-
Notifications
You must be signed in to change notification settings - Fork 0
/
resume.json
298 lines (297 loc) · 17 KB
/
resume.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
{
"$schema": "https://raw.githubusercontent.com/jsonresume/resume-schema/v1.0.0/schema.json",
"basics": {
"name": "Olive Haven",
"image": "https://avatars.githubusercontent.com/u/95305",
"email": "[email protected]",
"phone": "+19494156469",
"url": "https://haven.lol",
"summary": "In my roles as an experienced member of technical staff / tech lead, I have been dedicated to fostering empathy and encouraging teamwork, collaboration, and mentorship within my teams. In managing and resolving incidents with high customer impact, I strive to create a healthy and productive work environment by maintaining open lines of communication with stakeholders. I mentor team members in analytical problem-solving, emphasizing the application of the scientific method to research issues and conduct experiments for root cause analysis. By leveraging strong written and verbal communication skills and prioritizing customer feedback, I can drive continuous improvement, informed decision-making, and effective engineering roadmap planning. My extensive experience in roadmap planning, Agile, and Kanban helps ensure projects stay within scope and deliver exceptional customer service and engagement.",
"location": {
"city": "Portland",
"region": "OR",
"countryCode": "US",
"address": "United States"
},
"profiles": [
{
"network": "DOCX Resume",
"username": "OliveHaven.docx",
"url": "https://haven.lol/OliveHaven.docx"
},
{
"network": "PDF Resume",
"username": "OliveHaven.pdf",
"url": "https://haven.lol/OliveHaven.pdf"
},
{
"network": "GitHub",
"username": "0xhaven",
"url": "https://github.com/0xhaven"
},
{
"network": "LinkedIn",
"username": "0xhaven",
"url": "https://www.linkedin.com/in/0xhaven/"
}
]
},
"work": [
{
"name": "LegalZoom",
"url": "https://www.legalzoom.com",
"location": "Remote",
"position": "Senior Site Reliability & DevOps Engineer",
"startDate": "2022-09-01",
"endDate": "2024-09-31",
"summary": "Experienced technical staff member supporting a high growth ~350-member engineering org and helping to double an Engineering Services (SRE/DevOps/Platform) organization from ~10 to ~20 engineers supporting SaaS and B2B products. I started working as an SRE in 2022, then moved to support the expanding DevOps team throughout 2023",
"highlights": [
"Datacenter migration to AWS cloud infrastructure, resulting in significant cost savings and improved resource provisioning efficiency through infrastructure as code and AWS services.",
"Migration to from Akamai CDN to AWS CloudFront, leveraging CDK infrastructure-as-code in TypeScript / JavaScript to provide a more performant, cost-effective, and engineer-friendly self-serve platform for CDN management.",
"Supported expanding the SRE and DevOps teams in hiring 2 new DevOps engineers, 2 new Site Reliability Engineers, and and cross-training 4 former Datacenter Operations Engineers as AWS Cloud Engineers. Facilitated onboarding for new engineers through comprehensive documentation and knowledge sharing sessions, accelerating their integration into the team and promoting a collaborative environment.",
"Enhanced system reliability through effective incident management and troubleshooting, with a focus on root cause analysis and continuous improvement, reducing downtime and service disruptions.",
"Strengthened cross-team collaboration by providing hands-on support to developer teams, streamlining release processes, and supporting service launches. This resulted in increased release velocity, minimized incidents, and improved team efficiency.",
"Promoted a collaborative and empathetic team environment, fostering knowledge sharing, improving team morale, and mentoring junior engineers.",
"Platform operations and maintenance for CI/CD, Monitoring, Deployment systems (including migrating legacy systems). Including GitHub Enterprise, GitHub Actions, ArgoCD, Jenkins, Kubernetes, Datadog, Azure Active Directory, Azure DevOps, Rundeck, IIS, and Rundeck."
