~/root
role: infra_engineer::builder::architect
"I use tools to create tools to solve everyday problems so that we can all go home on time."
I use AI and automation to build operator-facing tooling for infrastructure problems — remediation, compliance, repeatable workflows. The kind of work that usually lives in a shared doc nobody updates — I turn it into something you can actually run, audit, and hand off.
open_to_work: true
documentation: current
prod_validated: partial
~/home
// background
father
husband
veteran
chill guy
I grew up in rural eastern Ohio — three stoplights in the whole county type of place — joined the Air Force, and was stationed at Hurlburt Field in Florida. I worked on AC-130 gunships, MC-130 Talon IIs, and MH-53 Pave Low helicopters across multiple deployments. When my service was up, I settled in Middle Tennessee, where I live now with my wife and daughter.
// outside the terminal
retro gaming
old hardware
jeep trails
drums
tabletop
rpg's
sci-fi
live comedy
concerts
cooking
When I'm not in a terminal, you'll find me crawling down trails in my Jeep — or most likely working on it because it's broken again — behind a drum kit I've been playing since fifth grade, or deep in a retro gaming rabbit hole. Part of that is nostalgia, part of it is finally being able to own all the things I couldn't growing up. I collect old hardware for the same reason: there's history in it.
When the WiFi goes down on purpose, I'm into tabletop games and RPGs, sci-fi, live comedy, concerts, and music festivals. I cook. I'm usually learning something new just because it's interesting.
~/lib
Accumulated dependencies. This is the full reference — experience, skills, certifications, education. Read it like a man page. Download if you need something to hand off.
"I've automated a lot of things. None of them were things I enjoyed doing manually."
Infrastructure engineer with 16+ years of experience who treats infrastructure as a product — something to architect, automate, and evolve. Deep operator background in high-volume, distributed systems (10,000+ VMs, 500+ ESXi hosts) transitioning into cloud-native and platform engineering. Open source contributor with shipped tooling for compliance automation, observability, and runbook execution. Builds tooling for infrastructure engineers: high-level languages operators already know, human-readable YAML configuration, modular architecture with a solid core and pluggable components, and documentation written for the person running the tool — not the person who built it. Applies AI and agentic workflows as a force multiplier to reduce manual operations, build self-documenting systems, and rapidly accelerate delivery — the kind of engineer who reduces the on-call queue by eliminating the conditions that create them.
// professional_experience
Self-Directed — Independent Software Development & R&D
Dec 2024 – Present
- Infrastructure as product: Designed and shipped open-source tooling for compliance automation, runbook execution, and connectivity validation — treating every tool as a deployable artifact with CI/CD, docs, and testable interfaces
- Operator-first design: Standalone tools built around operator ergonomics — YAML-driven configuration, modular architecture where components can be added or removed independently, and documentation written for infrastructure engineers already familiar with PowerShell or Bash
- Parallel AI agent orchestration: Operates Cline Kanban to run Claude Code and Codex as parallel workers in isolated git worktrees — managing task dependency chains, reviewing diffs, leaving line-level feedback for agent correction loops, and gated commits and PRs
- AI governance & auditability: Built structured frameworks using Claude, Codex, Gemini, and Ollama as engineering force multipliers; versioned prompt rules and session logging for full traceability of AI-assisted development
- Terraform: Used to define, provision, and manage homelab infrastructure as code — all lab environments version-controlled and reproducible from a single apply
- CI/CD & DevOps discipline: All projects shipped with GitHub Actions pipelines, atomic artifact writes, dry-run modes, and provenance headers — zero manual deploy steps
- Platform breadth: Proxmox homelab as a real cloud-native testbed: Cloudflare Tunnel, SSH key auth, GitLab CE, Kanban, Docker, LXC workloads, remote dev environment — built and operated end-to-end
- Pursuing AWS Certified Cloud Practitioner (CLF-C02) certification
Experian Health
Systems Engineer / Infrastructure Engineer · Dec 2016 – Nov 2024 · Remote / Nashville, TN
- Scaled distributed infrastructure to 10,000+ virtual machines across 500+ ESXi hosts and 400+ physical servers with near five nines availability — reliability engineering and automation at a scale where manual processes aren't an option
- Multi-region data center operations: Operated 3 geographically separated data centers across middle Tennessee, distributing compute load, backup duties, and DR failover across all three — active production, warm spare, and DR tiers running simultaneously
- Distributed SQL & low-latency workloads: Administered physically separated SQL Server nodes in an active/spare/DR configuration across geographically distinct locations — engineered for low latency and automatic failover
