About

20 years building
infrastructure at scale.

I started at Rackspace in 2005 as a Linux support technician. By 2009, I was a founding member of the Cloud Servers team — one of the first public cloud offerings before that term meant what it means today.

From there: Amazon AWS, where I spent six years across Premium Support, IAM Authentication infrastructure, and RDS Operations. I was the escalation point for complex database issues across MySQL, PostgreSQL, MSSQL, Oracle, and Aurora. I built high-availability infrastructure for AWS's own internal systems.

Since 2019, I've been at Salesforce GovCloud as a Systems Security Engineer — building and operating FedRAMP-compliant cloud infrastructure, leading certificate lifecycle and PKI operations, and writing production Go tooling. I built sprint3r, a Go CLI for automated sprint tracking that integrates with GUS (Salesforce's internal work tracker) and posts to Slack.

Outside of work, I run a four-node Proxmox homelab with Ceph storage, a Talos Kubernetes cluster, and 15+ self-hosted services — all managed with Terraform and Ansible. That's where I prototype the systems I later recommend to clients.

Career
2019–now
Systems Security Engineer
Salesforce GovCloud
FedRAMP compliance, PKI/certificate lifecycle management, security tooling in Go, Terraform, Kubernetes.
2016–2019
RDS Operations & SecOps
Amazon AWS
Platform stability, database escalation (MySQL, PostgreSQL, MSSQL, Oracle, Aurora). Premium support escalation point.
2014–2016
IAM Authentication
Amazon AWS
IAM stack health and multi-location HA solutions for Data Warehouse and Tagris internal systems.
2012–2014
Premium Support Engineer
Amazon AWS
Full-stack AWS support (EC2, S3, Beanstalk) with on-call SLA management.
2005–2012
Various engineering roles
Rackspace
Linux support → Cloud Servers founding team → Professional Services (VPS/cloud migrations, Domino's Pizza) → Email and Apps infrastructure.