// security · operations · program leadership
Building Security & Risk Programs That Scale —
at the infrastructure level most organizations never encounter.
// about
I've spent my career at the intersection of physical security, data operations, and program management — building things that didn't exist before and solving problems that didn't have obvious solutions yet.
At Google, Microsoft, and before, I stood up programs from scratch that secured data and systems at a scale most organizations never encounter. That meant working across engineering, operations, and executive leadership simultaneously — translating complex technical risk into strategies that made sense for the business, and then driving them to completion.
What I've realized is that the skills I've developed — designing instrumented programs for chain of custody and asset traceability, building cross-functional consensus, and establishing trust at the executive level — matter far beyond the hyperscaler world. Industries like clean energy, AI infrastructure, and healthcare technology are grappling with exactly these problems, often without people who've solved them before.
Open to full-time leadership & fractional / advisory engagements
// career
Atlanta, GA
Atlanta, GA
Atlanta, GA
Lithia Springs, GA
Lithia Springs, GA
Atlanta Area, GA
Marietta, GA
Marietta, GA
// public record
Most of my work lives behind NDAs and security classifications — that's the nature of the field. But some of it has surfaced publicly. Below are examples of the programs, policies, and initiatives I've contributed to that you can read about directly.
Google's official video showing the disk erase cage, equipment, and physical destruction process — the workspaces, workflows, and hardware I designed. The segment starting at 1:15 shows the secure cage and processing equipment I selected and helped spec.
Watch on YouTube Google · Circular Economy · PublishedGoogle's account of how drives that pass the disk erase process are resold and reused globally — over 2.1 million parts resold in a single year. The hard drive portion of the resale program was made possible by the disk erase and verification program I ran: only drives that passed our process could be certified for resale. This page also describes the physical destruction process — the crusher, the shredder — for drives that couldn't be cleared.
Read on Google Sustainability Google · Data Security · PublishedGoogle's published account of "Layer 6: Disk Erase" — barcodes and asset tags tracking every drive from acquisition to destruction, the multi-step erase formatter, and physical destruction for drives that can't be wiped. I built this program: designed the workflows, selected the equipment (including the secure lockers and hydraulic punchers and shredders pictured), and worked with vendors to design and test destruction equipment at scale.
Read on Google Blog Google Cloud Blog · Published Oct 2025The final chapter of the program I built. Google can now cryptographically erase drives so reliably — NIST 800-88 compliant, with multiple independent verification layers — that physical shredding is no longer required. The article describes the "trust-but-verify model" at the core of the system: a phrase and an approach I championed in the program years earlier. The environmental payoff: drives that would have been shredded are now recovered, reused, and fed back into the circular economy.
Read on Google Cloud Blog Microsoft · Circular Centers · Published 2025Microsoft's Circular Centers reclaimed 3.2M+ components and achieved a 90.9% reuse/recycling rate in 2024 — fulfilling 85% of spare parts demand from harvested inventory. I helped design the first Circular Center in Boydton, VA: the physical layout, physical security requirements (never done before at this scale), and operations requirements for material movement. I also drove the on-wire wiping program that lets full racks move with drives still installed — unlocking the economics that make the whole model work.
Read Microsoft Circular Centers// beyond the resume
Built community-owned free wireless internet infrastructure across Atlanta years before municipal Wi-Fi was mainstream. Designed and deployed centrally managed captive portal nodes at homes and businesses — testing wireless distribution at the limits of what was commercially available.
Running a self-hosted Kubernetes cluster with Ceph distributed storage managing over 300TB of data across multiple nodes. Everything from monitoring (Prometheus/Grafana) to media to home automation runs here — because understanding infrastructure means running infrastructure.
Licensed amateur radio operator for over three decades. Ham radio was my first real introduction to the idea that infrastructure you build and operate yourself teaches you things you can't learn any other way.
// contact
If your organization is scaling fast and needs someone who's built these programs before — without having to learn the hard lessons from scratch — I'd welcome a conversation.
Open to