Skip to content

Resume

Go · Linux · Reliability

Pragmatic engineering, production hardening, and developer workflow improvements.

Focus areas:

  • Go (stdlib-first)
  • Observability
  • Security
  • CI/CD & Bazel


Pragmatic engineer with deep experience in Go, Linux systems, observability, and production reliability. I design and build lean, testable backends; automate infrastructure; and harden systems with strong security and rigorous change control. Recent work includes leading an at-scale CMDB with time-series power telemetry, Go 1.23.x upgrades on Bazel, secure certificate automation, and CI/CD governance for private→public code mirroring. Comfortable owning ambiguous problems end-to-end and delivering measurable improvements in uptime, performance, and developer workflow.

  • Languages: Go (idiomatic, stdlib-first), Bash, Python
  • Systems & Platforms: Linux, Kubernetes, Containers, Networking, IPMI, Redis, Postgres/TimescaleDB
  • Reliability & Observability: Prometheus, Grafana, SLOs/alerts, on-call workflow design
  • Build & CI/CD: Bazel, Gazelle, bzlmod, GitHub Actions, secure mirroring & contributor policy
  • Security: Threat modeling, endpoint controls, ACME/PKI, secret management
  • Practices: TDD, table-driven tests, explicit error handling, domain-first design
ThoughtSpot — Senior Member Of Technical Staff (Jul 2024 - Present)

ThoughtSpot — Senior Member Of Technical Staff

Section titled “ThoughtSpot — Senior Member Of Technical Staff”

Jul 2024 - Present

Custom Node Exporter (Project Lead & Backend) — Go, TimescaleDB, React, Prometheus, Grafana

  • Delivered a central source of truth for fleet state with time-series power telemetry and dashboards; eliminated spreadsheet-driven tracking and enabled earlier detection of PDU overload and resource hot spots.
  • Built a lean exporter that bundles IPMI tooling securely; exporter extracts and runs ipmicfg only when needed; backend limited to four external libraries to minimize attack surface and operational overhead.
  • Chose TimescaleDB for efficient storage of power metrics + host metadata.

Certificate Automation & Renewal — Docker, Cloudflare, Nginx Proxy Manager

  • Moved from wildcard certs to per-service ACME certificates; each internal service now has its own identity, eliminating manual cert copying and recurring wildcard cost.

Developer Threat Model (Engineering)

  • Drove an engineering-focused threat model; tightened endpoint controls and approved 1Password Secrets Automation to eliminate hard-coded secrets; delivered PoC demonstrating a CyberArk bypass risk to improve coverage.

Operational Efficiency (On-call)

  • Migrated on-call from spreadsheets/PagerDuty to GoAlert + Jira Service Management; improved visibility (“who is on call”), calendar sync, overrides, and cost efficiency.

Nebula: Admin Controls — Go, Postgres, JavaScript

  • Shipped admin controls to expose/toggle cloud regions and policy flags (ED-ticket requirement, per-env visibility) to developers.
  • Unblocked delivery by diagnosing non-idempotent DB migrations (Golang Migrate) in a highly automated codebase and adjusting approach.

Go Upgrade Program (1.21 → 1.23.6) — Bazel, GLIBC, Gazelle, go.mod/go.sum

  • Raised Go build reliability (~90% success as of May 29, 2025) and addressed EOL/security by building a custom 1.23.6 SDK, decoupling Go from the toolchain in Bazel, and introducing module metadata for transitive deps.
  • Tackled GLIBC ABI issues (GLIBC_PRIVATE), toolchain constraints (static linking), and dependency drift; defined Go-specific Bazel build settings to stabilize builds.
  • Proposed bzlmod adoption and created go_repository_generator to replace Gazelle where incompatible, unblocking rules and dependency graph updates.

Redis 7.4 from Source (Toolchain) — Crosstool-NG, toolchain-builder

  • Resolved a blocking build by passing precise CFLAGS to prefer Redis-bundled headers (linenoise) over global toolchain headers—fixing the vulnerability upgrade without risky global changes.

Repo Strategy & Governance

  • Private→Public Mirroring: Defined one-way mirroring with sanitization and pre-publication review; streamlined internal DX while maintaining compliance. Implemented automation and addressed history-rewrite policy.
  • Contributor Management: Established access, onboarding/offboarding, commit-signing, and CI scanning (e.g., TruffleHog) with prevention & remediation playbooks for sensitive data.

Talks

  • Co-speaker: Code Review – An Introduction (Codeflow tech talk series).

