Systems engineer specializing in HPC, distributed systems, and low-level performance optimization with an eye towards security, automation, and resilience. I have 8+ years of consistent experience in system administration, network engineering, and low level programming. My background in low-level systems has built a strong intuition for troubleshooting complex architectures and engineering robust solutions. Built production tools at Sandia National Laboratories that reduced petabyte-scale data analysis from weeks to milliseconds and automated HPC infrastructure deployment. Currently exploring algorithmic theory, GPU computing, numerical computing, cryptographic protocols and many other things that grab my curiosity.
Sandia National Laboratories — Cyber Systems R&D (2016–2021)
Trinity Intel - (2021–Present)
Publications:
- Low Resolution Indexing for Sub-Millisecond Searches on Petabyte-Scale Datasets
- Thunderbird Cup Automation
| Project | Description | Tools |
|---|---|---|
| HPL_GPU | Performance analysis of High-Performance Linpack on NVIDIA H100 GPUs. Achieved 73.1 TFLOPS (61% peak) with detailed kernel profiling and scaling analysis. | Nsight Systems, GDB, Slurm |
| gnu-compiler-optimizations | Study of GCC optimization levels (-O0 through -O3) on binary efficiency. Build system configurations with Make/CMake. | C, GCC, Make, CMake |
| numerical-computing | Numerical methods: conjugate gradient, iterative solvers, eigenvalue computation. Convergence analysis and stability bounds. | C, MATLAB |
| Project | Description | Tools |
|---|---|---|
| Distributed-Systems-Crypto-Simulation | Agent-based simulation of DeFi liquidation protocols with MEV mitigation analysis. N=1000 Monte Carlo runs with statistical validation. | Python, Mesa, NumPy |
| Advanced-Algorithms | Graduate algorithmic theory: Chernoff bounds for Nakamoto consensus (orphan block probability analysis), FLP impossibility, zero-knowledge proofs, FFT multiplication. | Probability Theory, Cryptography |
| Project | Description | Tools |
|---|---|---|
| nsa-codebreakers-18 | Complete NSA Codebreaker Challenge writeup — Ransomware analysis, protocol RE, TOTP key extraction, Ethereum smart contract exploitation, race condition attacks. All 8 tasks solved. | Wireshark, IDA, Web3.py, Solidity |
| binary-bomb-analysis | Reverse engineering exercises: disassembly, stack frame analysis, control flow reconstruction. | x86-64 Assembly, GDB, IDA |
| operating-systems-code | Kernel security modules (process monitor, syscall integrity checker), CPU scheduling, memory virtualization, concurrency primitives. | C, Kernel APIs, pthreads |
| Project | Description | Tools |
|---|---|---|
| XGhostClip | X11-style primary selection for macOS using Core Graphics event taps and Accessibility APIs. | Swift, macOS APIs |
| dot-files | Automated dev environment setup wit Ansible. Security toolkit, threat hunting tools, shell/vim/gdb configs. | Ansible, Bash, Python |