Proven ability to rapidly become an expert in new fields and identify the critical path to implement decisive solutions with significant business and operational impact.
Engineer and technical planner with 16 years of experience planning operations and designing systems in both business and military settings working with researchers, engineers, operators, and end-users to create efficient and creative solutions.
Experienced project manager for rapid capability development teams of portable tactical RF devices.
Lead planner for technical and operational exercises involving multiple organizations at distributed locations.
Senior Software Engineer
Rebellion DefenseWashington, DC
Full-motion video processing and target recognition; pipeline development, integration, and deployment to support exercises.
Multi-modal geospatial data processing; developed GDAL/PDAL based ingestion pipeline, orthorectification, data management, and curated into machine-learning-ready datasets.
Created front-end visualizations, demos, and proofs-of-concept to support sales and guide product vision.
Supported the training, integration, and deployment of AI/ML systems, primarily Tensorflow-based.
Familiar with deploying products to hostile computing environments, classified enclaves, difficult approving authorities, and remote locations.
Defense Digital ServiceWashington, DC
Team lead to rapidly develop a tactical counter-UAS system. Oversaw hardware development, electrical design, RF processing, reverse-engineering effort and developed novel timing attack mechanism
ANET - deployed with a team to Afghanistan to develop, integrate, and hand-off a system to track and understand advisor engagements.
Developed, flight tested, and performed technology hand-off for an RF system to manipulate integrated air defense systems.
Supported selection process for a multi-billion dollar cloud acquisition.
Senior Cyberspace Operations Officer
Cyber National Mission ForceFort Meade, MD
As Senior Cyber Operations Officer (SCOO) directed the execution of over 200 cyberspace missions performed by a dozen National Mission Teams (NMTs). Responsible for maintaining situational awareness of all Cyber Inter Surveillance Reconnaissance, Operational Preparation of the Environment and Offensive Cyber Operations (OCO) performed by the Cyber National Mission Force (CNMF). Direct representative of the CNMF to cryptologic partners for CNMF efforts and projects aligned to NMTs.
Exercised Mission Commander role in monthly exercise of a cyber weapon system protecting forces fighting counter-terrorism. Investigated and uncovered critical bottleneck in utilization of capability. Directed quarterly drills for defensive counter cyber-attack missions developing procedures and policy for effective C2.
Managed growth during a period of doubling of operational tempo. Coordinated CNMF support for time-sensitive operations, setting precedent and establishing staff procedures for effective use of cyberspace C2 tools. Automated routine tasks via SharePoint and AngularJS based portal - effectively reducing manpower requirements by half. Cyber C2 Portal for Operations (C3PO) subject matter expert.
Facilitate and instruct the USCYBERCOM Mission Commander (MC) course. Establish curriculum, manage course content development and coordinate instructors to meet J7 requirements. Established precedent of an instructor cadre for standardization and professional excellence. Advised in the development of Mission Commander responsibilities and execution of named cyberspace operations.
Partnered with NSA Tailored Access Operations and NSA Threat Ops Center to deconflict and enable full-spectrum cyberspace operations.
Marine Forces Cyberspace CommandFort Meade, MD
Manage MARFORCYBER exercise participation, scheduling, and long-term development. Transformed ad hoc scheduling into a formal multi-year exercise support plan.
Lead planner for CYBER FLAG 15 and CYBER GUARD 15 exercises; scenario design, Command and Control construct, network/target design, logistics for 118 participants, and development of training objectives. CYBER FLAG 15 is a USCYBERCOM led force-on-force cyberspace training exercise fusing attack and defense across a full
spectrum of military operations. CYBER FLAG 15 was the first example of a headquarters element and supporting teams operating distributed across the nation. Provided technical expertise regarding network vulnerabilities and cyberspace threats.
Developed a repeatable exercise support package for MAWTS-1 for Weapons Tactics Instructor Course (WTI); integrating the first Cyberspace Electronic Warfare Coordination Cell (CEWCC) into student events and provided technical guidance for scenario development and integration with kinetic operations. Repeated iterations of the exercise throughout 2014-2015 showcased a safe means of integrating cyberspace operations.
