◉ EMMANUEL TIGOUE
I secure AI systems and build the governance around them. 14-container Zero Trust platform, 37 GRC documents, detection to alert in under 30 seconds.
Certifications
ISC2 CISSP
Experience
- Secured AI gateway (Claude Opus 4.6, OWASP LLM Top 10, MITRE ATLAS) and red teamed 25 test cases for prompt injection, jailbreak, and data exfiltration pre-launch
- Built shift-left CI/CD (Trivy, Semgrep, Gitleaks, OPA, Cosign, SBOM) and executed DAST with OWASP ZAP: zero injection vulns across 8 categories, 4 header fixes same-day
- Cut alert noise from 200+ to 12 actionable findings by tuning Falco eBPF rules with Datadog routing via Falcosidekick
- Defined 16 Terraform files, 30+ resources, 8 OPA policies. Deployed Teleport PAM (JIT) and Keycloak SSO (3-tier RBAC)
- Reduced external attack surface to zero exposed ports through Cloudflare Zero Trust tunnels with mTLS
- Assessed Google Cloud IAM across 7 APIs: OAuth 2.0 lifecycle, org-level policies, cross-domain identity federation
- Automated ops via n8n SOAR with NeMo-sandboxed AI and Ollama local inference, cutting triage by 80%
- Authored 37 GRC documents: SSP (133 NIST 800-53 controls), POA&M (27 findings), 10 policies, 5 IR playbooks, DAST assessment, pen test
- Led incident response across 3 locations: POS skimmer investigations, credential compromises, and vendor access incidents. Built 6-step IR runbook cutting containment from 8 hours to 90 minutes
- Segmented flat network into 4 VLANs isolating POS payment, back-office, guest Wi-Fi, and management. Validated with Nmap scans
- Deployed Splunk SIEM with correlation rules cutting mean time to detect from 48 hours to under 4 hours
- Hardened Active Directory with GPO baselines, least-privilege enforcement, and credential rotation. Reduced audit findings from 14 to 2
- Maintained PCI DSS compliance across 45+ devices with quarterly Nessus scans, segmentation validation, and SAQ documentation
- Automated patch deployment, provisioning, and compliance reporting with Python and PowerShell, recovering 12 hours weekly
- Established AI governance aligned to NIST AI RMF with LLM-powered phishing detection and incident prioritization
Education
- B.B.A. Computer Information Systems | May 2026
Concentration in Cybersecurity - B.B.A. Business Economics | May 2026
- A.S. Business Administration | May 2025
What I Built
Operational security platform built on DigitalOcean, migrated from AWS EC2 for cost optimization. STRIDE threat-modeled, then deployed. Every metric below is verifiable in the public repository.
Migrated from AWS EC2 (65% cost reduction) • Cloud-agnostic, redeployable in hours
$135/mo
Single AWS EC2 instance. Vendor lock-in risk. NAT Gateway overhead. Underutilized compute.
Multi-Cloud IaC
Terraform-managed DigitalOcean infrastructure. Cloudflare zero-trust overlay. Full stack in Docker Compose. Cloud-agnostic architecture. Can redeploy to any provider in hours.
$48/mo
Fraction of the cost. Zero downtime migration. Same stack, same security posture. Proves multi-cloud capability.
4-Layer Security Architecture
STRIDE threat-modeled, then deployed. Cloudflare Tunnel (no exposed ports) + Teleport PAM with JIT access + Keycloak RBAC with 3-tier role separation. Falco eBPF runtime detection feeding Datadog SOC dashboards. Vault for secrets management.
65% Infrastructure Cost Reduction
AWS EC2 $135/mo down to DigitalOcean $48/mo. Self-hosted Qwen 3 8B handles local inference at zero marginal cost. Terraform IaC enables cloud-agnostic redeployment.
