Brandon S. Clark — Proof Hub (Resume + Case Studies)

v8 105 bullets Wausau, WI friendly
Last updated: 2026-02-27 · LinkedIn: linkedin.com/in/brandon-c-it-industry · Shortcuts: / search · C celebrate · S spotlight · T theme · P public
Showing 105 of 105 bullets No filter

Recruiter Quick Start

If you only read one thing: I build secure, automation-heavy backend/platform systems on AWS, and I communicate outcomes clearly (docs, demos, diagrams).
  • Target roles: Senior Software Engineer — Backend / Platform / Cloud
  • Location: Wausau, WI (Central Time) · Remote-friendly
  • Core themes: AWS serverless · Terraform/IaC · API design · Data foundations/ETL · Security-first automation · Enablement
Sharing tip: Toggle Public Mode before sharing outside your current org (sanitizes internal team names).
Proof points (auto-generated from your bullets):
Role lanes (one click = smarter filtering + better highlights):
Pick a lane to see curated highlights.

Role Timeline (Milwaukee Tool)

Turbo Tools (tailor faster + share better)

Recruiter Pack (fast copy/paste)

One message you can paste into a LinkedIn DM, email, or recruiter intake form. Updates based on lane + Public Mode.
Next steps: Atlas Signal

Impact Snapshot

Fast-scan proof points recruiters love (pulled from your bullet inventory when possible).
Sharing tip: validate your link preview with LinkedIn Post Inspector.

Focus Filters

Click a filter to jump straight to the most relevant bullets.

Top Skills Pack

Copy/paste into Skills sections (resume + LinkedIn).

Job Description Match

Paste a job description to highlight the bullets that match the role’s keywords.
No job description yet.

    Selected Bullets → Resume Paste

    Use the Pick button on any bullet to build a tailored set. Then copy as ATS text or Markdown.
    0 selected
    ATS tip: Keep resumes simple (single-column, no tables/text boxes). Use Copy ATS text when pasting into applications.

    Case Studies (architecture + outcomes)

    These are intentionally written “public safe” (use Public Mode + avoid internal URLs when sharing externally).
    💳 $85M Payment Portal — Full-Stack AWS Web Application

    Problem: Needed a client-facing payment portal that was reliable, secure, and scalable enough to handle high-volume production traffic.

    Approach: Designed and delivered a full-stack AWS-hosted web application with CI/CD pipelines, role-based access, and secure payment processing. Built from scratch with maintainability and operational readiness in mind.

    Results: Processed ~250,000 payments totaling ~$85M. Zero reported payment failures attributable to the platform. Still in production after handoff.

    Use it when interviewing for: full-stack or backend SWE, fintech, high-reliability systems, cloud-hosted web apps, CI/CD.

    ⚙️ 1,200-Hour Automation — Java + SQL Server ETL Program

    Problem: A manual data-entry process consumed thousands of engineering hours per year and introduced error risk through repetition.

    Approach: Built an automated data-entry program using Java and MS SQL Server that handled the full ingestion pipeline — parsing, validation, transformation, and persistence — without human intervention.

    Results: Saved more than 1,200 hours of manual work and approximately $40K annually. Delivered as a standalone tool with zero ongoing support burden.

    Use it when interviewing for: backend automation, ETL/data engineering, operational efficiency, enterprise tooling, cost reduction.

    🔐 Secure Provisioning Automation — Python CLI + AWS

    Problem: Onboarding new devices was slow (~10 min/device), manual, and inconsistent across dev, test, and prod environments.

    Approach: Built a Python CLI + supporting APIs that automated registration, certificate generation, credential handling, and multi-environment bootstrapping. Integrated Secrets Manager and Auth0 for security-first credential hygiene.

    Results: Reduced provisioning from ~10 minutes/manual to <1 minute/device. Estimated ~100 hours saved in a 100-device rollout. Published a comprehensive README and demo assets that cut onboarding time for new engineers by ~30%.

    Use it when interviewing for: cloud platform, backend tooling, security-minded automation, DevOps/platform engineering.

