Experience
2025 — Now
2025 — Now
Seattle, Washington, United States
2021 — 2025
2021 — 2025
Kirkland, Washington, United States
Team: Identity-Aware Proxy (IAP)
● Accelerated customer adoption of secure cloud-native apps by enabling IAP support for
Cloud Run, resulting in a 35% increase in protected workloads and making IAP the
default security layer for serverless applications.
● Strengthened enterprise compliance and session integrity by redesigning IAP’s OIDC
flow to bind tokens to browser state, reducing token misuse risks and aligning with
security requirements for regulated industries.
● Improved system scalability and operational agility by centralizing policy enforcement
via Cloud Policy Engine, cutting IAP server-side latency by 24% and enabling teams to
adopt fine-grained access control without service-specific logic.
● Contributed to Chrome Enterprise Premium growth by integrating it with Safe
Browsing proprietary signals, enabling enterprise-grade data loss prevention (DLP) and
helping grow premium user base from 3.1M to a projected 7M users.
2020 — 2021
2020 — 2021
Team: AWS Cognito
● Reduced threat surface area by building a global bot detection system across Cognito’s
auth flows; leveraged real-time CloudWatch analytics and mitigations to block
credential-stuffing attempts at scale, protecting millions of user accounts.
● Enhanced security auditability across AWS Cognito environments by implementing
production SSH command monitoring, aligning with internal compliance standards and
improving on-call accountability.
2018 — 2020
2018 — 2020
San Francisco Bay Area
Team: Flow (Security Product)
● Enabled real-time visibility into VM network behavior with Cadmus, a traffic
visualization system powered by conntrack insights, reducing debug times by 50% and
earning recognition from customer support teams.
● Resolved complex customer-impacting security breaches by analyzing and fixing OVS
rule conflicts, directly contributing to multiple high-severity support cases being
resolved without escalation.
● Increased policy flexibility and VM isolation by designing OVS rule layout to support
multi-cardinality policies for services deployed on the same VM, aligning the product
for multi-tenant use cases.
● Pioneered user-based policy enforcement for Windows VMs, extending Acropolis
security to enterprise workloads and helping close key feature gaps in competitive
bake-offs.
● Improved platform observability and compliance readiness by building a custom IPFIX
exporter for conntrack data; reduced memory footprint by 40% while meeting telemetry
SLAs.
2017 — 2018
2017 — 2018
Greater Los Angeles Area
• Delivered server configuration tool to evade the traditional process of manual configuration. Any server found un-configured in the network will be automatically identified and configured with the appropriate network configuration remotely. The tool overcomes authentication challenges to configure the server. Perl programming language and Expect is used in implementing this project.
• Programmed traffic management tool to monitor the traffic utilization from the transit providers during the billing period which is essential to prioritize the maintenance and improve the efficiency of the critical regions.
Education
University of Southern California
Master's degree
2016 — 2018
SDM college of Engineering and Technology
Bachelor's degree
2009 — 2013