15-Workflow SOAR Orchestration
Single webhook-driven control plane integrating 16 services: Google Workspace, Telegram, PostgreSQL, Ollama, Cloudflare, GitHub, Gmail, and more.
resource "digitalocean_droplet" "cd_alpha" { name = var.do_droplet_name region = var.do_region size = var.do_droplet_size image = var.do_image vpc_uuid = digitalocean_vpc.default.id ssh_keys = [digitalocean_ssh_key.coredirective.id] tags = var.do_tags lifecycle { prevent_destroy = true ignore_changes = [image, ssh_keys] } }
services: tunnel-cyber-squire: image: cloudflare/cloudflared:latest command: tunnel run network_mode: host restart: unless-stopped security_opt: - no-new-privileges:true read_only: true environment: - TUNNEL_TOKEN=${CD_TUNNEL_TOKEN} svc-automation: image: n8nio/n8n:latest security_opt: - no-new-privileges:true networks: - cd-internal # isolated bridge
package terraform.digitalocean deny[msg] { resource := input.resource_changes[_] resource.type == "digitalocean_droplet" not resource.change.after.vpc_uuid msg := "Droplet must be in a VPC" } deny[msg] { resource := input.resource_changes[_] resource.type == "digitalocean_droplet" not contains_tag(resource, "managed-by:terraform") msg := "All resources must be tagged" }
Security Engineering
This is not generic threat modeling. This is adversarial analysis of an autonomous AI agent with tool-use capabilities: an LLM that can browse the web, execute code, query databases, trigger SOAR workflows, and push to GitHub. One compromised prompt can chain through 6 active skills into 16 downstream service integrations.
Every threat below was identified through STRIDE decomposition of the full agentic pipeline, then cross-referenced against MITRE ATT&CK/ATLAS, OWASP LLM Top 10, NIST 800-53, and ISO 42001. The result: 29 categorized threats, 4 mapped kill chains, and a clear picture of where the controls hold and where the gaps remain.
Controls: Input validation, system prompt hardening, behavioral monitoring via Datadog, conversation length limits, output validation before workflow triggers.
Gap: No automated prompt injection detection at the gateway level. Recommended: implement input classifier before LLM processing.
Controls: N8N_RESTRICT_ENVIRONMENT_VARIABLES_ACCESS=true (deployed), Vault dynamic secrets, credential scoping, Falco detection rules for unusual credential access patterns.
Mitigated: Environment variable restriction closes the primary credential theft vector through n8n.
Controls: Skill allowlisting, workflow-level approval gates, Falco detection for unexpected n8n execution patterns, action audit logging in PostgreSQL.
Gap: No human-in-the-loop gate for sensitive workflow triggers (database operations, infrastructure changes).
Controls: net-ai air gap (no runtime internet), SHA256 hash verification at pull, periodic model integrity checks, behavioral baseline testing.
Gap: No automated model signing verification. Ollama registry lacks Sigstore/Cosign integration. Manual hash comparison only.
16 service integrations compromised • Database access (PostgreSQL) • Cloud infrastructure (CDN, DNS) • Communication channels (messaging, email) • Code repositories • Knowledge bases
AI Security & Governance
AI Governance Policy aligned to three international frameworks, governing 3 deployed AI systems with documented risk profiles, prompt injection defenses, and behavioral monitoring.
ISO 42001
AI system inventory, risk classification, responsible AI principles, lifecycle management, human oversight requirements, and continuous monitoring controls.
ISO 27701
Data protection in AI pipelines, PII handling controls, consent management, data retention policies, privacy impact assessments for AI systems.
NIST AI RMF
Govern, Map, Measure, Manage functions applied to 3 deployed AI systems. Risk tiering, bias evaluation, performance monitoring, and incident response procedures.
Self-hosted LLM. No data leaves server. Quantized for efficiency. Used for security analysis and automation tasks.
Authenticated gateway. Rate-limited. API key rotation enforced. Prompt injection defenses. Output validation layer.
On-premise voice transcription. Privacy-first: no audio leaves the server. No PII retention. Used for content workflows.
- rule: Unexpected outbound connection from n8n desc: Detects n8n container making connections to non-whitelisted IPs condition: > container.name = "svc-automation" and evt.type in (connect) and fd.typechar = "4" and not fd.rip in (rfc_1918_addresses) output: > Suspicious outbound connection from n8n (connection=%fd.name container=%container.name image=%container.image.repository) priority: WARNING tags: [network, n8n, lateral_movement]
GRC at a Glance
Contact