    🧩 Serverless Request Bus — API Gateway → Step Functions → Lambda

    Problem: Needed reliable, observable partner integrations with validation, flexible transformation, and auditability — without coupling to a single Lambda.

    Approach: Prototyped an end-to-end request bus: API Gateway → Step Functions → multiple Lambdas, each responsible for a single concern (filter, validate, transform, augment, respond). Each step was independently testable and the full workflow was observable via CloudWatch.

    Results: End-to-end requests completed in seconds. Packaged reusable state machine definitions, Postman collections, and runbooks — reducing tribal knowledge and enabling faster onboarding for the next engineer.

    Use it when interviewing for: distributed systems, serverless backend, integration platforms, API design, workflow orchestration, system design interviews.

    🗄️ Data Foundations — Parallel DB migration + ETL parity

    Problem: Modernizing a rigid legacy tool-data-reads storage system without disrupting critical operations.

    Approach: Designed a risk-managed “run in parallel” approach with ETL/backfill planning to maintain old vs new parity; implemented a flexible document database (DocumentDB) POC + schema design and integrated it into existing APIs/workflows.

    Results: Enabled safer migration, improved data flexibility, and strengthened long-term maintainability.

    Use it when interviewing for: data platforms, migrations, reliability, system design, ETL/DB work.

    Credentials (quick verification signals)

