🏂 C.

CEO

Sydney, New South Wales, Australia16 yrs 7 mos experience
Most Likely To SwitchAI ML Practitioner

Key Highlights

  • Co-founded Vulnetix, enhancing enterprise security management.
  • Awarded NSW Government 2024 Individual Innovation Service Award.
  • Active contributor to global cybersecurity standards.
Stackforce AI infers this person is a Cybersecurity expert with extensive experience in enterprise security solutions and application security.

Contact

Skills

Core Skills

Technical LeadershipCloudDevsecopsInformation Security StandardsCyber Threat Intelligence (cti)Artificial Intelligence (ai)CybersecurityInformation SecurityCompliance PciMachine LearningSoftware DevelopmentTeam Leadership

Other Skills

Lean StartupGolangPythonTypeScriptThreat ModelingProduct DevelopmentMarketing StrategyUser Interface DesignSearch Engine Optimization (SEO)DevOpsThreat & Vulnerability ManagementSecure Code ReviewAmazon Web Services (AWS)Rust (Programming Language)Founder

About

I’ve been working in enterprise security and building custom solutions for 20+ years, including at some of Australia’s largest enterprises such as CSIRO, Government, Mantel Group, and several startups. What keeps me coming back is not the challenge, though there are plenty of those, but the chance to make an impact. I’m obsessed with solving problems that improve the lives and toil of real people I can speak to. That’s why I co-founded Vulnetix, because I know there’s a better way for large complex enterprises to manage Product Security and in doing so, improve the lives of everyone it touches from CISO and engineer all the way down to the end user. I’m proud of Vulnetix’s appointment as Australia’s first GCVE Numbering Authority, providing free vulnerability data for the global community. I also received the NSW Government 2024 Individual Innovation Service Award in 2024, and am an active participant in global cybersecurity standards and open-source communities, including: - FIRST.org Exploit Prediction Scoring System (EPSS) - ECMA global supply-chain security TC54 standardisation as part of the CycloneDX Transparency Exchange API (TEA) publisher specification - OWASP Cheatsheet Series - Cloud Security Aliiance (CSA) Cloud Controls Matrix (CCM) - Contributing to AWS cryptography (running in every EC2, Lambda, EKS cluster worldwide) and RedHat Product Security Outside all this, you’ll find me offline: with my family, on a snowboard or in the wilderness.

Experience

16 yrs 7 mos
Total Experience
1 yr 9 mos
Average Tenure
2 yrs 8 mos
Current Experience

Vulnetix

Co-Founder & CTO

Mar 2025 – Present · 1 yr 2 mos · Australia

  • Co-founder & CTO @ Vulnetix – where AppSec makes sense at scale.
  • Vulnetix solves AppSec complexity for large organisations so that everyone – from CISO to engineer – can see what really matters and have more time to work on it. Not another scanner or point solution, Vulnetix connects your entire stack and adds customised prioritisation and automation to reduce toil, improve governance, and proactively monitor your security posture and compliance. Visit vulnetix.com for more. 🦉
Technical LeadershipLean StartupCloudGolangPythonTypeScript+8

Startmate

Summer'25 Accelerator cohort

Feb 2025 – May 2025 · 3 mos

Nsw government

Security Partner

Sep 2023 – Present · 2 yrs 8 mos · Remote

  • Working accross Digital NSW I liaised with Directors across Service NSW, Mobile App, and Digital Identity - delivering DevSecOps, NSW Artificial Intelligence Assessment Framework, ISMS, Risk Management, Vulnerability Remediation, Threat Modelling, and Secure-by-design Architecture.
Information Security StandardsTeam LeadershipMachine LearningArtificial Intelligence (AI)DevSecOpsCyber Threat Intelligence (CTI)+3

Csiro's data61

Cybersecurity Advisor

Mar 2023 – Jun 2023 · 3 mos · Australian Capital Territory, Australia · Hybrid

  • They are now known as Terria, go check them out! https://terria.io
CybersecurityInformation SecurityInformation Security StandardsDevSecOpsLegislative RelationsThreat & Vulnerability Management+5

Tafe nsw

Application Security Engineer

Jan 2022 – Sep 2022 · 8 mos · Moruya, New South Wales, Australia · Hybrid

CybersecurityAgile MethodologiesInformation SecurityInformation Security StandardsCloud SecurityDevSecOps+8

