Jordan Rash, Continuous Monitoring Developer in Denver, CO, United States
Jordan Rash

Continuous Monitoring Developer in Denver, CO, United States

Member since May 26, 2020
Jordan is a highly motivated and passionate reliability engineer that started his career in the United States Navy. It was there he learned no matter what time of day, be prepared to solve a problem. Later in his career, he had the desire to lean in on his computer science degree and entered the security field as a SOC manager, and, more recently, he has been a developer/SRE leveraging the power of Kubernetes. Every day as an SRE brings a new problem, and he is excited about the opportunities.
Jordan is now available for hire


  • CapitalOne Financial
    Amazon Web Services (AWS), DigitalOcean, Google Compute Engine (GCE), Linkerd...
  • InfoReliance
    Basecamp, Unix, Linux, Ansible, Amazon DynamoDB, AWS Lambda, Python, McAfee
  • United States Navy
    Splunk, Java, Python, Git, Ansible, Linux, Unix



Denver, CO, United States



Preferred Environment

Amazon Web Services (AWS), Linkerd, Gloo, DigitalOcean, Terraform, Ansible, Kubernetes, Docker, Python, Go

The most amazing...

...thing that I have developed is an implementation of the VirusTotal interface that allowed similar workflows to be done internally.


  • Lead Software Developer/Operations Engineer

    2018 - 2020
    CapitalOne Financial
    • Designed the plan to deploy OSQuery to all enterprise endpoints in the organization. Responsible for developing a technology stack that ensured no data loss, minimal time from the endpoint to SIEM.
    • Designed and developed an internal file hash indexer (written in Go), that allowed SOC analysts to easily answer the question “has this file had ever been seen in our network” The project is an internal representation of an API similar to VirusTotal.
    • Worked closely with the application team to support stress testing of multi-cloud and 3rd party CNCF application integration of CapitalOne container orchestration platform, CriticalStack.
    • Migrated multiple legacy applications to the Kubernetes platform in support of the effort to utilize a methodology focused on mutability and elasticity.
    Technologies: Amazon Web Services (AWS), DigitalOcean, Google Compute Engine (GCE), Linkerd, Gloo, Codecov, Codefresh, Drones, Kubernetes, Python, GoLand, Go
  • SOC Manager and Senior Cybersecurity Analyst

    2017 - 2018
    • Managed team of two developers, three analysts, and one infrastructure personnel responsible for customer security platform. Defined SLAs and identified SLOs to support the company's priorities.
    • Designed and implemented network engineering plans to determine the best location for McAfee and open-source sensors and data collectors.
    • Led development of an open-source, “serverless” incident management system that utilizes many of AWS technologies.
    • Interfaced daily with customers to ensure maximum communication and on-time deliverables.
    • Utilized the McAfee SIEM stack to develop analytics and correlation rules against real time endpoint and network data.
    Technologies: Basecamp, Unix, Linux, Ansible, Amazon DynamoDB, AWS Lambda, Python, McAfee
  • Surface Warfare Officer and Computer Network Defense Analyst

    2009 - 2017
    United States Navy
    • Handled the personal and professional growth of 14 employees ranging from continued education training to managing timesheets and leave requests.
    • Developed Python-based software to extract event-based data from various sources for analysis, automating the formerly manual process of moving data from collection sources to analysis platforms to include Splunk.
    • Created, tested, and deployed custom analytics to identify malicious activity and misconfigurations on enterprise networks.
    • Maintained technician level knowledge on networking equipment and advanced external RF communications equipment.
    • Served as the head network administrator of a medium-sized Windows domain. The network consisted of two domain controllers, 100 endpoints, 2 RHEL servers, 14 networking devices, and supported 150 personnel.
    • Identified systemic security issues with UNIX/Linux systems and provided recommendations for mitigating those issues.
    • Conducted vulnerability assessment teams focusing on identifying attack vectors and analysis of intrusions, and worked with partner organizations to expand the analysis.
    • Managed development and deployment of five software development efforts that supported data analysis and synchronous global operations.
    Technologies: Splunk, Java, Python, Git, Ansible, Linux, Unix


  • Micro Focused QA — Ephemeral Environments

    A Kubernetes based project that allowed for individual Jira tickets (represented as branches in the git provider) to be tested by a QA engineer within an ephemeral existence of the web application. Utilizing Helm and a CICD engine, I was able to create short-lived deployments of the customers' web app, with build hash referenced URLs, that allowed the developers and the QA team to work asynchronously. At any given point in time, there will be 15-20 deployments of the web app that reference a Jira ticket directly.


  • Languages

    Go, Python, Rust, Java, Dart
  • Other

    Site Reliability Engineering (SRE), Continuous Monitoring, GoBuffalo, Codefresh, Fintech, Drones, Linkerd, McAfee
  • Tools

    Google Compute Engine (GCE), AWS ELB, AWS CLI, Jira, HashiCorp, Auth0, Ansible, Terraform, Codecov, Istio, Basecamp, Git, Splunk, GoLand
  • Paradigms

    Continuous Delivery (CD), Continuous Integration (CI), Asynchronous Programming
  • Platforms

    Kubernetes, Linux, Docker, DigitalOcean, Amazon Web Services (AWS), Rancher, Google Cloud Engine, Gloo, AWS Lambda, Unix
  • Industry Expertise

  • Storage

    Amazon S3 (AWS S3), Amazon DynamoDB
  • Frameworks



  • Master's Degree in Software Engineering
    2015 - 2020
    George Mason University - Fairfax, VA
  • Bachelor's Degree in Computer Science
    2005 - 2009
    United States Naval Academy - Annapolis, MD


  • GIAC Continuous Monitoring Certification (GMON)
  • GIAC Penetration Tester (GPEN)
  • GIAC Security Essentials (GSEC)
    JULY 2016 - PRESENT
  • GIAC Certified Incident Handler (GCIH)

To view more profiles

Join Toptal
Share it with others