    Tip: Put certs near the top of LinkedIn if the target roles are cloud/platform heavy.
    2025 20 bullets
    • Milwaukee Tool (JEDI — Digital IoT Services Team) — Senior Software Engineer — Delivered a greenfield secure IoT device provisioning solution (Python CLI + supporting APIs) automating device registration, certificate generation, and secure bootstrapping aligned to AWS IoT Core + enterprise security standards; cut provisioning from ~10 min/manual to <1 min per device.
    • Implemented MQTT delta updates for constrained-device messaging, reducing payload size by ~40% overall and up to ~97% in an example (476B → 15B).
    • Integrated security-first patterns into provisioning workflows (AWS Secrets Manager + Auth0 credential handling + secure setup guidance) to enable scalable, multi-environment provisioning (dev/test/prod).
    • Served as the first implementer/pilot for the provisioning solution; surfaced systemic blockers (e.g., cloud governance permission constraints), partnered with governance/security to resolve them, and documented standards for future contributors.
    • Authored a comprehensive README.md for the DIoTS iot-testing repo / IoT provisioning tool (install steps, CLI examples, security guidance), reducing onboarding time for new engineers by an estimated ~30%.
    • Authored DIoTS service SLA definitions documentation and performed SLA gap identification, improving operational clarity and expectations.
    • Supported implementation of an SLA dashboard tracking three key metrics, enabling consistent measurement and incremental service improvement.
    • Built SR-Feedback-Workflow-V3 (Slack workflow automation for structured sprint-review feedback), secured cross-pod volunteer support, and validated stakeholder interest for broader adoption.
    • Designed and deployed an AI-assisted feedback collection + analytics pipeline using Slack Workflow forms + Microsoft Forms; enriched results via emotion detection; used Copilot/GenAI to produce an executive-style PDF report and Q4 2025 readout deck shared with leadership.
    • Iterated and delivered an “Intro to Slack Workflows” enablement session through multiple peer + cross-team dry runs, culminating in a refined delivery at Platform Cluster Sync.
    • Established a repeatable practice of short demo/how-to videos to unblock peers across tools/workflows/processes, converting tribal knowledge into reusable learning assets that reduce meeting dependency and accelerate onboarding/troubleshooting.
    • Created and demoed interactive documentation using Lucidchart advanced features (e.g., layered diagrams), improving clarity and influencing peers to adopt higher-quality visuals.
    • Delivered a “Memory Maps” technical presentation using creative PowerPoint animations to explain complex concepts (e.g., hex data parsing); received strong peer feedback and influence on presentation standards.
    • Presented to Cloud Center of Excellence stakeholders with clear visuals quantifying financial impact of reducing AWS CloudTrail usage, enabling informed cost-optimization decisions.
    • In sprint reviews, communicated delivered results using data-driven before/after visuals showing reduced errors and increased success rates, strengthening stakeholder trust through transparency.
    • Championed agile execution discipline by ensuring sprint retrospectives happened and advocating for explicit Definition of Done / “success looks like” criteria to reduce ambiguity and rework.
    • Initiated internal Technical Synchronization sessions to reduce knowledge silos on critical infra/security topics (AWS IoT Device Defender audit, AWSCC provider implications, Terraform multi-env/multi-region deployment mechanics).
    • Championed adoption of DiSC Profiles within the POD by creating/shareable enablement assets (template, PowerPoint, how-to video) and influencing leadership alignment—resulting in scheduled Q1 2026 implementation.
    • Represented JEDI/CPP & DIoTS in the Extreme Ownership Challenge by setting a time-bound goal, tracking progress, and reporting outcomes—reinforcing accountability and continuous improvement.
    • Operationalized innovation and GenAI adoption by running monthly AI-assisted communication reviews, participating in 2+ innovation sprints, sharing learnings, and automating repetitive tasks.
    2024 9 bullets
    • Milwaukee Tool (JEDI — Data Engineering Team) — Software Engineer II — Advanced the Tool Data Foundations Project by delivering a comprehensive tool-data tagging system and collaborating on QuickLink integrations with the EDA team.
    • Improved delivery execution and organization by leveraging GitHub to streamline task management and increase work clarity/trackability.
    • Incorporated peer feedback to improve design clarity, usability, and scalability of deliverables (as reflected in year-end feedback).
    • Exceeded expectations in partner-team enablement by refining documentation, improving support efficiency, and helping increase the rate of resolved partner feature requests.
    • Earned recognition for “One Team Mentality” through a collaborative and inclusive approach that strengthened team culture and cross-functional execution.
    • Built strong cross-functional relationships and was recognized as a trusted, positive-intent collaborator and enabler for partner teams.
    • Demonstrated proactive communication and problem-solving—addressed challenges effectively to maintain momentum toward shared objectives.
    • Received “Exceeds Expectations” manager ratings in key leadership behaviors, including Candid communication, One Team Mentality, and Build Collaborative Relationships.
    • Delivered consistently strong overall performance as a Software Engineer II (Meets Expectations overall), with standout strengths in operational improvements, partner enablement, and collaboration.
