About me
I kinda have a weird job.
On a day-to-day basis, I leverage over 15 years of full-stack software and cloud experience to engineer my organization’s way through thorny cloud-related problems, deliver an identity-centric cloud access strategy, and (try to) keep our cloud environments secure by default.
My professional journey has lately been focused on forming diverse yet secure cloud infrastructure environments and guiding high-level decision-making to deliver that vision. With a track record of designing and implementing services and strategies that accelerate developer operations while maintaining our security goals, I help my teams ship sustainable projects and, hopefully, help our partners work in better ways than they could before.
The cloud environments I work on tend to be large, which breaks a lot of vendors. As a result, we often have to either build or contribute solutions that meet our needs. Doing this requires a sometimes tricky blend of software and cloud infrastructure knowledge because what we deliver has to land, be well-tested and maintained, and be scalable and nuanced to our needs. As a result, I also end up mentoring folks on both ends of the software/infrastructure spectrum.
Finally, cloud security work involves a lot of coordination between the security team, other engineering teams, vendors, and cloud service providers. As such, I do a lot of writing, pitching, pleading, and planning.
Some examples of my work include:
- An AWS review program for a top 10 US bank to map new services to existing IAM-based or software-driven regulatory controls or develop new software-driven compensating controls
- A principal engineer for two cloud security start-ups, leading proposal, design, and implementation phases for new products and features
- Four different CMDB and one CIEM design and implementation projects
- Principal inventor on two patents related to cloud provider analysis 1
- Helped navigate two acquisitions of cloud management software companies
- A first responder to a headline cybersecurity incident, performing forensic collection on over 10PB of object storage
- A CSPM program for an industry-leading SaaS provider covering 25k+ AWS accounts and 10k Azure subscriptions
- An internal short-term secure token service for local developer machines, Terraform Cloud, and GitHub Actions to access corporate environments
- An AWS IAM role and policy distribution service to deploy 10s of thousands of centrally managed IAM resources
- An AWS Account/Azure Subscription/GCP Project vending solution for teams to self-service operational segmentation strategies
1. In case you are curious, those two patents are Providing on-demand production of graph-based relationships in a cloud computing environment and Using cached summaries for efficient access analysis for cloud provider entities.