Description: OPA/Sentinel-like concepts, enforcement pipelines, compliance automation.
    Use: Prevent misconfigurations and improve audit readiness.

Emerging future skills for this role (2–5 years)

  1. Platform engineering product management mindset (Important)
    Description: Treat internal platform as a product with roadmaps, adoption metrics, and UX for developers.
    Use: Increase self-service, reduce cognitive load for teams.
  2. AI-assisted operations (AIOps) literacy (Optional → Important over time)
    Description: Using anomaly detection, event correlation, and AI copilots for triage and automation.
    Use: Faster incident response and reduced toil, with human oversight.
  3. Software supply chain security integration (Important)
    Description: SBOM awareness, provenance, secure build pipelines intersecting with infra.
    Use: Meeting enterprise buyer expectations and compliance requirements.
  4. Sustainability and carbon-aware infrastructure (Context-specific)
    Description: Energy/cost-aware scheduling and reporting.
    Use: ESG reporting and optimization where required.

9) Soft Skills and Behavioral Capabilities

  1. Systems thinking
    Why it matters: Infrastructure failures rarely have single causes; dependencies and incentives shape outcomes.
    How it shows up: Connects incidents to architecture, process, and org design; prioritizes high-leverage fixes.
    Strong performance looks like: Prevents recurring problems by addressing root causes across teams and tooling.

  2. Executive communication and narrative clarity
    Why it matters: Infrastructure investments compete with product features; leaders must explain trade-offs.
    How it shows up: Clear QBRs, risk registers, and decision memos; concise incident updates.
    Strong performance looks like: Stakeholders understand what is changing, why, and what outcomes to expect.

  3. Operational leadership under pressure
    Why it matters: During severe incidents, calm decision-making and coordination reduce impact.
    How it shows up: Runs incident command effectively; prioritizes safety, clarity, and speed; avoids blame.
    Strong performance looks like: Faster restoration, controlled communication, and actionable postmortems.

  4. Stakeholder management and negotiation
    Why it matters: Infrastructure impacts many teams; alignment is required for standards and adoption.
    How it shows up: Negotiates service boundaries, SLO ownership, roadmap priorities, and rollout plans.
    Strong performance looks like: High adoption of platform standards with minimal friction and escalation.

  5. Talent development and coaching
    Why it matters: Infrastructure is specialized; team capability determines reliability and delivery pace.
    How it shows up: Develops managers, grows senior engineers, creates learning plans and career paths.
    Strong performance looks like: Reduced single points of failure, strong succession, and improved retention.

  6. Bias for automation and continuous improvement
    Why it matters: Manual operations don’t scale; toil drives outages and burnout.
    How it shows up: Invests in IaC, self-service, standardization, and measurable toil reduction.
    Strong performance looks like: Fewer manual tickets, faster provisioning, lower on-call load.

  7. Pragmatic risk management
    Why it matters: Over-governance slows delivery; under-governance causes outages and audit failures.
    How it shows up: Calibrates controls by service criticality; introduces guardrails and automation instead of manual approvals.
    Strong performance looks like: Predictable delivery with fewer high-severity incidents and fewer audit surprises.

  8. Customer empathy (internal and external)
    Why it matters: Outages and friction harm trust; infra teams serve both engineers and end customers indirectly.
    How it shows up: Prioritizes reliability and developer experience; communicates in customer-impact terms.
    Strong performance looks like: Higher internal satisfaction and fewer customer-impacting regressions.


10) Tools, Platforms, and Software

Tools vary by company size and cloud provider. The table below reflects common enterprise and modern SaaS environments.

