Systems Engineer — Critical Infrastructure — Autonomous AI Agent Fleets
Military college graduate (MSE) and Microsoft Certified Systems Engineer with over a decade of experience in energy basin critical infrastructure. Co-founded the first wireless ISP in Colorado. Currently focused on field communications engineering for a major energy operator, while independently building and operating a fleet of autonomous AI agents across cloud, bare-metal, and isolated lab environments.
Career path spans enterprise networking at chassis level, RF backhaul across difficult terrain, OT/SCADA integration at scale, and M&A asset transitions under compressed timelines. The through-line: making complex distributed systems work reliably where failure isn't an option.
Full-depth Cisco experience from access to core, including chassis-level work on Cat OS 6500 platforms, ASA firewalls, and I&E variant configurations. Meraki enterprise stack deployments from core to top-of-rack. Designed and maintained complex topologies with per-VLAN spanning tree, BGP peering, and SVI-based routing.
Full product line — Cat OS 6500 chassis-level, ASAs, access to core, I&E variants. Per-VLAN STP, BGP, SVIs.
Complete Meraki stack deployments, core to top-of-rack. Cloud-managed enterprise infrastructure at scale.
100+ deployments across plant and mobile assets. Rapid connectivity for remote energy infrastructure.
Designed and deployed microwave backhaul across some of the most challenging terrain in the western basins. Path studies, link budget analysis, interference mitigation — all driven by the reality of keeping remote SCADA and plant operations connected where wireline infrastructure doesn't exist.
Path studies, link budgets, interference analysis, and frequency coordination across difficult mountainous terrain. Practical RF engineering for real-world constraints.
Hands-on with Exalt, Cambium, SAF, Mimosa, and Redline platforms. Selection, deployment, and long-term management of multi-vendor RF infrastructure.
Comfortable on both sides of the IT/OT divide. Full vendor stack experience across SCADA platforms, PLCs, RTUs, HMI systems, and industrial networking. Managed M&A asset cutovers and SCADA conversions under compressed timelines across multiple operators in the Piceance and Uinta basins.
Asset cutovers, SCADA system conversions, and infrastructure migrations under compressed timelines. Multiple operators, multiple basins.
11 years across Piceance and Uinta basins. Multiple operators including major energy companies. Deep understanding of upstream oil & gas operations.
A fleet of specialized AI instances operating across cloud, on-premise bare metal, and isolated inference lab environments. Six figures in dedicated compute hardware. Multiple frontier models in active rotation with defined roles and cost profiles. Machine-to-machine orchestration — no chat interfaces.
Multi-environment deployment spanning cloud-hosted instances, on-premise bare metal servers, and an isolated inference lab. Custom async dispatch protocol with a shared knowledge vault enables machine-to-machine orchestration across the fleet. Each instance runs a defined role with a specific frontier model selected for that task's cost and capability profile.
Cloud, bare metal, and isolated lab. Each environment serves a distinct purpose in the fleet architecture.
Custom protocol for machine-to-machine orchestration. Shared knowledge vault. No human-in-the-loop chat interfaces.
Multiple frontier models in active use, selected per-task by cost and capability. Not locked to any single provider.
Organizational model borrowed from Yang-Mills gauge theory in differential geometry. Projects are modeled as fibers in a principal bundle, AI instances as gauge transformations operating on those fibers, and the shared knowledge layer as the connection form that keeps everything coherent.
Keeping dozens of projects, multiple models, and several physical environments synchronized requires a rigorous framework. Gauge theory provides the mathematical structure to detect when system state disagrees and to maintain coherence across the fleet.
Purpose-built security operations running live across the fleet. Dedicated adversarial agents on isolated infrastructure perform structured penetration testing; blue team agents receive findings and implement hardening. Automated scans cover external exposure, DNS hygiene, SSL posture, and service configuration.
Adversarial agents on isolated infrastructure. Structured penetration testing with Kali Linux offensive toolkit. Scoped attack surface management.
Automated hardening from red team findings. WAF events, intrusion detection, system audits, and geo-enriched attacker intelligence.
Real incidents investigated and remediated. Dispatch pipeline vulnerabilities and context leakage events handled through the fleet's security operations pipeline.
Scrape, score, filter, generate, OPSEC-sanitize, publish. Closed-loop automation with human review gates at critical decision points.
Frontier LLMs compete head-to-head on identical build specs. Side-by-side deployment, voting, and scoring. Results drive model routing decisions.
Multi-stage pipeline: signal detection, validation, execution planning, risk management. Deterministic technical analysis with LLM invalidation layers.
Host-level monitoring with compressed telemetry and real-time visualizations. Observer independence as a core design constraint.
Vision models produce editable parametric CAD output from reference images. Bridging AI perception with engineering-grade design tools.
100+ project plans in the knowledge vault. Multiple frontier models in active rotation. Automated content production at velocity. Everything behind Cloudflare Zero Trust.
Alpha DEC and SGI terminals. Early exposure to 3D Systems polymer resin printing — years before consumer 3D printing existed. Now Collins Aerospace / RTX
Military college graduate — Master of Science in Engineering. Pepperdine University film school. MCSE certification.
Co-founded one of the earliest commercial wireless ISPs in Colorado. Built the network from scratch — towers, radios, backhaul, NOC, and customer CPE.
Competitive extreme overclocking — multiple world records using liquid nitrogen cooled CPUs and GPUs. Pushing hardware to absolute physical limits. HWBOT verified
11+ years in critical infrastructure across the Piceance and Uinta basins. Cisco, RF, SCADA, M&A transitions. Currently: field communications for a major energy operator.
Independently built and operating an autonomous AI agent fleet. Six figures in compute. Multiple frontier models. Machine-to-machine orchestration at scale.
Live demos of the AI fleet, security dashboards, and agent outputs are available behind Cloudflare Zero Trust. Request access to explore interactive dashboards, real-time fleet observability, and security operations data.
Live intrusion detection, WAF events, threat maps with geo-enriched attacker intelligence.
Request AccessReal-time monitoring, compressed telemetry, and system topology visualization.
Request AccessHead-to-head LLM competition results and side-by-side deployment comparisons.
Request AccessOpen to conversations about infrastructure, AI systems, security operations, and interesting problems.