Jacob Hochstetler
  • Distributed Computing
  • Machine Learning
  • Informatics

EDUCATION

Aug 2007 - A.A. - NCTC - Corinth, TX

May 2011 - B.S. in Computer Science - University of North Texas - Denton, TX

 

CERTIFICATIONS

Security+ - October 2010

ITILv3 Certified - February 2010

Sun Certified System Administrator (SCSA) - Solaris 8 & 2.6

Sun Certified System Support Engineer (SSE) - August 2002

Cisco Certified Network Associate (CCNA) - September 2000

 

SOFTWARE SKILLS/EXPERIENCE

Languages:

Main (knowledge and daily experience):  Ruby/jRuby, Rails, jQuery, Go, Twitter Bootstrap, SASS, Shell scripting

Experienced:  Java, ObjC, Swift (iOS), Percona, Solr

Used in the past: Python, PHP, Perl, Shell scripting/TCL/VBS, Angular.js

Interests and Curiosity: Lisp, Smalltalk, Informatics, NoSQL (RethinkDB, Couchbase)

iOS App 'Gun Locker': https://itunes.apple.com/us/app/gun-locker/id655124696

Test Driven Development

Agile Technologies

Continuous Integration & Testing

 

EMPLOYMENT

2015 - Present - Fidelity, LLC - Senior Software Engineer

                  I lead a project to enable automatic public key encryption and management within the Fidelity computing environment. This project spanned multiple platforms and environments while operating within the Fidelity private cloud infrastructure.  Working within the Fidelity cloud computing environment, we were able to open source our products and contribute a significant amount to the open-source community.

 

2012 - 2014 - General Dynamics (GD) - UNIX Systems Lead

Maintained UNIX systems within the USAFCENT A2/ISRD (inside the CAOC) in a deployed environment, and provided support for UNIX services to the USAFCENT A6 on an ongoing basis.  The ISRD maintains approximately 300 users and 600 workstations, with 30 servers across more than a dozen geographical sites. The UNIX servers were a mix of Solaris 8, 9, 10, and RHEL 5 & 6 guests running on Dell ESX 5 hosts.  Day-to-day operations included managing both the VMware infrastructure and the UNIX hosts running on them.

While lead, I also developed a framework of web services for customers which replaced business process within the CAOC. These sites worked together to provide IT services to technicians and metrics/visibility to management.  They were built using Ruby, Rails, jQuery JS, PostgreSQL and Apache on RHEL 6. All utilized seamless single-sign-on (SSO) with Internet Explorer and Apache NTLM through Active Directory.

The Requirements Tracker replaced an earlier Access DB application which was updated by hand from a BMC Remedy server.  The Requirements Tracker automated the requirements process and added categorization, queuing and statistics on the requirements workflow.

The Firewall Exception Tracker replaced several Excel applications used within the CAOC.   The exception approval process involves five different offices working together, and my application cut the average approval time in half. The FER tracker integrates with the Requirements Tracker to pull real-time ticket status from the Remedy backend. In addition, the external customer has complete visibility of the FER process from start to finish.

                  The CAOC Comm Focal Point Dashboard displays the status of all the CAOC services.  Before the dashboard, each IT shop would have to input outages and authorized service interruptions into an online form, which would then have to be copied to another system, and updated through a third form to a Powerpoint slides. The goals for the project were to minimize the complicated steps needed to report/update outages, thereby increasing technician involvement in the outage process. For external customers, the site was designed to be able to brief system status directly from the dashboard, negating the need for emailing PowerPoint slides.

 

A separate customer within the Intelligence Community needed a portal for intel analysts to author intel products for distribution. For this project I went with a full Java stack due to the workload: jRuby, Rails, Twitter Bootstrap, jQuery, PostgreSQL, JBoss AS7, Torquebox app/messaging server, Apache Solr and Tika.  It was designed agilely with test driven development (TDD) due to the complexity of the project.

The products are indexed in an Apache Solr server, and searchable with facets through the portal. Each product has a unique workflow through a creation/quality control/approval process.

The customer also required various other products be available for searching, along with several fields of metadata.  The products range from normal office documents, to mpeg clips of full motion video (FMV), while the metadata ranges from country focus to product classification. These products are uploaded separately from the normal intel workflow and are indexed against the Solr server after being tagged by the analyst.  After upload, multi-page documents are converted to PDFs, and an animated GIF is generated from this PDF.  The animated GIFs are used for previewing documents during the searching and faceting. Each product is classified by the analyst and Active Directory based roles prevent special category items from being visible to non-cleared personnel.

                 

2010 - 2011 - GD - JWICS Systems / C2 Systems

I supported core services on JWICS, including: NetApp FAS filers, Windows 2003/2008 servers, XP/Vista/7 desktops, VMware ESX/ESXi 3-5 & vCenter, RHEL, Veritas NetBackup/Syncsort BEX, and Active Directory (in conjunction with ActiveRoles Server). VisualBasic and Batch file scripts were used for day-to-day account maintenance and administrator duties. For UNIX systems, I maintained the Joint Surveillance Target Attack Radar System (JSTARS) Workstation (JSWS) on Sun v490s running Solaris 10. I was an approver for Radiant Mercury (Solaris 9) in a training and administrative capacity.

The CAOC maintains approximately 1200 users and 3000 workstations, with 1000 servers across more than a dozen networks.  I also participated in several Continuity of Operations (COOP) exercises and real-life disaster recovery operations (DRO).

 

2007 - 2010 - GD - Onsite Sun Engineer

I provided on-site Sun support to the EDS (later HP) datacenter in Plano, Texas. With our Multi-Vendor Contract (MVS), we installed and maintained over 5000 Sun, HP, and IBM servers. These systems ran everything from Red Hat Linux (RHEL 3/4/5) to HP-UX, and from Solaris (8/9/10) to VMware ESX hosts.

The Sun Microsystems EDS site was being managed by several legacy Excel applications and an Access Database. These applications tracked inventory, outages and employee time-keeping among several EDS sites. On the request of Sun management, I converted these apps into a cohesive portal using Java and Grails deployed using SunÕs own technologies (PostgreSQL, Glassfish, and OpenSolaris).  This enabled better reporting of service level metrics on the contract and was a catalyst to move to flex-scheduling for the onsite Sun employees. At its peak, it was deployed to seven EDS sites, and was used by 50 employees.

 

2006 - 2007 - GD - C2 Systems Administrator

I installed, configured, and maintained Solaris-based Command and Control (C2) systems at the CAOC. The systems included JSWS, Radiant Mercury (RM) and Information Support Server Environment (ISSE) guard all running Solaris 8. Additionally, I trained end-users and Air Force maintainers on the systems. Furthermore, to support our mission of continuity, I wrote training documentation and materials for C2 Systems information.

 

2005 - 2006 - GD - GCCS Administrator/COP Manager

As the Common Operational Picture (COP) manager at the CAOC, I provided on-site operational and functional support by giving technical advice and by managing the flow of information between the networks: SIPR, CSD, CENTRIX, and GCC+2. This included the ability to interpret displayed air picture information and the understanding of the interconnecting capabilities of the GCCS, COP, and Command and Control Personal Computer (C2PC) clients. I accomplished this through tailoring the displays and databases for various theater requirements and the manipulation of tracks (ground, air and sea). GCCS administration involved the day-to-day administration of a multi-node client-server environment running DII-COE on Solaris 2.5.1.

 

2004 - 2005 - GD - Onsite Sun Engineer

I conducted hardware and software fault isolation and repair on Sun Microsystems servers, storage arrays and workstations at the CAOC. In addition, I performed the same duties on Dell, Compaq and NetApp systems and printers. Since Sun hardware failures were sporadic, I spent most of my workday amending and revising our business operations to better reflect SunÕs Best Practices. As the dedicated Sun engineer, I provided training to military personnel in the operation of Solaris and Sun Microsystems equipment.

 

2003 - 2004 - Academi (formerly Blackwater Security Company) - Security Contractor

During this time I was deployed to the Middle East to conduct security and training operations for the US and Iraqi military.

 

2000 - 2002 - GD - Field Engineer

I serviced Sun boxes at secure sites including Lockheed-Martin, NASA and National Semiconductor. Other sites included Apple, Symantec, and Microsoft. The machines I worked on encompassed SunÕs entire product line. During this time I worked at Sun Microsystems in the Silicon Valley area, I received several awards for customer service and technical excellence.

I created several in-house software tools to measure business metrics at Sun Dallas using Perl and Ruby. These tools gathered mail messages and database information using SQL, to compile reports for Sun management. Before I started, there was no process in place to monitor call escalations and tasks. Using my system, management was able to see escalation queues, local partÕs inventories and incoming support tickets in real-time through their two-way pagers.

 

1996 -2005 - US Army - Counter-Intelligence Agent

I served in Human Intelligence providing CI duties to sliced elements. The duties included surveillance, interviewing human sources, interrogation, force-protection and analyzing open-source intelligence. I received my Top Secret clearance on January 3, 1999. Since then I have been both CI and full-scope polygraphed.

  • Application containerization
  • Enterprise infrastructure
  • UX Design