avatar

Olive Haven
she/her

About

Wife 🤵🏻‍♀️, Dog Mom 🐶, Queer Geeky Hacker 🤓, Senior SRE and Software Engineer 👩🏻‍💻. In my roles as an experienced member of technical staff / tech lead, I have been dedicated to fostering empathy and encouraging teamwork, collaboration, and mentorship within my teams. In managing and resolving incidents with high customer impact, I strive to create a healthy and productive work environment by maintaining open lines of communication with stakeholders. I mentor team members in analytical problem-solving, emphasizing the application of the scientific method to research issues and conduct experiments for root cause analysis. By leveraging strong written and verbal communication skills and prioritizing customer feedback, I can drive continuous improvement, informed decision-making, and effective engineering roadmap planning. My extensive experience in roadmap planning, Agile, and Kanban helps ensure projects stay within scope and deliver exceptional customer service and engagement.

Work Experience

LegalZoom
Remote
September 2022 – Present
Senior Site Reliability & DevOps Engineer
Experienced technical staff member supporting a high growth ~350-member engineering org and helping to double an Engineering Services (SRE/DevOps/Platform) organization from ~10 to ~20 engineers supporting SaaS and B2B products. I started working as an SRE in 2022, then moved to support the expanding DevOps team throughout 2023
  1. Datacenter migration to AWS cloud infrastructure, resulting in significant cost savings and improved resource provisioning efficiency through infrastructure as code and AWS services.
  2. Migration to from Akamai CDN to AWS CloudFront, leveraging CDK infrastructure-as-code in TypeScript / JavaScript to provide a more performant, cost-effective, and engineer-friendly self-serve platform for CDN management.
  3. Supported expanding the SRE and DevOps teams in hiring 2 new DevOps engineers, 2 new Site Reliability Engineers, and and cross-training 4 former Datacenter Operations Engineers as AWS Cloud Engineers. Facilitated onboarding for new engineers through comprehensive documentation and knowledge sharing sessions, accelerating their integration into the team and promoting a collaborative environment.
  4. Enhanced system reliability through effective incident management and troubleshooting, with a focus on root cause analysis and continuous improvement, reducing downtime and service disruptions.
  5. Strengthened cross-team collaboration by providing hands-on support to developer teams, streamlining release processes, and supporting service launches. This resulted in increased release velocity, minimized incidents, and improved team efficiency.
  6. Promoted a collaborative and empathetic team environment, fostering knowledge sharing, improving team morale, and mentoring junior engineers.
  7. Platform operations and maintenance for CI/CD, Monitoring, Deployment systems (including migrating legacy systems). Including GitHub Enterprise, GitHub Actions, ArgoCD, Jenkins, Kubernetes, Datadog, Azure Active Directory, Azure DevOps, Rundeck, IIS, and Rundeck.
Armorblox
Remote
March 2021 – July 2022
Senior System Reliability Engineer
Hired as Product / Platform engineer for this small email security SaaS startup, I ran into several (rather normal) startup issues including immature engineering culture, burgeoning technical debt, code rot, and poor production reliability. I was able to help plug these holes by creating documentation and implementing engineering and development best practices. This work on improving developer experience led to discussing production reliability shortcomings with the CTO and engineering organization management. Following this proven positive impact, I was able to get C-level buy-in to create a dedicated Systems Reliability Team. As a founding member of this team, I helped hire and train Junior, Senior, and Principal engineers. My main goal was to get each member up to speed, able to progress as individual engineers, and to support the broader engineering org goals and milestones. With this fledgling SRE team, I worked to prioritize the following engineering goals:
  1. Automation of manual tasks in the production environment (as well as development and staging), primarily leveraging Stackstorm workflow/runbook automation services
  2. Improved development workflow and maturing engineering culture with Bitbucket Pipelines and Jenkins CI/CD and improvements to in-house development environment Kubernetes / Helm management
  3. Monitoring of application and infrastructure services with Prometheus and Grafana
  4. Oncall rotation with actionable metrics & dashboards, detailed runbooks, and incident response procedures to improve detection of and response time to incidents in production systems
  5. Infrastructure as Code (IaC) defining environments, clusters, services with reproducible Terraform, Helm, and ArgoCD code managed in understandable and testable Git repositories
  6. Catch-all DevOps support for developers, QA engineers, and Customer Support staff who need help understanding, interacting with, fixing issues, as well as identifying common problems and developing solutions to prevent future recurrence
New Context
Remote
March 2020 – March 2021
Senior DevSecOps Consultant
I was hired as a remote security consultant contracting with large enterprise clients to do security analysis of infrastructure. While there, I created Go microservices leveraging GCP, AWS, Kubernetes, and Postgres APIs to do internal service discovery and track sensitive data flow throughout organizational infrastructure. The results of this analysis were stored in an extensible neo4j graph database and surfaced as security and business metric queries and dashboards.
Atlassian
Mountain View, CA
February 2017 – February 2018
Senior Trust Engineer
I worked as a Senior Software Engineer building distributed microservices in Go for internal Identity APIs. This involved interacting with various Product, Platform, and SRE teams across Atlassian to support their specific use cases of a overarching Atlassian product and user Identity. My main task was building a distributed, high reliability, low latency authorization store from scratch as the backend authorization provider for all modern Go microservices (with legacy support for custom authorization architectures already in place in Jira and Confluence). Much of this work was on low-level performance tuning of queries to shared Cassandra and Redis databases. I gained a lot of monitoring and performance tuning skills by working with Atlassian's amazing embedded SRE team to:
  1. Implement custom metric gathering with Prometheus
  2. Create performance & reliability monitoring dashboards in Honeycomb
  3. Act as first line Oncall and service specific alerting and operations runbooks
  4. Create automated CI/CD testing and full microservice load testing across staging environments
  5. Have full ownership of the services release management, including GitOps for environment management and hotfixes
Salesforce
San Francisco, CA
June 2016 – December 2016
Distributed Systems/Security Engineer
I created a Public Key Infrastructure for internal services including HSM-backed CA with CFSSL and Puppet managed internal service public key credential generation.
Cloudflare
San Francisco, CA
September 2014 – March 2016
Cryptographic Systems Engineer
I improved global web cryptographic standards and implementations. I helped provide fast and secure TLS for free to millions of sites by implementing low level extensions to standard nginx to allow dynamic TLS cert and key lookup from a global distributed cache. I also improved many open source PKI and generic infosec infrastructure software in OpenSSL, Go, and CFSSL toolkit. I implemented "Keyless SSL" software in Go allowing use of proxied TLS keys from otherwise untrusted edge servers so that TLS wouldn't need to be shipped to untrusted datacenters or hostile jurisdictions. During my time here, I learned a great deal about the modern TLS ecosystem on the internet, including spending many hours on code archaeology of various server and client codebases or testing closed source implementations to diagnose and fix / workaround protocol bugs as they came up in the wild.
Google Summer of Code
Stanford, CA
June 2014 – July 2014
Tor Project Student Developer
I worked on packaging ooni-probe (part of the Open Observatory of Network Interference) for easy access and use in locations where ISPs or Governments are blocking Tor. I learned a great deal about the obfuscation (and detection) techniques used in the wild to hide (and identify) encrypted communications.
Amazon
Seattle, WA
October 2013 – December 2013
Software Development Engineering Intern
As an engineer on the AWS S3 team, I built a service to detect hotspots in the S3 cloud storage system trie data structure for targeted repair to keep S3 lookups performant.
Mozilla, OWASP
Mountain View, CA
July 2013 – September 2013
Security Tools Intern
While working as a software engineering intern with the Mozilla Security Tools team, I worked on the OWASP ZAP webapp penetration testing tool and added SPDY (later HTTP/2) and QUIC (later HTTP/3) support by rewriting the internal network stack using the Netty framework.
VMware
Palo Alto, CA
March 2013 – June 2013
Security Intern
I added Secure Boot support to virtual UEFI firmware across all VMware products by implementing OpenSSL-based public key authentication in virtual storage devices.
Facebook
Menlo Park, CA
January 2013 – April 2013
Security Infrastructure Intern
I worked on the Security Infrastructure team to detect Android malware on end-user devices and track spread through the social Graph API.
Stanford CURIS
Stanford, CA
June 2012 – September 2012
Cryptography Researcher
Using C++ and NTL, I designed and implemented a highly optimized Lattice-based Fully Homomorphic (FHE) cryptosystem based on a custom polynomial ring translation of [Brakerski12] resulting in a paper and poster.

