Skills and Buzzwords
Kubernetes (k8s), AWS, GovCloud (US), Ansible, FedRAMP, Vulnerability
Remediation, Linux, Red Hat Enterprise Linux (RHEL), AWX / Ansible Control
Platform, FreeIPA / RedHat IdM, Kickstart, SSH, Nginx, MySQL, BIND, RSA SecurID,
OS Hardening, DNS, Switching and Routing, DevOps, F5 Load Balancing
(Local Traffic Manager / LTM and Global Traffic Manager / GTM), HAProxy,
Security
Misc.
Certified Kubernetes Administrator (CKA)
Issued: Jan 7, 2023 (valid)
Verify:
LF-9w4mf4b99e
Red Hat Certified Engineer (RHCE)
Issued: Mar 19, 2004 (NOT current)
Verify:
110-810-785
About
I am seeking the opportunity to be the technical leader for a Cloud Operations
team. I hope to leverage the experiences I've gained managing internet-facing
production environments for nearly 30 years by mentoring other engineers on
Linux, Ansible, Kubernetes, and other modern cloud technologies. I am motivated
to build stable, easy to manage environments and replace time-wasting technical
debt with long-term solutions utilizing DevOps best practices.
Experience
Sr FedRAMP Cloud Operations Engineer
Zoom Video Communications | July 2020 - July 2022
At Zoom I was a technical leader for the Zoom for Government Operations
team, managing Zoom's FedRAMP Authorized services. I joined the team
during the peak of the pandemic when Zoom was undergoing unprecidented
growth. I helped our newly formed team grow from 5 to over 30 members
while aggressively advocating the adoption of modern technologies and
DevOps best practices.
- Led numerous automation initiatives around instance and service
deployment, configuration, compliance, and vulnerability management
with Ansible
- Created internal reference architectures for internal single sign-on,
cloud-based OS image creation, and fully-automated node (instance)
provisioning
- Spearheaded effort to harden OS and service deployments to obtain
Department of Defense Impact Level 4 (IL4) Authorization
- Conducted bulk of 'Hiring Manager' screening interviews during rapid
expansion of team
- Mentored team members on the extended set of requirements and standards
for continued compliance in a FedRAMP environment
- Performed DBA duties until dedicated role was filled
- Heavy use of AWS services including: GovCloud (US), EC2, S3, RDS,
DynamoDB, ElastiCache, VPC, Security Groups, IAM
Sr Engineer
Cisco (Webex) | May 2016 - Jan 2020
At Cisco Webex I was a founding member of the FedRAMP Governance and
Compliance team. Our focus was on design, maintenance, and vulnerability
remediation vulnerability remediation. We managed the bastion and
authentication servers directly. Our team had responsibilities spread across
three separate environments; two with FedRAMP Moderate ATOs (Authority To
Operate) and a third in pre-production.
- Automated CentOS Security Hardening processes using both Ansible and
Puppet according to CIS benchmarks
- Created workflow to generate consistent, hardened CentOS VMware images
using Packer and Vagrant
- Redesigned existing DNS solution to significantly reduce amount of
resources and configuration work required to set up new customers
- Analyzed and remediated security vulnerabilities to meet Sponsoring
Agency requirements
- Designed and implemented proactive patching policies for Linux servers
(CentOS and RHEL) including support infrastructure to support patching
systems without Internet access
- Rebuilt existing FedRAMP RSA SecurID Cluster (two-factor authentication)
to eliminate single points of failure within the environment
Sr Operations Engineer
Pinger | May 2011 - Oct 2015
At Pinger I was a member of the small Network Operations team managing the
company's internet-facing services. Our responsibilities ranged from physically
rack mounting new equipment to 24/7 on-call support for production services
(and everything in between).
- Extensive OS and hardware level MySQL (Percona Server) tuning and
optimization
- Replaced aging Citrix Netscaler infrastructure with F5 LTM hardware
- Automated Linux OS install processes for CentOS servers
- Maintained physical datacenter location / equipment
- Designed and implemented a near real-time abuse blocking system utilizing
BGP at network edges
Sr Linux Systems Administrator
LiveOps | Sep 2007 - Mar 2011
At LiveOps I was a member of the small Server Operations team managing LiveOps
CentOS based servers and F5 load balancers. I was the only Systems
Administrator in Operations for 2 1/2 years.
- Responsible for the design, installation, and maintenance of 24x7 website
infrastructure
- Redesigned F5 load balancer and DNS infrastructure from ground up and
implemented design
- Played a key role in two data center build-outs
- Responsible for over 500 servers
- Took ownership of abandoned legacy systems and services
Sr Linux Systems Administrator
StubHub | Jan 2006 - Jul 2007
At StubHub I was a member of the small Operations team responsible for managing
the company's internet facing services. eBay acquired StubHub during my time
here.
- Responsible for the design, installation, and maintenance of 24x7 website
infrastructure
- Charter member of 'SWAT Team' formed as a cross-functional group tasked
with diagnosing and recommending actions for performance and stability issues
with production website
- Implemented shared storage infrastructure throughout production utilizing
Red Hat Cluster Suite and Global Filesystem
- Worked primarily with Red Hat Enterprise Linux
UNIX Systems Administrator
America Online (AOL) | Sep 2002 - Jun 2005
At America Online I was a member of the Test Operations team. Our focus was to
work with internal developers supporting any of their operational needs and find
any potential problem areas long before any planned production deployment. I
also achieved Red Hat Certified Engineer certification on RHEL 3.
UNIX Systems Administrator
iVMG / NetVMG | Nov 2000 - Jul 2002
At iVMG / NetVMG I was a member of the Server Operations team. This role
primarily focused on building internal systems and working with developers as
the company was still planning it's market strategy and had a very limited set
of non-revenue customers.
UNIX Systems Administrator III
MachOne Communications / Telocity | May 1998 - Sep 2000
At Telocity I was a member of the Systems Operations team. My responsibilities
were primarily around the initial build out and long-term maintenance of a full
set of services expected of an Internet Service Provider. Email, Usenet, Web
Services, DNS, etc.
UNIX Systems Administrator
Grin Net | Sep 1996 - Nov 1998
Grin Net was a small regional ISP startup focusing on dial-up access. I was the
solo 'Server Guy' in a 3 person company. My focus was managing BSD/OS systems
running various internet facing services as well as providing phone-based
technical support for our customers.
Technical Support Rep.
Hooked / Whole Earth Networks | Sep 1995 - Sep 1996
I began my career in technology at Hooked which was a regional Internet Service
Provider. My responsibilities were primarily to handle phone based technical
support for customers using Windows PCs.