Skip to content

jkordish/resume

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

21 Commits
 
 

Repository files navigation

avatar

Joseph Kordish

San Antonio, TX | email joe@unicornclouds.com | jkordish gh | in/jkordish lnk


Summary

Seasoned Site Reliability Engineer (SRE) and technology generalist with extensive experience designing and automating large-scale systems. Skilled in DevOps, cloud infrastructure, and security; adept at rapidly learning new technologies to solve complex problems. AWS-focused with expertise in designing immutable, self-healing systems using container orchestration platforms (Kubernetes/EKS). A proven track record leading technical teams through mergers/acquisitions, ensuring continuity and innovation. Known for resourcefulness, strong mentoring, and a collaborative, can-do attitude.


Core Skills & Technologies

  • Cloud & Orchestration: AWS (EKS, Lambda, EC2, S3, etc.), OpenStack
  • Automation & Configuration Management: Ansible, Terraform, Packer, Rundeck, Jenkins, TeamCity
  • Containerization: Docker, Kubernetes (EKS), Helm, Consul
  • Languages: PowerShell, Shell scripting, Node.js, Python, Go, Rust
  • CI/CD & Pipelines: Jenkins, TeamCity, GitLab CI, AWS CodePipeline
  • Security & Compliance: CISSP, PCI-DSS, Vulnerability Assessments, Intrusion Detection
  • Other: VMware ESX, Linux Administration (RHCSA), Networking (Cisco/CCNA), NetApp

Experience

Principal Site Reliability Engineer

Trellix (formerly Mandiant → FireEye → McAfee)
January 2022 – Present

  • Led technical direction and day-to-day operations for the SRE team, mentoring junior members.
  • Designed and implemented AWS EKS deployment systems to ensure high availability, scalability, and reduced operational overhead.
  • Pioneered stateless, immutable infrastructure approaches that improved reliability and recovery.
  • Drove automation with Terraform, Packer, and Consul, emphasizing self-discovery and self-healing at scale.

Principal Site Reliability Engineer

FireEye
January 2021 – December 2021
(FireEye Products sold off and merged with McAfee, ultimately forming Trellix.)

  • Oversaw SRE best practices for production workloads in AWS, including container orchestration, CI/CD automation, and data pipelines.
  • Streamlined multi-tier AWS infrastructure, focusing on operational efficiency and incident mitigation.

Senior Site Reliability Engineer

FireEye
January 2018 – January 2021

  • Championed serverless architecture with multiple AWS Lambda implementations, reducing operational overhead.
  • Migrated legacy systems to AWS EKS, cutting deployment times significantly.
  • Managed multiple AWS EKS clusters, ensuring robust security and compliance for mission-critical services.
  • Deployed AWS Lambda functions to offload and simplify various operational tasks.

Site Reliability Engineer

FireEye
January 2014 – January 2018

  • Redesigned and supervised the CI/CD pipeline using Ansible, Terraform, Packer, and Consul.
  • Implemented a Big Data Analytics platform (EMR, AWS Data Pipeline, Lambda) to process large-scale ETL workloads.
  • Created operational documentation, runbooks, and standard operating procedures for consistent deployments.

Site Reliability Engineer

Mandiant
July 2013 – December 2013
(Acquired by FireEye)

  • Built and optimized a TeamCity-based build system, drastically reducing release cycles.
  • Converted complex Bash deployment scripts into Ansible playbooks, improving reliability and reducing errors.

Senior Technologist

Trans-Tel Central
April 2012 – July 2013

  • Rolled out an OpenStack-based multi-tenant operational network, managing storage, virtualization, and networking end to end.
  • Spearheaded PCI assessments business, obtaining PCI-ASV certification and ensuring compliance for diverse clients.

Technology Consultant III

Hewlett-Packard
September 2010 – March 2012

  • Served as Senior Virtualization Engineer for the US Army Medical IT Center (USAMITC), overseeing 1,000+ virtual machines.
  • Automated routine VM tasks using PowerCLI scripts, boosting admin productivity and lowering incidents.
  • Assisted in a large-scale virtualization infrastructure refresh, focusing on performance tuning and security hardening.

Computer Security Engineer

TASC Inc.
September 2007 – September 2010

  • Designed and integrated VMware virtualization solutions for the Air Force (CITS 35), rolling out first large-scale deployment across multiple commands.
  • Conducted network vulnerability assessments as part of the Air Force 92nd Aggressor Squadron, identifying and mitigating enterprise-level security threats.
  • Provided strategic solutions for vulnerability mitigation and refined processes for continuous improvement.

Network Security Analyst

MacAulay Brown
November 2006 – September 2007

  • Defended the Air Force Global Information Grid (GIG) against malicious threats via real-time network monitoring and intrusion detection.
  • Collaborated with the Air Force Network Security Division (AFCERT) to respond rapidly to critical security incidents.

Information Protection Technician

United States Air Force (USAF)
October 2000 – October 2006

  • Led a team of eight, implementing boundary protection, vulnerability assessment, and intrusion detection for the largest Air Force communications squadron.
  • Applied deep packet inspection with tcpdump and similar tools to troubleshoot low-level network issues.

Education

Master of Science, Information Assurance & Security (Network Defense)
Capella University, 2015–2016 | Summa Cum Laude

Bachelor of Science (BS), Psychology
Capella University, 2012–2015 | Summa Cum Laude


Certifications

  • CISSP – ISC2 License #112897
  • Network+ – CompTIA License #COMP10617900
  • Security+ – CompTIA License #COMP001004759650
  • CEHv6 (Ethical Hacking and Countermeasures) – EC-Council
  • ITIL V3 Foundation
  • RHCSA (Red Hat Certified System Administrator) – #605010315431388
  • MCTS: Windows Server 2008 Active Directory
  • VMware Certified Professional 3/4/5 – License #24125
  • Linux Professional Institute Certification (LPIC1) – (Expired)
  • Cisco Certified Network Associate (CCNA) – #CSCO10432786 (Expired)

Open Source / Volunteering

  • Rust Language Release Team Volunteer
    January 2018 – January 2020
    • Assisted with testing, documentation, and community support for Rust releases.

About

resume

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published