Technical planner and developer with 15 years of experience planning operations and designing systems in both business and military settings working with researchers, engineers, operators, and end-users to create efficient and creative solutions.
Experienced technical lead and operational planner involving multiple organizations at distributed locations.
Proven ability to identify and implement decisive solutions with significant business and operational impact.
Digital Services Expert
Defense Digital ServicePentagon
Engineer on ANET, a project to support NATO and US advisors in Afghanistan to manage their engagements with local government. Deployed and trained users for initial adoption and transitioned the project to a team of NATO developers for long-term support.
Spearheaded code.mil to increase usage and adoption of open source for the needs of the DoD. Created a novel approach to address the copyright and licensing issues often faced by government entities.
Founded the Jyn Erso program, a overall effort to re-imagine the way the DoD can utilize technical talent in the military and apply it to relevant problems. After two years, the original program with ARCYBER has expanded into additional programs, a facility in Augusta, GA, and expansion to include all branches of the armed forces. Responsible for project selection, building the teams, and technical leadership.
Technical lead for the initial Jyn 1 project to develop Darkbridge, a man-packable system based on a software defined radio to detect and defeat commercial drones used on the battlefield. Created the first portable live demodulator for the target signal and a novel attack technique. The system is currently deployed to theater and the techniques developed have been adopted by several COTS and GOTS capability providers.
Technical lead for Jyn 5, dubbed "Hack the FAA", focused on improving the security of the nation's air traffic control system. Demonstrated multiple vulnerabilities over the course of multiple flight tests and providing recommendations for remediation. Trained additional military operators and transitioned the technology to industry partners for additional platform integration.
Involved in additional projects such as the creation of burnable infrastructure, JEDI acquisition, and a BeyondCorp-style deployment.
Senior Cyberspace Operations Officer
Cyber National Mission ForceFort Meade, MD
As Senior Cyber Operations Officer (SCOO) directed the execution of over 200 cyberspace missions and nearly 900 hours of execution performed by a dozen National Mission Teams (NMTs). Responsible for maintaining situational awareness of all Cyber Inter Surveillance Reconnaissance, Operational Preparation of the Environment and Offensive Cyber Operations (OCO) performed by the Cyber National Mission Force (CNMF). Direct representative of the CNMF to cryptologic partners for CNMF efforts and projects aligned to NMTs.
Exercised Mission Commander role in monthly exercise of a cyber weapon system protecting forces fighting counter-terrorism. Investigated and uncovered critical bottleneck in utilization of capability. Directed quarterly drills for defensive counter cyber-attack missions developing procedures and policy for effective C2.
Managed growth during a period of doubling of operational tempo. Coordinated CNMF support for time-sensitive operations, setting precedent and establishing staff procedures for effective use of cyberspace C2 tools. Automated routine tasks via SharePoint and AngularJS based portal - effectively reducing manpower requirements by half. Cyber C2 Portal for Operations (C3PO) subject matter expert.
Facilitate and instruct the USCYBERCOM Mission Commander (MC) course. Establish curriculum, manage course content development and coordinate instructors to meet J7 requirements. Established precedent of an instructor cadre for standardization and professional excellence. Advised in the development of Mission Commander responsibilities and execution of named cyberspace operations.
Partnered with NSA Tailored Access Operations and NSA Threat Ops Center to deconflict and enable full-spectrum cyberspace operations.
Marine Forces Cyberspace CommandFort Meade, MD
Manage MARFORCYBER exercise participation, scheduling, and long-term development. Transformed ad hoc scheduling into a formal multi-year exercise support plan.
Lead planner for CYBER FLAG 15 and CYBER GUARD 15 exercises; scenario design, Command and Control construct, network/target design, logistics for 118 participants, and development of training objectives. CYBER FLAG 15 is a USCYBERCOM led force-on-force cyberspace training exercise fusing attack and defense across a full
spectrum of military operations. CYBER FLAG 15 was the first example of a headquarters element and supporting teams operating distributed across the nation. Provided technical expertise regarding network vulnerabilities and cyberspace threats. These exercises include the design and exploitation of full enterprise Windows environments (up to regional and national networks) as well as attack platforms and replication of public Internet services.
Developed a repeatable exercise support package for MAWTS-1 for Weapons Tactics Instructor Course (WTI); integrating the first Cyberspace Electronic Warfare Coordination Cell (CEWCC) into student events and provided technical guidance for scenario development and integration with kinetic operations. Repeated iterations of the exercise throughout 2014-2015 showcased a safe means of integrating cyberspace operations.
