New York, New York, United States
I built security controls for Plaid's internal MCP server. This involved shipping a CLI-based auth flow with strong device guarantees (via DPoP), adding user-level audit logging for tool calls, and automatically identifying and rate limiting sensitive endpoints.
I also developed a new system for employees to access Kubernetes at Plaid. By integrating Kubernetes RBAC with Plaid's central permissioning service and introducing a proxy for live permission checks, I enabled user-based, just-in-time access to Kubernetes clusters.
In addition, I worked on cryptographic isolation of Plaid and Plaid CRA traffic for compliance. This involved attaching a signed claim (Plaid vs Plaid CRA) to every external-origin request and verifying that signature at every network hop in middleware.