Category Tool / platform Primary use Common / Optional / Context-specific
Cloud platforms AWS Core cloud compute/network/storage/IAM Common
Cloud platforms Microsoft Azure Core cloud services (enterprise-heavy environments) Common
Cloud platforms Google Cloud Platform (GCP) Core cloud services (data/analytics-heavy) Optional
Container / orchestration Kubernetes (EKS/AKS/GKE) Container orchestration platform Common
Container / orchestration Helm / Kustomize Kubernetes packaging and configuration Common
Container registry ECR / ACR / GCR / Artifact Registry Image storage and scanning integration Common
IaC Terraform Declarative infrastructure provisioning Common
IaC CloudFormation / Bicep Provider-native IaC Optional
Config management Ansible OS configuration and automation Optional
Config management Chef / Puppet Legacy configuration management Context-specific
CI/CD GitHub Actions Automation for infra pipelines and checks Common
CI/CD GitLab CI CI/CD and runner management Common
CI/CD Jenkins Legacy/complex pipeline environments Context-specific
Git / source control GitHub / GitLab Version control and code review Common
Observability Datadog Metrics, APM, logs, dashboards Common
Observability Prometheus + Grafana Metrics collection and visualization Common
Observability OpenTelemetry Standardized instrumentation and traces Common
Logging ELK/Elastic Stack Centralized logging and search Optional
Logging Splunk Enterprise logging/SIEM integration Context-specific
Alerting / on-call PagerDuty On-call schedules, incident escalation Common
Alerting / on-call Opsgenie On-call and incident response Optional
ITSM ServiceNow Incident/problem/change/request workflows Context-specific
ITSM Jira Service Management Lightweight service desk and ITSM Optional
Collaboration Slack / Microsoft Teams Coordination, incident channels Common
Documentation Confluence / Notion Runbooks, standards, knowledge base Common
Project / portfolio Jira Backlog management, delivery tracking Common
Security (IAM) Okta / Entra ID (Azure AD) SSO, identity lifecycle Common
Secrets management HashiCorp Vault Secrets storage, dynamic credentials Common
Key management AWS KMS / Azure Key Vault Encryption key management Common
Edge / security Cloudflare CDN/WAF/DDoS protection Optional
Edge / security AWS WAF / Azure Front Door Cloud-native edge security Common
Networking Palo Alto / Fortinet Firewalling (enterprise/hybrid) Context-specific
Networking Cisco Routing/switching in hybrid environments Context-specific
Cost management AWS Cost Explorer / Azure Cost Management Spend analysis and budgeting Common
Cost management CloudHealth / Apptio FinOps, allocation, governance Optional
Policy-as-code OPA / Conftest Policy validation in pipelines Optional
Policy-as-code Terraform Sentinel Policy enforcement (Terraform Cloud/Enterprise) Context-specific
Endpoint / MDM Intune / Jamf Corporate device management (if under scope) Context-specific
Status page Statuspage / custom Customer incident communication Optional

11) Typical Tech Stack / Environment

Infrastructure environment

  • Predominantly cloud-based (single cloud or multi-cloud) with potential hybrid components (VPN/private links to corporate networks; occasional colocation or on-prem for legacy).
  • Standard patterns: multi-account/subscription strategy, shared services, segmented networks, centralized logging/observability.
  • Mix of managed services and self-managed components depending on maturity and compliance.

Application environment

  • Modern SaaS application layer often includes:
  • Microservices and APIs (REST/gRPC)
  • Containerized workloads on Kubernetes or managed container platforms
  • Some VM-based workloads (third-party software, legacy services, build systems)
  • Release model emphasizes continuous delivery with progressive delivery patterns (context-dependent).

Data environment

  • Managed databases (e.g., cloud relational databases) and caches/queues.
  • Data pipelines and analytics platforms may be under data engineering, but infrastructure typically owns foundational compute, networking, and observability integration.
  • Backup, retention, and encryption are cross-functional concerns, often executed through infra tooling.

Security environment

  • Shared responsibility with Security/GRC:
  • IAM governance and privileged access patterns
  • Secrets management and key management
  • Vulnerability remediation processes and patch SLAs
  • Audit evidence generation for infrastructure changes and access

Delivery model

  • Infrastructure delivered through:
  • IaC repos (modules and service stacks)
  • GitOps patterns for Kubernetes (context-specific)
  • CI pipelines for linting, plan/apply gating, policy checks
  • Production changes use staged rollouts, maintenance windows (where needed), and strong rollback patterns.

