AWS Certified Solutions Architect and Certified Ethical Hacker with 12+ years building, securing, and operating cloud infrastructure for production workloads.
➜ usman@prod aws sts get-caller-identity --query Account 303268631774 ➜ usman@prod kubectl -n prod get pods -l app=api | grep -v Running (no output, all healthy) ➜ usman@prod curl -sI https://api.example.com | head -1 HTTP/2 200 ➜ usman@prod cf-cli waf rules deploy --zone iamuk.in ✓ 14 rules synced · 0 errors ➜ usman@prod uptime load average: 0.21, 0.18, 0.16 ➜ usman@prod
a typical morning
Proof
Public, third-party verified track record on Upwork. Every number you would ask about a senior engineer, on the record.
01 · What I do
From greenfield AWS design to keeping a cPanel fleet patched at 2 a.m. I cover the full stack of infrastructure that production businesses actually run on.
AWS multi-account, EKS/ECS, RDS, networking, IAM. Greenfield design or cleanup of accounts that got away.
Cloudflare WAF, DDoS, bot management. CEH-aligned vulnerability assessments and hardening.
Autoscaling, CI/CD, IaC, observability, on-call setup, FinOps audits.
cPanel/WHM fleet, WHMCS automation, nginx, Linux server admin, DNS migrations, DR.
02 · Stack
A working list of platforms, services, and tools I've shipped to production. Not a buzzword bingo card.
03 · Security in motion
CEH-aligned, attacker's-eye-view security work, from WAF rule tuning to incident response. Below: a sample of what a hardened edge actually looks like in production.
WAF
ON
DDoS
MITIGATED
TLS
1.3
illustrative · sample WAF events
➜ usman@sec nmap -sV -Pn target.example.com 443/tcp open https nginx 1.27 22/tcp open ssh OpenSSH 9.6 (key-only) ➜ usman@sec nuclei -t cves/ -u https://target.example.com [INFO] templates: 9842 · severity: critical,high,medium ✓ no critical CVEs detected ➜ usman@sec fail2ban-client status sshd Currently banned: 47 · Total banned: 12,809 ➜ usman@sec aws iam get-account-summary | jq .RootAccountMFAEnabled 1 ➜ usman@sec cf-cli waf attack-score --zone iamuk.in --last 1h blocked: 1,284 · challenged: 312 · passed: 18,973 ➜ usman@sec
04 · Credentials
AWS Certified Solutions Architect
Amazon Web Services

Certified Ethical Hacker
EC-Council
DevOps Engineer
12+ years in production
05 · Recent work
Anonymized for NDA reasons. Names and full case studies on request.
70%
monthly cloud bill cut
Account-to-account migration of a SaaS suite into a consolidated AWS account. Decommissioned legacy infra cleanly.
0
data-loss incidents since
Recovered a self-hosted search cluster from a data-loss event, then designed a rolling-update playbook to prevent reoccurrence.
14
WAF rules deployed
Hardened a content platform behind Cloudflare WAF with bot-management and rate-limit rules. Stopped an active credential-stuffing wave.
06 · Process
01
30 minutes. We figure out whether your problem matches what I ship. If not, I'll point you somewhere better.
02
Fixed price, fixed timeline, written deliverables. No ambiguity about what "done" means.
03
Code, runbook, diagram, and a real walkthrough so your team can run what I built.
What clients say
“Rebuilt our AWS account from scratch and cut the monthly bill almost in half. Runbooks our team actually opens.”
“Walked into a Typesense incident at 11pm. Had us back online by 1, root-caused by morning, with a playbook for next time.”
“Three-week security audit. We expected a slide deck. Got working IAM changes, WAF rules, and a tabletop exercise.”
Names withheld under NDA. References available on request.
07 · Writing
Cloud, security, and the boring infra work that keeps systems up.
Work with me
Whether it's a security audit, a cloud migration, or putting your platform on EKS. Short engagements, fixed scope, no retainers.
08 · Newsletter
Cloud architecture, security incidents, and DevOps lessons, drawn from real work. Not LinkedIn talking points.
Unsubscribe anytime. 5 minute read.