Career Portfolio · Updated April 2026

Brian Ogilvie

Staff Software Engineer · Enterprise Infrastructure Products
Recognition
Promoted to Staff SWE (IC6)
Performance rating: Exceeded Expectations
7+ Years industry
5+ Years at Meta
~450 Diffs / year
01

Professional Summary

Software engineer with 7+ years of industry experience, including 5+ years at the current company building and operating the product surface of a large cross-functional "infrastructure-as-a-product" program — a multi-team effort spanning software engineering, production engineering, and underlying infra service teams that delivers enterprise infrastructure (asset inventory, deployment-request workflows, storage access-control, host/operations tooling) as cohesive self-service products rather than siloed tools. Core contributor across four flagship products in that portfolio, with a demonstrated ability to stand up greenfield GenAI applications and agent-evaluation pipelines alongside the product work. Consistent high-output contributor (~450 shipped changes per year for five consecutive years) across full-stack server, frontend, data pipelines, and CI infrastructure.

02

Key Achievements

122 13
Days · −90%

Drove a 90% reduction in enterprise-infrastructure deployment time

Led the product and automation workstream that cut end-to-end infrastructure deployment time from 122 days to 13 days for the enterprise deployment-request platform. Raised automated deployment-review coverage from 0% to 75%; automated the security and privacy review paths so most requests auto-approve in seconds; delivered a unified deployment interface replacing three legacy UIs.

Order-of-magnitude faster time-to-deploy, with the heaviest savings on security and privacy review steps that previously required a specialist team.

33% 94%
Data-model coverage

Grew infrastructure data-model coverage from 33% to ~94%

Codified the relationship graph between enterprise-infrastructure entities in a single asset-of-record system. Built ingestion and UI-extension work on the central asset graph; authored sync automation that keeps the graph consistent with upstream sources; built an AI agent for customer attestation that replaced a fragmented manual process.

Customers completed attestation tasks faster and with fewer errors; downstream products gained a reliable single source of infrastructure relationships.

~70%
Cluster coverage

Led org-wide storage access-control rollout to ~70% cluster coverage

Technical lead on the full rollout of a new file-sharing-protocol access-control model and subsequent network-filesystem ACL rollout across the enterprise storage fleet. Built the core rollout infrastructure; designed a web interface for non-technical owners to manage permissions; automated stale-grant removal; unblocked a critical milestone by identifying a missing class of user groups.

"Deep ownership and problem-solving mindset directly contributed to us reaching complete rollout." — partner team lead

5+
XFN teams aligned

Authored strategy for a new cross-functional security/operations domain

Authored the long-term engineering-support proposal for a new, complex security and operations deployment domain. Defined scope in an undefined problem space; mapped needs across SWE and non-SWE teams; drove alignment across 5+ cross-functional teams.

Established the framework and XFN alignment that the follow-on roadmap work depends on.

Technical leadership and mentorship

  • Scope Led a pod of 2–3 ICs, mentored two mid-level engineers into higher-scope contributions (stakeholder communication, impact measurement, proactive/independent work), shaped strategic direction for a program impacting ~70 engineers.
  • Recognition Per manager review: "a force multiplier and strong engineering cultural influence."

Team Quarterback — org-wide AI-native transformation program

  • Role Designated Quarterback for my team during a quarter-long AI-native transformation program spanning 40+ teams across 7 sub-pillars, with >95% participation.
  • Scale AI-generated code reached ~87% of output (+25 pp in-quarter); agent-assisted code-review rate reached ~78% (+33 pp); weekly active AI-tooling usage ~98%.
  • How Shipped a production AI code-review bot, an org-wide CI test-coverage signal, and AI-context rules files for flagship codebases.
  • Program outcomes On-call investigations cut from 15–60 min to under 3 (70–95% reduction); 10–15× speedup on common provisioning workflows; unit-test counts doubled; 10 annual objectives completed 9 months ahead of plan.

Core contributor to a multi-team "infrastructure-as-a-product" program

  • Portfolio Long-running engineer on four flagship products — storage access-control, enterprise asset inventory, deployment-request portal, host-operations console used daily by infrastructure on-call.
  • Scope Program spans multiple infra-service teams and engineering disciplines (SWE, PE, service teams); I own product-layer surfaces that integrate with counterpart service teams.
  • Result 4+ years of continuous product ownership across schema, UI-framework, and asset-identifier migrations without service interruption.

