Bertram Gilfoyle

Systems • Infrastructure • Security DevOps / SRE

Systems-focused engineer with a security-first mindset and a bias for automation. Builds reliable Linux-based infrastructure, hardens services, and removes operational toil through repeatable tooling. “If it’s fragile, it’s going to break. Let’s fix that before production does.”

[[Location]] [[Email]] [[Phone]] [[Website / GitHub]]
Core
Linux • Networking • Automation
Focus
Reliability • Security • Observability

Experience

Systems / Infrastructure Engineer (DevOps / SRE)

Linux Automation Security Observability
Pied Piper • [[Year–Year]]
  • Owned core infrastructure for a rapidly evolving product environment, prioritizing stability, repeatability, and secure defaults.
  • Standardized provisioning and configuration workflows to reduce drift and shorten recovery time during incidents.
  • Designed practical hardening controls (least privilege, secrets hygiene, auditing) aligned with real operational constraints.
  • Implemented monitoring and alerting baselines that improved signal quality and reduced noisy pages.
  • Partnered with engineering to diagnose performance regressions and eliminate bottlenecks at the OS/network/service layers.

Operations & Security Contributor

Incident Response Threat Modeling Policy-as-Code
Cross-functional • [[Year–Year]]
  • Led incident triage and postmortems with a focus on measurable prevention (runbooks, automation, guardrails).
  • Added lightweight security reviews for high-risk changes without blocking delivery.
  • Created “safe-by-default” templates for services (logging, metrics, access patterns, secrets) to speed up new deployments.

Selected Projects

Infrastructure-as-Code Baseline

IaC Immutable-ish Reviewable Changes
[[Internal]] • [[Year]]
  • Introduced a versioned infrastructure baseline to make environment changes auditable, reviewable, and repeatable.
  • Codified networking, access boundaries, and service defaults to reduce configuration surprises across stages.

Observability Stack Refresh

Metrics Logs Tracing
[[Internal]] • [[Year]]
  • Defined consistent service-level telemetry (golden signals) and alert thresholds that improved actionable visibility.
  • Built dashboards and runbooks to shorten mean-time-to-diagnose for common failure modes.

Secure Deployment Pipeline

CI/CD Secrets Supply Chain
[[Internal]] • [[Year]]
  • Added guarded release checks (linting, tests, policy gates) and improved secret handling for automated deploys.
  • Reduced risky manual steps by converting common workflows into safe, repeatable automation.

Education

[[Degree / Program]]

Computer Systems Security
[[University]] • [[Year]]
  • Relevant coursework: operating systems, networks, distributed systems, applied security. (Edit as needed.)