Adopted an architectural framework to create a structured battlespace management methodology encompassing non-kinetics; Electronic Warfare, Cyberspace Operations, and the rest of Information Operations. The layered model allows for abstraction, separation of concerns, de-confliction, and common terminology used to sub-divide the information domain. This model was used during exercises to provide feedback for cyberspace doctrine development.
Senior Software Engineer
OpenTable Inc.San Francisco, CA (remote)
Part-time contractor for Copilot Labs Inc. until acquisition by OpenTable Inc. and renewed contract to perform DevOps and developer functions: maintain servers and back-end infrastructure, plan and execute major upgrades and migrations, design a continuous integration development and production environment, develop tools and utilities for administrators, and establish a security program.
Transitioned standalone servers into a scalable and fault-tolerant cluster architecture utilizing Amazon Web Services including; EC2, S3, RDS, IAM, Elastic Beanstalk, EMR, ElastiCache, CloudWatch, and Route 53. Primary technologies used: Python, Django, MySQL, SQLite, Apache, nginx, Docker, Jenkins, git/Github, and a liberal abuse of shell scripting.
Improved the workflow and testing capabilities for developers and designers. Automated scaling for future expansion and business growth.
Performed security testing and a basic security audit of systems. Resolved critical vulnerabilities such as Heartbleed and ShellShock within 24 hours of public disclosure.
Sought this position after years of participating in Open Source programming and maintaining development skills during military service. This provided an initial opportunity to work in a small startup setting until acquisition where now the goal is to integrate with a larger organization.
Produced Scala and Haskell libraries and provided technical instruction as required by clients on an hourly basis. Produced required products on timeline and meeting client specification. For example:
Critical learning point was the importance of formal project specification and clear communication with clients to develop requirements. Several projects grew in scope, consuming additional time and attention.
Electronic Warfare Officer
Marine Tactical Electronic Warfare Squadron 4Cherry Point, NC
Flew over 900 hours in the EA-6B Prowler as an Electronic Counter-Measures Officer with 70 combat sorties for 291.1 combat hours with multiple deployments to Operation Enduring Freedom.
After basic trainig and Initially assigned to the Operations Department as a scheduler and quickly becoming the Subject Matter Expert for multiple ICAP III weapon systems and support systems. Familiarity with the systems and tactics led to an early assignment as the Electronic Warfare Department Head for Exercise Red Flag Alaska and deployment to MCAS Iwakuni, Japan. Simultaneously held collateral billets as Tactics Officer, Operational Security
Officer, Classified Material Control Center Custodian, and Joint Mission Planning System Officer.
Created a novel electronic attack technique applicable to several target sets and relying on an optimizing algorithm. Confirmed the tactic in coordination with Johns Hopkins University Jammer Technique Optimization Team and employed it in combat operations. Documented and corrected long-standing deficiencies in the tactical employment of the EA-6B by optimizing for the delivery of jamming power to a target. The opportunities to solve technical and tactical
challenges in an operational squadron and in collaboration with experts were rewarding professional experiences.
Technical Solutions Specialist
Google Inc.Mountain View, CA
Identified and prevented fraud in Google AdSense and AdWords by both automated tools and alert systems. Investigated flagged incidents for fraudulent behavior.
Leveraged existing machine learning algorithms such as self-organizing maps and classifying neural networks to discover novel click-fraud patterns of behavior. Revealed and terminated several multi-million dollar accounts engaged in click duplication and traffic replication.
This position required a change of perspectives and thinking like a malicious actor; designing automated processes that can be utilized at a large scale.
IT Project Management
Planned two critical infrastructure migrations while minimizing business impact and downtime.
Operated budget and planned the participation of up to 118 personnel in multiple locations for large exercises.
Developed logistics to maintain technical support to tactical operations during movements of personnel and equipment.
Experienced with Microsoft Project, SharePoint, and version control software (git, SVN, Darcs) for project management.
Experienced in a myriad of languages and frameworks, with specific attention on strong type systems, formal verification, and packaging.
Contributor and maintainer of NixOS, a Linux distribution based on a declarative approach to configuration management.
Experience in deploying capabilities based on software defined radios, GNU Radio, and signals reverse engineering.
System Administration and DevOps
Used Linux commercially, on desktop, and personal servers since 2001. Tried RedHat, Ubuntu, Arch, (and Plan 9!) before becoming involved with NixOS due to its purely functional philosophy regarding configuration, upgrades, deterministic builds, and a mix of binary and source distribution.
Supported experimental, development, continuous integration, and production environments for Copilot Labs Inc. and subsequently for OpenTable Inc.
Experienced with virtualization, including VMWare, vSphere, XEN, QEMU, as well as Amazon Web Services (AWS) and many public and private cloud platforms.
Maintain a honeypot in order to investigate current trends in remote exploitation.