At Hordanso LLC, a Google Cloud Partner, I spearheaded the development and implementation of cutting-edge cloud security strategies, significantly enhancing DDoS attack mitigation and cloud data encryption. My expertise in Google Cloud proficiency and proactive incident detection, coupled with a strong focus on results, has led to groundbreaking advancements in securing internet-facing services and sensitive data.
currently supporting Target's network security posture in Google Cloud.
Available upon request
Zero-Trust Security Implementation for Multi-Cloud Environments, Led the deployment of a zero-trust security model across AWS, GCP, and Azure, leveraging VPC Service Controls and Access Context Manager to enforce strict access controls and prevent unauthorized data exfiltration. Defined service perimeters and implemented strict API call restrictions, significantly reducing the attack surface. DDoS Mitigation and OWASP Protection, Developed and implemented Cloud Armor AI rules for advanced DDoS attack mitigation, improving application availability and security. Integrated OWASP Top 10 protections into the security architecture, safeguarding applications from common vulnerabilities. AWS Connect Integration and Security, Configured and secured AWS Connect for cloud-based contact center operations, ensuring compliance with internal security policies. Integrated AWS Lambda and Amazon Lex for automated workflows, while ensuring encryption and access control measures were properly enforced. Machine Learning for Threat Detection in Cloud Environments, Integrated machine learning algorithms to analyze network traffic and detect anomalies, reducing the time to detect and respond to security incidents. Leveraged AI-powered tools to predict potential security threats, enhancing the proactive defense capabilities of the cloud infrastructure.
AWS, Google Cloud Platform (GCP), Microsoft Azure, AWS IAM, Azure AD, Google Identity, CloudTrail, Security Command Center, VPC Service Controls, Firewalls, Security Groups, Network ACLs, Google Cloud Armor, AWS Shield, Terraform, Ansible, Jenkins, GitLab, Binary Authorization, Cloud Pub/Sub, BigQuery, Looker, CloudWatch, Azure Monitor, AWS S3 Encryption, Google Cloud Storage Encryption, Azure Blob Storage Encryption, Machine Learning Models for Anomaly Detection, AI-based Security Tools, Zero Trust, OWASP Top 10, CIS Benchmarks, AWS Connect Integration, Lambda, Amazon Lex