2025 20 bullets
-
Milwaukee Tool (JEDI — Digital IoT Services Team) — Senior Software Engineer — Delivered a greenfield secure IoT device provisioning solution (Python CLI + supporting APIs) automating device registration, certificate generation, and secure bootstrapping aligned to AWS IoT Core + enterprise security standards; cut provisioning from ~10 min/manual to <1 min per device.
-
Implemented MQTT delta updates for constrained-device messaging, reducing payload size by ~40% overall and up to ~97% in an example (476B → 15B).
-
Integrated security-first patterns into provisioning workflows (AWS Secrets Manager + Auth0 credential handling + secure setup guidance) to enable scalable, multi-environment provisioning (dev/test/prod).
-
Served as the first implementer/pilot for the provisioning solution; surfaced systemic blockers (e.g., cloud governance permission constraints), partnered with governance/security to resolve them, and documented standards for future contributors.
-
Authored a comprehensive README.md for the DIoTS iot-testing repo / IoT provisioning tool (install steps, CLI examples, security guidance), reducing onboarding time for new engineers by an estimated ~30%.
-
Authored DIoTS service SLA definitions documentation and performed SLA gap identification, improving operational clarity and expectations.
-
Supported implementation of an SLA dashboard tracking three key metrics, enabling consistent measurement and incremental service improvement.
-
Built SR-Feedback-Workflow-V3 (Slack workflow automation for structured sprint-review feedback), secured cross-pod volunteer support, and validated stakeholder interest for broader adoption.
-
Designed and deployed an AI-assisted feedback collection + analytics pipeline using Slack Workflow forms + Microsoft Forms; enriched results via emotion detection; used Copilot/GenAI to produce an executive-style PDF report and Q4 2025 readout deck shared with leadership.
-
Iterated and delivered an “Intro to Slack Workflows” enablement session through multiple peer + cross-team dry runs, culminating in a refined delivery at Platform Cluster Sync.
-
Established a repeatable practice of short demo/how-to videos to unblock peers across tools/workflows/processes, converting tribal knowledge into reusable learning assets that reduce meeting dependency and accelerate onboarding/troubleshooting.
-
Created and demoed interactive documentation using Lucidchart advanced features (e.g., layered diagrams), improving clarity and influencing peers to adopt higher-quality visuals.
-
Delivered a “Memory Maps” technical presentation using creative PowerPoint animations to explain complex concepts (e.g., hex data parsing); received strong peer feedback and influence on presentation standards.
-
Presented to Cloud Center of Excellence stakeholders with clear visuals quantifying financial impact of reducing AWS CloudTrail usage, enabling informed cost-optimization decisions.
-
In sprint reviews, communicated delivered results using data-driven before/after visuals showing reduced errors and increased success rates, strengthening stakeholder trust through transparency.
-
Championed agile execution discipline by ensuring sprint retrospectives happened and advocating for explicit Definition of Done / “success looks like” criteria to reduce ambiguity and rework.
-
Initiated internal Technical Synchronization sessions to reduce knowledge silos on critical infra/security topics (AWS IoT Device Defender audit, AWSCC provider implications, Terraform multi-env/multi-region deployment mechanics).
-
Championed adoption of DiSC Profiles within the POD by creating/shareable enablement assets (template, PowerPoint, how-to video) and influencing leadership alignment—resulting in scheduled Q1 2026 implementation.
-
Represented JEDI/CPP & DIoTS in the Extreme Ownership Challenge by setting a time-bound goal, tracking progress, and reporting outcomes—reinforcing accountability and continuous improvement.
-
Operationalized innovation and GenAI adoption by running monthly AI-assisted communication reviews, participating in 2+ innovation sprints, sharing learnings, and automating repetitive tasks.
2024 9 bullets
-
Milwaukee Tool (JEDI — Data Engineering Team) — Software Engineer II — Advanced the Tool Data Foundations Project by delivering a comprehensive tool-data tagging system and collaborating on QuickLink integrations with the EDA team.
-
Improved delivery execution and organization by leveraging GitHub to streamline task management and increase work clarity/trackability.
-
Incorporated peer feedback to improve design clarity, usability, and scalability of deliverables (as reflected in year-end feedback).
-
Exceeded expectations in partner-team enablement by refining documentation, improving support efficiency, and helping increase the rate of resolved partner feature requests.
-
Earned recognition for “One Team Mentality” through a collaborative and inclusive approach that strengthened team culture and cross-functional execution.
-
Built strong cross-functional relationships and was recognized as a trusted, positive-intent collaborator and enabler for partner teams.
-
Demonstrated proactive communication and problem-solving—addressed challenges effectively to maintain momentum toward shared objectives.
-
Received “Exceeds Expectations” manager ratings in key leadership behaviors, including Candid communication, One Team Mentality, and Build Collaborative Relationships.
-
Delivered consistently strong overall performance as a Software Engineer II (Meets Expectations overall), with standout strengths in operational improvements, partner enablement, and collaboration.
