For practitioners,
by by practitioners.
Security tools, guides, and resources built by someone who actually uses them. No fluff, no paywalls.
Available for consulting — remote worldwide.
Expertise & Specializations
A decade of hands-on work in enterprise security, infrastructure design, and systems engineering. Not a generalist — a practitioner.
More about meCybersecurity
Penetration testing, vulnerability management, incident response, security architecture, and compliance.
Systems Administration
Linux and Windows server management, Active Directory, cloud migration, and automation.
Vendor Risk Assessment
A practical, no-login tool for evaluating third-party vendor security posture across 12 risk domains — data handling, access controls, compliance, incident response, and more.
- 12 risk assessment domains
- Instant scoring and risk rating
- Exportable PDF report
- No account required
Latest Guides & Posts
Zero Trust Architecture Cheat Sheet
Quick reference covering identity, device, network, and workload pillars of zero trust.
Active Directory Hardening: A Practical Guide
Step-by-step walkthrough for locking down Active Directory — tiered admin model, Protected Users, LAPS, and advanced audit policies.
Need help securing your infrastructure?
Security assessment, architecture review, or hands-on consulting — let's talk about what you need.