Terraform
Experienced Cloud Security and DevOps professional with a strong work ethic and a passion for building secure, scalable solutions in AWS environments. Skilled in Linux systems administration, automation, infrastructure-as-code, and vulnerability assessment, with a track record of delivering compliant and reliable systems that align with FedRAMP standards. Adept at managing complex cloud resources, performing secure system upgrades and deployments, and leading end-user training initiatives. Committed to collaborative, team-based environments and driving innovation through secure-by-design principles and continuous improvement.
Own and operate an incorporated small business; Authorized Service Provider for Measurement Canada
Manages all aspects of the business, servicing small and large retail concerns in the Maritimes for Class III and Class II legal for trade weighing concerns.
I began studying TKD in 1998 while attending the Nova Scotia Agricultural College (now Dalhousie Agricultural Campus) for my engineering certificate. I took it up again in 2016 when we had moved home to Truro, N.S. and began volunteering there at the same time. In 2019 I was invited to the Assistant Instructor Course, completed it, and have been an assistant instructor since than. I earned my black belt in Dec of 2024 and am now working to become a full instructor within the school.
Terraform
AWS Linux 2 CIS
Wazuh
Splunk
Veracode
Fortify on Demand
TennableIO
Nessus
Elastic Cloud
Jira
Moo Duk Kwan - Tae Kwon Do
I manage a home lab environment that integrates DevOps, cybersecurity, and network infrastructure practices using a Raspberry Pi running my own VPN, Nginx, and secure DNS, reverse proxying, and Wiki with Git-based version control. The lab includes automated rsync and SMB-based backup systems to a NAS with TLS-secured services via Let's Encrypt and external DNS. Security tools like ClamAV, RKHunter, CrowdSec, Wazuh, and Nmap are orchestrated from a centralized Linux scanning node using SSHFS and NFS mounts. I’ve implemented automated scan, logging, systemd service management, and cron-based scheduling to support continuous monitoring and hardening. My setup emphasizes keyless SSH authentication, system isolation, and secure remote access, reinforcing practical skills in scripting, Linux administration, network security, and infrastructure as code.