Security Engineer delivering AI-augmented cloud security platforms for enterprise clients on AWS. Integrates LLM-driven automation with SOAR orchestration for threat detection and incident response. Reduced attack surface by 85% through Zero Trust architecture.
CoreDirective Automation Engine — a production security platform on AWS serving enterprise clients. 6-service containerized stack, 17 integrated services, zero external AI costs. Every metric below is verifiable in the public repository.
Cloudflare Tunnel + AWS Security Groups + SELinux container confinement. No exposed ports. 16/18 NIST 800-53 controls implemented. Quarterly credential rotation enforced.
Self-hosted Qwen 2.5 7B (4-bit quantized) replaces $400/mo GPU instances. Self-managed NAT instance saves $367/year vs AWS NAT Gateway. Production Terraform with S3+KMS state backend.
Single webhook-driven control plane. Google Workspace, Telegram, PostgreSQL, Ollama, Cloudflare, GitHub, and 11 more services. 99.2% success rate across 700+ workflow executions.
resource "aws_security_group" "zero_trust" { name = "cd-zero-trust-sg" vpc_id = aws_vpc.main.id ingress { # No inbound rules - tunnel access only from_port = 0 to_port = 0 protocol = "-1" cidr_blocks = [] # DEFAULT DENY } egress { from_port = 443 to_port = 443 protocol = "tcp" cidr_blocks = ["0.0.0.0/0"] } tags = { Name = "CoreDirective-ZeroTrust" } }
services: cd-service-n8n: image: n8nio/n8n:latest security_opt: - no-new-privileges:true read_only: true tmpfs: - /tmp networks: - cd-internal # isolated bridge deploy: resources: limits: memory: 2G cpus: "1.0" cap_drop: - ALL # drop all capabilities cap_add: - NET_BIND_SERVICE
Open to Security Engineer roles. Available for interviews and technical discussions.
emmanueltigoue@gmail.com