- VMware + Nutanix HCI clustering: Operated 16-node physical host clusters with automatic VM and container workload distribution and load balancing — distributed compute without manual intervention
- Major data center migrations: Core team member on 2 large-scale DC migrations involving tens of millions of dollars of equipment — ESXi hosts, storage arrays, tape backups, network gear, racks, and cabling — executed with zero unplanned downtime
- Object storage & file protocols: Administered Dell ECS (S3-compatible object storage) including bucket management; served multi-departmental file shares from remote data centers; executed file share data migrations; restored systems from both disk and tape
- Data security: Enforced encryption at rest and in transit across storage and network platforms for HIPAA and PCI-DSS requirements
- Eliminated manual operations via PowerShell and Ansible Automation Platform: automated patching cycles, configuration drift remediation, and compliance auditing across the entire fleet
- Compliance automation: Enforced HIPAA, PCI-DSS, NIST 800-53, and SOC 2 through automated internal audits, structured documentation, and runbook-driven remediation — compliance without developer friction
- Disaster recovery engineering: Designed and executed DR runbooks with regular test cycles; built business continuity posture from documentation through live failover validation
- Monitoring & observability: Administered Splunk for SIEM and log aggregation; SolarWinds for infrastructure and network monitoring; Dell OpenManage Enterprise for hardware-level alerting across 400+ physical nodes; VMware vCenter and Nutanix Prism for unified virtualization visibility; exposure to vRealize Operations (vROps) for performance monitoring
- Storage at scale: Managed Dell EMC Isilon, PowerFlex, Data Domain, ECS, and ExaGrid — multi-platform enterprise storage with documented runbooks and full auditability
- On-call rotation: 1 week per month across the full infrastructure stack — continuous on-call posture maintained since 2016
- Hardened Windows Server and RHEL/Linux environments; mentored junior engineers
City of Franklin
Data Center Engineer / City Information Security Officer · Oct 2012 – Oct 2016 · Franklin, TN
- Data center migration & infrastructure build-out: Led standup of Cisco UCS compute platform with Nexus switching as part of a full DC migration — racked, cabled, and commissioned the environment from the ground up
- Exchange hybrid migration: Administered Exchange Online and led migration from on-prem Exchange to a hybrid Exchange Online environment integrated with Azure Active Directory; administered Microsoft Exchange Online Protection
- Security platform administration: Stood up and administered Mandiant FireEye network threat prevention platform; administered Cisco IronPort web filter for organization-wide web security enforcement
- VMware vSphere administration: Administered vSphere environment as part of broader data center build-out and ongoing operations
- Enterprise patching program: Owned and operated the organization-wide patching program across workstations, servers, and network gear — full-environment coverage as part of the ISO function
- Infrastructure monitoring: Deployed and administered SolarWinds for network and infrastructure monitoring across the environment
- On-call rotation: 1 week on / 1 week off — responsible for full-environment incident response covering infrastructure, security, and network
- Rewrote Group Policy infrastructure for consistent, auditable workstation and server security posture; deployed MBAM, Veeam, and Office 365 with security and compliance configurations
- Administered DNS, ExaGrid, AD/DNS/DHCP, and file services; managed workstation imaging; supported Cisco routing, switching, and VPN (NetMotion, AnyConnect)
// open_source_projects
YMC / YMC-L Python · PowerShell · Go · WinRM · Docker
Agentless compliance scanners for Windows and Linux, mapping checks to NIST 800-53, SOC 2, HIPAA, PCI DSS, and ISO 27001 with audit-ready structured output. Both platforms are active and currently being ported to Go as distributed container workloads.
The Collective Go · Docker · Kubernetes · k3s · Python · actively in development
Orchestration platform for distributed compliance scanning across enterprise environments. Scanner nodes (YMC/YMC-L) deploy as lightweight Go containers close to target endpoints eliminating single-point bandwidth saturation and avoiding network security policy triggers. Nodes report findings to a centralized aggregation layer. Designed for Kubernetes orchestration.
FailWarden Python · SSH · GitHub Actions
YAML-driven runbook executor for infrastructure remediation over SSH. Compile-time validation, audit logging, dry-run mode, and a library of shipped runbooks — the kind of tool that turns an on-call incident into a documented, repeatable, one-command fix.
ReadyCheck Python · CLI
Connectivity validation CLI that compares observed network behavior against declared intent and emits structured review artifacts.
project-prompts AI Governance · Prompt Engineering · CLI
Structured library of versioned prompt engineering guidelines and session logging tooling for AI-assisted development — governance and auditability for agentic workflows at the project level.