2023 9 bullets
-
Milwaukee Tool (JEDI — Data Engineering Team) — Data Engineer II — Drove a risk-managed transition to stand up a new, more flexible tool-data-reads system in parallel with the legacy database, aiming to avoid disruption while ensuring old vs. new reads stayed in parity.
-
Completed a deep ramp-up on the tool data domain being transferred into ownership, building a foundation to support long-term customer needs and future improvements.
-
Researched and implemented a new database solution to store key data sets supporting the tool-data-reads modernization effort.
-
Defined an ETL-driven migration strategy to move historical tool data reads into the new database while preventing loss/corruption and maintaining consistency during transition.
-
Identified and planned use of Amazon SageMaker Studio Notebooks to streamline backfill scripts/processes and support consistent data migration validation.
-
Built extensive hands-on AWS DocumentDB experience through research, proof-of-concepts, and schema design for a JSON document-style data model.
-
Integrated AWS DocumentDB into existing tooldata APIs and workflows, expanding the platform’s data storage flexibility.
-
Transformed Terraform/IaC from a prior weakness into a strength; completed 2023 goal to improve understanding of Terraform and Terraform Modules (completed 12/27/2023).
-
Broadened data engineering capability (parsing, manipulation, storage) across multiple data systems, increasing readiness for higher-impact work.
2022 19 bullets
-
Milwaukee Tool (ONE‑KEY Integrations / SPI) — Software Engineer II — Produced a formal Security Risk Assessment of Oracle authentication (Basic Auth), delivered as an executive-ready PowerPoint and supporting written report.
-
Built and demo’d an AWS Step Functions POC that retrieved items, extracted nested payload details, and generated environment-specific deep-link URLs; shared demo videos and earned peer recognition.
-
Implemented and verified a Step Functions state machine for Inventory Item Create with request validation; packaged definition files and execution examples for reuse.
-
Researched and delivered the first set of Inventory-model CRUD API endpoints using a serverless architecture (Lambda + Step Functions), laying groundwork for the API Gateway portion of the pipeline.
-
Produced a complete “reference pack” for the POC (Postman collections, repo map by step, CI/CD + environment references) and was directly thanked for consolidating it.
-
Enabled QA API automation by providing hands-on support and Postman guidance; recognized via direct shout-out email.
-
Developed and presented a reusable “Request Bus” pattern and introduced a complementary bus event pattern concept; called out explicitly in team shout-outs.
-
Improved troubleshooting effectiveness for the Procore transfer integration by adding targeted logging and deeper tracing; repeatedly recognized for fast debugging and increased visibility.
-
Created architecture diagrams and kicked off data-mart documentation, updating diagrams live during stakeholder calls to improve shared understanding of the solution being co-created.
-
Performed deep-dive research on connecting Swagger/OpenAPI/CodeGen into AWS (API Gateway/Lambda) and shared practical resources to enable future client SDK generation.
-
Jumped outside core responsibilities to assist PT4 in a time-boxed bug-fixing effort; ramped quickly in a new language/repo and resolved key Hydraulic Reports defects.
-
Created visual solution designs/diagrams for the best approach to export the Transfer Report to an external integration partner (high-level AWS flow + Visio).
-
Fixed a DynamoDB throughput failure (“configured provisioned throughput exceeded”) by updating Terraform table billing mode from PROVISIONED → PAY_PER_REQUEST, improving operational stability.
-
Refactored Transfer Report PDF deep-link implementation by separating business logic from HTML templates and moving logic server-side; made deep-link URL generation more dynamic.
-
Resolved a PDF not downloading issue caused by environment differences (staging base URL missing “/app/”) with a dynamic fix that works across test/stage/prod.
-
Investigated and resolved a Procore defect where the Transfer Report didn’t show in Procore’s Project Daily Log for unassigned tools, restoring expected integration behavior.
-
Built an end-to-end external API gateway POC using AWS API Gateway → Step Functions → multi-Lambda “Request Bus” pattern (filter/transform, validation, internal API calls, deep-link augmentation), returning results in seconds; expanded skills in Terraform, Jenkins, and VTL mapping templates.
-
Scaled team effectiveness by setting up teammates’ Postman environments (dynamic variables, Runner automation), sharing short how-to videos, and curating Confluence documentation/research spikes to reduce tribal knowledge.
-
Earned AWS Certified Solutions Architect – Associate (SAA‑C03) on 08/25/2022 (128 days early), received “Exceeds Expectations” for the goal, and proactively shared study resources with the broader ONE‑KEY engineering group.
2021 10 bullets
-
Milwaukee Tool (ONE‑KEY Integrations) — Software Engineer II — Built and deployed Oracle Unifier “People” integration APIs (GET/POST) with a no-bugs release, outperforming comparable integrations that later had post-“done” defects.
-
Delivered end-to-end DTW PDF Report upload integration to Oracle Unifier, owning UI/UX front-end + back-end integration work; pushed through deployment in time for the next release cycle and earned “stepped up / Rockstar” recognition.
