Background
Who I am
I'm a System Engineer and IAM (Identity & Access Management) Engineer. My work centers on designing and hardening infrastructure, identity systems, and access controls so that the right people and systems get the right access — and nothing more.
On the backend, I spend most of my time in Entra ID, Okta, AWS IAM, and custom IdP integrations — writing policies, auditing access, and building zero trust frameworks that actually hold up under pressure. I automate everything with Terraform, Python, and PowerShell because manual processes don't scale and they breed drift.
On iOS, I build tools like Autheris — a secure 2FA token manager that lives entirely on-device. The goal is to take the same security principles I apply to cloud infrastructure and make them practical in the palm of your hand. This site is where I showcase those projects and point to their dedicated pages. When I'm not building, I write about IAM hardening, authentication patterns, and threat intelligence on the blog.
Latest
Recent posts
Security research, technical deep-dives, and threat intelligence. View all posts →
CISA Contractor Leaked AWS GovCloud Keys on GitHub for Weeks
A CISA contractor ran a public GitHub repo called 'Private-CISA' with plaintext passwords, AWS GovCloud admin credentials, and disabled secret scanning. GitGuardian spotted it. The government didn't.
Node.js Supply Chain Security: Developer Workstation Protection Against npm Backdoors [2026]
A compromised npm package isn't just a security incident—it's a supply chain catastrophe. Here's the complete hardening guide I developed after spending three weeks containing the node-ipc fallout.
Tycoon2FA Returns With Device Code Phishing - After March Takedown
The Tycoon2FA phishing kit is back three months after international law enforcement took it down. The new twist: OAuth device code phishing that bypasses traditional detection by never asking for passwords.