Fiskil

Cybersecurity Advisor

Oct 2021 – Dec 2021 · 2 mos · Remote

CybersecurityInformation SecurityInformation Security StandardsCompliance PCIDevSecOpsLegislative Relations+5

Culture amp

Application Security Engineer

Mar 2021 – Jul 2021 · 4 mos · Remote

CybersecurityInformation SecurityInformation Security StandardsCompliance PCIDevSecOpsLegislative Relations+5

Sportsbet

Application Security Engineer

Oct 2020 – Mar 2021 · 5 mos · Remote

CybersecurityInformation Security StandardsDevSecOpsThreat & Vulnerability ManagementApplication Security ArchitectureGo+3

Zip co

Information Security Consultant

Aug 2020 – Sep 2020 · 1 mo · Sydney, New South Wales, Australia · Remote

  • Consultant Engagement via Mantel Group brand CMD
CybersecurityCompliance PCIDevSecOpsTeam LeadershipThreat & Vulnerability ManagementApplication Security Architecture+6

Grays

Application Security Consultant

Jul 2020 – Aug 2020 · 1 mo · Sydney, New South Wales, Australia · Remote

  • Consultant Engagement via Mantel Group brand CMD
CybersecurityInformation SecurityInformation Security StandardsGoServerless ComputingNetwork Security

Anz

Security Partner

Oct 2019 – Jul 2020 · 9 mos · Melbourne, Victoria, Australia · On-site

  • Consultant Engagement via Mantel Group brand Kasna
  • As a security partner to SRE and Developer Experience delivery squads;
  • Developed, evaluated, and critiqued design and integration models which facilitate scalability, extensibility and reusable solutions.
  • Developed and applied patterns for elegant solutions to meet to customer, regulatory and shareholder expectations
  • Design and articulate security controls to protect against identified attack vectors
  • Directly worked on;
  • Kubernetes (GCP)
  • Gatekeeper Admission Controller (OPA/Rego)
  • Binary Authorisation
  • Anthos
  • Google Cloud Build
  • Splunk
  • Github for Business
  • Dynatrace
  • Terraform
  • Conftest
  • Golang
  • Twistlock / Prisma
  • Checkmarx
CybersecurityInformation Security StandardsDevSecOpsThreat & Vulnerability ManagementApplication Security ArchitectureSoftware Development+2

Streamotion

Application Security Consultant

Sep 2019 – Sep 2019 · 0 mo · Sydney, New South Wales, Australia · On-site

  • Consultant Engagement via Mantel Group brand CMD
  • Prior to Fox Sports launch of Kayo Sports and Binge, the streaming service (Streamotion) was in development - It was my task to perform Kubernetes and AWS vulnerability assessment, application penetration testing and fuzzing, threat modelling workshops, and assist in hiring AppSec talent.
CybersecurityInformation SecurityInformation Security StandardsGoProject ManagementServerless Computing+3

Australia post

2 roles

Information Security Consultant | cmdsolutions.com.au

Aug 2019 – Sep 2019 · 1 mo · Melbourne, Victoria, Australia · On-site

  • Team lead for Infrastructure, Design, and Implementation of a new PCI DSS compliant AWS environment.
  • Worked with internal SecurePay stakeholders, parent company AustPost stakeholder, and sibling subsidiary Digital iD requirements
  • Leveraging a validated solution accelerator for PCI DSS account and network design
  • Establishing security principles for future work
  • Prioritise for self-service catalogue of approved solutions with governance baked-in
  • Segregation of data access, processing, and persistence
  • Provisions for parent company access of governance tasks while keeping full sovereignty over all data by the owner organisation
  • Sharing with parent organisation of governance related metrics, logs, and events for monitoring, incident response, audit, and non-repudiation controls
  • Supporting all existing services, capabilities, and technologies where appropriate and feasible
CybersecurityInformation Security StandardsDevSecOpsThreat & Vulnerability ManagementApplication Security ArchitectureProject Management+3

