
Cross-Cloud Role Sanity Checker
Security-focused utility designed to validate AWS IAM roles and GCP service accounts before initiating cross-cloud data transfers.
Security Analyst & Engineer focusing on Incident Response and Cloud Security.

I am a Security Engineer who doesn't trust assumptions. I build and break systems, then automate the guardrails: detections, incident response, and secure cloud architectures. My work spans AWS/GCP IAM sanity checks, log pipelines (Splunk + Elastic), PCAP threat hunting with Zeek/Suricata, and rule engineering (YARA/Sigma).
Open source and Proprietary projects and contributions. Here are a few highlights.

Security-focused utility designed to validate AWS IAM roles and GCP service accounts before initiating cross-cloud data transfers.
Building the foundation of a security-focused homelab with enterprise hardware, network segmentation, and Proxmox virtualization.
Setting up Active Directory domain services, Windows clients, and integrating a SIEM for centralized logging and monitoring.
Investigation of a AWS IAM Role Backdoor via Stratus Red Team.
Selected findings, write-ups, and vendor advisories.
Discovered an authentication bypass vulnerability allowing unauthorized access to protected resources.
Full writeup pending vendor approval.
Identified a stored cross-site scripting vulnerability in the administrative interface.
Full writeup pending vendor approval.
Found an API endpoint exposing sensitive user information without proper authorization checks.
Full writeup pending vendor approval.
Previous roles, timelines, and highlights from recent engagements.




Degrees and programs that shaped my technical foundation.



Industry-recognized credentials validating expertise.




Academic writings and thoughts on security, Cloud Infrastructure, and engineering craft.
This paper explores the practical benefits of implementing machine learning algorithms within AWS threat hunting workflows. It examines how ML models can enhance detection capabilities, reduce false positives, and automate the identification of sophisticated threats in cloud environments.
An examination of practical implementation strategies and benefits of phased migration towards post-quantum cryptography. This paper addresses the challenges organizations face in transitioning from classical cryptographic systems to quantum-resistant alternatives.