-
Owned integration requirements gathering and documentation, producing high-quality UI/UX + API docs and uncovering where/how to update Swagger/OpenAPI docs for integration APIs—then documenting the process.
-
Presented a live Oracle Unifier Integration demo to the entire ONE‑KEY department as the only software developer presenting, translating complex integration work into a clear cross-team narrative.
-
Produced a backup demo video (risk mitigation for outages) shared internally and sent to Oracle, improving stakeholder visibility and reducing delivery/demo risk.
-
Identified and clarified a security flaw/risk around linking integrator accounts; created a short demo video that made the issue easy to understand and faster to act on.
-
Improved agile execution by proposing to keep the Sprint Retro board open throughout the sprint, enabling continuous capture of ideas/issues instead of last-minute recollection.
-
Reduced “tribal knowledge” risk by creating Confluence pages establishing shared standards for documentation expectations, code-commenting best practices, and practical how-tos (e.g., Postman guidance).
-
Onboarded/mentored a new developer (environment setup + git/source control) and delivered detailed QA-ready test documentation (UI steps + Postman examples + screenshots), improving handoffs and reducing back-and-forth.
-
Discovered and shared a solution for the Autodesk BIM 360 integration account-linking error (“Need to Install ONE‑KEY App BIM 360 Error”), unblocking integration workflows for the team.
2020 10 bullets
-
Foundation Finance — Developed and deployed a client-facing payment portal that processed ~250,000 payments totaling ~$85,000,000.
-
Integrated CI/CD pipelines using Bitbucket Pipelines to automatically build, run QA tests, and deploy web applications.
-
Assisted with the design and implementation of web applications hosted in AWS.
-
Collaborated with project managers to scope milestones, resource use, and delivery estimates; reported project progress to executives.
-
Led teams toward technical solutions and reinforced best practices for maintainable delivery.
-
Created internal coding standards (nomenclature, comment styling, API versioning, unit test script design).
-
Designed, developed, and implemented a role-based security model for end users.
-
Built custom SQL Server functions and stored procedures to support platform needs.
-
Researched machine learning approaches using JavaScript and Python to improve and automate work processes.
-
Delivered UI/UX web experiences using React.
2019 9 bullets
-
Foundation Finance — Built an automated data-entry program (Java + MS SQL Server), saving 1,200+ human hours and ~$40,000.
-
Developed a new client portal from scratch using the MERN stack (MongoDB, Express, React, Node.js) with features such as dependency injection, driver’s license scanning, Passport-JWT authentication, and more.
-
Developed a client-facing payment portal using Node.js, Express, and SQL.
-
Researched and built proof-of-concepts prior to production adoption (ID scanning vendors, MongoDB tooling, MERN stack standardization).
-
Automated Active Directory administration via PowerShell scripts to extract user information and create new users with default parameters.
-
Implemented VisualCron Server and automated scheduled jobs to reduce manual work and improve operational consistency.
-
Implemented MongoDB Atlas Cloud for centralized data storage.
-
Created technical documentation for both IT and end users to improve clarity and onboarding.
-
Researched, vetted, selected, and implemented a 3rd-party identification scanning solution into the custom portal platform.
2018 6 bullets
-
Aqua Finance — Promoted within four months for exceeding senior executive expectations.
-
Increased scope and responsibility by moving into full-stack development ownership.
-
Wrote new .NET software solutions supporting web-based dealer and consumer systems.
-
Developed Java Spring APIs and custom JSP login pages.
-
Expanded contributions across C#, JSP, Java, and Salesforce development areas.
-
Strengthened troubleshooting capability across internal systems and production issues.
2017 7 bullets
-
Aqua Finance — Developed solutions in AFI’s proprietary software using Alaska Xbase++ and Express++.
-
Assisted with designing, deploying, and migrating to a new modernized environment.
-
Worked across enterprise tooling including SLES (Suse Linux Enterprise Server), Windows 10, GroupWise 2012, Advantage Database Server, and UNITRENDS backup software.
-
Delivered features using Xbase++, Express++, C#, and Java based on evolving business needs.
-
Documented releases through structured release notes, code comments, and user manual updates.
-
Applied accounting and finance concepts to implement solutions aligned to business rules.
-
Consistently introduced new ideas and reasoning into program code to improve outcomes.
2016 6 bullets
-
Minnesota Attorney General’s Office — Supported and administered system applications used by the office and its attorneys.
-
Partnered with internal stakeholders to determine application needs and database design approaches.
-
Managed an office-wide retention project by applying retention policies to case dockets prior to purging.
-
Designed and implemented a custom MS Access global error handler to track database errors and increase team efficiency.
-
Worked across a wide variety of tools and languages including MS Office, Relativity, Regular Expressions, VBA, SQL Server/T‑SQL, Visual Studio, ASP.NET, HTML, and Python.
-
Performed database and application testing—from OS security patch verification through finalization tests prior to deployment.