    2023 9 bullets
    • Milwaukee Tool (JEDI — Data Engineering Team) — Data Engineer II — Drove a risk-managed transition to stand up a new, more flexible tool-data-reads system in parallel with the legacy database, aiming to avoid disruption while ensuring old vs. new reads stayed in parity.
    • Completed a deep ramp-up on the tool data domain being transferred into ownership, building a foundation to support long-term customer needs and future improvements.
    • Researched and implemented a new database solution to store key data sets supporting the tool-data-reads modernization effort.
    • Defined an ETL-driven migration strategy to move historical tool data reads into the new database while preventing loss/corruption and maintaining consistency during transition.
    • Identified and planned use of Amazon SageMaker Studio Notebooks to streamline backfill scripts/processes and support consistent data migration validation.
    • Built extensive hands-on AWS DocumentDB experience through research, proof-of-concepts, and schema design for a JSON document-style data model.
    • Integrated AWS DocumentDB into existing tooldata APIs and workflows, expanding the platform’s data storage flexibility.
    • Transformed Terraform/IaC from a prior weakness into a strength; completed 2023 goal to improve understanding of Terraform and Terraform Modules (completed 12/27/2023).
    • Broadened data engineering capability (parsing, manipulation, storage) across multiple data systems, increasing readiness for higher-impact work.
    2022 19 bullets
    • Milwaukee Tool (ONE‑KEY Integrations / SPI) — Software Engineer II — Produced a formal Security Risk Assessment of Oracle authentication (Basic Auth), delivered as an executive-ready PowerPoint and supporting written report.
    • Built and demo’d an AWS Step Functions POC that retrieved items, extracted nested payload details, and generated environment-specific deep-link URLs; shared demo videos and earned peer recognition.
    • Implemented and verified a Step Functions state machine for Inventory Item Create with request validation; packaged definition files and execution examples for reuse.
    • Researched and delivered the first set of Inventory-model CRUD API endpoints using a serverless architecture (Lambda + Step Functions), laying groundwork for the API Gateway portion of the pipeline.
    • Produced a complete “reference pack” for the POC (Postman collections, repo map by step, CI/CD + environment references) and was directly thanked for consolidating it.
    • Enabled QA API automation by providing hands-on support and Postman guidance; recognized via direct shout-out email.
    • Developed and presented a reusable “Request Bus” pattern and introduced a complementary bus event pattern concept; called out explicitly in team shout-outs.
    • Improved troubleshooting effectiveness for the Procore transfer integration by adding targeted logging and deeper tracing; repeatedly recognized for fast debugging and increased visibility.
    • Created architecture diagrams and kicked off data-mart documentation, updating diagrams live during stakeholder calls to improve shared understanding of the solution being co-created.
    • Performed deep-dive research on connecting Swagger/OpenAPI/CodeGen into AWS (API Gateway/Lambda) and shared practical resources to enable future client SDK generation.
    • Jumped outside core responsibilities to assist PT4 in a time-boxed bug-fixing effort; ramped quickly in a new language/repo and resolved key Hydraulic Reports defects.
    • Created visual solution designs/diagrams for the best approach to export the Transfer Report to an external integration partner (high-level AWS flow + Visio).
    • Fixed a DynamoDB throughput failure (“configured provisioned throughput exceeded”) by updating Terraform table billing mode from PROVISIONED → PAY_PER_REQUEST, improving operational stability.
    • Refactored Transfer Report PDF deep-link implementation by separating business logic from HTML templates and moving logic server-side; made deep-link URL generation more dynamic.
    • Resolved a PDF not downloading issue caused by environment differences (staging base URL missing “/app/”) with a dynamic fix that works across test/stage/prod.
    • Investigated and resolved a Procore defect where the Transfer Report didn’t show in Procore’s Project Daily Log for unassigned tools, restoring expected integration behavior.
    • Built an end-to-end external API gateway POC using AWS API Gateway → Step Functions → multi-Lambda “Request Bus” pattern (filter/transform, validation, internal API calls, deep-link augmentation), returning results in seconds; expanded skills in Terraform, Jenkins, and VTL mapping templates.
    • Scaled team effectiveness by setting up teammates’ Postman environments (dynamic variables, Runner automation), sharing short how-to videos, and curating Confluence documentation/research spikes to reduce tribal knowledge.
    • Earned AWS Certified Solutions Architect – Associate (SAA‑C03) on 08/25/2022 (128 days early), received “Exceeds Expectations” for the goal, and proactively shared study resources with the broader ONE‑KEY engineering group.
    2021 10 bullets
    • Milwaukee Tool (ONE‑KEY Integrations) — Software Engineer II — Built and deployed Oracle Unifier “People” integration APIs (GET/POST) with a no-bugs release, outperforming comparable integrations that later had post-“done” defects.
    • Delivered end-to-end DTW PDF Report upload integration to Oracle Unifier, owning UI/UX front-end + back-end integration work; pushed through deployment in time for the next release cycle and earned “stepped up / Rockstar” recognition.