Agile or SDLC context

  • Infrastructure teams typically operate with a product-like backlog:
  • Roadmap-driven platform work
  • Interrupt-driven operational work (incidents, urgent fixes)
  • Guardrails to protect planned delivery from constant firefighting (toil reduction focus)

Scale or complexity context

  • The director scope is most common where:
  • Multiple product teams depend on shared infrastructure
  • There is meaningful uptime/SLA expectation
  • Cloud spend is material and requires governance
  • Audit and security demands require systematic controls

Team topology

A typical structure under or adjacent to this role (varies by company): – Platform Engineering (paved roads, self-service, cluster/runtime platforms) – SRE / Reliability (SLOs, incident response, resilience engineering) – CloudOps / Infrastructure Engineering (cloud foundations, networking, IAM patterns) – Corporate IT / Endpoint (sometimes separate; sometimes partially aligned) – Observability team (sometimes embedded in platform/SRE) – Network/Security engineering (may be separate; strong partnership is essential)


12) Stakeholders and Collaboration Map

Internal stakeholders

  • CTO / VP Engineering (typical manager): Align strategy, approve major investments, resolve trade-offs with product delivery.
  • Engineering Directors / VPs (Product Engineering): Platform needs, SLOs, release dependencies, prioritization and incident collaboration.
  • CISO / Head of Security: Security controls, vulnerability remediation priorities, audit readiness, IAM governance.
  • GRC / Compliance: Control mapping, evidence requirements, audit schedules, risk acceptance processes.
  • Finance / FP&A / FinOps: Budgeting, forecasting, cost allocation, optimization targets, vendor spend governance.
  • Procurement / Vendor Management: Contract negotiation, renewals, vendor risk reviews.
  • ITSM / Service Desk: Request workflows, incident/problem/change processes, knowledge base alignment.
  • Customer Support / Customer Success: Incident communications, customer-impact summaries, recurring reliability issues affecting escalations.
  • Product Management (platform/product): Align platform roadmaps with product priorities; quantify developer productivity improvements.

External stakeholders (as applicable)

  • Cloud provider account teams and support: Escalations, architecture reviews, credits, roadmap alignment.
  • Managed service providers / consultants: Specialized migrations, network projects, compliance support (where used).
  • Auditors: Evidence requests, control testing, remediation validation.

Peer roles

  • Director of Engineering (Product)
  • Director of SRE / Head of Reliability (in some orgs; sometimes under this role)
  • Director of Security Engineering
  • Director of IT / Corporate Systems
  • Enterprise Architect / Principal Architect

Upstream dependencies

  • Company strategy and growth forecasts (new markets, customer segments, regions).
  • Security and compliance requirements (controls, timelines).
  • Product roadmap timing (launches, traffic growth events).
  • Vendor delivery timelines (circuits, hardware lead times, provider features).

Downstream consumers

  • Product engineering teams deploying services
  • Data engineering and analytics teams consuming compute/storage and data platforms
  • Support/CS teams relying on operational transparency and incident handling
  • Customers relying on uptime and performance

Nature of collaboration

  • Co-ownership: Reliability is shared—infra provides platforms and guardrails; product teams own service behavior.
  • Enablement: Infra designs paved roads and reduces cognitive load; teams adopt and provide feedback.
  • Governance with empathy: Standards enforced through automation and default patterns rather than manual policing.

Typical decision-making authority and escalation points

  • The Director of Infrastructure is the escalation point for:
  • Persistent reliability risks
  • Cross-team dependency conflicts involving infrastructure
  • Major vendor outages or contract disputes
  • Budget overruns and urgent capacity needs
  • Escalates to CTO/VP Engineering when:
  • Trade-offs materially affect product commitments
  • Significant budget increases are required
  • Risk acceptance is needed for unresolved security/compliance gaps

13) Decision Rights and Scope of Authority

Decision rights should be explicit to prevent ambiguity and bottlenecks.

