Cloud Security
Fix the foundation before security and delivery problems compound.
Cloud architecture, IAM boundaries, secrets handling, deployment controls, and the operational guardrails that keep modern systems workable in production.
Cloud, Security & AI Architect
I help founders and technical teams fix cloud, security, compliance, and delivery problems without adding more process theater.
My background is cloud-first, with more than 14 years working across infrastructure, platform, security, and delivery. AI is part of the modern toolset, not the whole service: I help organizations use it safely inside products and operations without losing control of the cloud foundations underneath.
Built for founders, trusted by technical teams.
What I Do
I help founders and technical teams fix the systems underneath delivery, cloud, security, and compliance pressure so the business can keep moving without expensive rewrites or process-heavy slowdown.
Cloud Security
Cloud architecture, IAM boundaries, secrets handling, deployment controls, and the operational guardrails that keep modern systems workable in production.
Compliance-Ready Systems
ISO 27001 and SOC 2 readiness through practical architecture decisions, logging, recovery, evidence, and operating discipline across single-cloud or hybrid estates, including GDPR and sovereignty-sensitive requirements.
AI As An Addition
Bring AI into products and operations as part of a wider cloud, DevOps, security, and compliance strategy rather than as an isolated experiment.
Key Offers
Cloud & Security Audit
For organizations on AWS, Azure, Hetzner, or mixed environments that need a clear report, threat picture, remediation plan, and guidance on security, compliance, AI adoption, and data-residency tradeoffs.
Fractional CTO
For founders who need senior technical direction, calmer decision-making, and a stronger operating model.
Platform & AI Delivery
From modern cloud architecture to RAG pipelines and local model deployments, with security controls and platform discipline built in from the start for regulated and sovereignty-sensitive environments.
Case Study Preview
Reframing infrastructure telemetry into an AI-driven analysis platform: cloud-native foundations, RAG-style retrieval patterns, and operator-focused threat visibility for cloud security use cases.
Read the case studyLatest Writing
How Engagements Work
Every engagement is designed to get from ambiguity to a practical plan quickly, without a long advisory runway.
Every engagement follows the same progression from ambiguity to action.
We review the current architecture, delivery pressure, cloud footprint, and compliance constraints.
I identify the real bottlenecks, security gaps, and high-cost design decisions that matter first.
You get a prioritized technical plan with tradeoffs, sequence, and practical next actions.
We either close out the audit cleanly or continue into hands-on support, CTO work, or implementation.
Ready To Talk
If your organization is using AI on real infrastructure and needs stronger security, clearer architecture, compliance readiness, or help with GDPR and data-residency constraints, we should talk.