I will harden your AWS or azure environments
About this Gig
Your cloud is your attack surface. Most breaches don't start with zero-days they start with an S3 bucket left open, an IAM role with too many permissions, or security groups that never got cleaned up.
I'm an ISC2 CCSP-certified security engineer with 15+ years of experience securing infrastructure environments across AWS, GCP, and Azure. I've hardened infrastructure for startups, mid-size companies, and enterprise teams.
What I deliver:
- CIS benchmark hardening (Level 1 and Level 2)
- IAM audit least privilege, no wildcard policies, no stale keys
- Network security security groups, NACLs, firewall rules tightened
- Logging & monitoring enabled (CloudTrail, Azure Monitor, GCP Audit)
- Clear, prioritized report not a 200-page compliance doc, an actual fix list your team can act on
Who this is for:
- Startups preparing for SOC 2 or their first security review
- SaaS founders who built fast and need to harden before Series A
- IT teams that inherited a cloud environment and need to clean it up
Message me first if you have questions I respond within 24 hours.
Cloud provider:
Amazon Web Services
Expertise:
Configuration
•
Other
Cloud computing resource:
Route53
•
VPC
•
Security Groups
•
DNS
FAQ
Which cloud providers do you support?
AWS, Microsoft Azure, and Google Cloud Platform. All three at Standard and Premium tiers.
Do you need admin access to my cloud account?
For the audit (Basic), read-only access is enough. For hardening work, I need either a dedicated IAM role with appropriate permissions or a live screen-share session — your choice.
Will this help me pass a SOC 2 or PCI audit?
It maps to the technical controls those frameworks require. It removes the most common findings before they show up in your audit report. You still need a formal auditor for certification.
How do you handle sensitive credentials?
I never store credentials. Access is granted for the duration of the engagement and revoked when we're done.