Can decide independently

  • Infrastructure operational procedures and team rituals (on-call structure, incident response processes).
  • Tooling configuration standards (alert routing rules, dashboard conventions, logging retention within agreed policy).
  • Prioritization within the infrastructure backlog for operational fixes and technical debt remediation (within agreed quarterly goals).
  • Implementation details for approved architectures (module design, rollout plans, default configurations).
  • Hiring recommendations and team structure adjustments within approved headcount.

Requires team/peer alignment (but not necessarily executive approval)

  • Major platform interface changes that impact product teams (new deployment patterns, deprecations, migration timelines).
  • SLO frameworks and ownership models (alignment with SRE and product engineering leadership).
  • Cross-cutting changes to CI/CD, identity patterns, or networking that require adoption by many teams.
  • Changes that affect Security control operation (e.g., secrets workflows, privileged access processes).

Requires manager/executive approval (CTO/VP Engineering, sometimes CFO/CISO)

  • Annual/quarterly budgets and material spend increases (cloud commitments, enterprise tooling contracts).
  • Major vendor selections and multi-year commitments (cloud provider EDPs, observability platform contracts).
  • Strategic architecture shifts (multi-region design, platform re-architecture, data center exit).
  • Risk acceptance decisions for critical vulnerabilities, DR gaps, or compliance exceptions.
  • Org-wide policy decisions that change developer workflows substantially.

Budget authority (typical)

  • Owns: infrastructure tooling and platform budgets, cloud spend governance, and vendor contract execution within approved budgets.
  • Partners with Finance: forecasting and variance management.
  • Partners with Procurement: negotiation and contracting.

Architecture authority (typical)

  • Owns: reference architectures for cloud foundation, runtime platforms, network patterns, observability baseline.
  • Shared: service architecture decisions with product engineering; infra defines guardrails and paved roads.

Vendor authority (typical)

  • Owns vendor evaluation and performance management for infra-specific vendors.
  • Coordinates with Security for vendor risk and with Procurement for contract terms.

Hiring authority (typical)

  • Owns hiring for infrastructure org (managers, SREs, platform engineers, network engineers).
  • Final approvals may require VP/CTO and HR business partner depending on company policy.

14) Required Experience and Qualifications

Typical years of experience

  • 12–18+ years in infrastructure, operations, platform engineering, SRE, or related engineering domains.
  • 5–8+ years in people leadership, including managing managers and/or leading multi-team organizations.

Education expectations

  • Bachelor’s degree in Computer Science, Engineering, or similar is common.
  • Equivalent practical experience is frequently acceptable, especially for leaders with deep operational backgrounds.

Certifications (relevant but not mandatory)

Labeling reflects typical enterprise preferences; certifications should not substitute for experience. – Cloud certifications (Common/Optional):
– AWS Solutions Architect (Associate/Professional)
– Azure Solutions Architect Expert
– Google Professional Cloud Architect
– Security certifications (Context-specific):
– CISSP (for security-heavy scope)
– CCSP (cloud security)
– ITSM/Service Management (Context-specific):
– ITIL Foundation (helpful in ITSM-heavy orgs)
– Kubernetes (Optional):
– CKA/CKAD (helpful if Kubernetes is core)

Prior role backgrounds commonly seen

  • Infrastructure Engineering Manager → Senior Manager → Director
  • Head of SRE / SRE Manager (especially in SaaS)
  • Platform Engineering Manager / Director (sometimes title variants)
  • Network Engineering Manager (in hybrid/enterprise contexts)
  • Systems Engineering / DevOps leadership roles

Domain knowledge expectations

  • Production operations in cloud environments; strong grasp of availability engineering.
  • Networking and IAM patterns sufficient to lead architecture decisions.
  • Operational governance: incident response, change management, DR.
  • Cost and vendor management at meaningful scale.
  • Compliance awareness (SOC 2/ISO 27001) if the company sells to enterprises; deep regulated expertise only if the company operates in regulated domains.

