Career Profile
I am a technical lead at Apple with over 10 years of experience in software engineering and architecture, specializing in big data and cloud computing. I have a CISSP certification and a strong background in security and scalability.
In my current role, I manage the roadmap and resources for a cross- cutting business track, involving multiple teams and projects. I lead a team of four senior engineers and ensure the alignment of our quarterly OKR plans with the company’s vision and goals. I also coordinate with global teams across different functions and domains for product delivery and operational excellence.
I am passionate about solving real-world problems with cutting- edge technologies, and I always strive to learn new skills and tools. I have contributed to several open source projects and have multiple domain exposure, ranging from maps to robotic process automation. I believe in making computing accessible and inclusive, and I value collaboration, innovation, and quality.
Experiences
Leading a team of 4 senior engineers within Maps Org in the data ingest space.
- plan & execute yearly roadmap and resource allocations for a cross cutting business track, involving multiple teams and projects.
- responsible (planning, design, architecture, scrum, …) for a team of 4 senior engineers and accountable for quarterly OKR plans
- coordinate between globally distributed teams with cross-functional expertises for product delivery and operational excellence
Founding engineer who architected and built core product offering of the company, helping to deploy the product in multiple forture 500 companies.
- Architect for Jiffy Core and Jiffy Unit Testing. Written most of the initial releases.
- Jiffy is a robotic process automation (RPA) suite of products & is used by several fortune 100 companies.
- Implemented execution controller & scheduler/planner; which is consistently being able to scale and withhold multitude of features getting added almost every month.
- Implemented workflow designer - which is an state of the art drag-and-drop, almost zero scripting, work flow creation environment.
- For the visual analytics product (docube.io), developed front-end SPA. Implemented and integrated a configurable scheduling system. Integrated with social authentication (OpenID) providers.
- Built a high throughput, concurrent, reactive data streaming pipeline (“insights” feature of docube.io)
- Built MVP of a real time synchronization of remote OLTP systems to OLAP system (on cloud) for analytical (ML) usecase.
Helping WyPlay to enhance and maintain their state of the art Set-Top-Box solutions/suits for Belgacom’s 4 different STB platforms and corresponding client software. I helped them to solve long time pending problems related to performance.
- Python for the STB Front-end and middleware, drivers and low level services are in C (need to refer from time to time). Whole environment is built using gentoo build system - emerge/portage.
- Helped to automate testing practices by architect and implementing a tool for stability tests using Django and celery/rabbitmq. Which helps one-click test execution and result tracking in the STB test farm.
Leading product development efforts with the use of proven and apt technologies by incorporating best solutions for the business.
- Implemented a number of mobile e-commerce systems using our indigenous internal framework for web-crawling and won accolades.
- Wrote the back-end services & crawlers in Python (while front-end being any of Android, iOS or mobile interfaces.)
- Role includes tasks from development, mentoring, client interactions & recruiting new talents. Other roles: Performance Engineering/ Tuning. System Design & Documentation. Reverse Engineering
Certifications
The vendor-neutral CISSP credential confirms technical knowledge and experience to design, engineer, implement, and manage the overall security posture of an organization. Required by the world’s most security-conscious organizations, CISSP is the gold-standard information security certification that assures information security leaders possess the breadth and depth of knowledge to establish holistic security programs that protect against threats in an increasingly complex cyber world.