I build defensible security systems.
Cybersecurity, AI/ML, and cyber–physical security — engineered for real constraints and real adversaries.
Building WeanTech: Opaque Clarity Security
I design defensible security systems across the cyber–physical boundary: identity, endpoints, cloud, logging, automation, and incident response — with a bias for measurable risk reduction and operational clarity under stress.
Security architecture
Design secure-by-default systems that remain defensible under real constraints.
- Identity + access (least privilege, conditional access)
- Endpoint + cloud hardening
- Logging strategy, detections, and evidence paths
Clear thinking, measurable outcomes
Threat model → prioritize → implement → validate. No theater.
- Adversary-first design
- Automation that is auditable and reversible
- AI only where it reduces toil and improves decisions
- Navy Master-at-Arms
- Municipal policing
- Air Force Security Forces + CATM
- Industrial Armed First Responder
- Cybersecurity & risk
- Cyber–physical security
- AI/ML for defense
- Training & enablement
Email is the clean channel. I use Proton Mail by default.