Leadership experience expectations

  • Experience leading through managers and building org structure.
  • Establishing operating rhythms and measurable outcomes.
  • Proven track record of handling critical incidents and driving systemic improvements.
  • Ability to influence across engineering and security without relying on authority alone.

15) Career Path and Progression

Common feeder roles into this role

  • Infrastructure Engineering Senior Manager
  • SRE Senior Manager / Head of SRE (smaller org)
  • Platform Engineering Senior Manager
  • Network/Systems Engineering Manager (in enterprise IT-heavy orgs)
  • Principal/Staff Infrastructure Engineer transitioning into leadership (less common but viable)

Next likely roles after this role

  • VP Infrastructure / VP Platform Engineering
  • VP Engineering (broader scope across product and platform, depending on background)
  • Chief Technology Officer (CTO) (in smaller companies or infrastructure-centric businesses)
  • Head of Technology Operations / SVP Technology (enterprise context)

Adjacent career paths

  • Security leadership track: Director of Security Engineering (if strong security inclination)
  • Architecture track: Enterprise Architect / Chief Architect (if architecture-heavy)
  • Program/operations track: Director of Technical Program Management (if execution governance-heavy)
  • Cloud/FinOps track: FinOps Director or Cloud Center of Excellence leader

Skills needed for promotion (Director → VP)

  • Multi-year strategic planning and investment governance across multiple domains.
  • Mature executive communication: board-level risk and investment narratives.
  • Proven ability to run a portfolio (multiple roadmaps) and deliver business outcomes through other leaders.
  • Strong vendor negotiation outcomes and financial accountability at larger scale.
  • Capability to drive org-wide operating model changes (ownership, SLO adoption, platform productization).

How this role evolves over time

  • Early tenure: Stabilize reliability, clarify ownership, reduce operational noise, create credibility.
  • Mid tenure: Build scalable platform capabilities, codify standards, mature DR and governance.
  • Later tenure: Optimize for leverage—self-service, paved roads, and organizational enablement; shift from “running infra” to “running an infrastructure product organization.”

16) Risks, Challenges, and Failure Modes

Common role challenges

  • High interrupt load: Incidents and escalations can consume capacity and derail strategic work.
  • Ambiguous ownership boundaries: Confusion between SRE, platform, product teams, and security creates gaps and duplication.
  • Legacy and tech debt: Unowned systems, manual processes, and inconsistent environments increase risk.
  • Tool sprawl: Overlapping monitoring, CI/CD, and security tools create cost and operational complexity.
  • Scaling pains: Growth increases traffic, data, and team count; architectures that worked at smaller scale break down.

Bottlenecks

  • Centralized approvals for IAM/network changes without automation.
  • Over-reliance on a few senior engineers for critical systems.
  • Insufficient environments or standardized provisioning slowing feature delivery.
  • Lack of observability consistency causing slow incident diagnosis.

Anti-patterns

  • Ticket-driven infrastructure with no product mindset: Becomes a request factory rather than an enablement platform.
  • Hero culture in incident response: Fixes symptoms, encourages burnout, avoids systemic prevention.
  • Over-governance: Manual change boards and excessive approvals that push teams to bypass processes.
  • Under-governance: No standards or guardrails; results in drift, insecure configs, and outages.
  • Vendor dependence without leverage: Contracts and support plans that don’t match business criticality.

Common reasons for underperformance

  • Treating infrastructure as purely technical, not socio-technical (process, incentives, ownership).
  • Inability to communicate trade-offs and obtain alignment across engineering and security.
  • Poor prioritization: chasing new tools while leaving top incident drivers unresolved.
  • Weak talent management leading to skill gaps, attrition, and execution instability.

