Šimon L.
Principal Software Engineer at Mission IT- Claim this Profile
Click to upgrade to our gold package
for the full feature experience.
Topline Score
Bio
Shawn Wells
Šimon and I collaborated together from 2011-2016 in the formation of Red Hat's OpenSCAP technologies and associated open source communities. Šimon worked within Red Hat's Engineering organization, with myself in our Public Sector CTO office. OpenSCAP development efforts automated security compliance checks -- both configuration and vulnerabilities -- for RHEL-based systems. This automation drove competitive superiority of RHEL-based systems and was among the most visible projects affecting Red Hat's global Government markets. This work was among the top customer requested features of Red Hat Enterprise Linux 7, enhancing the security automation experience for Red Hat customers globally. Over the years, Šimon grew to become a leader of the OpenSCAP community. From a technology perspective Šimon became the upstream maintainer of our SCAP interpreter. Among his many responsibilities, Šimon ran our Scrum sprints -- coordinating across development, sales, and product management to drive our technology roadmap. I quickly began to admire Šimon's skills in stakeholder management, as he carefully balanced aggressive development timelines and realistic schedules while keeping all parties informed. Through his planning, Šimon and his team drove OpenSCAP releases which shipped in several versions of Red Hat Enterprise Linux 6 and 7. Extremely important in open source development, Šimon balanced the rapid development needs of an upstream development community versus stable enterprise releases. For the upstream code base, Šimon focused on making something usable. The code did not need to be feature complete or ultra-reliable, but needed to convey a vision of Security Automation. Establishing a clear vision established an entry point for other developers to get involved -- which included Red Hat's competitors such as Oracle. Šimon forged a reputation where the community took him seriously, and recognized that he's capable of acting as a steward of the community, rather than only a "Red Hat staffer." In addition to his code development role, Šimon helped build the OpenSCAP community. Over 5 years the community grew from less than 5 code contributors to over 100 people across some 25 independent companies. Over 1.3 million lines of code were developed across the OpenSCAP communities. MITRE wrote a report citing OpenSCAP's configuration remediation process as leading industry, something of which other vendors should aspire towards. I have great personal and professional respect for Šimon. As he moves from the OpenSCAP development team to ManageIQ, I wish him all the best -- and I will jump on any opportunity to collaborate again in the future.
Shawn Wells
Šimon and I collaborated together from 2011-2016 in the formation of Red Hat's OpenSCAP technologies and associated open source communities. Šimon worked within Red Hat's Engineering organization, with myself in our Public Sector CTO office. OpenSCAP development efforts automated security compliance checks -- both configuration and vulnerabilities -- for RHEL-based systems. This automation drove competitive superiority of RHEL-based systems and was among the most visible projects affecting Red Hat's global Government markets. This work was among the top customer requested features of Red Hat Enterprise Linux 7, enhancing the security automation experience for Red Hat customers globally. Over the years, Šimon grew to become a leader of the OpenSCAP community. From a technology perspective Šimon became the upstream maintainer of our SCAP interpreter. Among his many responsibilities, Šimon ran our Scrum sprints -- coordinating across development, sales, and product management to drive our technology roadmap. I quickly began to admire Šimon's skills in stakeholder management, as he carefully balanced aggressive development timelines and realistic schedules while keeping all parties informed. Through his planning, Šimon and his team drove OpenSCAP releases which shipped in several versions of Red Hat Enterprise Linux 6 and 7. Extremely important in open source development, Šimon balanced the rapid development needs of an upstream development community versus stable enterprise releases. For the upstream code base, Šimon focused on making something usable. The code did not need to be feature complete or ultra-reliable, but needed to convey a vision of Security Automation. Establishing a clear vision established an entry point for other developers to get involved -- which included Red Hat's competitors such as Oracle. Šimon forged a reputation where the community took him seriously, and recognized that he's capable of acting as a steward of the community, rather than only a "Red Hat staffer." In addition to his code development role, Šimon helped build the OpenSCAP community. Over 5 years the community grew from less than 5 code contributors to over 100 people across some 25 independent companies. Over 1.3 million lines of code were developed across the OpenSCAP communities. MITRE wrote a report citing OpenSCAP's configuration remediation process as leading industry, something of which other vendors should aspire towards. I have great personal and professional respect for Šimon. As he moves from the OpenSCAP development team to ManageIQ, I wish him all the best -- and I will jump on any opportunity to collaborate again in the future.
