Career Notes

Career

My path from PowerShell automation to cleared defense platform engineering, and how I run reliability-first agentic workflows in production.

Career at a glance

selected signal from the full story below

Platform coverage

OpenShift, AKS, EKS, GKE, RKE2

Plus local Kind and k3s validation loops.

Current lanes

what I spend most cycles on

  • ArgoCD GitOps delivery across production clusters with tight audit trails.
  • Terraform/Terragrunt automation for repeatable platform changes.
  • Agentic orchestration patterns with one owner per change and explicit review.
  • Security and compliance rails: STIG hardening, secret handling, and policy enforcement.

Current lane

Senior DevSecOps Engineer at Raft. Shipping secure platform capabilities across classified and unclassified environments with TS clearance.

Platform depth

Kubernetes across OpenShift, AKS, EKS, GKE, RKE2, plus local Kind/k3s for fast validation before bigger rollouts.

Delivery style

GitOps-first delivery with ArgoCD, Terraform/Terragrunt automation, and review rails that keep ownership clear.

Where it started

PowerShell roots: AdminToolkit, HelpDesk, and a lot of script-driven cleanup in regulated environments.

Timeline snapshot

automation roots -> platform depth -> agentic delivery

  • 2024 -> now

    Raft | Sr. DevSecOps Engineer

    Defense platform delivery across classified and unclassified environments, with agentic workflow enablement and secure GitOps.

  • 2022 -> 2024

    Lumen | Infrastructure + Platform Engineering

    Kubernetes platform operations, admission controls, namespace automation, and developer-platform guardrails.

  • 2020 -> 2022

    Ansira | DevOps Engineering

    Terraform-based infrastructure, CI/CD pipelines, and certificate automation that removed repetitive manual work.

  • 2016 -> 2020

    Nebraska Public Power District | IT Automation

    PowerShell-heavy automation roots in a regulated environment, including DNS/AD workflows and internal tooling.

I did not start as a “platform engineer.” I started writing PowerShell because I was tired of repetitive clicks and manual runbooks. That turned into a long path through IT support, DevOps, platform engineering, and now defense-oriented DevSecOps work where reliability and security are non-negotiable.

Career progression

2016 to 2020: automation first, titles later

At Nebraska Public Power District, I learned to treat scripting like a force multiplier in a regulated environment.

  • Built and maintained internal PowerShell tooling and shared modules.
  • Automated repetitive AD reporting and operational checks.
  • Scripted DHCP and DNS migration work, including Azure DNS movement.
  • Supported user access and permission workflows with policy discipline (NERC-heavy culture).
  • Finished my B.S. in Computer Information Systems and earned Security+.

This was where I built the habit that still drives my work: if a task is repeated, it should be automated, tested, and documented.

2020 to 2022: formal DevOps delivery

At Ansira, I shifted from IT scripting to end-to-end DevOps delivery.

  • Architected Terraform deployments for Azure infrastructure across environments.
  • Built CI/CD flows with TeamCity, PowerShell, and PSake.
  • Automated PKI lifecycle work that reduced hours of manual effort to seconds.
  • Improved build throughput with parallelization and repeatable release mechanics.
  • Worked directly with developers, DBAs, and security stakeholders to keep delivery moving without sacrificing compliance.

I also earned CISSP during this window, which sharpened how I think about tradeoffs between speed and control.

2022 to 2024: cloud-native and platform depth

At Lumen (first on a full-stack DevOps team, then on platform engineering), I went deep on Kubernetes operations and internal developer platforms.

  • Built APIs and services in Go, and shipped Kubernetes resources via Helm on GKE.
  • Used Terraform, Ansible, and Vault to stand up private VPC test environments with user-specific VPN access.
  • Created and maintained CI pipelines across a multi-repo platform.
  • Implemented Kubewarden admission policies on large clusters.
  • Worked with the Kubewarden dev team on policy functionality in Go.
  • Automated project and namespace creation through a simple front-end form backed by Ansible, Rancher project setup, resource quotas, and Azure AD group mapping.
  • Built and configured AWX/Ansible workflows to scale consistent operations for the team.

This is where I moved from “I can ship code” to “I can build and operate platform guardrails for many teams.”

2022 to present: ansible-driven scaling projects (InFlux)

In parallel, I also worked on blockchain infrastructure automation at InFlux.

  • Rebuilt rigid shell-based install/config processes into Ansible-driven workflows.
  • Used Terraform and Ansible to provision and configure Flux node infrastructure.
  • Converted single-node assumptions into fleet-oriented automation patterns.
  • Focused on idempotent, repeatable config so scaling operations stayed predictable.

That work reinforced the same platform lesson: scale comes from reliable process and automation contracts, not heroics.

2024 to present: defense platform and DevSecOps at Raft

As a Senior DevSecOps Engineer at Raft, I support mission-critical platform delivery in a TS-cleared context.

  • Run ArgoCD-based GitOps workflows for secure, auditable Kubernetes deployments in sensitive environments.
  • Operate in production OpenShift, AKS, and RKE2 ecosystems, plus local Kind workflows for development validation.
  • Deploy and maintain platform capabilities in strict environments, including air-gapped IL6 conditions.
  • Scale and manage AKS and EKS infrastructure with Terraform and Terragrunt.
  • Built Terraform-focused GitHub pipelines that validate and apply infrastructure changes with consistent controls.
  • Handle classified and CUI workflows across contracts with cross-functional teams under clearance constraints.
  • Work across security, platform, and application roles where context switching is constant and documentation quality matters.

Specific mission details stay private, but the engineering patterns are the same: automate carefully, verify continuously, and keep accountability explicit.

Agentic engineering in production

I use agentic workflows in real engineering delivery, not as a toy demo. The rule is simple: useful automation only counts if it improves reliability.

Multi-agent orchestration

  • I split work into clear roles (discovery, implementation, verification) so context is focused and handoffs are intentional.
  • I parallelize read-heavy workstreams first (discovery and review), then keep exactly one writer for edits.
  • I treat orchestration output as input to engineering judgment, not a replacement for it.

Explicit ownership

  • Every change has a named owner for implementation and a named owner for review.
  • “The agent did it” is never an acceptable production accountability model.
  • I keep ownership boundaries clear in incident response and release work so decisions are traceable.

Review rails

  • I expect policy rails before merge: linting, tests, security checks, and environment-aware validation.
  • For platform and policy changes, I bias toward diff review plus behavioral verification, not just static green checks.
  • For GitOps changes, I care about auditability and drift control as much as speed.

Rollback expectations

  • If I cannot explain rollback in plain language, the change is not ready.
  • Infrastructure and policy updates should have deterministic rollback paths, not improvised fixes.
  • I plan for partial failure up front, especially in secure or air-gapped deployment paths.

Reliability over hype

  • I prefer boring, debuggable workflows over flashy autonomous behavior.
  • The goal is lower incident rate and faster recovery, not maximum novelty.
  • Agentic systems should reduce operational load and increase clarity for humans on-call.

Community, mentoring, and public work

Outside day-job delivery, I spend a lot of time helping people level up.

  • I maintain this site to document what worked, what failed, and what changed after incidents.
  • I stream open-source and infra work on Twitch.
  • I mentor and support engineers in community spaces, including PowerShell-focused Discord groups.
  • I keep building in public through GitHub projects and practical writeups.

Teaching and sharing force me to keep my own thinking honest. If I cannot explain it clearly, I probably do not understand it deeply enough yet.

Why this page exists

This page is not a polished corporate bio. It is a practical map of how I work: automate repetitive effort, keep ownership explicit, respect security constraints, and optimize for reliable delivery under pressure.