summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorJesse Luehrs <doy@tozt.net>2022-04-22 22:29:38 -0400
committerJesse Luehrs <doy@tozt.net>2022-04-22 22:29:57 -0400
commitaa023c647b656f4d5baa7cbc55626f5a0668bc8b (patch)
tree16601d85ac1b78ae2e49f4292817b24a4b4b93dd
parent0921361fac584ec5e68d66d1274a0fa37e09709a (diff)
downloadtozt-hugo-master.tar.gz
tozt-hugo-master.zip
update resumeHEADmaster
-rw-r--r--static/resume.pdfbin82457 -> 82442 bytes
-rw-r--r--static/resume.tex41
-rw-r--r--static/resume.txt9
3 files changed, 26 insertions, 24 deletions
diff --git a/static/resume.pdf b/static/resume.pdf
index 94f593a..2fa25b8 100644
--- a/static/resume.pdf
+++ b/static/resume.pdf
Binary files differ
diff --git a/static/resume.tex b/static/resume.tex
index fd5c66e..c41de4a 100644
--- a/static/resume.tex
+++ b/static/resume.tex
@@ -18,7 +18,7 @@
{https://tozt.net/}
{doy@tozt.net\hspace{0.5in}}
{(618) 616-6287}
- {142 E 16th St. \#19D}
+ {142 E. 16th St. \#19D}
{New York, NY, 10003}
% }}}
% Work Experience {{{
@@ -39,31 +39,32 @@
\item Converted all of our internal infrastructure to use an
installation of Confidant
(\url{https://lyft.github.io/confidant/}) for secrets storage
- and distribution, giving us much more control over which people
- and machines had access to our secrets.
- \item Implemented an authentication service which allowed users to
- sign arbitrary data as their own identity in a way that
- machines could independently verify. This allowed us to remove
- almost all use of GPG at Stripe, which eliminated a large class
- of tooling issues related to deployments.
+ and distribution, giving us much more control over which
+ people and machines had access to our secrets.
+ \item Implemented an authentication service in go which allowed
+ users to sign arbitrary data as their own identity in a way
+ that machines could independently verify. This allowed us to
+ remove almost all use of GPG at Stripe, which eliminated a
+ large class of tooling issues related to deployments.
\item Contributed to importing all of our low level infrastructure
which had originally been set up via custom tooling (or by
- hand) into Terraform, allowing us to (mostly) automate creation
- of new AWS accounts.
+ hand) into Terraform, allowing us to (mostly) automate
+ creation of new AWS accounts.
\item Contributed to our rollout of Envoy for service-to-service
communication, giving us automatic, transparent mutual TLS for
almost all internal traffic. Additionally, used features
provided by Envoy to implement a blue/green deploy mechanism
- which greatly improved speed and reliability of deploys for our
- critical services.
- \item Implemented a fleetwide service in go for running maintenance
- commands on servers (running puppet, restarting services, etc),
- which reduced the time needed for running these types of
- commands from several days in some cases to under 5 minutes.
- Additionally, designed a secure protocol for these types of
- actions which ensured that the end services would not perform
- any actions without first ensuring that the request was logged
- in a separate secure append-only logging system.
+ which greatly improved speed and reliability of deploys for
+ our critical services.
+ \item Implemented a fleetwide service in go for running
+ maintenance commands on servers (running puppet, restarting
+ services, etc), which reduced the time needed for running
+ these types of commands from several days in some cases to
+ under 5 minutes. Additionally, designed a secure protocol for
+ these types of actions which ensured that the end services
+ would not perform any actions without first ensuring that the
+ request was logged in a separate secure append-only logging
+ system.
\end{itemize}
% }}}
% Infinity Interactive {{{
diff --git a/static/resume.txt b/static/resume.txt
index ea898c8..15edfbf 100644
--- a/static/resume.txt
+++ b/static/resume.txt
@@ -23,10 +23,11 @@ January 2015 - June 2021
Confidant (https://lyft.github.io/confidant/) for secrets storage and
distribution, giving us much more control over which people and machines had
access to our secrets.
-- Implemented an authentication service which allowed users to sign arbitrary
- data as their own identity in a way that machines could independently verify.
- This allowed us to remove almost all use of GPG at Stripe, which eliminated a
- large class of tooling issues related to deployments.
+- Implemented an authentication service in go which allowed users to sign
+ arbitrary data as their own identity in a way that machines could
+ independently verify. This allowed us to remove almost all use of GPG at
+ Stripe, which eliminated a large class of tooling issues related to
+ deployments.
- Contributed to importing all of our low level infrastructure which had
originally been set up via custom tooling (or by hand) into Terraform,
allowing us to (mostly) automate creation of new AWS accounts.