]
},
{
"name": "Armorblox",
"url": "https://www.armorblox.com/",
"location": "Remote",
"position": "Senior System Reliability Engineer",
"startDate": "2021-03-31",
"endDate": "2022-07-31",
"summary": "Hired as Product / Platform engineer for this small email security SaaS startup, I ran into several (rather normal) startup issues including immature engineering culture, burgeoning technical debt, code rot, and poor production reliability. I was able to help plug these holes by creating documentation and implementing engineering and development best practices. This work on improving developer experience led to discussing production reliability shortcomings with the CTO and engineering organization management.\nFollowing this proven positive impact, I was able to get C-level buy-in to create a dedicated Systems Reliability Team. As a founding member of this team, I helped hire and train Junior, Senior, and Principal engineers. My main goal was to get each member up to speed, able to progress as individual engineers, and to support the broader engineering org goals and milestones. With this fledgling SRE team, I worked to prioritize the following engineering goals:",
"highlights": [
"Automation of manual tasks in the production environment (as well as development and staging), primarily leveraging Stackstorm workflow/runbook automation services",
"Improved development workflow and maturing engineering culture with Bitbucket Pipelines and Jenkins CI/CD and improvements to in-house development environment Kubernetes / Helm management",
"Monitoring of application and infrastructure services with Prometheus and Grafana",
"Oncall rotation with actionable metrics & dashboards, detailed runbooks, and incident response procedures to improve detection of and response time to incidents in production systems",
"Infrastructure as Code (IaC) defining environments, clusters, services with reproducible Terraform, Helm, and ArgoCD code managed in understandable and testable Git repositories",
"Catch-all DevOps support for developers, QA engineers, and Customer Support staff who need help understanding, interacting with, fixing issues, as well as identifying common problems and developing solutions to prevent future recurrence"
]
},
{
"name": "New Context",
"position": "Senior DevSecOps Consultant",
"startDate": "2020-03-31",
"endDate": "2021-03-31",
"highlights": [],
"summary": "I was hired as a remote security consultant contracting with large enterprise clients to do security analysis of infrastructure.\nWhile there, I created Go microservices leveraging GCP, AWS, Kubernetes, and Postgres APIs to do internal service discovery and track sensitive data flow throughout organizational infrastructure. The results of this analysis were stored in an extensible neo4j graph database and surfaced as security and business metric queries and dashboards.",
"url": "https://newcontext.com",
"location": "Remote"
},
{
"name": "Atlassian",
"url": "https://atlassian.com",
"location": "Mountain View, CA",
"position": "Senior Trust Engineer",
"startDate": "2017-02-28",
"endDate": "2018-02-28",
"summary": "I worked as a Senior Software Engineer building distributed microservices in Go for internal Identity APIs. This involved interacting with various Product, Platform, and SRE teams across Atlassian to support their specific use cases of a overarching Atlassian product and user Identity.\nMy main task was building a distributed, high reliability, low latency authorization store from scratch as the backend authorization provider for all modern Go microservices (with legacy support for custom authorization architectures already in place in Jira and Confluence). Much of this work was on low-level performance tuning of queries to shared Cassandra and Redis databases.\nI gained a lot of monitoring and performance tuning skills by working with Atlassian's amazing embedded SRE team to:",
"highlights": [