Adopted an architectural framework to create a structured battlespace management methodology encompassing non-kinetics; Electronic Warfare, Cyberspace Operations, and the rest of Information Operations. The layered model allows for abstraction, separation of concerns, de-confliction, and common terminology used to sub-divide the information domain. This model was used during exercises to provide feedback for cyberspace doctrine development.
Senior Software Engineer
OpenTable Inc.San Francisco, CA (remote)
Part-time contractor for Copilot Labs Inc. until acquisition by OpenTable Inc. and renewed contract to perform DevOps and developer functions: maintain servers and back-end infrastructure, plan and execute major upgrades and migrations to AWS, design a CI/CD system and production environment, develop tools and utilities for administrators, and establish a security program.
Transitioned standalone servers into a scalable and fault-tolerant cluster architecture utilizing Amazon Web Services (AWS) including; EC2, S3, RDS, IAM, Elastic Beanstalk, EMR, ElastiCache, CloudWatch, and Route 53. Primary technologies used: Python, Django, MySQL, SQLite, Apache, nginx, Docker, Jenkins, git/Github, and a liberal abuse of shell scripting.
Improved the workflow and testing capabilities for developers and designers. Automated scaling for future expansion and business growth.
Performed security testing and a basic security audit of systems. Resolved critical vulnerabilities such as Heartbleed and ShellShock within 24 hours of public disclosure.
Sought this position after years of participating in Open Source programming and maintaining development skills during military service. This provided an initial opportunity to work in a small startup setting until acquisition where now the goal is to integrate with a larger organization.
Produced Scala and Haskell libraries and provided technical instruction as required by clients on an hourly basis. Produced required products on timeline and meeting client specification. For example:
Critical learning point was the importance of formal project specification and clear communication with clients to develop requirements. Several projects grew in scope, consuming additional time and attention.
Electronic Warfare Officer
Marine Tactical Electronic Warfare Squadron 4Cherry Point, NC
Flew over 900 hours in the EA-6B Prowler as an Electronic Counter-Measures Officer with 70 combat sorties for 291.1 combat hours with multiple deployments to Operation Enduring Freedom.
After basic training and Initially assigned to the Operations Department as a scheduler and quickly becoming the Subject Matter Expert for multiple ICAP III weapon systems and support systems. Familiarity with the systems and tactics led to an early assignment as the Electronic Warfare Department Head for Exercise Red Flag Alaska and deployment to MCAS Iwakuni, Japan. Simultaneously held collateral billets as Tactics Officer, Operational Security
Officer, Classified Material Control Center Custodian, and Joint Mission Planning System Officer.
Created a novel electronic attack technique applicable to several target sets and relying on an optimizing algorithm. Confirmed the tactic in coordination with Johns Hopkins University Jammer Technique Optimization Team and employed it in combat operations. Documented and corrected long-standing deficiencies in the tactical employment of the EA-6B by optimizing for the delivery of jamming power to a target. The opportunities to solve technical and tactical
challenges in an operational squadron and in collaboration with experts were rewarding professional experiences.
Technical Solutions Specialist
Google Inc.Mountain View, CA
Identified and prevented fraud in Google AdSense and AdWords by both automated tools and alert systems. Investigated flagged incidents for fraudulent behavior.
Leveraged machine learning algorithms such as self-organizing maps and classifying neural networks to discover novel click-fraud patterns of behavior. Discovered, investigated, and terminated several multi-million dollar accounts engaged in click duplication and traffic replication.
This position required a change of perspectives and thinking like a malicious actor; designing automated processes that can be utilized at a large scale.
Founder of Defense Digital Service Jyn Program and technical lead for the successful development of multiple SDR (software defined radio) capabilities which continue to be in use today.
Operated budget and planned the participation of up to 118 personnel in multiple locations for large exercises.
Planned logistics to maintain technical support to tactical operations during movements of personnel and equipment.
Experienced with planning and executing critical infrastructure migrations while minimizing business impact and downtime.
Experienced with Microsoft Project, SharePoint, and version control software (git, SVN, Darcs) for project management.
Nix contributor since 2013 and managing packages, designing NixOS modules, and reviewing contributions. Currently a committer to Nixpkgs.