Curriculum Vitae
Design, construction, infrastructure, security — different materials, same discipline.
The Thread
Every role I have held — carpenter, designer, data centre manager, security architect — has been the same job wearing different clothes. You study a material, understand how it fails, and build something that holds up under stress. A dovetail joint, a firewall policy, an obfuscation technique: the thinking is identical. Structure, load paths, failure modes. The material changes; the discipline does not.
That is the thread. It is why a career that looks nonlinear on paper has actually been one continuous practice — applied to wood, then to networks, then to security architecture at scale.
Building Things
I started as a carpenter in the mid-nineties — site work on affordable housing in Brighton, then contracted to a film studio in Luxembourg where I built sets for American Werewolf in Paris. Half the role was workshop construction from technical drawings; the other half was standby problem-solving on set, adapting to whatever the director needed in the moment. It taught me to work fast, work precisely, and think on my feet.
Between contracts I studied Interior Design at Ravensbourne, where I was drawn to spatial systems — how environments shape behaviour, how structure serves function. That programme ran concurrent with a part-time systems administration role in the university's Network Operations Centre, and the crossover felt natural. Both disciplines dealt with the same questions: how do you design something that accommodates change, handles load, and fails gracefully?
The part-time role grew into a decade of consulting across commercial and academic sectors in the UK. At Ravensbourne I designed and deployed AAA infrastructure, rearchitected firewall perimeters using OpenBSD CARP and packet filter, built fault-tolerant WAN topologies, and managed production Red Hat compute clusters. At the Royal Veterinary College I handled systems administration, disaster recovery planning, and database work. I consulted for BECTU evaluating media production facilities. The thread through all of it was the same: understand the existing system, identify where it fails, and fix the architecture — not just the symptoms.
The transition from physical craft to technology was not a pivot. It was a widening of the same lens. What changed was the material — from timber and steel to packets and protocols — but the instinct to understand structure before building on top of it carried straight through.
Infrastructure at Scale
My first full-time engineering role was at GoDaddy in Singapore — GNU/Linux systems across a global hosting platform of over 4,500 production servers. Front-line incident response, platform abuse investigation (including evidence chain-of-custody work with US federal law enforcement), and the unglamorous reality of keeping services running at scale. Within two years I was managing the APAC data centre operations, leading a site expansion, building out KPIs that had never existed, and fixing a product change that had silently burned over a million dollars in capacity.
From there I joined Facebook (later Meta) to lead the turn-up of their first APAC regional data centre. Five years as Site Manager, building a team and a culture from scratch in a region where Meta had no operational presence. I proposed and developed the Red Team Operations Global Programme — a partnership between Meta's internal Red Team and Infrastructure Operations across all global touchpoints, including cable landing stations, PoPs, and co-location facilities. That programme expanded to a full data centre engagement, uncovering vulnerabilities that guided strategic growth into high-threat locations across APAC.
The shift from operations into security was gradual and then sudden. I moved into Infrastructure & Operations Security Engineering, then into ERAD Operations — global oversight of non-volatile media handling, digital forensics process improvement, and incident response programme development. Running data centres had taught me how systems fail; the security roles gave me a framework for thinking about why they fail and who benefits.
Security Architecture
At ExpressVPN I managed Operations Engineering before volunteering into counter-censorship work — a domain where security, networking, and geopolitics collide. I earned enough trust to secure C-suite approval for a dedicated Information Security Research team across Hong Kong and the USA, reporting into the CISO. We classified censorship entities into tiers, developed short- and long-term bypass strategies, and delivered measurable results: a two-year-old iOS client misconfiguration fixed, a TLS 1.3 flaw in an obfuscation technique discovered and resolved (restoring sustained connectivity from zero to over two hours), and time-to-connect reduced from 20 seconds to under 5 on desktop.
As Cybersecurity Architect at staff level, I collaborated with the Principal Security Architect to establish the formal Security Architecture function — defining structure, workflow, and execution strategy. The work was threat modelling, security control analysis, and the structural decisions about how services should be built. Not compliance theatre. Architectural integrity: identifying gaps before they become incidents, and building governance that engineering teams actually follow.
What "security architecture" means in practice is making the hard calls about trade-offs — where to invest, what to accept, and how to build systems that degrade gracefully rather than fail catastrophically. It is design work. The same discipline, applied to a different material.
What I Build Now
I run an independent engineering practice — Knight Intelligence — where I design and build the things I have spent years thinking about. A distributed security operations platform in Rust. An AI-first operating system with multi-model orchestration and autonomous agent delegation. A DevSecOps automation ecosystem. Self-hosted infrastructure from bare metal up.
The projects on this site are the public-facing side of that work. TeenTidal is a parental controls layer for the Tidal music platform. pg-harden is a PostgreSQL security hardening tool. FretNote is a guitar learning app for iPad. They are different problems, but the approach is the same: understand the domain deeply, build something that solves a real need, and care about the details.
I build because it is how I think. Each project — whether it ships commercially or lives on GitHub — is an exercise in applied engineering: the same practice of studying the material, understanding how it fails, and making something that holds.
Professional Experience
- Founder & Principal Engineer, Knight Intelligence (2025–Present)
- Cybersecurity Architect (Staff), ExpressVPN (2024–2025)
- Head of Counter-Censorship (Product Enablement), ExpressVPN (2024)
- Manager, Operations Engineering, ExpressVPN (2022–2024)
- Information Security Engineer, ERAD Operations, Facebook/Meta (2021–2022)
- Infrastructure & Operations Security Engineer, Facebook/Meta (2019–2021)
- Data Centre Site Manager, Facebook/Meta (2014–2019)
- Manager, Data Centre Operations, GoDaddy (2012–2014)
- GNU/Linux Engineer, GoDaddy (2011–2012)
- Consultant, Information Security, UK (2000–2010)
- Carpenter Sub-contractor, UK & Luxembourg (1996–2000)
Credentials
Industry Certifications
- Certified Information Systems Security Professional (CISSP) — (ISC)2
- GIAC Security Leadership (GSLC) — SANS
- Assessing & Exploiting Control Systems & IIoT — Black Hat/InGuardians
- Terrorism and Counterterrorism — LDE Centre for Safety and Security
- ITILv3 Foundation — Pearson VUE
Formal Education
- BA (Hons), Interior Design — Ravensbourne College of Design & Communication, UK
- Level 3 Foundation Diploma in Art & Design, Brighton Metropolitan College, UK
Other Education
- Apnea Academy International, Instructor
- GNVQ Level 3 Site Carpentry, Brighton Metropolitan College, UK