Brock Quinn, PCI-DSS Developer in Vancouver, BC, Canada
Brock Quinn

PCI-DSS Developer in Vancouver, BC, Canada

Member since June 3, 2019
Brock has over a dozen years of practical experience working with Cloud and on-premises environments, specializing in infrastructure migrations, cybersecurity, and compliance. He possesses a strong entrepreneurial drive and is always looking for the best solution to fit project requirements. With a strong customer service background, Brock communicates well and prides himself on delivering high-quality results.
Brock is now available for hire

Portfolio

  • Teppen Services
    Docker, Gitlab CI, Cognito, CloudFront, ECS, Fargate, S3, API Gateway, Lambda...
  • Oracle
    Oracle Cloud Infrastructure (OCI), Terraform, SALT, Python, Bash, Linux...
  • NetSuite
    Amazon Web Services, Puppet, Cisco Nexus Switches...

Experience

  • Red Hat Linux, 20 years
  • Amazon Web Services (AWS), 8 years
  • PCI-DSS, 7 years
  • Puppet, 7 years
  • Python, 4 years
  • Terraform, 2 years
  • AWS Lambda, 2 years
  • Oracle Cloud, 2 years

Location

Vancouver, BC, Canada

Availability

Part-time

Preferred Environment

RHEL, CentOS, Windows 10 + WSL, VSCode, Vim

The most amazing...

...project I've worked on was moving a co-location deployment with 16 racks of equipment to another location with four hours of downtime within 30 days.

Employment

  • Co-founder

    2019 - PRESENT
    Teppen Services
    • Designed a Cloud infrastructure that implements best practices for high-availability, scalability, security, and performance.
    • Developed a SaaS API using Python, AWS Lambda, Cognito, and API Gateway.
    • Developed a SaaS website front end using Aurelia JavaScript framework.
    • Developed and maintained a CI/CD pipeline using GitLab and Docker, deploying to AWS ECR and ECS Fargate.
    • Designed and deployed infrastructure using the Infrastructure-as-Code tool Terraform.
    • Developed a data archival system using Python, AWS Glacier Deep Archive, and Azure Blob Storage.
    • Developed and tested AWS Lambda functions using AWS SAM.
    • Managed a team of staff.
    Technologies: Docker, Gitlab CI, Cognito, CloudFront, ECS, Fargate, S3, API Gateway, Lambda, Python, Node.js
  • Principal Network Analyst

    2017 - 2019
    Oracle
    • Designed a Cloud network infrastructure for products being deployed in Oracle Cloud Infrastructure. Infrastructure as code written and deployed using Terraform.
    • Oversaw network automation and configuration management using Python and SALT.
    • Reviewed proposed solutions ensuring best practices coverage for security, high-availability, and business continuity and disaster recovery.
    • Provided mentoring and training to engineers.
    • Worked with a global, remote first team.
    Technologies: Oracle Cloud Infrastructure (OCI), Terraform, SALT, Python, Bash, Linux, Cisco, Arista, Juniper, Docker, Oracle VM, GNS
  • Principal Network Engineer

    2015 - 2017
    NetSuite
    • Advised and participated in compliance audits including PCI-DSS, SOC 1 and 2, ISO27001 as the technical lead.
    • Responsible for infrastructure capacity planning relating to the Advanced Rating group of products.
    • Oversaw the split data center infrastructure and half, to a new data center facility.
    • Migrated the company-owned data center infrastructure to the co-location facility.
    • Designed and built a Cloud-based hot standby disaster recovery solution.
    • Provided mentoring and training.
    • Worked in a global, remote-first team.
    Technologies: Amazon Web Services, Puppet, Cisco Nexus Switches, Cisco Unified Computing System (UCS), Cisco ASA, Oracle Database, Java, Apache Tomcat, Apache HTTPd, Red Hat Enterprise Linux
  • Senior Network Engineer

    2012 - 2015
    Monexa
    • Implemented high availability best practices using load balancing and redundant servers.
    • Deployed a Zabbix monitoring system to monitor all infrastructure components and manage assets.
    • Designed and deployed a new infrastructure using Citrix XenServer and Cisco UCS platform to significantly reduce data center footprint and day-to-day management tasks.
    • Implemented configuration management using Puppet to centrally manage all system configurations.
    • Migrated source code version control to Git and assisted with provisioning a Jenkins system to create a CI/CD solution.
    • Implemented security best practices including server hardening, rate limits, DoS protection and explicit firewall filtering.
    • Advised and participated in security and compliance audits including PCI-DSS, SOC 1 & 2, ISO27001 as the technical lead on the project.
    Technologies: Amazon Web Services, Java, Apache Tomcat, MySQL, Oracle Database, Red Hat Enterprise Linux, Solaris, Zabbix, Citrix XenServer, HAProxy
  • Network Engineer

    2010 - 2012
    Hostworks
    • Designed and deployed network infrastructure, including but not limited to routers, switches, firewalls, load balancers, and IDS and IPS solutions.
    • Monitored and maintained the existing network infrastructure.
    • Implemented network automation using scripting languages.
    • Participated in on-call roster.
    Technologies: Linux, Solaris, Apache, NFS, Bind, Bash, Cisco, Juniper, Foundry, Citrix, NetApp, VMWare
  • Systems Engineer

    2008 - 2010
    Adam Internet
    • Migrated legacy systems to new infrastructure.
    • Maintained custom software for remote network testing.
    • Maintained and improved game server infrastructure.
    • Maintained and improved corporate email infrastructure.
    • Maintained and improved the standard operating environment for Linux and Windows hosts.
    Technologies: Linux, Solaris, Apache, Xen, NFS, Sendmail, Exim, Bind

Experience

  • Tied.to SaaS Product (Development)

    Tied.to was a Cloud-based follow me phone system. A customer could purchase one or more numbers in various countries, and they would be redirected to the customer based on settings defined in the dashboard. The product had two components. First, the front end, developed using the Aurelia JavaScript framework and utilized the AWS Amplify utilities for authentication. It was hosted on S3 in production and used CloudFront for optimal performance. The second component, the backend, was an API customers would directly connect to using the Tied.to front end. It was written in Python and deployed to AWS Lambda in production. It used AWS API Gateway to provide authorization control and DDoS protections.

Skills

  • Platforms

    Amazon Web Services (AWS), AWS EC2, Red Hat Linux, AWS Lambda, Oracle Database
  • Storage

    Oracle Cloud, MySQL
  • Other

    Cisco, Juniper, HAProxy, PCI-DSS, Firewalls, Security, Software Development, System Security Developer, Infrastructure as Code, Monitoring, AWS API Gateway, DevNetOps, SOX Compliance, ISO 27001
  • Tools

    Terraform, Puppet
  • Paradigms

    DevOps, Continuous Deployment
  • Languages

    Python, Bash, JavaScript

To view more profiles

Join Toptal
I really like this profile
Share it with others