Shawn Wells
Šimon and I collaborated together from 2011-2016 in the formation of Red Hat's OpenSCAP technologies and associated open source communities. Šimon worked within Red Hat's Engineering organization, with myself in our Public Sector CTO office. OpenSCAP development efforts automated security compliance checks -- both configuration and vulnerabilities -- for RHEL-based systems. This automation drove competitive superiority of RHEL-based systems and was among the most visible projects affecting Red Hat's global Government markets. This work was among the top customer requested features of Red Hat Enterprise Linux 7, enhancing the security automation experience for Red Hat customers globally. Over the years, Šimon grew to become a leader of the OpenSCAP community. From a technology perspective Šimon became the upstream maintainer of our SCAP interpreter. Among his many responsibilities, Šimon ran our Scrum sprints -- coordinating across development, sales, and product management to drive our technology roadmap. I quickly began to admire Šimon's skills in stakeholder management, as he carefully balanced aggressive development timelines and realistic schedules while keeping all parties informed. Through his planning, Šimon and his team drove OpenSCAP releases which shipped in several versions of Red Hat Enterprise Linux 6 and 7. Extremely important in open source development, Šimon balanced the rapid development needs of an upstream development community versus stable enterprise releases. For the upstream code base, Šimon focused on making something usable. The code did not need to be feature complete or ultra-reliable, but needed to convey a vision of Security Automation. Establishing a clear vision established an entry point for other developers to get involved -- which included Red Hat's competitors such as Oracle. Šimon forged a reputation where the community took him seriously, and recognized that he's capable of acting as a steward of the community, rather than only a "Red Hat staffer." In addition to his code development role, Šimon helped build the OpenSCAP community. Over 5 years the community grew from less than 5 code contributors to over 100 people across some 25 independent companies. Over 1.3 million lines of code were developed across the OpenSCAP communities. MITRE wrote a report citing OpenSCAP's configuration remediation process as leading industry, something of which other vendors should aspire towards. I have great personal and professional respect for Šimon. As he moves from the OpenSCAP development team to ManageIQ, I wish him all the best -- and I will jump on any opportunity to collaborate again in the future.
Shawn Wells
Šimon and I collaborated together from 2011-2016 in the formation of Red Hat's OpenSCAP technologies and associated open source communities. Šimon worked within Red Hat's Engineering organization, with myself in our Public Sector CTO office. OpenSCAP development efforts automated security compliance checks -- both configuration and vulnerabilities -- for RHEL-based systems. This automation drove competitive superiority of RHEL-based systems and was among the most visible projects affecting Red Hat's global Government markets. This work was among the top customer requested features of Red Hat Enterprise Linux 7, enhancing the security automation experience for Red Hat customers globally. Over the years, Šimon grew to become a leader of the OpenSCAP community. From a technology perspective Šimon became the upstream maintainer of our SCAP interpreter. Among his many responsibilities, Šimon ran our Scrum sprints -- coordinating across development, sales, and product management to drive our technology roadmap. I quickly began to admire Šimon's skills in stakeholder management, as he carefully balanced aggressive development timelines and realistic schedules while keeping all parties informed. Through his planning, Šimon and his team drove OpenSCAP releases which shipped in several versions of Red Hat Enterprise Linux 6 and 7. Extremely important in open source development, Šimon balanced the rapid development needs of an upstream development community versus stable enterprise releases. For the upstream code base, Šimon focused on making something usable. The code did not need to be feature complete or ultra-reliable, but needed to convey a vision of Security Automation. Establishing a clear vision established an entry point for other developers to get involved -- which included Red Hat's competitors such as Oracle. Šimon forged a reputation where the community took him seriously, and recognized that he's capable of acting as a steward of the community, rather than only a "Red Hat staffer." In addition to his code development role, Šimon helped build the OpenSCAP community. Over 5 years the community grew from less than 5 code contributors to over 100 people across some 25 independent companies. Over 1.3 million lines of code were developed across the OpenSCAP communities. MITRE wrote a report citing OpenSCAP's configuration remediation process as leading industry, something of which other vendors should aspire towards. I have great personal and professional respect for Šimon. As he moves from the OpenSCAP development team to ManageIQ, I wish him all the best -- and I will jump on any opportunity to collaborate again in the future.
