Designed and fully automated the deployment of a multi-node OpenShift edge cluster, including RHCOS bootstrapping, ignition configuration, Operator deployment, and workload provisioning — reducing manual deployment effort by over 80% through ansible scripting
Led the development of hardened RHEL 9 baselines within the Common Hosting Environment (CHE), applying STIGs, ACAS findings, and DISA controls using Ansible, Bash, and version-controlled templates to enforce secure default states
Built and maintained GitLab CI/CD pipelines for OpenShift infrastructure and system configuration automation, enabling reliable, repeatable, and auditable cluster deployment workflows
Delivered automated compliance remediation tooling, generating installable patch sets and enforcing security baselines across nodes and workloads with minimal manual intervention
Integrated Podman and OpenShift-native container workflows into platform deployment, supporting secure, lightweight service delivery in mission-focused edge environments
Automated vSphere environments (vCenter, ESXi) to streamline VM provisioning and maintain secure baselines across hybrid staging and test networks
Supported operational test events by deploying and validating OpenShift-based systems under field-like conditions, resolving integration and configuration issues rapidly through hands-on debugging
Developed custom automation scripts in Bash and Ansible to enforce configuration drift protection, streamline patch cycles, and maintain system conformance with enterprise and program-level requirements
Translated security and infrastructure requirements into tested, documented, and automated deployments, bridging the gap between platform engineering, cybersecurity, and mission delivery
Member of the SRC Cybersecurity Competition Pro Team, demonstrating advanced security expertise and team collaboration
Recipient of a Spot Award for exceptional contributions to the Common Hosting Environment (CHE) project