Application Security Engineer | digio.com.au

May 2019 – Aug 2019 · 3 mos · Melbourne, Victoria, Australia · On-site

  • Worked directly with 18 delivery teams to educate, develop, and implement;
  • Snyk; Source Composition Analysis
  • Checkmarx; Static Application Security Testing
  • Nucleus Security; Enterprise Vulnerability Management
  • This involved integration into the SDLC at various stages with workshops and pair programming with developers using Ruby, Python, .NET, Java, Kotlin, Node.js, and various Javascript frameworks.
  • Developed AWS serverless solutions for Application Security utilisation and reporting;
  • Lambda
  • CodeBuild
  • CodeDeploy
  • Service Catalog
  • CloudWatch Events (real-time monitoring, alerting, remediation)
  • BitBucket
  • Gitlab
  • Integration of various third parties to Nucleus, including;
  • Snyk
  • Checkmarx
  • Rapid7
  • Tenable
  • Palo Alto
  • AWS GuardDuty
  • AWS SecurityHub
  • AWS Config
CybersecurityInformation SecurityInformation Security StandardsCompliance PCIThreat & Vulnerability ManagementProject Management+1

Trivial security

Founder & CEO

Jul 2019 – Jun 2024 · 4 yrs 11 mos · Australia

  • Trivial Security and "Early Warning Service" Cyber Threat Intelligence (CTI) alerting platform which correlates penetration testing or attack surface scanner discovered assets with thousands of intelligence sources, both paid integrations and monitored by the TrivialSec team.
  • Our AI/ML was trained on public domain registration information and metadata which spanned every registered domain for the entire internet within minutes of being registered (before owners would have any website content being served), Our data collection was authorised by the domain registrars via CZDS an ICANN program.
  • The accuracy and timeliness of our source data allowed an unprecedented prediction of future bad actor malicious activity online - giving our first believers intelligence they could not find anywhere else in the market.
Artificial Intelligence (AI)Machine LearningCyber Threat Intelligence (CTI)Amazon Web Services (AWS)PythonRust (Programming Language)+8

Mantel group

Secirity Practice Lead

May 2019 – Oct 2020 · 1 yr 5 mos · Greater Melbourne Area · Remote

  • AWS Premier Partner - 2019/20 winner APN #1 Consulting Partner - AWS Security Competency
  • People Guide (mentoring program).
  • As the Practice Lead at Mantel Group, I spearheaded the development and execution of a comprehensive security strategy across multiple brands. In this role, I led the Community of Practice (CoP) for security, facilitating DevSecOps, cyber, and data talks. I was responsible for incident response, addressing security advisories, and managing privacy and data breach incidents. My work included conducting risk assessments and threat modeling for cloud service providers and SaaS vendors, along with vulnerability assessments using SAST, DAST, and SCA techniques.
  • For several clients with AI/ML needs, I was resourced to deliver Apache Airflow, Hadoop, Spark, Keras, Tensorflow, and various other skills I developed in past roles - to assist the Data Science team whenever the need arose.
  • Our team defined new architectures in line with regulatory compliance standards, gaining endorsement from multiple stakeholders. My efforts extended to implementing security controls through policy-as-code, operational security monitoring, and threat hunting practices. I also ensured that IAM, Federation, and SSO/SAML were properly integrated and managed, and I drove the adoption of developer-friendly security tooling in CI/CD pipelines.
  • Throughout my tenure, I applied both qualitative and quantitative analysis to software selection, leading implementations, audits, and reporting for various compliance standards, including HIPAA, NIST, APRA, ASIC, PCI, ISO, OAIC, ACSC, and IRAP. My work spanned across numerous technologies such as Kubernetes, Docker, gVisor, and a wide array of programming languages and databases. I successfully collaborated with organizations like nib group, Data Action, Australia Post, Tyro, and ANZ Bank, among others, ensuring robust security practices were in place to protect their critical systems.
CybersecurityInformation SecurityInformation Security StandardsCompliance PCIDevSecOpsLegislative Relations+5