Business risks if this role is ineffective

  • Increased outage frequency and customer churn; missed SLA commitments.
  • Slower product delivery due to fragile environments and manual provisioning.
  • Security incidents or failed audits due to missing controls and evidence.
  • Uncontrolled cloud spend and budget overruns.
  • Loss of key infrastructure talent due to burnout and unclear direction.

17) Role Variants

This role’s scope changes meaningfully by company size, maturity, and regulatory posture.

By company size

  • Small (startups, <200 employees):
  • Often more hands-on; may directly own Kubernetes/cloud ops and be a “player-coach.”
  • Smaller vendor portfolio; fewer formal ITSM processes.
  • Mid-size (200–2000):
  • Strong focus on platform engineering, standardization, and multi-team enablement.
  • More formal SLO/incident governance; meaningful FinOps and procurement involvement.
  • Enterprise (2000+):
  • Managing managers across multiple infra towers (network, compute, IAM, observability).
  • Heavy change governance, compliance evidence, and vendor management; potential global/regional operations.

By industry

  • General SaaS (typical): Reliability, cost, and developer experience are primary.
  • Financial services/healthcare (regulated): Stronger audit, change control, data protection, and DR requirements; more formal risk acceptance processes.
  • Gaming/media (traffic spikes): Elastic scaling, CDN strategy, performance, and capacity modeling become central.

By geography

  • Single-region focus: Simpler DR and networking needs; more centralized operations.
  • Multi-region/global: Requires region expansion playbooks, data residency considerations, follow-the-sun on-call (or vendor support), and more complex network and identity patterns.

Product-led vs service-led company

  • Product-led (SaaS): Platform capabilities and reliability are tied tightly to product velocity; self-service and paved roads are key.
  • Service-led (IT services/MSP): Greater emphasis on standardized delivery, customer-specific environments, contractual SLAs, and ITIL-style service management.

Startup vs enterprise operating model

  • Startup: Speed and pragmatism; fewer guardrails initially, but director must prevent fragile growth.
  • Enterprise: Formal governance, vendor management, and organizational complexity; director must keep process from stalling delivery.

Regulated vs non-regulated environment

  • Non-regulated: Can move fast with automated controls and lighter evidence requirements.
  • Regulated: Requires documented controls, audit trails, strict access reviews, defined RTO/RPO, and formal change management.

18) AI / Automation Impact on the Role

Tasks that can be automated (increasingly)

  • Alert correlation and deduplication: AI-assisted grouping of related alerts to reduce noise.
  • Incident triage support: Suggested likely causes, recent changes, and impacted services based on telemetry.
  • Runbook execution: Automated remediation for known failure modes (restart/redeploy, scale-out, failover toggles) with guardrails.
  • Cost anomaly detection and recommendations: Identifying spend spikes and proposing rightsizing or scheduling changes.
  • Policy checks in delivery pipelines: Automated validation of IaC changes against security and compliance policies.
  • Drafting operational artifacts: First-draft postmortems, incident timelines, and change summaries (human-reviewed).

Tasks that remain human-critical

  • Accountability and prioritization: Deciding what to fix, what to accept, and what to fund.
  • Risk trade-offs and governance design: Calibrating controls to business needs and culture.
  • Stakeholder alignment: Negotiating boundaries, adoption, and investment across executives and teams.
  • Talent leadership: Hiring, coaching, performance management, and organizational design.
  • Complex incident command: Ambiguous, multi-factor outages require judgment, coordination, and leadership presence.
  • Architecture decisions with long-term consequences: Selecting patterns that optimize for resilience, cost, operability, and team cognition.

