William Findlay

Software Engineer · Kernel Hacker · Security Researcher · BPF Developer

Senior Software Engineer at Cisco with 5 years building runtime security infrastructure in Go and eBPF. Core contributor to Tetragon, the open-source CNCF eBPF security platform powering Cisco Hypershield. Published researcher with upstream contributions to the Linux kernel's BPF subsystem.

Experience

Senior Software Engineer
Cisco Systems, Inc., Kanata, ON (Remote)
  • Own and maintain Tetragon's real-time process lifecycle tracking subsystem in Go and eBPF, forming the foundation of Cisco Hypershield's runtime security enforcement
  • Designed and implemented system call profiling capabilities in Tetragon, using tracepoint and kprobe-based eBPF programs to model per-process syscall behavior
  • Drove technical continuity on Tetragon through Cisco's acquisition of Isovalent, maintaining development velocity on a core CNCF security project
  • Championed responsible AI-assisted development within the enterprise engineering team, establishing agent-centric documentation standards that streamline onboarding for both human developers and AI agents
Software Engineer
Isovalent, Inc., Kanata, ON (Remote)
  • Joined the Tetragon team as an early member, building Isovalent's runtime security and observability platform in Go and eBPF
  • Shipped layer 7 protocol parsers in eBPF and SIEM ingestion filtering for enterprise customers
  • Co-authored upstream patches for the Linux kernel's BPF networking stack
  • Overhauled the project's testing framework and CI pipeline
  • Mentored new engineers and helped scale the team through a period of rapid growth
Teaching Assistant, Operating Systems & Distributed Systems
Carleton University, Ottawa, ON
  • Nominated three times for the Outstanding Teaching Assistant Award
  • Developed course tutorials on eBPF, kernel memory management, concurrency, and rootkits
  • Led tutorials and created coursework for classes of up to 50 students

Education

Doctor of Philosophy in Computer Science
left to join the founding Tetragon team at Isovalent
Carleton University, Ottawa, Canada
Master of Computer Science
Carleton University, Ottawa, Canada
B.Sc. Computer Science, Honours
Carleton University, Ottawa, Canada

Skills

Linux Kernel:
eBPF (kprobes, tracepoints, LSM, XDP), kernel module development, libbpf, bcc
Systems Programming:
Go, C, Rust, Python
Security:
Runtime enforcement, process confinement, intrusion detection, syscall profiling
Research:
Published at ACM CCSW, invited speaker at IBM Research and eBPF Summit
AI-Assisted Development:
Claude Code power user, custom agent orchestration, prompt engineering, automated workflow design
Languages:
English, French

Research

Research Assistant
Carleton University, Ottawa, Canada

Awards

  • Nominee, Senate Medal for Academic Achievement, Carleton University (2021)
  • Three-time nominee, Outstanding Teaching Assistant Award, Carleton University (2019 – 2021)
  • Dean's Honour List, Carleton University (2019, 2020)
  • Multiple academic scholarships and research assistantships, Carleton University (2015 – 2021)

Presentations and Invited Talks

bpfbox: Simple Precise Process Confinement with eBPF
Invited Talk, IBM Research — Security and Privacy
bpfbox: Simple Precise Process Confinement with eBPF
Conference Presentation, ACM CCSW 2020
bpfbox: Simple Precise Process Confinement with eBPF and KRSI
Lightning Talk, First Annual eBPF Summit

Publications

Conference Proceedings

  1. William Findlay, Anil Somayaji, and David Barrera. "bpfbox: Simple Precise Process Confinement with eBPF". In: Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop. CCSW'20. Virtual Event, USA: Association for Computing Machinery, 2020, pp. 91–103. DOI: 10.1145/3411495.3421358.

Technical Reports and Theses

  1. William Findlay. "Host-Based Anomaly Detection with Extended BPF". Honours Thesis. Carleton University, 2020. URL.

Open-Source Software

Creator/Maintainer

BPFContain — Experimental Container Security Mechanism using eBPF
  • Container security framework using eBPF programs and LSM hooks
  • Tech stack: Rust, libbpf-rs, eBPF
  • Subject of Master's Thesis research
bpfbox — eBPF-Based Process Confinement Mechanism
ebpH — eBPF-Based Intrusion Detection System
  • Intrusion detection system for Linux that establishes per-executable system call profiles to detect anomalies

Core Contributor

Tetragon — eBPF-Based Security Observability and Runtime Enforcement (CNCF)
  • One of the first maintainers; core contributor since the pre-open-source phase (2021)
  • Own the real-time process lifecycle tracking and syscall profiling subsystems

Contributor

bcc — eBPF Programming Framework for Python
  • Implemented ringbuf eBPF map support, enhanced LSM probe support, Python support for stack and queue eBPF maps
libbpf-rs — Rust Implementation of libbpf
  • Implemented ringbuf eBPF map support, enhanced LSM probe support, bugfixes and API improvements