Software engineer with 7+ years of industry experience, including 5+ years at the current company building and operating the product surface of a large cross-functional "infrastructure-as-a-product" program — a multi-team effort spanning software engineering, production engineering, and underlying infra service teams that delivers enterprise infrastructure (asset inventory, deployment-request workflows, storage access-control, host/operations tooling) as cohesive self-service products rather than siloed tools. Core contributor across four flagship products in that portfolio, with a demonstrated ability to stand up greenfield GenAI applications and agent-evaluation pipelines alongside the product work. Consistent high-output contributor (~450 shipped changes per year for five consecutive years) across full-stack server, frontend, data pipelines, and CI infrastructure.
Led the product and automation workstream that cut end-to-end infrastructure deployment time from 122 days to 13 days for the enterprise deployment-request platform. Raised automated deployment-review coverage from 0% to 75%; automated the security and privacy review paths so most requests auto-approve in seconds; delivered a unified deployment interface replacing three legacy UIs.
Order-of-magnitude faster time-to-deploy, with the heaviest savings on security and privacy review steps that previously required a specialist team.
Codified the relationship graph between enterprise-infrastructure entities in a single asset-of-record system. Built ingestion and UI-extension work on the central asset graph; authored sync automation that keeps the graph consistent with upstream sources; built an AI agent for customer attestation that replaced a fragmented manual process.
Customers completed attestation tasks faster and with fewer errors; downstream products gained a reliable single source of infrastructure relationships.
Technical lead on the full rollout of a new file-sharing-protocol access-control model and subsequent network-filesystem ACL rollout across the enterprise storage fleet. Built the core rollout infrastructure; designed a web interface for non-technical owners to manage permissions; automated stale-grant removal; unblocked a critical milestone by identifying a missing class of user groups.
"Deep ownership and problem-solving mindset directly contributed to us reaching complete rollout." — partner team lead
Authored the long-term engineering-support proposal for a new, complex security and operations deployment domain. Defined scope in an undefined problem space; mapped needs across SWE and non-SWE teams; drove alignment across 5+ cross-functional teams.
Established the framework and XFN alignment that the follow-on roadmap work depends on.
Joined a global-scale technology company in 2020 into its enterprise-infrastructure product organization — a team whose thesis is that internal infrastructure should be delivered as cohesive products (self-service, unified UX, clear lifecycle) rather than as a patchwork of tools. Onboarded by delivering a compliance-workflow product (legal-hold UI + async backend handlers). Expanded over 2021–2023 into broad ownership of enterprise-infrastructure product surfaces, taking on multi-year maintenance of an asset-inventory/operations tool and the access-control automation for an enterprise storage system. Pivoted toward applied GenAI in 2024, building an auto-categorization pipeline and a team-tag GraphQL model for a documentation-automation product. In 2025, extended that into agent-quality evaluation — a from-scratch pipeline that became the cross-product quality signal for AI agents on the platform — and shipped a production AI code-review bot for the org. In early 2026, served as the designated Quarterback for my team in an org-wide AI-native transformation program (40+ teams across 7 sub-pillars) that drove AI-generated code to ~87% of output and cut typical on-call investigation times by 70–95%.
Promoted to Staff Software Engineer (IC6) in the 2025 year-end cycle on the strength of the deployment-velocity turnaround, the storage access-control rollout, the data-model coverage work, and demonstrated cross-functional leadership (authoring strategy in a new security/operations domain, aligning 5+ XFN teams, mentoring two mid-level engineers). Currently pod lead within an enterprise-infrastructure organization, owning two flagship products (a deployment-request portal and a lab-infrastructure portal) and driving a multi-version compatibility refactor that is the gating prerequisite for a major multi-region rollout. Consistent ~450-change-per-year throughput across five consecutive years, spanning full-stack, data pipelines, and CI infrastructure.