Contact

United States
Portland, OR US
+19494156469
GitHub
LinkedIn

Education

  • 2010 2014

    Stanford University

    BS

    Computer Science, Mathematics Minor

    Courses
    • CS 355: Advanced Topics in Cryptography
    • CS 343: Advanced Topics in Compilers
    • CS 243: Program Analysis and Optimizations
    • CS 240: Advanced Topics in Operating Systems
    • CS 140: Operating Systems & Systems Programming
    • CS 244: Advanced Topics in Networking
    • CS 242: Programming Languages
    • CS 161: Design and Analysis of Algorithms
    • Math 121: Galois Theory
    • Phil 152: Computability and Logic
    • Phil 154: Modal Logic
    • Math 161: Set Theory
    • Math 171: Fundamental Concepts of Analysis
  • 2008 2010

    Gatton Academy of Mathematics and Science

    High School

    Mathematics and Computer Science

    Courses
    • CS 443: Data Structures
    • Math 473: Graph Theory
    • Math 450: Complex Analysis
    • Math 435: Partial Differential Equations
    • Math 307: Linear Algebra
    • Math 310: Discrete Mathematics

Skills

System Reliability Engineering
DevOps
Infrastructure as Code (IaC)
Continuous Integration/Continuous Deployment (CI/CD)
Kubernetes
Docker
Amazon Web Services (AWS)
Google Cloud Platform (GCP)
Azure
Terraform
Ansible
Jenkins
GitOps
Service Monitoring
Site Reliability Engineering (SRE)
Automation
Scripting (Bash, Python)
Networking
Security
Container Orchestration
Log Management
Incident Response
Agile/Scrum
Load Balancing
Infrastructure Scalability
CICD Pipelines
Git
Helm
Prometheus
Grafana
Distributed Systems
Configuration Management
Database Administration
Cloud Migration
Network Security
CI/CD Tools
Cloud Services (EC2, S3, VPC, GKE)
Linux/Unix Systems
Scripting (Shell, Perl, Ruby)
Web Servers (Nginx, Apache)
Service Discovery
Elasticsearch
Load Testing
Web Application Firewall (WAF)
Containerization
Change Management
GitLab
Automation Tools (Puppet, Chef)
Monitoring Tools (Datadog, New Relic)
Serverless Computing
Database Management (MySQL, PostgreSQL)
Microservices Architecture
Network Protocols (TCP/IP, HTTP, DNS)
Shell Scripting
Version Control (Git)
SaaS/PaaS/IaaS
Incident Management
Cross-Team Collaboration
Root Cause Analysis
Infrastructure Optimization
Log Analysis
DevSecOps
MacOS
Linux
Unix
Maven
PowerShell
C# / CSharp
Test-Driven Development (TDD)
SSH