Security baseline automation
Reusable patterns for least-privilege IAM, logging, and environment hardening.
A curated list of projects is coming here. I recommend focusing on 3–6 items with a consistent case-study format: problem → approach → result.
Reusable patterns for least-privilege IAM, logging, and environment hardening.
Reducing misconfigurations with guardrails, policy-as-code, and continuous checks.
Dashboards, alert tuning, and response playbooks that help teams move fast under pressure.
Segmentation, DDoS awareness, and pragmatic resilience design decisions.