Credentials
-
Red Hat Certified Virtualization Administrator
Red HatSep, 2013- Oct, 2024 -
Red Hat Certified Engineer
Red Hat -
Red Hat Certified System Administrator
Red Hat -
SELinux Policy Administration
Red Hat
Experience
-
Mission IT
-
United States
-
Software Development
-
1 - 100 Employee
-
Principal Software Engineer
-
Apr 2023 - Present
-
-
-
CrowdStrike
-
United States
-
Computer and Network Security
-
700 & Above Employee
-
Staff Cloud Solution Architect
-
Jan 2021 - Apr 2023
Member of Cloud Integration Architecture team in CrowdStrike. Focused on architecting, building and maintaining cloud-based integration across the product portfolio (Kubernetes, Serverless, API SDKs, Log shipping, CloudFormation resources, focused on big 3 clouds; AWS, Azure, GCP). Informal mentoring in the sales and pre-sales organization. Member of Cloud Integration Architecture team in CrowdStrike. Focused on architecting, building and maintaining cloud-based integration across the product portfolio (Kubernetes, Serverless, API SDKs, Log shipping, CloudFormation resources, focused on big 3 clouds; AWS, Azure, GCP). Informal mentoring in the sales and pre-sales organization.
-
-
-
Red Hat
-
United States
-
Software Development
-
700 & Above Employee
-
Principal Software Engineer
-
Dec 2018 - Jan 2021
-
-
Senior Software Engineer
-
Apr 2016 - Jan 2021
Working on backend of Red Hat Cloudforms. CloudForms is an upper-layer management abstraction that allows an organization to manage private, public and virtual infrastructure seamlessly from a single-pane-of-glass. Contributing to various features. Deep knowledge of cloud and traditional infrastructures.Main highlights: - IPv6 enablement - Chargeback calculations for VMs and containers - Performance tuning of tiered applications - Found & fixed multiple security vulnerabilities within the product Show less
-
-
Team Lead & Senior Software Engineer
-
Mar 2015 - Apr 2016
Team Lead of OpenSCAP ecosystem Engineering - Team Lead &Scrum Master of Security Compliance Engineering - Project management, resource planning, hiring, work assignments, performance evaluationTeam was focused on - Development of tools for assessing compliance of operating system and infrastructures - Contributing mainly to the following upstream projects: https://github.com/OpenSCAP/Experience: - Focused on compliance audit of cloud environments - deep knowledge of SCAP standards family (Security Content Automation Protocol) - Participated in SCAP 1.2 implementation within OpenSCAP project - Release nanny of multiple releases of the OpenSCAP project, most active contributor, reviewed hundreds of patches - Feature lead of OpenSCAP scanner integration to Spacewalk project and RH Satellite - Designed a web-based tool for SCAP scans comparison - Feature lead of remediation capabilities of OpenSCAP - Advocated for and started and lead continuous integration project for security-related components in Red Hat Enterprise Linux - Found and filed dozens of issues against open source projects - Mentor to new team members - Technical communication with SCAP 1.2 certification authority - Co-authored an U.S. Patent Application - Work travelling across Europe, U.S., and middle east - Passionate about open source software, tooling, and automation. - Languages: C, C++, Java EE, Python, Ruby, SQL, XSLT. Show less
-
-
Software Engineer
-
Feb 2012 - Feb 2015
- Developer with focus on Security Standards and Technologies - Compliance Audit, SCAP–Security Content Automation Protocol - Led Integration of SCAP into RHN Satellite - Participated in SCAP 1.2 implementation within OpenSCAP project
-
-
Quallity Assurance Associate
-
Feb 2010 - Feb 2012
- Systems Management Quallity Engineering. - Analysis, reporting and tracking of defects in software. - Design, implementation and execution of tests and test suites. - Cooperation with the upstream development
-
-
Education
-
Masaryk University Faculty of Informatics
Master's degree, Informatics---Information Systems -
Brno University of Technology Faculty of Information Technology
Bachelor, Information Technology