"Implement custom metric gathering with Prometheus",
"Create performance & reliability monitoring dashboards in Honeycomb",
"Act as first line Oncall and service specific alerting and operations runbooks",
"Create automated CI/CD testing and full microservice load testing across staging environments",
"Have full ownership of the services release management, including GitOps for environment management and hotfixes"
]
},
{
"name": "Salesforce",
"position": "Distributed Systems/Security Engineer",
"startDate": "2016-06-30",
"endDate": "2016-12-31",
"highlights": [],
"summary": "I created a Public Key Infrastructure for internal services including HSM-backed CA with CFSSL and Puppet managed internal service public key credential generation.",
"url": "https://salesforce.com",
"location": "San Francisco, CA"
},
{
"name": "Cloudflare",
"position": "Cryptographic Systems Engineer",
"startDate": "2014-09-30",
"endDate": "2016-03-31",
"highlights": [],
"summary": "I improved global web cryptographic standards and implementations. I helped provide fast and secure TLS for free to millions of sites by implementing low level extensions to standard nginx to allow dynamic TLS cert and key lookup from a global distributed cache.\nI also improved many open source PKI and generic infosec infrastructure software in OpenSSL, Go, and CFSSL toolkit.\nI implemented \"Keyless SSL\" software in Go allowing use of proxied TLS keys from otherwise untrusted edge servers so that TLS wouldn't need to be shipped to untrusted datacenters or hostile jurisdictions.\nDuring my time here, I learned a great deal about the modern TLS ecosystem on the internet, including spending many hours on code archaeology of various server and client codebases or testing closed source implementations to diagnose and fix / workaround protocol bugs as they came up in the wild.",
"url": "https://cloudflare.com",
"location": "San Francisco, CA"
},
{
"name": "Google Summer of Code",
"position": "Tor Project Student Developer",
"startDate": "2014-06-30",
"endDate": "2014-07-31",
"highlights": [],
"summary": "I worked on packaging ooni-probe (part of the Open Observatory of Network Interference) for easy access and use in locations where ISPs or Governments are blocking Tor. I learned a great deal about the obfuscation (and detection) techniques used in the wild to hide (and identify) encrypted communications.",
"url": "https://ooni.org",
"location": "Stanford, CA"
},
{
"name": "Amazon",
"position": "Software Development Engineering Intern",
"startDate": "2013-10-31",
"endDate": "2013-12-31",
"highlights": [],
"summary": "As an engineer on the AWS S3 team, I built a service to detect hotspots in the S3 cloud storage system trie data structure for targeted repair to keep S3 lookups performant.",
"url": "https://aws.amazon.com",
"location": "Seattle, WA"
},
{
"name": "Mozilla, OWASP",
"position": "Security Tools Intern",
"startDate": "2013-07-31",
"endDate": "2013-09-30",
"highlights": [],
"summary": "While working as a software engineering intern with the Mozilla Security Tools team, I worked on the OWASP ZAP webapp penetration testing tool and added SPDY (later HTTP/2) and QUIC (later HTTP/3) support by rewriting the internal network stack using the Netty framework.",
"url": "https://www.zaproxy.org",
"location": "Mountain View, CA"
},
{
"name": "VMware",
"position": "Security Intern",
"startDate": "2013-03-31",
"endDate": "2013-06-30",
"highlights": [],
"summary": "I added Secure Boot support to virtual UEFI firmware across all VMware products by implementing OpenSSL-based public key authentication in virtual storage devices.",
"url": "https://vmware.com/",
"location": "Palo Alto, CA"
},
{
"name": "Facebook",
"position": "Security Infrastructure Intern",
"startDate": "2013-01-31",
"endDate": "2013-04-30",
"highlights": [],
"summary": "I worked on the Security Infrastructure team to detect Android malware on end-user devices and track spread through the social Graph API.",
