About
I am a driven software professional with nearly a decade of experience in systems design and full-stack engineering, spanning CDNs, edge computing, and application servers. My career has been defined by a passion for scaling complex systems and a relentless focus on developer velocity.
Joined Curative to scale its multi-billion dollar COVID-19 testing business (35M tests and 2M+ vaccines). Later built the health insurance business from 0 to 190K members in 3 years.
Currently building Sierra Agents to automate call center operations, saving Curative significant administrative overhead, and improving response times for members and providers.
Mentored and cross-trained engineers. Established guilds and built social cohesion across the engineering organization.
After joining Booz Allen I became a founding member of the project team for Recreation.gov, a greenfield ecommerce project for national parks. I initially served as a Cloudformation SME responsible for Infrastructure as Code work before transitioning those responsibilities to focus on AWS Lambda and security-related tasks.
Highlights:
•
Wrote one-off deployments and progressed to writing abstractions in Cloudformation for others to manage. Translated concepts of inheritance from Java to Cloudformation by writing interface templates.
•
Pioneered use of Cloudformation and Lambda across project teams and trained teams in standards for creating AWS resources.
•
Built self-contained PCI compliant isolated environment for sensitive workload in three months.
Created a Lambda Function trigger for when EC2 instances were created that reads Tags on the instance and creates Alarms and DNS records, enabling health check alarms to monitor resource usage (CPU/Memory/IO)
•
Designed automated solutions to prevent bots from hitting recreation.gov. Initial solution was built to read streaming CDN logs parsed to a database in real-time, with the database scanned for offenders and updates sent to WAF to block IP address. Designed a more scalable solution using a push model with CDN logs stored in a SIEM with alerts pushing a webhook to trigger a Lambda workflow to block the IP address at WAF for a period of time.