Applied GenAI — AI code review, agent QoE, document classification

  • AI code-review bot Delivered production AI bot that automatically reviews engineering changes across the org; typed structured-output prompts rather than free-text-then-parse.
  • Agent-quality pipeline From-scratch pipeline computing task success rate, P90 end-to-end latency, and P90 token consumption per trace for every product shipping an AI agent. First consistent cross-product agent-quality signal.
  • Document classification Summarize-before-search architecture with KNN similarity over historical cases; migrated output to typed structured-response API.

Engineering excellence & reliability

  • Review cadence Reviewed 464 code changes in the last review cycle; closed 133 on-call tasks.
  • Storage access-control automation Designed audit and grant-management tooling covering the full enterprise-storage ACL population; hardened scheduled-job runtime with per-backend failure isolation (blast radius: 100% → per-backend).
  • CI quality signal Authored org-wide diff-time Continuous Integration signal enforcing test coverage; membership-gated enforcement within an infrastructure-products organization.
  • Incident response Authored team SEV criteria; extended the organization's SEV-review linter; strengthened incident-response culture beyond immediate team.

Deployment-request platform — multi-version compatibility refactor (current)

  • What Driving a version-aware refactor of the deployment-request form framework used by enterprise customers to provision compute resources.
  • How Refactored a rule-engine-based permission system and compute-configuration editor to be version-aware across multiple major versions of the underlying service-lifecycle model; fixed silent data-loss bugs on resubmission.
  • Result Unblocking the upcoming multi-region rollout; prerequisite gating item for the next major product milestone.
03

Technical Skills

Languages & Frameworks

Hack / PHP JavaScript TypeScript React Python SQL GraphQL

Infrastructure & Systems

  • Large-scale typed web-application platform & RPC frameworks
  • Distributed graph-backed entity framework (graph DB + typed schema)
  • Distributed workflow / scheduled-job systems (batch, DAG orchestration)
  • Dynamic configuration-management system
  • Real-time analytics (column-store, time-series monitoring)
  • Internal LLM platform with typed structured output; KNN vector search
  • Container orchestration platform
  • Distributed version control (Sapling-family)

Domains

  • Enterprise infrastructure products — asset inventory, access-control, deployment workflows
  • Applied GenAI — classification, agent-quality eval, AI code review
  • Operational reliability — failure isolation, backfill correctness, oncall noise reduction
  • Graph-based asset modeling — identifier migrations, schema evolution
  • Developer experience & CI — diff signals, codemods, coverage enforcement
04

Career Trajectory

From onboarding on a compliance-workflow product to Staff-level ownership of an enterprise-infrastructure product portfolio — with a deliberate pivot into applied GenAI that became a core part of the role.

Joined a global-scale technology company in 2020 into its enterprise-infrastructure product organization — a team whose thesis is that internal infrastructure should be delivered as cohesive products (self-service, unified UX, clear lifecycle) rather than as a patchwork of tools. Onboarded by delivering a compliance-workflow product (legal-hold UI + async backend handlers). Expanded over 2021–2023 into broad ownership of enterprise-infrastructure product surfaces, taking on multi-year maintenance of an asset-inventory/operations tool and the access-control automation for an enterprise storage system. Pivoted toward applied GenAI in 2024, building an auto-categorization pipeline and a team-tag GraphQL model for a documentation-automation product. In 2025, extended that into agent-quality evaluation — a from-scratch pipeline that became the cross-product quality signal for AI agents on the platform — and shipped a production AI code-review bot for the org. In early 2026, served as the designated Quarterback for my team in an org-wide AI-native transformation program (40+ teams across 7 sub-pillars) that drove AI-generated code to ~87% of output and cut typical on-call investigation times by 70–95%.

Promoted to Staff Software Engineer (IC6) in the 2025 year-end cycle on the strength of the deployment-velocity turnaround, the storage access-control rollout, the data-model coverage work, and demonstrated cross-functional leadership (authoring strategy in a new security/operations domain, aligning 5+ XFN teams, mentoring two mid-level engineers). Currently pod lead within an enterprise-infrastructure organization, owning two flagship products (a deployment-request portal and a lab-infrastructure portal) and driving a multi-version compatibility refactor that is the gating prerequisite for a major multi-region rollout. Consistent ~450-change-per-year throughput across five consecutive years, spanning full-stack, data pipelines, and CI infrastructure.