This is the fully buzzword compliant version suitable for
resume bots and initial screeners. One-page version here.
Summary: |
Distinguished Infrastructure Security Architect
with over 20 years of experience building
and securing high-availability services at
internet scale. I provide long term vision,
high quality standards, a realistic threat
model, and a deep background in operations,
system administration, and teaching Computer
Science to protect against threats ranging
from nation-state adversaries to malicious
insiders and opportunistic attackers.
Chances are you've interacted directly or indirectly with code, sites, and systems on the internet that I've touched; I'd like to apologize for any inconveniences this may have caused. |
LinkedIn Profile | |
Experience: |
Current Positions:Akamai Technologies (2022 - present)Principal Security Architect Stevens Institute of Technology (2003 - present)Adjunct Professor of Computer Science Instructor for graduate level classes "Advanced Programming in the UNIX Environment" (based on the W. Richard Stevens book) and "Aspects of System Administration" (developed by myself). Past Positions: Yahoo! Inc. (2015 - 2022)(aka Oath Inc. / Verizon Media between 2017 and 2021)Distinguished Infrastructure Security Architect Principal member and Infrastructure Security Architect of the Yahoo Paranoids, our industry-wide recognized team of information security experts. I focus primarily on infrastructure architectural design and decisions that impact all of the company's internal systems across all layers of the OSI stack and all data centers, public cloud environments, and edge locations. I work at the intersection of an over 20-year old infrastructure spanning dozens of datacenters across the globe with massive cloud-native environments and products, covering countless edge cases not usually encountered in other environments; I'm involved in cleaning up after and working to make repeats impossible of some of the internet's biggest compromises, including insights that cannot be learned elsewhere, yet are invaluable to be applied everywhere. Recent projects included:
I provide research and meticulous analysis of the threat landscape and develop and report on company-wide metrics that help our team reduce our attack surface by making difficult decisions and prioritizing the most impactful work. At the same time, I enable our developers and engineers to improve productivity and move roadblocks out of their way, making Security their partner. Twitter (2013 - 2015)Staff Infrastructure Security Engineer Senior member of the Information Security team, team lead for security operations and infrastructure security. We coordinate incident response for company-wide security issues such as Heartbleed, Shellshock, POODLE etc; we maintain all of Twitter's SSL/TLS certificates; we perform internal and external security reviews, consult on internal and external facing feature development and infrastructure changes or planning. Rolled out Kerberos at Twitter and drove migration of Subversion, SSH, sudo(8), Git, and misc. services to use Kerberos; maintenance of monitoring and auditing around TLS certificates and supported cipher suites; wrote and maintained a tool to allow for user-friendly asymmetric encryption of secrets; helped designed key distribution system; wrote system software for and designed end-to-end solution around bootstrapping trust using TPMs in untrusted locations; regular end-user training to reduce risk of phishing and just general education of all engineers on security related issues. Etsy (2012 - 2013)Senior Network Security Engineer Yahoo! Inc. (2007 - 2011)Principal Paranoid, System Architect
Stevens Institute of Technology (2001 - 2006)System Administrator |
Publications/Talks: |
I've presented at various national and
international conferences, including RealWorld Crypto,
Velocity, O'Reilly Security, ICANN, ConFoo, BSides,
DevOpsDays, and NANOG; please see this page for selected talks. Book: Principles of System Administration Video Lecture Series: Advanced Programming in the UNIX Environment, System Administration |
Technical Skills: |
Specialties : Solving hard problems at the intersection of large scale infrastructure and security; realistic, long term strategic systems thinking;
conceptual integrity; threat modeling and Zero Trust; all things Unix;
automation of any thinkable task; DevOps, SRE, and hybrid cloud environmentsOS and Cloud:
NetBSD, FreeBSD, Linux
(RHEL, Ubuntu, ...), IRIX, MacOS X, Solaris; Amazon Web Services (AWS), Amazon Elastic Compute CloudProgramming Languages:
C, Perl, shell, Go, Java, PHP, Python, C++, SQL, some
Tcl/Tkwork samples Protocols, Services and Standards:
TCP/IP, UDP, HTTP, SMTP, DNSInformation Security:
SSH, SSL, TLS, x509 Certificate Management and PKIs, asymmetric and symmetric
key cryptography, PGP, authN/authZ, Kerberos (krb5), HSM, TPM
Spoken Languages:
English (fluent), German (native), Spanish (basic), French (elementary) |
Education: |
STEVENS INSTITUTE OF TECHNOLOGY Master of Science Computer Science (2004), Bachelor of Science Computer Science (2001) PHILIPS-UNIVERSITÄT MARBURG Marburg, Germany M.A. studies in Contemporary German Literature and American Studies (1996-1998) |
Other: |
Blog
Code
Presentations / Talks NetBSD developer since 2002 (find my name in your macOS stat(1) manual page) |