Data action

Information Security Consultant | cmdsolutions.com.au

Jan 2019 – Apr 2019 · 3 mos · Adelaide, South Australia, Australia · On-site

  • In preparation for a Managed Open Banking API product, I was responsible for APRA approved AWS uplift and producing risk assessments of 42 AWS services.
  • Monitoring, Alerting, and auto-remediation of security events
  • SecurityHub vulnerability management workflow runbooks
  • Logging centralisation and data security protections
  • Security insights and SIEM operations leveraging S3, Athena, Glue, EMR, and Datalake
  • Risk assessments required appropriate data classification and handling to be established, threat modelling, and APRA approved assessment process established.
  • The assessments involved an evidence-based approach at three levels; Vendor, Service, Implementation. Due-diligence and probity are critical, and the exercise consists of addressing risk domains as defined by Cloud Security Alliance (CSA) and establishing an inherent risk assessment prior to the adoption of the service. To reduce the inherent risk there are security controls defined in 5 main categories; Preventative, Detective, Corrective, Deterrent, Compensating. With these controls the organisation has a feasible residual risk rating and expectation for implementation and future treatment plan dependant of adopted recommendations.
Information Security StandardsCompliance PCIMachine LearningSoftware DevelopmentArtificial Intelligence (AI)

86 400

GRC Consultant | CMD Solutions

Nov 2018 – Jan 2019 · 2 mos · Sydney, New South Wales, Australia · On-site

  • Worked with internal stakeholders, parent company stakeholder, and sibling subsidiary requirements
  • Leveraging a validated solution accelerator for PCI DSS account and network design
  • Establishing security principles for future work
  • Segregation of data access, processing, and persistence
  • Developed, evaluated, and critiqued design and integration models which facilitate scalability, extensibility and reusable solutions.
  • Developed and applied patterns for elegant solutions to meet to customer, regulatory and shareholder expectations
  • Design and articulate security controls to protect against identified attack vectors
  • Patch Management and patch compliance visibility
  • Improved IAM / RBAC to support a range of predefined job functions
  • Monitoring, Alerting, and auto-remediation of security events using AWS native solutions
  • Container scanning and improved container repository workflows
  • Improvements to security testing; SCA, SAST, DAST, Threat Surface
  • AWS vulnerability assessment
CybersecurityInformation SecurityInformation Security StandardsMachine LearningThreat & Vulnerability ManagementNetwork Security

Origin energy

Data System Engineer | CMD Solutions

Oct 2018 – Nov 2018 · 1 mo · Melbourne, Victoria, Australia · On-site

  • To support the data science and machine learning teams it was my role to provide AWS solutions to deploy new production capabilities and support data team workflows.
  • Deployed Jupyter Notebooks with SSO
  • Established a DAG capability using Apache Airflow
  • Containerised POC workloads re-platformed to Apache Airflow
  • Contributed new Python for new Export-Load-Transform (ELT) workloads
  • Sagemaker Machine Learning model deployment
CybersecurityInformation Security StandardsCompliance PCIThreat & Vulnerability ManagementProject ManagementNetwork Security+2

Nib group

GRC Consultant | CMD Solutions

Jul 2018 – Oct 2018 · 3 mos · Newcastle, New South Wales, Australia · Hybrid

  • Risk assessments of various AWS offerings planned for adoption required appropriate data classification and handling to be established, threat modelling, and APRA approved assessment process established.
  • The assessments involved an evidence-based approach at three levels; Vendor, Service, Implementation. Due-diligence and probity are critical, and the exercise consists of addressing risk domains as defined by Cloud Security Alliance (CSA) and establishing an inherent risk assessment prior to the adoption of the service. To reduce the inherent risk there are security controls defined in 5 main categories; Preventative, Detective, Corrective, Deterrent, Compensating. With these controls the organisation has a feasible residual risk rating and expectation for implementation and future treatment plan dependant of adopted recommendations.
Information Security StandardsMachine LearningProject ManagementSoftware DevelopmentJava

Public safety business agency

Risk Management Consultant | CMD Solutions

May 2018 – Jul 2018 · 2 mos · Brisbane, Queensland, Australia · Remote

  • Cloud Service Provider and SaaS Vendor evidence-based risk assessments and Threat Modelling
  • Security Controls design, implementation, and validation of control effectiveness
  • Security Incident response and addressing security advisories
  • Design and implement operational security monitoring, alerting
  • Define and implement IAM, Federation, and SSO/SAML
CybersecurityInformation SecurityInformation Security StandardsCompliance PCISoftware DevelopmentNetwork Security+1

