Production scale
200-node AKS + 100TB+ datasets
Published in Raft data platform work.
Read the Raft write-upCareer Notes
My path from PowerShell automation to cleared defense platform engineering, and how I run reliability-first agentic workflows in production.
selected signal from the full story below
Production scale
200-node AKS + 100TB+ datasets
Published in Raft data platform work.
Read the Raft write-upSecure environments
IL5 / IL6 + air-gapped operations
TS-cleared delivery with strict controls.
Related Fox coverage (Starsage AI test)Platform coverage
OpenShift, AKS, EKS, GKE, RKE2
Plus local Kind and k3s validation loops.
what I spend most cycles on
Current lane
Senior DevSecOps Engineer at Raft. Shipping secure platform capabilities across classified and unclassified environments with TS clearance.
Platform depth
Kubernetes across OpenShift, AKS, EKS, GKE, RKE2, plus local Kind/k3s for fast validation before bigger rollouts.
Delivery style
GitOps-first delivery with ArgoCD, Terraform/Terragrunt automation, and review rails that keep ownership clear.
Where it started
PowerShell roots: AdminToolkit, HelpDesk, and a lot of script-driven cleanup in regulated environments.
automation roots -> platform depth -> agentic delivery
2024 -> now
Raft | Sr. DevSecOps Engineer
Defense platform delivery across classified and unclassified environments, with agentic workflow enablement and secure GitOps.
2022 -> 2024
Lumen | Infrastructure + Platform Engineering
Kubernetes platform operations, admission controls, namespace automation, and developer-platform guardrails.
2020 -> 2022
Ansira | DevOps Engineering
Terraform-based infrastructure, CI/CD pipelines, and certificate automation that removed repetitive manual work.
2016 -> 2020
Nebraska Public Power District | IT Automation
PowerShell-heavy automation roots in a regulated environment, including DNS/AD workflows and internal tooling.
I did not start as a “platform engineer.” I started writing PowerShell because I was tired of repetitive clicks and manual runbooks. That turned into a long path through IT support, DevOps, platform engineering, and now defense-oriented DevSecOps work where reliability and security are non-negotiable.
At Nebraska Public Power District, I learned to treat scripting like a force multiplier in a regulated environment.
This was where I built the habit that still drives my work: if a task is repeated, it should be automated, tested, and documented.
At Ansira, I shifted from IT scripting to end-to-end DevOps delivery.
I also earned CISSP during this window, which sharpened how I think about tradeoffs between speed and control.
At Lumen (first on a full-stack DevOps team, then on platform engineering), I went deep on Kubernetes operations and internal developer platforms.
This is where I moved from “I can ship code” to “I can build and operate platform guardrails for many teams.”
In parallel, I also worked on blockchain infrastructure automation at InFlux.
That work reinforced the same platform lesson: scale comes from reliable process and automation contracts, not heroics.
As a Senior DevSecOps Engineer at Raft, I support mission-critical platform delivery in a TS-cleared context.
Specific mission details stay private, but the engineering patterns are the same: automate carefully, verify continuously, and keep accountability explicit.
I use agentic workflows in real engineering delivery, not as a toy demo. The rule is simple: useful automation only counts if it improves reliability.
Outside day-job delivery, I spend a lot of time helping people level up.
Teaching and sharing force me to keep my own thinking honest. If I cannot explain it clearly, I probably do not understand it deeply enough yet.
This page is not a polished corporate bio. It is a practical map of how I work: automate repetitive effort, keep ownership explicit, respect security constraints, and optimize for reliable delivery under pressure.