I use this space to learn, explore new technologies, and share patterns I come across in security, AI, cloud architecture, wellness, and whatever else catches my curiosity. I also vibe code to kindle my creative side, and thanks to AI for removing the friction. Everything broken down from first principles, based on my own experience and opinions. If you spot anything off, feel free to reach out.
Security Architect · Author · 25+ Years in Cybersecurity
My career started in software development. Understanding how things are built made me better at finding where they fall apart. That perspective led me into offensive security, where I spent over 15 years leading penetration testing and red team engagements, finding and exploiting vulnerabilities across thousands of applications, infrastructure environments, and wireless networks. I've published exploits on Exploit-DB and built WAED, an open-source web attack and exploitation distro used by security professionals for training.
For 8 years, I worked as a Qualified Security Assessor (QSA), assessing hundreds of organizations for PCI DSS compliance across retail, finance, and healthcare. That experience gave me a deep understanding of how regulatory frameworks translate into real-world security controls, and where most organizations struggle to close the gap.
I then moved into presales and security strategy, helping position security products for enterprise customers and translating complex technical capabilities into business outcomes. That combination of hands-on technical depth and customer-facing experience shaped how I think about security architecture today.
Most recently, I spent 4+ years at AWS as a Security Specialist, working with some of the largest enterprises in the world on cloud security, identity architecture, and governance at scale. IAM, SCPs, Control Tower, Landing Zone Accelerator, Zero Trust, and everything in between.
Today, I'm focused on the next frontier: AI and agentic security. How do you secure AI agents that make decisions and take actions on behalf of users? How do you govern which models your organization can deploy? How does identity and authorization work when the "user" is an autonomous agent? These are the questions I'm researching and writing about. I write about security the way I wish someone had explained it to me: from first principles, no jargon, one concept building on the last.
15+ years leading penetration testing and red team engagements. Secured thousands of applications, infrastructure, and wireless environments. Published exploits on Exploit-DB. Created WAED (Web Attacks and Exploitation Distro).
8 years as a Qualified Security Assessor (QSA). Assessed hundreds of organizations for PCI DSS compliance across retail, finance, and healthcare. Deep understanding of regulatory frameworks and how to operationalize them.
4+ years at AWS as a Security Specialist, helping top enterprises secure cloud migrations, design identity architectures, and implement governance at scale. IAM, SCPs, Control Tower, Landing Zone Accelerator.
Currently focused on securing AI agents, model governance, and the intersection of identity and AI. Researching agentic authorization, Cedar policies, and post-quantum cryptography.
Technical concepts explained from first principles. No prior knowledge required.
From "what is a password" to "securing AI agents with Cedar policies." The complete guide to authentication, authorization, and modern identity, explained from scratch.
150 pages / PDF + EPUB
Get the BookHow encryption works, why quantum computers break it, and how post-quantum cryptography fixes it. From symmetric encryption basics to hybrid TLS 1.3 key exchange.
95 pages / PDF + EPUB
Get the BookDeep dives and first-principles explanations on security, identity, and cloud architecture.
How I use Wim Hof breathing to quickly reach the meditative Alpha state, and how it connects to Silva meditation.
Read more →How the Silva Method helped me think clearer, sleep better, and approach problems differently. And why it matters for people in tech.
Read more →A 60-second breathing technique that resets your nervous system. Why every tech professional should take a minute to breathe.
Read more →A collection of working Steampipe SQL queries for AWS. Query IAM, EC2, S3, VPCs, and more using SQL syntax.
Read more →The story behind the name and what this project is about.
Read more →Setting up secure Python server and client communication using OpenSSL-generated certificates.
Read more →Finding what makes you happy and gives your life purpose by discovering the overlap of passion, skill, need, and reward.
Read more →Common Nmap commands with examples for discovering hosts and services on a network.
Read more →Understanding the difference between SAML 2.0 and OIDC for authentication and authorization.
Read more →Why having your own website gives you credibility and how to create one for free.
Read more →Changing industry trends in vulnerability assessment, red teaming, and technical assessments.
Read more →Create an IAM policy to access S3 bucket objects only when MFA authentication is provided.
Read more →A high-level overview of AWS IAM service and what you can do with it.
Read more →An overview of various techniques for finding prime numbers and why they matter in cryptography.
Read more →Netcat is a network service for reading and writing connections using TCP or UDP. Here are the essential commands.
Read more →The pros and cons of being a generalist versus a specialist in your career.
Read more →Getting started with Python for creating security tools, from basics to advanced features.
Read more →Constantly planning but never taking action? Here's how to break the cycle.
Read more →