Skip to content
Kevin Wells
Menu
HOME
Skills & Experience
Current Threats & Trends
Articles
Automation & Monitoring
Streamline operations with Ansible workflows, logging pipelines, and proactive monitoring.
Backups & DR
Protect data and maintain continuity with resilient backup and recovery strategies.
Cloud Security
Defend AWS and hybrid environments with strong identity, policy, and monitoring controls.
Identity & Access Management (IAM)
Secure access with SSH keys, sudo, PAM, and cloud IAM roles.
System Hardening
Secure Linux systems through patching, CIS benchmarks, and OS lockdown.
Tools & Cheatsheets
Practical quick-reference guides for Linux and cloud security administrators.
Resources
About
Contact
Get In Touch
[contact-form-7 id=”25″ title=”Get in Touch”]