    • Owned integration requirements gathering and documentation, producing high-quality UI/UX + API docs and uncovering where/how to update Swagger/OpenAPI docs for integration APIs—then documenting the process.
    • Presented a live Oracle Unifier Integration demo to the entire ONE‑KEY department as the only software developer presenting, translating complex integration work into a clear cross-team narrative.
    • Produced a backup demo video (risk mitigation for outages) shared internally and sent to Oracle, improving stakeholder visibility and reducing delivery/demo risk.
    • Identified and clarified a security flaw/risk around linking integrator accounts; created a short demo video that made the issue easy to understand and faster to act on.
    • Improved agile execution by proposing to keep the Sprint Retro board open throughout the sprint, enabling continuous capture of ideas/issues instead of last-minute recollection.
    • Reduced “tribal knowledge” risk by creating Confluence pages establishing shared standards for documentation expectations, code-commenting best practices, and practical how-tos (e.g., Postman guidance).
    • Onboarded/mentored a new developer (environment setup + git/source control) and delivered detailed QA-ready test documentation (UI steps + Postman examples + screenshots), improving handoffs and reducing back-and-forth.
    • Discovered and shared a solution for the Autodesk BIM 360 integration account-linking error (“Need to Install ONE‑KEY App BIM 360 Error”), unblocking integration workflows for the team.
    2020 10 bullets
    • Foundation Finance — Developed and deployed a client-facing payment portal that processed ~250,000 payments totaling ~$85,000,000.
    • Integrated CI/CD pipelines using Bitbucket Pipelines to automatically build, run QA tests, and deploy web applications.
    • Assisted with the design and implementation of web applications hosted in AWS.
    • Collaborated with project managers to scope milestones, resource use, and delivery estimates; reported project progress to executives.
    • Led teams toward technical solutions and reinforced best practices for maintainable delivery.
    • Created internal coding standards (nomenclature, comment styling, API versioning, unit test script design).
    • Designed, developed, and implemented a role-based security model for end users.
    • Built custom SQL Server functions and stored procedures to support platform needs.
    • Researched machine learning approaches using JavaScript and Python to improve and automate work processes.
    • Delivered UI/UX web experiences using React.
    2019 9 bullets
    • Foundation Finance — Built an automated data-entry program (Java + MS SQL Server), saving 1,200+ human hours and ~$40,000.
    • Developed a new client portal from scratch using the MERN stack (MongoDB, Express, React, Node.js) with features such as dependency injection, driver’s license scanning, Passport-JWT authentication, and more.
    • Developed a client-facing payment portal using Node.js, Express, and SQL.
    • Researched and built proof-of-concepts prior to production adoption (ID scanning vendors, MongoDB tooling, MERN stack standardization).
    • Automated Active Directory administration via PowerShell scripts to extract user information and create new users with default parameters.
    • Implemented VisualCron Server and automated scheduled jobs to reduce manual work and improve operational consistency.
    • Implemented MongoDB Atlas Cloud for centralized data storage.
    • Created technical documentation for both IT and end users to improve clarity and onboarding.
    • Researched, vetted, selected, and implemented a 3rd-party identification scanning solution into the custom portal platform.
    2018 6 bullets
    • Aqua Finance — Promoted within four months for exceeding senior executive expectations.
    • Increased scope and responsibility by moving into full-stack development ownership.
    • Wrote new .NET software solutions supporting web-based dealer and consumer systems.
    • Developed Java Spring APIs and custom JSP login pages.
    • Expanded contributions across C#, JSP, Java, and Salesforce development areas.
    • Strengthened troubleshooting capability across internal systems and production issues.
    2017 7 bullets
    • Aqua Finance — Developed solutions in AFI’s proprietary software using Alaska Xbase++ and Express++.
    • Assisted with designing, deploying, and migrating to a new modernized environment.
    • Worked across enterprise tooling including SLES (Suse Linux Enterprise Server), Windows 10, GroupWise 2012, Advantage Database Server, and UNITRENDS backup software.
    • Delivered features using Xbase++, Express++, C#, and Java based on evolving business needs.
    • Documented releases through structured release notes, code comments, and user manual updates.
    • Applied accounting and finance concepts to implement solutions aligned to business rules.
    • Consistently introduced new ideas and reasoning into program code to improve outcomes.
    2016 6 bullets
    • Minnesota Attorney General’s Office — Supported and administered system applications used by the office and its attorneys.
    • Partnered with internal stakeholders to determine application needs and database design approaches.
    • Managed an office-wide retention project by applying retention policies to case dockets prior to purging.
    • Designed and implemented a custom MS Access global error handler to track database errors and increase team efficiency.
    • Worked across a wide variety of tools and languages including MS Office, Relativity, Regular Expressions, VBA, SQL Server/T‑SQL, Visual Studio, ASP.NET, HTML, and Python.
    • Performed database and application testing—from OS security patch verification through finalization tests prior to deployment.
    Resume modes
    One story, five entry points