Software Engineer, Cloud-native & Distributed Systems Design
Designing and building privacy-first, cloud-native distributed systems. Passionate about system design where security, privacy, and great devUX converge.
Strategy & Architecture
Interoperable Architectures, Integration Patterns, Strategic Systems Design
Cloud & Infrastructure
Hybrid Multi-Cloud, Cost Optimization, Resilient Data Federation
Security & DevOps
Zero-Trust Principles, Container Orchestration, CI/CD Automation
01 //
Protocol_Work
Current R&D
FACTS (Factor-based Attestation & Credential Transport): A multi-modal system primitive for Just-in-Time identity. Rather than a stored secret, FACTS fundamentally disarms bearer-tokens by treating identity as a runtime derivation based on the convergence of known good runtime state.
-
→
Post-auth PSK Research Continuous Attestation
Devised Time-based Ephemeral Liveness Signals (TELS), a specification for ephemeral post-auth PSKs enabling real-time verification with 0-RTT session resumption -
→
Transport Composability Authz+Authn achieved orthogonal to transport
Implemented single security model across three independent transport bindings (TLS 1.3 extension, REST/HTTPS, SAE air-gapped) demonstrating architectural flexibility and reusability. -
→
Static Artifact Exchange Air-gapped, asynchronous key agreement
Designed zero-trust transport topology with zero-parsing invariant for asynchronous cryptographic exchanges suitable for IoT and constrained supply-chain contexts.
Explore FACTS ↗
02 //
Engineering
FACTS Reference Implementation
Production Rust Toolchain
facts-cli (notary operations, attester/verifier agents), facts-toolchain (core cryptographic libraries), achieving sub-millisecond key derivation with proper zeroization.
Multi-Transport Demonstration
Docker orchestration harness proving protocol composability across TLS 1.3 extension (0-RTT, PSK ratcheting), REST/HTTPS (stateless challenge/response), and SAE (air-gapped asynchronous).
Formal Security Analysis
ProVerif symbolic model proving injective correspondence (replay prevention), trust chain integrity, forward secrecy, and inert credential property under active adversary assumptions.
Browser Integration
Real-world WebAuthn demo using @hpke/core (RFC 9180), Ed25519 notary signing, PRF extension for hardware-rooted factor encryption, demonstrating production viability.
CleanPix SaaS Multi-Cloud Deployment
Impact Highlights
- → Multi-Cloud Platform Design:18-year journey from monolithic legacy systems to federated multi-cloud architecture spanning 5 providers with event-driven Kafka backbone.
- → Cost Optimization: Strategic provider selection and resource allocation achieving 77% infrastructure cost reduction while improving availability and performance.
- → Resilience Engineering: Cross-provider replication topology for MySQL and storage with proven zero-loss recovery during production failures.
03 //
IETF_Engagement
-
→
Engaging Diverse IETF Working Groups: Participating in technical discussions across OAuth, RATS, and WIMSE working groups on workload identity, attestation semantics, and authentication vs authorization boundaries.
Ephemeral Compute Attestation (ECA)
IETF Internet-Draft
Formal protocol specification for secure machine identity bootstrapping. Three-phase challenge-response ceremony using composable cryptographic factors.
VIEW_DRAFT ↗Static Artifact Exchange (SAE)
IETF Internet-Draft
Minimal hardened transport for asynchronous artifact exchange via stateless repositories. Eliminates parser vulnerabilities via "publish-then-poll" design.
VIEW_DRAFT ↗Relationship to FACTS: Evolving from experimental IETF Internet-Drafts [above], FACTS introduces a unified protocol suite for establishing "Day 1" identity bootstrap and enforcing "Day 2" continuous integrity with refined terminology: Boot Factor (BF) → Provisioning Factor (PF), Instance Factor (IF) → Evidence Factor (EF).
04 //
Ops_History
Protocol design inspired from real-world ops
18 years operating production systems directly informed FACTS protocol design. Real-world operational pain points—credential rotation, identity bootstrap in ephemeral environments, trust anchor heterogeneity across cloud providers—drove architectural decisions. FACTS represents applying systems thinking from infrastructure management to cryptographic protocol engineering.
Head of Infrastructure & Principal System Designer
CleanPix Corp | 2012 — Present
Owning the technical roadmap and architectural vision for a mission-critical SaaS platform. Responsible for bridging business goals with distributed systems implementation.
- Strategic Cost Optimization: Designed and executed a federated multi-cloud architecture across 5 heterogeneous providers. This strategy eliminated single-vendor dependency and drove a 77% reduction in infrastructure opex while increasing availability.
- System Modernization: Led the architectural decomposition of legacy services, introducing an event-driven Kafka backbone that reduced P95 latencies by >1000ms and enabled asynchronous scaling.
- Resilience Engineering: Engineered the disaster recovery protocol and cross-provider replication topology (MySQL/Storage), proven in production during a critical storage failure with zero data loss and sub-48h RTO.
- Engineering Standards: Established CI/CD and BDD methodologies, moving the engineering culture from manual release cycles to automated, zero-downtime deployments.
Product Champion & Integration Lead
CleanPix Corp | 2009 — 2012
- Modernized a legacy web application (JSP/JavaScript) to improve user experience and cross-system engagement.
- Facilitated alignment between business requirements and technical implementation, crafting user stories for testable integrations.
Infrastructure Integration Specialist
CleanPix Corp | 2008 — 2009
- Coordinated development, staging, and production rollouts to ensure component interoperability.
- Led a full system rebuild after a hardware transition, reintegrating data flows to maintain business continuity.
Customer Service Representative
CleanPix Corp | 2007 — 2008
- Managed customer onboarding and guided new users through initial setup.
05 //
Skill_Stack
Distributed Systems
- Multi-cloud federation
- Event-driven architecture (Kafka)
- Zero-trust design
- Disaster recovery & business continuity
- Stateless server architecture
- Horizontal scalability
Applied Cryptography
- HPKE (RFC 9180)
- TLS 1.3 Extensions (0-RTT, PSK)
- OAuth 2.0/DPoP (RFC 9449)
- WebAuthn/FIDO2 (PRF Extension)
- HKDF, AEAD
Security Architecture
- Zero Trust Architecture
- Hardware security (TPM, Secure Enclave)
- Air-gapped transport protocols
- Continuous attestation
- Identity binding mechanisms
Implementation
- Rust (production-grade, memory-safe)
- JavaScript
- Docker orchestration
- CI/CD automation
- CLI tooling
- DNS operations
Formal Methods
- ProVerif symbolic modeling
- Dolev-Yao adversary assumptions
- Security property verification
- Inert credential proofs
Standards Bodies
- IETF (OAuth, RATS, WIMSE)
- W3C (WebAuthn)
- IETF I-D authorship
- Cross-WG collaboration
- Peer review incorporation
06 //
Education
Diploma, Digital Graphics Communication
SAIT (Southern Alberta Institute of Technology), Calgary, AB | 2007
Foundation in UX/design evolved into specialization in systems architecture and integration.