John Menerick
11+ years securing Fortune 500 financial institutions, tech companies, startups, and public-sector organizations — applying complex systems science to build defenses that evolve under pressure.
Most security programs assume more tools and more operators will keep pace with an ever-expanding attack surface. That assumption is wrong. Defense is a complex adaptive system — one that senses, responds, and evolves. Drawing on TAME, TOTE feedback loops, and Ashby’s Law of Requisite Variety to engineer security architectures that self-correct under pressure, spanning application security, detection engineering, zero trust, cryptographic protocol design, and AI/ML security.
Core Competencies
Threat modeling, secure code review, supply chain
Secure code review, SAST/DAST integration, threat modeling (STRIDE, PASTA, attack trees), secure SDLC design, API security, and supply chain hardening. Built security programs adopted across Fortune 500 SDLC pipelines.
Detection engineering, SIEM pipelines, forensics
Detection engineering end-to-end, SIEM and telemetry pipeline design, IR and forensics, threat hunting, vulnerability management, and red team automation. Reduced MTTD from hours to minutes at a Fortune 500.
MPC, ZK proofs, TEE, PKI, formal verification
Zero trust and zero-knowledge architecture, MPC, threshold cryptography, SPIFFE/SPIRE, zk-SNARKs/zk-STARKs, BFT/PBFT, Paxos/Raft consensus security, TEE and confidential compute, side-channel mitigation, and formal verification of distributed protocols.
LLM security, federated learning, autonomous agents
LLM security and prompt injection defense, federated learning security, differential privacy, model poisoning defenses, energy model-driven simulations, autonomous agent security, distributed agent consensus, and verifiable inference in untrusted environments.
AWS/GCP/OCI, CI/CD hardening, service mesh
AWS, GCP, and OCI security architecture, secure CI/CD and IaC hardening, distributed systems security (consistency models, linearizability, causal ordering), container security and service mesh trust, workload orchestration security.
TAME, TOTE, Ashby’s Law, adaptive defense modeling
Applying TAME framework, TOTE feedback loops, and Ashby’s Law of Requisite Variety to security architecture. Models the problem before reaching for a tool — mapping feedback loops and failure modes before writing a single detection rule.
Published Research & Open Source
Whitepapers
Open Source
Live Intelligence Dashboards
Volunteerism & Public Service
White House, Office of the President
- Contributor — Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence
- Contributor — National Strategy for Trusted Identities in Cyberspace (NSTIC)
DARPA — Defense Advanced Research Projects Agency
- Cyber Grand Challenge Finalist
- AI Cyber Challenge Participant
US Department of Defense
- Satellite Contributor
- InfraGard — US Critical Infrastructure First Responder
- Alameda County Sheriff’s OES Comm. Team — Incident Management
Cloud-Native Security Governance
CNCF SIG Security member and Kubernetes SIG Security contributor — working on security standards, threat models, and policy guidance for cloud-native deployments.
CFP & CFW Review Board
Call-for-Papers and Call-for-Workshop reviewer for OWASP conferences, evaluating security research submissions for technical rigor and practitioner relevance.
Steering Committee Member
Cloud Security Alliance Steering Committee, contributing to cloud security standards, best practice guidance, and enterprise adoption frameworks.
DEF CON · ISC2 · CCC · GrrCON · DerbyCon · Skytalks · BSides · RootCon
Invited speaker and lecturer at 8+ major information security conferences spanning offensive security research, supply chain attacks, and AI security architecture.
Accomplishments
Black Badge Holder
The DEF CON Black Badge is the most prestigious award in competitive hacking — issued only to winners of DEF CON CTF and select elite competitions. Fewer than a few hundred exist worldwide. A lifetime pass to DEF CON and a permanent mark of elite offensive security capability.
Tomb of the Unknown Soldier — Wreath Bearer
Selected as a Wreath Bearer at the Tomb of the Unknown Soldier at Arlington National Cemetery — one of the most solemn honors the United States extends to a civilian. Reserved for individuals recognized for distinguished service to the nation.
White House, Office of the President
- Letter of Recognition for Outstanding Achievements and Merit
US Congress
- US Senate — Resolution of Merit and Accomplishment
- US House of Representatives — Resolution of Recognition
Michigan State Senate
- Resolution of Merit and Accomplishment
Letter of Commendation
Formal recognition from the United States Air Force for distinguished contributions to national security.
Letter of Commendation
Formal recognition from the United States Marine Corps for distinguished contributions to national security.
Letter of Commendation
Formal recognition from the United States Army for distinguished contributions to national security.
Letter of Commendation
Formal recognition from the United States Navy for distinguished contributions to national security.