Tyro payments

Security Consultant | CMD Solutions

Mar 2018 – May 2018 · 2 mos · Sydney, New South Wales, Australia · On-site

  • AWS Database Migration Service (DMS) from On-premise Mysql to Aurora Postgres
  • Lambda (Serverless more broadly) usage workshops for PCI DSS compliance
  • Risk assessments of various AWS offerings planned for adoption;
  • These required appropriate data classification and handling to be established, threat modelling, and APRA approved assessment process established.
  • The assessments involved an evidence-based approach at three levels; Vendor, Service, Implementation. Due-diligence and probity are critical, and the exercise consists of addressing risk domains as defined by Cloud Security Alliance (CSA) and establishing an inherent risk assessment prior to the adoption of the service. To reduce the inherent risk there are security controls defined in 5 main categories; Preventative, Detective, Corrective, Deterrent, Compensating. With these controls the organisation has a feasible residual risk rating and expectation for implementation and future treatment plan dependant of adopted recommendations.
CybersecurityInformation SecurityInformation Security StandardsThreat & Vulnerability ManagementProject ManagementSoftware Development+1

Dexar group

Data System Engineer | CMD Solutions

Jan 2018 – Mar 2018 · 2 mos · Canberra, Australian Capital Territory, Australia · Hybrid

  • AWS S3 Datalake implementation;
  • Considerations for restricted intellectual property data protections and public access
  • Data ingestion from Salesforce using Hadoop and Spark on AWS Elastic Map Reduce (EMR)
  • Arbitrary ingestion patterns supporting formats including csv, json, and flat files
  • Supporting landing zone raw data formats transformation to parquet
  • Transient EMR cluster provisioning
  • Apache Hive using EMR and Glue Data catalog
  • PySpark Glue jobs
  • Athena connections to Tableu
  • Data visualisations to demonstrate business value to non-technical stakeholders
  • Frequent workshops demonstrating new capabilities
CybersecurityInformation SecurityInformation Security StandardsCompliance PCIDevSecOpsThreat & Vulnerability Management+4

Engineers australia

Information Security Engineer | CMD Solutions

Jan 2018 – Jan 2018 · 0 mo · Canberra, Australian Capital Territory, Australia · Remote

  • Identity System Design
  • IAM and Access Management
  • ABAC Authentication
  • Geo-location Authorisation
  • Multifactor Authentication enrollment
  • Okta Administration
Information Security StandardsMachine LearningSoftware DevelopmentJava

Cmd solutions australia

Principal Consultant

Nov 2017 – May 2019 · 1 yr 6 mos · Victoria, Australia · Remote

  • Implemented developer oriented security solutions for APRA regulated customers.
  • Threat Modelling, Risk Assessments, Data Classification, IRAP/ISM, ISO27k, PCI DSS, NIST, GDPR.
  • Maintained operational applications and IaC for managed services using python, ansible, bash, and multiple CI/CD tools.
  • For several clients with AI/ML needs, I was resourced to deliver Apache Airflow, Hadoop, Spark, Keras, Tensorflow, and various other skills I developed in past roles - to assist the Data Science team whenever the need arose.
  • Solution Designed and Implemented numerous data oriented projects comprised of ETL, Datalake, IaC for ML workloads, etc. Using ecosystems such as SAS, Snowflake, Salesforce, Tableau, Hadoop + Spark + Hive, and AWS-native options.
CybersecurityInformation Security StandardsDevSecOpsApplication Security ArchitectureServerless ComputingSoftware Development+3

Nib group

Security Consultant | CMD Solutions

Nov 2017 – Jan 2018 · 2 mos · Newcastle, New South Wales, Australia · Hybrid

  • AWS solution architecture design
  • Contributed security improvements to Ruby and Python repositories
  • ISO27k audit finding triage and remediation efforts
  • Varios ISO SAQ (self-assessment questionnaire) for maturity and audit readiness
  • Produce Dataflow diagrams and a CCW (compensating controls workbook) for PCI DSS
  • Risk assessments of various third parties: Atlassian, Microsoft, Mimecast, and many others.
  • These required appropriate data classification and handling to be established, threat modelling, and APRA approved assessment process established.
  • The assessments involved an evidence-based approach at three levels; Vendor, Service, Implementation. Due-diligence and probity are critical, and the exercise consists of addressing risk domains as defined by Cloud Security Alliance (CSA) and establishing an inherent risk assessment prior to the adoption of the service. To reduce the inherent risk there are security controls defined in 5 main categories; Preventative, Detective, Corrective, Deterrent, Compensating. With these controls the organisation has a feasible residual risk rating and expectation for implementation and future treatment plan dependant of adopted recommendations.
CybersecurityInformation SecurityInformation Security StandardsProject ManagementSoftware Development