"url": "https://engineering.fb.com",
"location": "Menlo Park, CA"
},
{
"name": "Stanford CURIS",
"position": "Cryptography Researcher",
"startDate": "2012-06-30",
"endDate": "2012-09-30",
"highlights": [],
"summary": "Using C++ and NTL, I designed and implemented a highly optimized Lattice-based Fully Homomorphic (FHE) cryptosystem based on a custom polynomial ring translation of [Brakerski12] resulting in a paper and poster.",
"url": "https://undergradresearch.stanford.edu",
"location": "Stanford, CA"
}
],
"skills": [
{"name": "System Reliability Engineering"},
{"name": "DevOps"},
{"name": "Infrastructure as Code (IaC)"},
{"name": "Continuous Integration/Continuous Deployment (CI/CD)"},
{"name": "Kubernetes"},
{"name": "Docker"},
{"name": "Amazon Web Services (AWS)"},
{"name": "Google Cloud Platform (GCP)"},
{"name": "Azure"},
{"name": "Terraform"},
{"name": "Ansible"},
{"name": "Jenkins"},
{"name": "GitOps"},
{"name": "Service Monitoring"},
{"name": "Site Reliability Engineering (SRE)"},
{"name": "Automation"},
{"name": "Scripting (Bash, Python)"},
{"name": "Networking"},
{"name": "Security"},
{"name": "Container Orchestration"},
{"name": "Log Management"},
{"name": "Incident Response"},
{"name": "Agile/Scrum"},
{"name": "Load Balancing"},
{"name": "Infrastructure Scalability"},
{"name": "CICD Pipelines"},
{"name": "Git"},
{"name": "Helm"},
{"name": "Prometheus"},
{"name": "Grafana"},
{"name": "Distributed Systems"},
{"name": "Configuration Management"},
{"name": "Database Administration"},
{"name": "Cloud Migration"},
{"name": "Network Security"},
{"name": "CI/CD Tools"},
{"name": "Cloud Services (EC2, S3, VPC, GKE)"},
{"name": "Linux/Unix Systems"},
{"name": "Scripting (Shell, Perl, Ruby)"},
{"name": "Web Servers (Nginx, Apache)"},
{"name": "Service Discovery"},
{"name": "Elasticsearch"},
{"name": "Load Testing"},
{"name": "Web Application Firewall (WAF)"},
{"name": "Containerization"},
{"name": "Change Management"},
{"name": "GitLab"},
{"name": "Automation Tools (Puppet, Chef)"},
{"name": "Monitoring Tools (Datadog, New Relic)"},
{"name": "Serverless Computing"},
{"name": "Database Management (MySQL, PostgreSQL)"},
{"name": "Microservices Architecture"},
{"name": "Network Protocols (TCP/IP, HTTP, DNS)"},
{"name": "Shell Scripting"},
{"name": "Version Control (Git)"},
{"name": "SaaS/PaaS/IaaS"},
{"name": "Incident Management"},
{"name": "Cross-Team Collaboration"},
{"name": "Root Cause Analysis"},
{"name": "Infrastructure Optimization"},
{"name": "Log Analysis"},
{"name": "DevSecOps"},
{"name": "MacOS"},
{"name": "Linux"},
{"name": "Unix"},
{"name": "Maven"},
{"name": "PowerShell"},
{"name": "C# / CSharp"},
{"name": "Test-Driven Development (TDD)"},
{"name": "SSH"}
],
"education": [
{
"institution": "Stanford University",
"area": "Computer Science, Mathematics Minor",
"studyType": "BS",
"startDate": "2010-09",
"endDate": "2014-08",
"courses": [
"CS 355: Advanced Topics in Cryptography",
"CS 343: Advanced Topics in Compilers",
"CS 243: Program Analysis and Optimizations",
"CS 240: Advanced Topics in Operating Systems",
"CS 140: Operating Systems & Systems Programming",
"CS 244: Advanced Topics in Networking",
"CS 242: Programming Languages",
"CS 161: Design and Analysis of Algorithms",
"Math 121: Galois Theory",
"Phil 152: Computability and Logic",
"Phil 154: Modal Logic",
"Math 161: Set Theory",
"Math 171: Fundamental Concepts of Analysis"
]
},
{
"institution": "Gatton Academy of Mathematics and Science",
"area": "Mathematics and Computer Science",
"studyType": "High School",
"startDate": "2008-08",
"endDate": "2010-05",
"courses": [
"CS 443: Data Structures",
"Math 473: Graph Theory",
"Math 450: Complex Analysis",
"Math 435: Partial Differential Equations",
"Math 307: Linear Algebra",
"Math 310: Discrete Mathematics"
]
}
],
"meta": {
"version": "v1.0.0",
"canonical": "https://github.com/jsonresume/resume-schema/blob/v1.0.0/schema.json"
}
}