Shan

Shan

Cloud Security Engineer

Information SecurityAI AutomationWeb DevThreat Modelling

About

Specializing in Information Security, I focus on the intersection of AI resilience and defensive infrastructure.

I identify structural weaknesses through adversarial assessments and threat modelling, while designing autonomous AI automation workflows to streamline complex security operations and high-performance systems..

AI AutomationSystem ArchitectureIndependent ResearchHuman-Centric Design

Services

Cloud security

Securing cloud infrastructure and workloads across AWS, GCP, and Azure using automated auditing.

  • IAM Policy Hardening
  • IaC Auditing
  • Container & K8s Security

Threat Modelling & Security Architecture

Structured risk analysis — identifying attack surfaces and design weaknesses before they become incidents.

  • STRIDE & DREAD threat modelling
  • Attack surface mapping & DFD analysis
  • Security design reviews & gap analysis

AI & LLM Security

Adversarial assessment of LLMs — testing for safety failures, prompt injection, and systemic vulnerabilities.

  • Prompt injection & jailbreak testing
  • Robustness & alignment auditing
  • OWASP LLM Top 10 assessments

ML-Driven Security Analytics

Leveraging ML to detect threats, model behavior, and surface anomalies across complex data pipelines.

  • Behavioural anomaly detection (UEBA)
  • Threat intelligence & log correlation
  • AI-augmented SIEM & automated triage

Full Stack Web Development

Building responsive, high-performance, and secure web solutions using modern full-stack frameworks.

  • Next.js & React Architectures
  • Secure API Design & Integration
  • Performance Optimization & SEO

AI Agents & Automation

Designing and deploying autonomous AI agents to streamline workflows and automate complex processes.

  • Autonomous Workflow Design
  • RAG System Optimization
  • Multi-agent Orchestration

Project

An automated tool for scanning AWS IAM policies to identify over-privileged roles and simplify the principle of least privilege.

Tech Stack

PythonBoto3AWS Config

Monitors S3 bucket permissions in real-time, automatically remediating public access misconfigurations.

Tech Stack

GoAWS LambdaTerraform

A comprehensive cloud security orchestration platform that integrates IAM auditing, resource scanning, and real-time threat detection across multi-cloud environments.

Tech Stack

PythonAWS WorkloadsDockerTerraform