UNCLASSIFIEDPublic release - static page - no external scripts
SEC: BRIEFING

BRADLEY
SAUCIER

VIPER1 | STAKEHOLDER BRIEFING
Verification-first engineering leadership
Deputy Operations Manager - Anduril Industries - USAF Combat Controller (Ret.)
CALLSIGN: VIPER1POSTURE: UNCLASSIFIEDMODE: BRIEFING

Purpose: provide an unclassified, fast-read briefing on how I lead engineering delivery. Public repos on GitHub hold the runnable artifacts and documentation.

BLUF
I translate intent into bounded requirements, verification gates, and auditable evidence.
Standard
Testable claims, explicit constraints, reproducible runs, and documented decision rationale.
Boundary
Unclassified only. No proprietary, sensitive, or export-controlled technical data is intended for publication.
PROFILE
Python C++ Java Linux Docker CI
Focus
Assurance cases, durable CI gates, formal methods, software security
Leadership development
Executive MBA - incoming. Program details published when confirmed.
Privacy
No analytics by default. Static, self-contained page.
SEC: OPERATING MODEL

Operating model

How I convert intent into delivery

Define
State the objective, constraints, and failure modes before implementation begins.
Bound
Write acceptance criteria that are measurable and realistic inside an explicit risk envelope.
Verify
Make credibility runnable: tests, CI gates, repeatable commands, and expected outputs.
Record
Capture the why: assumptions, trade-offs, and decision logs that survive turnover.

What a stakeholder should see

Clarity
Short statements, concrete scope, no ambiguous claims.
Discipline
Evidence trails and reproducibility, not slideware.
Risk posture
Unknowns are labeled and bounded. Bad news surfaces early.
Routing
Work items include repro steps, constraints, and definition of done.
SEC: ASSURANCE

Assurance

Assurance pattern I enforce

I do not treat documentation as marketing. It is the control surface for verification and audit.

Claim:
  What we assert is true (bounded and testable)

Context:
  Constraints, interfaces, assumptions, risk envelope

Evidence:
  Tests, CI gates, logs, and traceable artifacts

Verify:
  Commands and expected outputs from a clean environment
            

Unclassified abstract method

Describe
The class of problem and the operational constraints (not program specifics).
Show
Generic methods and verification discipline via public artifacts.
Avoid
Parameters, sensitive timelines, platform identifiers, and export-controlled technical details.
SEC: PUBLIC ARTIFACTS

Public artifacts

Autonomy verification limits

STATUS: ACTIVE

Demonstrates why universal, unbounded autonomy verification fails in the general case, and how to build bounded assurance that still produces usable guarantees.

Emphasis
Scope control, reductions, and repeatable verification from a clean environment.
Link
Repository

Security evidence pack

STATUS: ACTIVE

Evidence-driven security posture: risk framing, hardening actions, and verification notes organized for audit and reproduction.

Emphasis
Traceability, verification steps, and clear boundaries on claims.
Link
Repository

Deterministic course planner

STATUS: ACTIVE

Defensive ingestion and predictable behavior under constraint: validates prerequisites and outputs a sorted catalog deterministically.

Emphasis
Explicit data-structure choice, input validation, and repeatable build-run steps.
Link
Repository

What this page is

STATUS: INFO
This site
Stakeholder briefing: how I operate, what I value, and where to find public evidence.
GitHub
The public record: runnable artifacts, documentation, and verification paths.
Limits
Unclassified only. Details that create risk are omitted by design.
SEC: CONTACT

Contact

Routing

GitHub
github.com/bradsaucier
Repo topics
Open an issue in the relevant repository with evidence and repro steps.
General
Use the issue template below to reduce ambiguity and accelerate resolution.

Issue template

Context:
  System:
  Environment:
  What changed:

Constraints:
  Time:
  Safety:
  Interfaces:
  Policy:
  Dependencies:

Definition of done:
  Tests:
  Checks:
  Artifacts:
  Acceptance criteria:

Evidence:
  Repro steps:
  Commands run:
  Output or logs:
  Links: