Nishant (he/him)
Building Systems & Shaping Futures
I specialize in crafting robust system architectures, engineering scalable solutions, and optimizing data pipelines. Since graduating from Rensselaer Polytechnic Institute in 2022, I have collaborated with multiple IC elements, including the DIA, NSA, and CIA, to deliver mission-critical applications. Leveraging tools such as Python, Go, Kubernetes, NiFi, Docker, ELK, and OpenSearch, I focus on driving efficiency and streamlining workflows. My experience spans leading multi-network integrations, automating large-scale data processing, and enhancing cloud deployments to meet stringent security standards.
Experiences
Founding Engineer @ Levianth
- • Developed with the goal of serving the United States intelligence community, including combatant commands, Levianth is a work-in-progress innovation aimed at addressing the complex challenges of modern intelligence operations. By combining automation, stealth, and scalability, Levianth aspires to revolutionize OSINT collection practices, enabling intelligence professionals to efficiently acquire critical insights while mitigating exposure and risk
System Development Engineer II @ Amazon Web Services
- • OpenSearch team
Software Engineer @ Department of Defense
- • Architected the design, implementation, and deployment of Keycloak SSO and IAM across OSINT applications facilitating automation built through CloudFormation incorporating client and server authorization in TypeScript
- • Engineered a Python brokerage service handling 5+ TB of commercial data monthly utilizing Kafka and NiFi
- • Stood up the ELK stack supporting OSINT applications handling complex queries reducing runtime by 60%
- • Spearheaded the cross-domain solution across three networks utilizing SQS, SNS, and S3 buckets through NiFi
- • Streamlined data synchronization between AWS PostgreSQL RDS to Elasticsearch built in Python and Shell scripts
Software Engineer @ Department of Defense
- • Orchestrated the deployment of a $5MM PWA supporting the US Strategic Command and Chief Information Office utilizing RedHat OpenShift, Docker, and Helm charts while aiding in vulnerability testing utilizing Prisma
- • Accelerated project rollouts to classified networks by 85% templating scans, Docker builds, and Helm upgrades
- • Implemented a dynamic NiFi cluster to handle source ETLs to ES incorporating Docker, Zookeeper, and EC2
- • Reconfigured Helm charts to deploy applications improving scalability and reducing deployment time by 40%
- • Modernized brokers by integrating Flask APScheduler across applications to handle microservice cache rendering
Site Reliability Engineer Intern @ Defense Intelligence Agency
- • Assisted in the coordination of an infrastructure optimization for the US Strategic Command’s progressive web applications and ongoing agency-wide bundled software utilizing Red Hat OpenShift4, Docker, and Helm
- • Containerized Python scripts into packages allowing for seamless project integration and code maintainability
- • Developed Bash scripts to streamline developmental environment setup processes and repository code transfers
- • Established an interactive platform built in Flask to migrate project data from Elasticsearch5 to Elasticsearch7
- • Designed and implemented 50 Python test files meeting a code coverage of 87% automated by a Bash script
Software Engineer Intern @ Department of Defense
- • Championed the CI/CD pipeline for the US Strategic Command’s progressive web applications and ongoing agency-wide services automating Selenium browser testing, Python unit testing, and generating SonarQube reports
- • Responsible for the dissociation of a DEEA contract saving $30,000 monthly by improving deployment readiness
- • Reduced Jenkin stage runtimes by 50% accelerating Helm rollouts, Docker builds, and deployment to OpenShift 4
- • Engineered a Flask RESTful API to streamline Splunk logs to ServiceNow tables handling infrastructure reporting
- • Revamped web applications built in AngularJS and Flask allowing for Blueprint modularity and Jasmine unit testing
Security Engineer Intern @ General Electric
- • Spearheaded the build-out of an enhanced identity and access management health monitor tracking over 2,800 application environments embodying core cybersecurity protocols concerning infrastructure, user, and data solidity
- • Piloted SSO and MFA enablement and verification for 686 applications to promote a secure enterprise network
- • Revamped GE standard processes by 15% using LEAN principles to make SSO data collection reproducible