EPAM — Senior Software Engineer (September 2023 – June 2024)

EPAM — Senior Software Engineer [September 2023 – June 2024]

Section titled “EPAM — Senior Software Engineer [September 2023 – June 2024]”
  • Increased Go backend test coverage from 60% to 85%
  • Worked with payment compliance system and helped reduce ops load by improving per-country config.
  • Worked with integrating ClickHouse to Uber’s Payment Compliance platform to enhance data processing and analysis for partially automated business and driver onboarding workflows.
Suse — Software Engineer (Apr 2023 – Aug 2023)

Suse — Software Engineer [Apr 2023 – Aug 2023]

Section titled “Suse — Software Engineer [Apr 2023 – Aug 2023]”
  • Helped in testing docker extensions that can work on rancher desktop.
  • Worked on customer issues and was a bridge between customer success team and developers where customer reported bugs were identified, reproduced and then send over to developers to work on. This helped in reducing turn around time for bugs reported by customers.
Google (Feb 2019 – Mar 2023)

System Development Engineer @CIMS [Feb 2022 - Mar 2023]

Section titled “System Development Engineer @CIMS [Feb 2022 - Mar 2023]”

Observability And Monitoring

  • Materialize data sources for monitoring contact center call quality, POLQA scores, total calls per country across multiple contact center businesses in AMER, APAC and EMEA
  • Maintain privacy and security best practices by using row level ACL filtering so partner vendor teams can access data without having to materialize multiple tables to remove/mash/hash PII information
  • Tech lead, author and solo contributor for designing, deploying a tool written from ground up in GoLang to audit, enforce best practices across multiple SQL tables and scripts and generate reports on usage.

System Development Engineer @Looker [Jan 2020 - Jan 2022]

Section titled “System Development Engineer @Looker [Jan 2020 - Jan 2022]”
  • Ops Request Process (Looker DevOps): Redesigned request intake across customer and internal access flows; reduced spikes in time-to-resolve by ensuring required data is captured up-front (~150+ weekly requests).
  • Legacy Tunnel Migration: Automated verification of ~450+ customer SSH tunnels; replaced a ~2,250-minute manual effort with ~3 hours of automated checks, accelerating Kubernetes migration readiness.
  • Legacy Cleanup & Data Consolidation: Built tools to collect model sizes/DB sizes over SSH, reconcile AWS tags (license, instance type), and prioritize migrations; received a peer bonus for impact.

Information Technology Resident [Feb 2019 - Dec 2020]

Section titled “Information Technology Resident [Feb 2019 - Dec 2020]”
  • Ticket Dispatcher (Go, Spanner): Extended Summary() to produce per-queue actionable ticket stats; enabled 12-hour role-based throughput and channel health forecasting.
  • TSDisplay (Techstop): Co-delivered a UI redesign to surface wait times, notify next user, and steer to remote/self-service channels as advised by UX study (Jan 2019).
  • PrintCentral → SAP S4 Adapter: Wrote a data adapter to integrate with S4 without rewriting core Printer/Device models; enabled phased deprecation of CAMP and compatibility testing.
  • gLinux Support Improvements: Added troubleshooting capabilities and training/break-fix sessions to reduce misrouted tickets (disk encryption, Nvidia, pkg issues).
  • USB Hub Reliability Testing: Authored automated Linux stress tests (dd/hdparm) + reports; results informed accessories review process and reduced e-waste.
Juspay Technologies (Nov 2017 – Dec 2018)

Network And System Admin / DevOps [Nov 2017 – Dec 2018]

Section titled “Network And System Admin / DevOps [Nov 2017 – Dec 2018]”
  • Designed and configured 2 racks in a managed data center at two different locations with redundant and highly available services and network infrastructure
    • 40 supermicro server
    • 4 Firewalls, 4 Edge routers, 4 L3 switche
  • Setup entire office network from the ground up with Firewalls, switches, Access Points with an end to end monitoring stack by taking the advantage of SNMPv2, SNMPv3 for multi vendor products like Fortigate, Juniper SRX, CISCO, pfSense using Prometheus”
    • 2 Firewall
    • 24 APs,
    • 4 switches
  • Configuring dashboards using open source monitoring tools such as Grafana; framing complex regex patterns to parse multiple log formats for telegraf to monitor API hit counts, success rates, HTTP code vs latencies, etc. for merchants like Amazon, Uber, Ola. This dashboard displayed stats for:
    • 10 VMs for each merchant load avg, cpu, ram, network utilization, Latencies, HTTP codes, success rates for APIs
Freelancer @Fiverr & @Upwork (May 2016 - July 2018)

Freelancer @Fiverr & @Upwork [May 2016 - July 2018]

Section titled “Freelancer @Fiverr & @Upwork [May 2016 - July 2018]”

Network And System Design Consultant Help clients choose the right technology for their job through consultation, help them configure it and document architecture along the way

Formglas Products Ltd

  • Setup and configure monitoring solution for VMs, servers, routers, firewalls, switches, etc. using Grafana and Prometheus”
  • Configured Loki which is a multi tenant log aggregation system
  • Setup and configure ticketing system using osTicket
  • Configured OpenVPN on pfsense for remote access of Corporate resources

Niyat

  • Suggest hardware, operation cost and infrastructure architecture that requires minimum setup and maintenance cost
  • VoIP, Interactive Voice Response (IVR), Call Recording System

B.Tech, IIIT Bhubaneswar, 2017.

  • CCNA [2016 - 2019, Credential ID CSCO12895739]
  • CCNP - Switch 300-115 [2019 - 2022]
  • RHCSA [2019 - 2022, Credential ID 190-213-827]