Certifications
| Credential | Issuer |
|---|---|
| Security Professional | |
| Certified Information Systems Security Professional (CISSP) | (ISC)² |
| InfoSec Assessment Methodology (IAM) I / II / III | NSA |
| InfoSec Evaluation Methodology (IEM) I / II / III | NSA |
| Certified Kubernetes Security Specialist (CKS) | CNCF |
| Certified Kubernetes Administrator (CKA) | CNCF |
| SANS Elite Portfolio (GXPN, GDAT, GX-IA, and others) former | SANS Institute |
| Google Cloud & Infrastructure | |
| Google Cloud Professional Certification | |
| Professional Google Workspace Administrator | |
| GDC Air-Gapped Security Operator Fundamentals | |
| SecOps on Google Distributed Cloud (GDC) — Tier 1 Analyst | |
| SecOps on Google Distributed Cloud (GDC) — Tier 2 Analyst | |
| SecOps on Google Distributed Cloud (GDC) — Tier 3 Analyst | |
| Evaluate Your Cloud Next-Generation Firewall Needs | |
| Google AI & Machine Learning | |
| Gemini for Security Engineers | |
| Machine Learning Operations (MLOps) for Generative AI | |
| Vector Search and Embeddings | |
| Transformer Models and BERT | |
| Attention Mechanism | |
| Encoder-Decoder Architecture | |
| Introduction to Generative AI | |
| Google Responsible AI | |
| Responsible AI for Developers: Privacy & Safety | |
| Responsible AI for Developers: Fairness & Bias | |
| Responsible AI: Applying AI Principles with Google Cloud | |
| Introduction to Responsible AI | |
| Oracle Cloud Infrastructure | |
| OCI Foundations Associate | Oracle |
| OCI AI Foundations Associate | Oracle |
| OCI Data Management Foundations Associate | Oracle |
| Government & Federal | |
| IS-100, IS-200, IS-700, IS-800 — Incident Command System | US FEMA |
| Public Trust Clearance | US Department of Justice / FBI |
| Other Professional | |
| Certified Scrum Master | Scrum Alliance |
| Amateur Extra Class License (W8MEJ) | US FCC |
| General Class & GMRS License | US FCC |
| LinkedIn Trusted Cryptographic Identity Portfolio | |
Coding Identity & Developer Rankings
Rankings derived from verified repository activity — not self-reported skills — across a career-spanning corpus of open source and professional work. Independently computed by CodersRank from 627,824+ active developers worldwide.
GigaStreak — 579 Consecutive Days of Commits
June 29, 2020 – January 28, 2022. CodersRank awards the GigaStreak badge for unbroken daily commit activity measured in hundreds of days. This streak places it among the longest verified streaks on the platform — sustained through the pandemic, across security tooling, infrastructure automation, and open source research.
| Language | Score | World Rank | US Rank | Activity |
|---|---|---|---|---|
| TypeScript | 743.2 | Top 0.2% of 118K | Top 1% of 1K | |
| JavaScript | 424.8 | Top 0.5% of 279K | Top 3% of 2K | |
| JSON | 311.0 | Top 0.8% of 283K | Top 4% of 2K | |
| HCL | 206.2 | Top 0.7% of 8K | Top 3% of 70 | |
| Shell | 172.9 | Top 0.2% of 140K | Top 1% of 1K | |
| SQL | 83.7 | Top 0.2% of 52K | Top 1% of 440 | |
| TSQL | 62.9 | Top 0.3% of 55K | Top 2% of 395 | |
| HTML | 144.2 | Top 2% of 292K | Top 5% of 2K | |
| CSS / SCSS | 120.9 / 101.1 | Top 2% of 266K | Top 4–6% | |
| Python | 108.4 | Top 5% of 165K | Top 9% of 1K | |
| PHP | 116.3 | Top 4% of 107K | Top 5% of 628 | |
| PLpgSQL | 54.3 | Top 2% of 6K | Top 2% of 58 |
579 consecutive days of commits
Awarded for unbroken daily coding activity spanning June 29, 2020 to January 28, 2022. One of the longest verified streaks on the platform, sustained through active security research and infrastructure engineering.
5+ years in multiple technologies
Awarded for sustained, deep engagement with multiple technologies over multi-year periods — verified from repository history rather than self-reported. Reflects career-spanning commitment to TypeScript, JavaScript, Shell, and security tooling.
Work Philosophy
Models the problem before reaching for a tool. Maps feedback loops, failure modes, and emergent behavior before writing a single rule.
Builds what doesn’t exist. Built Gyoithon and IntelMetrics when the tooling wasn’t there. Ships solutions, not vendor evaluations.
Operates at both altitudes. Moves between executive architecture conversations and hands-on code review, packet captures, and IR triage in the same week.
Teaches by doing. Pairs on active incidents and co-authors detections with junior engineers to build genuine systems thinking, not process compliance.
Defaults to transparency. Publishes research and open-sources tooling so the community can build on it rather than rediscover it.
Perspective
How do you apply complex systems theory to security engineering?
Threat landscapes are nonlinear — attackers adapt, environments shift, controls interact unpredictably. Ashby’s Law of Requisite Variety ensures defensive systems match the adaptive capacity of threats. Practically: detection pipelines with self-tuning feedback loops, architectures where subsystem failure doesn’t cascade, and security operations treated as a living system rather than a fixed-state machine.
What’s missing from how most organizations approach security engineering today?
Three things. First, optimizing for compliance over resilience — while defenders check annual audit boxes, threat actors use AI-driven reconnaissance to compress the attack lifecycle toward near-zero. Second, the velocity gap from underinvestment in automation: without real-time telemetry pipelines and self-healing response workflows, you’re bringing a manual process to a machine-speed fight. Third, failure to treat security as a high-concurrency distributed systems problem. Security has to be a set of algorithmic guarantees, not a gate.
Identity
{
"id": "ocid1.user.oc1..aaaaaaaaxxxxxxxxxxxxxxxxxxxxxxxx",
"name": "[email protected]",
"compartmentId": "ocid1.tenancy.oc1..aaaaaaaayyyyyyyyyyyyyyyyyyyyyyyy",
"timeCreated": "2024-01-25T15:00:00.000Z",
"lifecycleState": "ACTIVE"
}
{
"email": "[email protected]",
"sub": "117813812345678901234",
"name": "John Menerick",
"iss": "https://accounts.google.com"
}