// technical_skills
Infrastructure & Cloud
VMware vSphere/ESXi
Nutanix HCI
AWS (CLF-C02 in progress)
Docker
Kubernetes / k3s
Proxmox
Linux / RHEL / Windows
Automation & IaC
Terraform
Ansible
Chef (familiar)
PowerShell
Python
Go
Bash
GitHub Actions CI/CD
Observability & Monitoring
Splunk (SIEM)
SolarWinds
Dell OpenManage Enterprise
VMware vCenter
Nutanix Prism
vROps
Security & Compliance
NIST 800-53
HIPAA
PCI-DSS
SOC 2
ISO 27001
CIS Benchmarks
DISA STIG
Encryption at rest/transit
System Hardening
Storage & Data
Dell EMC Isilon
PowerFlex
Data Domain
ECS (S3-compatible)
ExaGrid
Veeam
Disk/tape backup
Data migration
File protocols
Networking
Cisco Nexus / IOS
Arista BCF SDN
DNS/DHCP at enterprise scale
Cloudflare Tunnel
Cisco IronPort
Mandiant FireEye
API & Integration
REST APIs
WinRM
SSH
S3-compatible APIs
Webhook integrations
AI & Tooling
LLMs
Prompt Engineering
Agentic AI
Kanban agent orchestration
AI governance & auditability
// certifications
AWS Certified Cloud Practitioner (CLF-C02) — in progress
Red Hat Certified Specialist in Ansible Automation — training completed, 2018
Certified Ethical Hacker (CEH) & CHFI — EC-Council — formerly certified, 2018
CompTIA CASP+ · PowerShell for Systems Administration — New Horizons — training completed, 2015
// education
M.S. Information Security and Assurance
Western Governors University · 2018
Thesis: Disaster Recovery & Business Continuity Program for a B2B Government Contractor — grounded in NIST 800-53 controls
B.A.S. Information Systems and Cyber Security
ITT Technical Institute · 2012 – 2014 · 4.0 GPA · Valedictorian
A.A.S. Computer Networking Systems
ITT Technical Institute · 2010 – 2012 · 4.0 GPA · Valedictorian
~/usr
Everything here is presented conservatively. Where a tool has strong unit coverage but limited production validation, the page says so directly. Honest statements are part of my communication style, not a disclaimer.
"My best ideas all started with 'why am I still doing this?'"
// infrastructure_tooling
featuredpythonpowershellgowinrmdockercompliance
YMC / YMC-L — You Must Comply
Agentless compliance scanners for Windows (YMC) and Linux (YMC-L). Framework-mapped checks for NIST 800-53, SOC 2, HIPAA, PCI DSS, and ISO 27001 with audit-ready structured output. No agent install required — runs over WinRM and SSH respectively. Both platforms active and currently being ported to Go as distributed container workloads.
- Windows and Linux coverage — two platforms, one compliance story
- Framework-mapped checks: NIST 800-53, SOC 2, HIPAA, PCI DSS, ISO 27001
- Audit-ready structured output — built for hand-off, not just inspection
- Porting to Go as distributed container workloads (see: The Collective)
godockerkubernetesk3sin development
The Collective
Orchestration platform for distributed compliance scanning. YMC/YMC-L scanner nodes deploy as lightweight Go containers close to target endpoints. Findings aggregate to a central layer (the Queen). Designed for Kubernetes orchestration.
pythoninfrastructurev0.2.0prod_validated: partial
FailWarden Orchestrator
A constrained YAML runbook executor for infrastructure remediation over SSH. Compile-time validation, audit logging, dry-run mode, and included runbooks — the thing you hand to an operator at 2am.
powershellwpfwindows
Loadout
Portable PowerShell + WPF workstation setup tool. Because manually rebuilding your toolchain on a fresh box is a crime against your own time.
pythonnetworkingcli
ReadyCheck
Connectivity validation CLI comparing observed network behavior against declared intent and emits review artifacts.
// ai_engineering_discipline
methodology
accountability
auditable
ai governance
project-prompts
AI is a force multiplier — but only if you can trust what it produced and reproduce how it got there. A structured library of project-scoped prompt engineering guidelines that standardize how AI is directed, reviewed, and constrained across engagements.
- Project-scoped guidelines that constrain AI behavior to the context and goals of each engagement
- Standardizes how AI tools are directed, what they're allowed to decide independently, and what requires human review
- Paired with session logging to maintain a full audit trail from requirement through implementation
- Treats AI tooling the same way good engineering treats any external dependency: version it, document it, own it
~/etc
"If your process was automated you would have more time to contact me."