R

Ruan de Clercq

Software Engineer

Cape Town, Western Cape, South Africa18 yrs 9 mos experience

Key Highlights

  • Expert in high-performance networking systems.
  • PhD in computer security with 11 publications.
  • Specializes in performance and security intersection.
Stackforce AI infers this person is a high-performance networking systems expert with a focus on security and cryptography.

Contact

Skills

Core Skills

Networking SystemsC++P4DpdkTraffic ManagementTls InterceptionCryptographySecuritySoftware Development

Other Skills

ScalabilityReliabilityNetworkingProgrammable DataplaneMonitoring ToolsTraffic ShapingAuthenticationCPythonBashOpenSSLgdbgitTLSVerilog

About

The first time my code didn't meet the performance requirements under load, it wasn’t a mysterious input that killed it. It was the CPU. The architecture was fine on paper, but the caches, memory, and I/O were screaming. That moment pulled me into a career of making real‑world networked systems behave the way the benchmarks promised. Today, I’m a software engineer at Dendrite Cyber, building high‑performance networking systems that move packets at blistering speed without any drops. I spend my days in C++, DPDK, and P4, turning hardware constraints into design choices: from an MPLS decapsulation device that can handle 32×100 Gbps, to a 32×100 Gbps traffic deduplication system, to a DPDK‑based network health monitor that gives deep, live visibility into what’s really happening on the wire. Before Dendrite, I worked at Netronome / Mira Security on TLS inspection devices that decrypts traffic at line rate. That meant sweating every CPU cycle, memory access, and I/O path while also hardening the cryptography stack by adding new cipher suites and TLS extensions, integrating HSMs, and keeping FIPS‑grade key management and certificate validation solid under pressure. I came into industry from a PhD in computer security, where I published 11 peer‑reviewed papers and learned how to tackle hard systems problems with researchers, cryptographers, and engineers in the same room. That research mindset still shapes how I work: measure first, understand the architecture, then tune. These days, my niche is the intersection of performance and security in real systems: how CPU and cache behavior, memory layouts, and protocol choices show up as latency, throughput, and resilience on real networks. I share what I learn - experiments, diagrams, and war stories - so other engineers can build faster, safer systems without reinventing every wheel. If you’re pushing the limits of packet processing, low‑latency C++ or secure high‑throughput infrastructure, I’d love to compare notes. Always happy to talk about packets, caches, or that one optimization that finally made your code fly.

Experience

Dendrite cyber

Engineering Specialist

Feb 2024Present · 2 yrs 2 mos

  • Designed and developed high-performance networking systems using P4, C++, and DPDK, focused on scalability, speed, and reliability.
  • MPLS Decapsulation Device: Built a programmable P4 dataplane that performs speculative parsing and dynamic rule learning in the control plane, achieving 100 Gbps throughput across 32 ports in a 1U chassis.
  • Traffic Deduplication Appliance: Architected a 4 × 100 Gbps deduplication system in P4, reducing redundant packet processing under heavy loads.
  • Network Health Monitoring Platform: Developed a DPDK-based visibility tool capable of inspecting and measuring network health at 100 Gbps line rate, improving operational insight for large-scale deployments.
  • PPPoE Termination Device: Implemented a high-throughput termination stack for ISP-grade environments, integrating authentication and traffic shaping.
  • Collaborated within a small, high-performing team pushing the limits of programmable networking and real-time packet processing.
C++DPDKP4Networking SystemsScalabilityReliability

Vastech

Engineering Specialist

May 2023Jan 2024 · 8 mos

Mira security

Principal Software Engineer

May 2021Apr 2023 · 1 yr 11 mos · Cape Town, Western Cape, South Africa

  • Responsibilities are listed under "Netronome - Lead Software Engineer".

Netronome

2 roles

Principal Software Engineer

Feb 2020Apr 2022 · 2 yrs 2 mos

Lead Software Engineer

Jul 2018Jan 2020 · 1 yr 6 mos

  • Designed, developed, and maintained a high-speed TLS interception platform capable of processing traffic at 100+ Gbps. Focused on optimizing system performance across CPU, memory, and I/O layers through deep profiling and tuning.
  • Enhanced the product’s security posture by implementing secure coding practices, improving input sanitation, and ensuring FIPS 140-2 compliance. Led key security initiatives such as key rotation, certificate validation, trust store management, and revocation updates.
  • Extended TLS protocol support by adding new extensions, cipher suites, signature algorithms, and X.509 validation. Integrated HSMs for secure key operations and contributed to the design of high-speed TCP packet processing components in C++ and C.
  • Regularly collaborated with cross-functional teams to debug, reproduce, and resolve complex issues in the TLS interception stack, ensuring reliable operation in demanding production environments.
  • Technologies: C++, C, Python, Bash, OpenSSL, gdb, git
C++CPythonBashOpenSSLgdb+2

Ku leuven: esat/cosic

PhD

Sep 2013Dec 2017 · 4 yrs 3 mos · Leuven, Belgium

  • Led the development of a multi-national collaboration, coordinating 3 research groups with 11 researchers, resulting in 2 publications.
  • Coordinated and developed a curriculum which successfully guided 75 students to design a cryptographic co-processor on an Field-programmable Gate Array (FPGA).
  • Developed analysis techniques to compare existing security policies which led to a major journal publication and a manuscript currently under review at a major journal.
  • Contributed to a team that designed a hardware accelerated Virtual Private Network (VPN).
  • Managed several Masters students to successfully complete their thesis projects.
  • Published 11 scientific articles, and delivered several presentations at seminars and conferences.
  • Designed several novel security enhancements for microprocessors in the fields of Control Flow Integrity (CFI), Software Integrity, and Trusted Computing, which were published in major conferences.
  • Developed security hardware IP cores for the AXI and Amba bus.
  • Developed software to interface with memory mapped hardware: baremetal and linux kernel modules.
  • Developed efficient software-based public-key cryptography implementations (Ring-LWE, ECC) optimized in Assembly.
  • Technologies used: C, C++, Verilog, VHDL, Assembler
CC++VerilogVHDLAssemblerCryptography+1

Saab systems grintek

Software Engineer

Aug 2010Aug 2011 · 1 yr · Pretoria Area, South Africa

  • Developed a tactical GIS interface based on Nasa World Wind.
  • Designed productivity tools for the software development team.
  • All software development was done using Java NetBeans.
JavaGISSoftware Development

Lqs international limited

Software Developer

Feb 2002Feb 2008 · 6 yrs

  • At LQS I worked closely with a team of mining engineers by developing software tools to assist with the planning and scheduling of mines.
  • I worked full-time at LQS from February 2002 until January 2006, and worked part-time for LQS from February 2006 until February 2008.

Education

KU Leuven

Doctor of Philosophy - PhD — Electrical and Electronics Engineering

Jan 2013Jan 2017

KU Leuven

Master's degree — Electrical Engineering with specialization in Embedded Systems and Multimedia

Jan 2011Jan 2013

University of Pretoria

Bachelor of Engineering (B.Eng.) — Computer

Jan 2006Jan 2010

Stackforce found 100+ more professionals with Networking Systems & C++

Explore similar profiles based on matching skills and experience