How AI changes the role over the next 2–5 years

  • Shift from reactive operations to proactive operations: Directors will be expected to reduce toil faster and build automation-backed operating models.
  • Higher expectations for measurable platform productivity: Adoption metrics, developer experience signals, and internal customer satisfaction become more central.
  • More sophisticated governance via automation: Guardrails become embedded in pipelines and platforms rather than enforced by manual review.
  • Greater emphasis on data quality in observability: AI effectiveness depends on consistent instrumentation, service ownership metadata, and clean event streams.

New expectations caused by AI, automation, or platform shifts

  • Build an “automation portfolio” with ROI tracking (toil hours reduced, incidents avoided, time-to-provision improvements).
  • Establish policies for safe use of AI in operations (access controls, auditability, avoiding sensitive data leakage).
  • Upskill teams on AIOps tools and on how to validate/override automated recommendations.
  • Increase investment in internal platforms that standardize telemetry and operational workflows.

19) Hiring Evaluation Criteria

What to assess in interviews

  1. Infrastructure strategy and operating model design – Can the candidate describe a coherent model for platform engineering, SRE, and operations? – Can they set boundaries that reduce friction while improving reliability?

  2. Reliability leadership and incident command – Evidence of leading SEV incidents, improving MTTD/MTTR, and reducing recurrence. – Ability to implement blameless postmortems with real accountability.

  3. Cloud architecture depth (practical, not theoretical) – Strong understanding of cloud networking, IAM, scaling, and resilience. – Ability to reason about trade-offs: managed services vs. self-managed, multi-region complexity, cost vs. performance.

  4. Automation and IaC maturity – Experience building IaC standards, modules, and pipelines. – Focus on drift control, testing, and safe rollout patterns.

  5. Security and compliance partnership – Demonstrated ability to implement workable controls and succeed in audits. – Balanced approach: guardrails and automation over bureaucracy.

  6. Cost and vendor management – Budget ownership, forecasting, cost optimization examples, and contract negotiation experience.

  7. People leadership – Leading managers, developing senior talent, handling performance issues. – Creating sustainable on-call and retention strategies.

Practical exercises or case studies (recommended)

  • Case study: “Design the next 12 months of infrastructure priorities”
    Provide a scenario (rapid growth, rising incidents, high cloud spend, upcoming SOC 2 audit). Ask for:
  • Prioritized roadmap
  • Operating model changes
  • Metrics and reporting plan
  • Resourcing assumptions and risks

  • Incident review simulation (45–60 minutes)
    Provide an incident timeline and telemetry snippets. Evaluate:

  • How they run incident command
  • Communication clarity
  • Hypothesis-driven troubleshooting approach
  • Postmortem quality and action item rigor

  • Architecture deep dive: cloud landing zone & network segmentation
    Ask for an outline reference architecture and governance model:

  • Accounts/subscriptions strategy
  • IAM boundaries
  • Network segmentation and connectivity
  • Logging/observability integration

  • FinOps scenario: cost spike and unit economics
    Provide spend by service/team; ask how they would:

  • Investigate
  • Attribute costs
  • Drive optimization with accountability

Strong candidate signals

  • Uses outcome metrics (reliability, cost, delivery speed) rather than tool-based vanity measures.
  • Has a track record of reducing incidents via systematic fixes (not only firefighting).
  • Can clearly explain infrastructure trade-offs to executives and engineers.
  • Demonstrates pragmatic governance: automation-first guardrails.
  • Evidence of building resilient teams (succession, reduced single points of failure).

Weak candidate signals

  • Over-indexes on tool selection with limited evidence of operational outcomes.
  • Blames developers or security for friction; lacks collaboration patterns.
  • Cannot articulate an operating model; treats everything as “infra owns it.”
  • Limited experience with budget/cost accountability.
  • Avoids performance management or struggles to describe talent development.

Red flags

  • Normalizes hero culture and excessive on-call burden as “just how it is.”
  • Minimizes security/compliance (“we’ll handle it later”) without a risk-based plan.
  • Advocates for heavy manual approvals and gates without automation (likely to slow delivery and be bypassed).
  • Cannot provide examples of measurable improvements or sustained reliability gains.
  • Poor incident communication habits (vague updates, delayed escalation, no customer empathy).

