tom@birmtech:~$ ./boot_profile
Tom Birmingham
Software Engineer | Hacker Ethos | Builder
I build secure, practical systems that turn complex technical problems into reliable outcomes. This site is self-hosted as part of my ongoing passion for the web, infrastructure, Unix, and creative engineering.
_/\/\/\/\/\____/\/\________________________________/\/\/\/\/\/\__________________________/\/\_______
_/\/\____/\/\__________/\/\__/\/\__/\/\/\__/\/\________/\/\________/\/\/\______/\/\/\/\__/\/\_______
_/\/\/\/\/\____/\/\____/\/\/\/\____/\/\/\/\/\/\/\______/\/\______/\/\/\/\/\__/\/\________/\/\/\/\___
_/\/\____/\/\__/\/\____/\/\________/\/\__/\__/\/\______/\/\______/\/\________/\/\________/\/\__/\/\_
_/\/\/\/\/\____/\/\/\__/\/\________/\/\______/\/\______/\/\________/\/\/\/\____/\/\/\/\__/\/\__/\/\_
____________________________________________________________________________________________________
Current Focus
- Unix, C programming, and ELF reversing
- Applied cryptography
- CTF problem-solving and security research
- Building resilient, secure systems
What I Build
- At Lockheed Martin, I help build aircraft operations data collection systems supporting predictive maintenance to reduce cost and downtime for the Navy and Marine Corps.
- I work within modern Department of Defense (DoD) security requirements, ensuring the systems meet strict government standards such as Software Technical Implementation Guides (STIGs), using software approved in the Department of the Navy Application and Database Management System (DADMS), and ensuring Assured Compliance Assessment Solution (ACAS) scan readiness by resolving Common Vulnerabilities and Exposures (CVEs).
- I build end-to-end solutions across requirements engineering, database design, implementation, frontend delivery, and production operations.
Self-Hosting Lab
- 2012 Mac mini running Ubuntu Server
- NGINX in Docker with hardened configuration and least privilege
- Static-site architecture for speed and reduced attack surface
- Automated deployments with health checks and rollback strategy
- Monitoring and notifications for container vulnerabilities, access attempts, and deployment events
Work With Me
If you need help with a technical project, consulting, or system design, reach out at tom@birmtech.com.