Background
Who I am
I'm a System Engineer and IAM (Identity & Access Management) Engineer. My work centers on designing and hardening infrastructure, identity systems, and access controls so that the right people and systems get the right access — and nothing more.
On the backend, I spend most of my time in Entra ID, Okta, AWS IAM, and custom IdP integrations — writing policies, auditing access, and building zero trust frameworks that actually hold up under pressure. I automate everything with Terraform, Python, and PowerShell because manual processes don't scale and they breed drift.
On iOS, I build tools like Autheris — a secure 2FA token manager that lives entirely on-device. The goal is to take the same security principles I apply to cloud infrastructure and make them practical in the palm of your hand. This site is where I showcase those projects and point to their dedicated pages. When I'm not building, I write about IAM hardening, authentication patterns, and threat intelligence on the blog.
Latest
Recent posts
Security research, technical deep-dives, and threat intelligence. View all posts →
Microsoft Defender Under Active Attack: SYSTEM Privilege Flaw Being Exploited
Microsoft disclosed two actively exploited vulnerabilities in Defender — a privilege escalation with a CVSS 7.8 score that gives attackers SYSTEM rights, and a denial-of-service flaw. Both are being used in the wild now.
CISA Admin Leaked AWS GovCloud Keys on Github
A CISA contractor pushed AWS GovCloud credentials, plaintext passwords, and internal system configs to a public GitHub repo for six months. The cybersecurity agency responsible for protecting federal infrastructure failed at the basics.
CISA Contractor Leaked AWS GovCloud Keys on GitHub for Weeks
A CISA contractor ran a public GitHub repo called 'Private-CISA' with plaintext passwords, AWS GovCloud admin credentials, and disabled secret scanning. GitGuardian spotted it. The government didn't.