David Nesting
david.nesting@gmail.com, Washington, DC
I am an engineering leader, with an emphasis in complex systems, reliability and resiliency, and solving problems. My superpowers include working with empathy, communicating with non-technical leaders, and adapting. I enjoy edge cases, adversarial thinking, and being hands-on. My interests range from hacking electronics to public policy.
Qualifications
- Can effectively lead small incident response task forces and large product delivery teams
- Can understand, build, and troubleshoot complex systems at all layers of the stack
- Can write efficient and readable code (Go, Python, others)
Overview of security clearances available on request.
Experience
Self-Employed, March 2025 - Present
- Artificial Intelligence and Software Defined Radio projects, public safety communications incident tracking, SDR orchestration on Kubernetes, AI agent workflow and orchestration
- Reliable and secure network design and deployment for a 30-unit residential building
- Guest Lecturer on Resiliency and Privacy Engineering for the Vanderbilt Policy Accelerator
Expert Witness, Electronic Frontier Foundation (EFF), April-May 2025
- Consulted on IT modernization, cybersecurity, and privacy
- Testified as an Expert Witness at the US District Court for the Southern District of New York
Vega-Bray Observatory Rehabilitation, March 2025
- Rehabilitated the Observatory's telescope, which had not seen light in 15 years
- Reverse engineered the dome control system and the telescope's drive and tracking system
- Built a custom hardware control system, and wrote custom drive and tracking software
Office of the Federal CIO, The White House (OMB), 2024-2025
AI and Cybersecurity Advisor to the Federal CIO
- AI, Cybersecurity, Reliability and Resiliency, and Technology Modernization policy and implementation advisor to the Federal CIO
- Artificial Intelligence Lead at OMB, collaborating heavily between IT, policy, records, and legal teams, built on-premise AI proofs of concept
- Technology Advisor to the OMB Chief Information Officer on AI, SRE/operations, data, cybersecurity, and modernization
- Led a cross-functional Technology Modernization Fund discovery effort and co-authored a $~100M modernization proposal
Rebellion Defense, 2021-2023
SRE and Infrastructure Team Manager
- Ran the Site Reliability Engineering and Infrastructure team at Rebellion Defense, a startup building AI-powered defense software.
- 12 SREs and SWEs
- Platform was based on AWS, Kubernetes, and novel infrastructure
- This was a highly hands-on role, with significant individual contribution
US Office of Personnel Management, 2019-2021
Deputy Chief Information Officer
- Managed a ~750-person federal CIO organization with a $100M/year budget
- Led a mainframe modernization activity to improve OPM's resiliency against single points of failure
- Introduced modern collaboration tools, such as Zoom and Slack, to prepare the agency for extended COVID-19 telework
- Advised the CIO on security, risk, modern practices, resiliency, and engineering
- Led a deep dive into call center issues resulting in disasterous customer experience. Built a fully-functional, call-accepting reproduction of the call center using cloud tools in about 3 hours to disprove the belief that this was a multi-year level of effort
- One time I had to build a Prometheus-based monitoring system from scratch in order to effectively troubleshoot a problem for which we had no visibility
- One time I had to reverse engineer the agency's correspondence tracking system because it finally died and nobody knew how it worked and we needed the records out of it
US Digital Service, The White House (OMB), 2014-2019
Director of Engineering from 2017-2019:
- Mentored a community of ~50 SREs, SWEs, and Data Engineers, supervising work assuments for 25
- Represented engineering and IT to agency and White House leadership, including to Cabinet officials
- Recruiting, speaking at round tables and conferences
- Helped build the engineering hiring process
Site Reliability and Security Engineer from 2014-2019. Projects included:
- Multiple rapid response and modernization efforts, including security and availability incidents, at HHS/CMS, GSA, State, Army, DOJ, and other agencies
- Security Engineering, performing code reviews, advice on prioritization and mitigation.
- One time I wrote an ASP parser and data flow analyzer to automatically generate code fixes for thousands of vulnerabilities in a government system
- Various projects, researching and advising on security threats and capabilities of nation-state adversaries
- Built and conducted bi-monthly security training and workshops for USDS
Site Reliability Engineer from 2007-2014 (7.5 years), on the logs infrastructure team, managing all layers of the logs infrastructure, including hardware, OS, and service, and supporting Google's legal and privacy teams. Projects included on-call, data integrity, privacy, access control, data availability, large-scale data migration, security, and hiring.
AT&T
Technical Architect and similar roles, from 1999-2007 (8 years), as a technical lead supporting www.att.com and similar sites. Shifted team from a traditional production operations team to a DevOps model.
Texas Networking, Inc.
Engineer, from 1995-1999 (approx.), as a member of the engineering staff. This was a small/startup regional ISP.
Education
Texas A&M, Computer Engineering, 1998