Myer

DevOps Engineer Lead

May 2017 – Nov 2017 · 6 mos · Melbourne, Victoria, Australia · On-site

Information Security StandardsDevSecOpsTeam LeadershipReact.jsProject ManagementServerless Computing+1

Brolly - connections covered

Principal Engineer

Jun 2016 – May 2017 · 11 mos · Melbourne, Victoria, Australia · On-site

  • At Ladoo, I played a pivotal role in the development of the Brolly product, which integrates with Twitter's firehose and other social media event streams. My achievements included migrating infrastructure from Vagrant to Docker, refactoring the application from PHP5 to PHP7 with the Symfony Framework, and upgrading from Backbone.js and Gulp to React and Webpack. I managed the Elasticsearch cluster migration to AWS and implemented 3D interactivity using SVG, D3, and Three.js.
  • Additionally, I led AI/ML initiatives, including LLM, NLP, and sentiment analysis, and transformed our data lake to meet the stringent requirements of regulated government and educational institutions.
  • My work supported high-profile customers such as the Bureau of Meteorology and various universities, ensuring seamless integration and effective data management for critical government and enterprise programs.
Information Security StandardsDevSecOpsTeam LeadershipReact.jsProject ManagementServerless Computing+1

Punters.com.au

Senior Product Development Engineer

Apr 2014 – Jun 2016 · 2 yrs 2 mos · Greater Melbourne Area · On-site

  • As the first technical hire at Punters Paradise (later renamed to Punters), I was responsible for a broad range of technical duties, including working with AWS services such as CloudFormation, EC2, Elasticache, DynamoDB, S3, CloudFront, and SNS. I developed in PHP7, MySQL, JavaScript, and Python, and utilized tools like Pandas for data science and reporting.
  • My role involved integrating iOS and Android APIs, managing big data ETLs, and designing adaptive autoscale algorithms. A key achievement was leading the development of a real-time odds trading system and wagering bet placement products.
  • I contributed a large portion to the implementation of AI/ML including k-means clustering, logistic and binary regression, and RNN decision trees, to predict sporting event outcomes. This advanced predictive capability was leveraged by partner sports betting organizations to optimize pricing odds, significantly enhancing their betting strategies.
Information Security StandardsDevSecOpsTeam LeadershipMachine LearningServerless ComputingSoftware Development

Rockwell information services

Senior Software Engineer

Apr 2013 – Mar 2014 · 11 mos · Greater Sydney Area · On-site

Information Security StandardsDevSecOpsTeam LeadershipMachine LearningProject ManagementServerless Computing+2

Knowledgeone corporation

Database System Analyst

May 2012 – Apr 2013 · 11 mos · North Sydney, New South Wales, Australia · On-site

Information Security StandardsDevSecOpsLegislative RelationsSoftware Development

1-stop connections

2 roles

Business Analyst

May 2011 – May 2012 · 1 yr · Sydney, New South Wales, Australia · On-site

Information Security StandardsLegislative RelationsSoftware Development

Application Support Analyst

May 2010 – May 2011 · 1 yr · Sydney, New South Wales, Australia · On-site

Compliance PCISoftware Development

Epl international - australia

Operations Supervisor

Jun 2008 – May 2010 · 1 yr 11 mos · Sydney, New South Wales, Australia · On-site

Compliance PCISoftware Development

Sdv australia

Operations Supervisor

Nov 2007 – Jun 2008 · 7 mos · Sydney, New South Wales, Australia

Team Leadership

Exposervice

Event Management Specialist

Jan 2007 – Nov 2007 · 10 mos · Sydney, New South Wales, Australia

Team Leadership

Dhl global forwarding

Logistics Specialist

Jan 2005 – Jan 2007 · 2 yrs · Greater Sydney Area

Team Leadership

Stuart alexander co.

Assistant Purchasing Manager

Dec 2004 – Jan 2005 · 1 mo · Greater Sydney Area

Workventures connect it

Computer System Technician

Jan 2003 – Dec 2004 · 1 yr 11 mos · Sydney, New South Wales, Australia

Stackforce found 100+ more professionals with Technical Leadership & Cloud

Explore similar profiles based on matching skills and experience