Operator mindset. Engineer execution.

I build defensible security systems.

Cybersecurity, AI/ML, and cyber–physical security — engineered for real constraints and real adversaries.

Current focus

Building WeanTech: Opaque Clarity Security

I design defensible security systems across the cyber–physical boundary: identity, endpoints, cloud, logging, automation, and incident response — with a bias for measurable risk reduction and operational clarity under stress.

Live tool ThreatLumen — a live threat intelligence dashboard I use for daily situational awareness.
Open ThreatLumen →
What I do

Security architecture

Design secure-by-default systems that remain defensible under real constraints.

  • Identity + access (least privilege, conditional access)
  • Endpoint + cloud hardening
  • Logging strategy, detections, and evidence paths
How I work

Clear thinking, measurable outcomes

Threat model → prioritize → implement → validate. No theater.

  • Adversary-first design
  • Automation that is auditable and reversible
  • AI only where it reduces toil and improves decisions
Background
  • Navy Master-at-Arms
  • Municipal policing
  • Air Force Security Forces + CATM
  • Industrial Armed First Responder
Domains
  • Cybersecurity & risk
  • Cyber–physical security
  • AI/ML for defense
  • Training & enablement
Contact

Email is the clean channel. I use Proton Mail by default.

dweant@proton.me

PGP public key