AI + Cloud Security
Threat-model the stack before it becomes a customer problem.
Secure model access, data paths, IAM boundaries, secrets handling, and deployment controls across AWS, Azure, Hetzner, and modern AI workloads.
AI & Cloud Security Architect
I help founders and technical teams fix cloud, security, compliance, and delivery problems without adding more process theater.
Best fit for Europe-based or Europe-facing startups building AI or SaaS products that need stronger architecture, GDPR-aware systems, and senior hands-on technical judgment across AWS, Azure, Hetzner, and hybrid environments.
What I Do
I help founders and technical teams fix the systems underneath delivery, cloud, security, and compliance pressure so the business can keep moving.
AI + Cloud Security
Secure model access, data paths, IAM boundaries, secrets handling, and deployment controls across AWS, Azure, Hetzner, and modern AI workloads.
Compliance-Ready Systems
ISO 27001 and SOC 2 readiness through practical architecture decisions, logging, recovery, evidence, and operating discipline across single-cloud or hybrid estates, including GDPR and sovereignty-sensitive requirements.
Fractional CTO
Clear decisions, calmer delivery, and hands-on support for founders who need both architecture judgment and execution across multiple vendors.
Key Offers
AI Security Audit
For startups running AI workloads on AWS, Azure, Hetzner, or mixed environments that need a clear report, threat picture, remediation plan, and guidance on security, compliance, and data-residency tradeoffs.
Fractional CTO
For founders who need senior technical direction, calmer decision-making, and a stronger operating model.
Build Secure AI Systems
From RAG pipelines to local model deployments, with security controls and platform discipline built in from the start for regulated and sovereignty-sensitive environments.
Case Study Preview
Reframing infrastructure telemetry into an AI-driven analysis platform: cloud-native foundations, RAG-style retrieval patterns, and operator-focused threat visibility for cloud security use cases.
Read the case studyLatest Writing
How Engagements Work
Every engagement is designed to get from ambiguity to a practical plan quickly, without a long advisory runway.
We review the current architecture, delivery pressure, cloud footprint, and compliance constraints.
I identify the real bottlenecks, security gaps, and high-cost design decisions that matter first.
You get a prioritized technical plan with tradeoffs, sequence, and practical next actions.
We either close out the audit cleanly or continue into hands-on support, CTO work, or implementation.
Ready To Talk
If you are building AI features on real infrastructure and need stronger security, clearer architecture, compliance readiness, or help with GDPR and data-residency constraints, we should talk.