Scorecard dimensions (with weighting guidance)

Use a structured scorecard to reduce bias and ensure consistency.

Dimension What “meets bar” looks like What “excellent” looks like Weight (example)
Infrastructure strategy Clear priorities tied to business outcomes Multi-year vision + pragmatic sequencing + trade-offs 15%
Reliability & operations Has run incidents and improved KPIs Builds reliability culture, SLO model, and prevention engine 20%
Cloud architecture Solid cloud and network fundamentals Designs scalable, secure foundations with strong governance 15%
Automation & IaC Uses IaC effectively Mature pipelines, policy-as-code, self-service patterns 10%
Security & compliance partnership Understands shared responsibility Implements operable controls, audit readiness, evidence automation 10%
FinOps & vendor management Can manage budgets and vendors Quantifies ROI, improves unit costs, negotiates strong terms 10%
People leadership Manages teams effectively Develops leaders, builds org, improves retention and performance 15%
Communication & influence Communicates clearly Executive-ready narratives + cross-functional alignment 5%

20) Final Role Scorecard Summary

Category Summary
Role title Director of Infrastructure
Role purpose Ensure infrastructure is reliable, secure, scalable, and cost-effective while enabling fast, safe software delivery through automation and clear operating models.
Top 10 responsibilities 1) Set infra strategy/roadmap 2) Own reliability outcomes & ops excellence 3) Lead incident/on-call governance 4) Establish cloud foundations & landing zones 5) Drive IaC and automation standards 6) Own observability baseline 7) Lead DR/BCP readiness and testing 8) Govern cost, capacity, and vendor portfolio 9) Partner with Security/Compliance on controls and audits 10) Build and lead a high-performing infrastructure org
Top 10 technical skills 1) Cloud architecture 2) Reliability operations (SRE principles) 3) Networking 4) IaC (Terraform) 5) Observability (metrics/logs/traces) 6) Security fundamentals (IAM, encryption, secrets) 7) DR and resilience engineering 8) CI/CD for infra delivery 9) FinOps/cost governance 10) Operating model/service ownership design
Top 10 soft skills 1) Systems thinking 2) Executive communication 3) Incident leadership under pressure 4) Stakeholder negotiation 5) Talent development 6) Continuous improvement mindset 7) Pragmatic risk management 8) Customer empathy 9) Prioritization and trade-off clarity 10) Accountability and follow-through
Top tools or platforms Cloud: AWS/Azure (common); Kubernetes; Terraform; GitHub/GitLab; Datadog/Prometheus/Grafana; PagerDuty; ServiceNow/Jira Service Management (context); Okta/Entra ID; Vault/KMS/Key Vault; Cloud cost tools (AWS/Azure native, optional Apptio/CloudHealth)
Top KPIs Availability/SLO attainment; SEV1/2 frequency; MTTD/MTTR; change failure rate; postmortem/action closure rate; on-call load; IaC coverage & drift; patch/vuln remediation SLAs; cost variance vs forecast; stakeholder satisfaction
Main deliverables Infra strategy & roadmap; reference architectures/standards; service catalog and ownership model; incident response program; DR plans and test evidence; observability baseline; IaC modules and automation pipelines; cost allocation dashboards; vendor portfolio and renewals plan; executive reporting/QBR materials
Main goals 30/60/90-day stabilization and roadmap alignment; 6-month measurable reliability and self-service improvements; 12-month maturity in governance, DR readiness, cost control, and platform enablement outcomes
Career progression options VP Infrastructure / VP Platform Engineering; VP Engineering (broader); CTO (context-dependent); Director of Security Engineering (adjacent); Enterprise/Chief Architect (adjacent)

Find Trusted Cardiac Hospitals

Compare heart hospitals by city and services — all in one place.

Explore Hospitals

Similar Posts

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments