Nurtured a cloud-native, event driven micro-service mindset with the developers whilst catering for cloud cost efficiency
Introduced Hyper-V and virtualization for hub/spoke sites
Seamlessly performed an AD cross forest migration on to a new AD forest with no disruption to end users
Global design & implementation of distributed file systems, Active Directory & EUC roaming
Represented SCC the customer weekly knowledge team & change approval board in an advisory capacity
Assist in the management and support of the Citrix XenApp 6.5 environment
Standardised server image reducing the storage footprint by half and incorporating baseline apps
Introduced Windows server images used to provision both virtual & physical machines leveraging SCCM, significantly reducing the lead time
Manage & support VMware vSphere clusters
Improve & streamline the Agile / Scrum environment / workflows
Integrated Intune with SCCM for iOS / Android MDM management & certificate distribution via NDES SCCM, Windows, Office365 & AD SME
Automated the implemented ‘internet based’ SCCM to streamline management of the Windows estate
Manage & support multi-site SCVMM private infrastructure
Successfully automated the migration of the entire SaaS virtual estate from VMware to SCVMM
Centralised script & task orchestration
Implemented resilient HA services e.g. Always-on OpenVPN integration with two-tier PKI
Achieved further business value from existing tool stacks Implemented corporate tooling on AWS ECS
Continuously evangelised automation (DevOps) practices
Hosted workshops centralise technical knowledge and expertise (PowerShell (incl. DSC) + SQL Server)
Multiple effective & accurate RCA conclusions
Containerised traditional based services deploying to Kubernetes Introduced Open Source alternatives to commercial products
Successfully pen-tested a client API exposing multiple vulnerabilities drove fixes to resolution while managing stakeholders
Part of a small team that supported Kubernetes workloads of >30k containers
Supported & evolved centralised ELK solutions to rapidly auto-scale & more efficiently cope with log shipping at scale
Leveraged open source tooling to enhance secret sharing, e.g. GPG, blackbox, keybase
Implemented GlusterFS/Heketi, Ceph, Longhorn PoC’s to provide persisted state in on-premise K8s clusters
Implement open source projects - Thanos, Longhorn, cert- manager, MetalLB & Istio
Resourcefully built upstream Kubernetes stacks in air-gapped environments
Deployed scalable Zookeeper/Kafka clusters on K8s
Introducing K8s HPA custom metrics from Sysdig to tune the cluster autoscaler
Integrated F5 & MetalLB with K8s Ingress
Identify and deliver on business requirements
Encouraged and empower team members to contribute back to upstream projects and the wider open-source community
Drove public/private cloud cost saving initiatives leveraging existing technology stacks in the 7 figures of magnitude
Successfully penetration tested a global AWS Lambda RDS-backed SPA – found multiple API vulnerabilities
Host workshops to fill technical skill gaps & drive technical creativity
Advocate & champion of effective collaboration/DevSecOps
Built a secure file sharing/redirection micro-service written in Python and deployed into Azure Kubernetes that returns one-time-use links as a 302 response for clients to follow and download direct from Azure blob container instead of a service that acts like a proxy which leads to faster upload/download times. The solution leveraged Azure Service Bus, Azure Blob Containers, Kubernetes, Managed Identities
Ensuring team members were empowered, accountable and engaged on a personal level with weekly 1-2-1, identifying & ensuring individual motivations are captured & challenged appropriately
Ensuring team members were empowered, accountable and engaged on a personal level with weekly 1-2-1, identifying & ensuring individual motivations are captured & challenged appropriately Advocate & champion of effective collaboration/DevSecOps Host workshops to fill technical skill gaps & drive technical creativity Successfully penetration tested a global AWS Lambda RDS-backed SPA – found multiple API vulnerabilities Drove public/private cloud cost saving initiatives leveraging existing technology stacks in the 7 figures of magnitude Encouraged and empower team members to contribute back to upstream projects and the wider open-source community Identify and deliver on business requirements Integrated F5 & MetalLB with K8s Ingress Introducing K8s HPA custom metrics from Sysdig to tune the cluster autoscaler Deployed scalable Zookeeper/Kafka clusters on K8s Resourcefully built upstream Kubernetes stacks in air-gapped environments Implement open source projects - Thanos, Longhorn, cert- manager, MetalLB & Istio Implemented GlusterFS/Heketi, Ceph, Longhorn PoC’s to provide persisted state in on-premise K8s clusters Leveraged open source tooling to enhance secret sharing, e.g. GPG, blackbox, keybase Supported & evolved centralised ELK solutions to rapidly auto-scale & more efficiently cope with log shipping at scale Part of a small team that supported Kubernetes workloads of >30k containers Successfully pen-tested a client API exposing multiple vulnerabilities drove fixes to resolution while managing stakeholders Containerised traditional based services deploying to Kubernetes Introduced Open Source alternatives to commercial products Multiple effective & accurate RCA conclusions Hosted workshops centralise technical knowledge and expertise (PowerShell (incl. DSC) + SQL Server) Continuously evangelised automation (DevOps) practices Achieved further business value from existing tool stacks Implemented corporate tooling on AWS ECS Implemented resilient HA services e.g. Always-on OpenVPN integration with two-tier PKI Centralised script & task orchestration Successfully automated the migration of the entire SaaS virtual estate from VMware to SCVMM Manage & support multi-site SCVMM private infrastructure Automated the implemented ‘internet based’ SCCM to streamline management of the Windows estate Integrated Intune with SCCM for iOS / Android MDM management & certificate distribution via NDES SCCM, Windows, Office365 & AD SME Improve & streamline the Agile / Scrum environment / workflows Manage & support VMware vSphere clusters Introduced Windows server images used to provision both virtual & physical machines leveraging SCCM, significantly reducing the lead time Standardised server image reducing the storage footprint by half and incorporating baseline apps Assist in the management and support of the Citrix XenApp 6.5 environment Represented SCC the customer weekly knowledge team & change approval board in an advisory capacity Global design & implementation of distributed file systems, Active Directory & EUC roaming Seamlessly performed an AD cross forest migration on to a new AD forest with no disruption to end users Introduced Hyper-V and virtualization for hub/spoke sites
Managed stakeholders, deliverables introducing & socialising agile/sprint to traditional IT stakeholders to also improve culture
Recruited for and grew high performing teams
Managed & led a number of project teams exceeding 10 members on central Government projects requiring 24x7 & 99.999% SLA
Adapt logging to expose structured event-based logging for added value and ease of monitoring/alerting for developers
Review product and mitigate security risks with ‘best practices’ in micro-service architecture e.g. JWT RS256 Authn/z and Istio to enforce
Socialise good security practices through workshops at early stages of developments (“shift-left”)
Funnel years of application and architecture security experience to secure both the business and product
Implement security governance & policy for all aspects of the business and product services
I did something awesome else
Point of contact for all security related matters
Successfully penetration tested an IoT-based SaaS platform finding XSS, SQL Injection and data disclosure through incorrect tenancy controls
Implemented Azure Application Gateway to leverage OWASP Core Rule Set to protect against (amongst others) the OWASP TOP 10 i.e. sql injection, XSS, code and shell injections
Significantly increased security and performance of several SaaS platforms by provisioning AWS Private Endpoints/Azure PrivateLinks whilst restricting public network access to the platform supernets. Performance was significantly increased by reducing the network hops service traffic had to do.
By default Azure services typically provisions endpoints that are publicaly accessible including the Azure Kubernetes API endpoint. For security, I migrated to Azure AKS environments that were built behind Azure Firewall’s that routed both ingress and egress traffic through. Ingress and Egress traffic was routed using UDR method and traffic was restricted at both Layer 4 and Layer 7 via Azure Firewall
Successfully exploited sites using tools like SQLMap to exfiltrate customer data.
Successfully exploited sites using tools like SQLMap to exfiltrate customer data.
Provisioned a private & internal hub and spoke topology with secure cross-platform remote accessing leveraging the Azure VPN service. The service was configured to auth with an internally provisioned two tier PKI. Users would leverage the Azure CLI to login and run a docker image which contained a script to configure a local OpenVPN client (incl. TunnelBlick) to connect securely to the Azure private LAN.
Designed and built a scalable (horizontal & vertical) observability service that consisted of single panes of glass and powered by ELK, Azure Monitoring/AWS CloudTrail Thanos.io, Prometheus, Grafana, AlertManager. This scraped and shipped logs centrally from many Kubernetes clusters in several regions. Prometheus, Filebeat and Metricbeat were configured to dynamically discover services and scrape/ship logs & metrics to the centralised platform.
Migrated to a modern CI/CD strategy using declarative tooling & GitOps-based pipelines through Terraform, FluxCD & Helm