Leonard Kachi - Cloud Security Engineer

Obidiegwu Onyedikachi Henry

Cloud Security Engineer

About Me

I'm a Cloud Security Engineer with focus on secure cloud design, automated defense, and intelligent threat response across AWS, Azure, and hybrid environments. I merge DevSecOps principles, Zero Trust frameworks, and AI-driven security analytics to transform cloud infrastructures into resilient ecosystems.

Every architecture I design follows one core rule: security must move faster than risk. From IaC blueprints to real-time anomaly detection, my work blends engineering precision with strategic foresight. I'm fluent in automation, observability, and compliance engineering, and I continuously evolve systems to stay ahead of emerging threats including quantum-era risks.

Technical Proficiency

AWS Security
93%
Zero Trust Architecture
90%
Python Automation
88%
Terraform/IaC
92%
DevSecOps
85%
Threat Detection
87%

What I Do

  • Architect multi-cloud security infrastructures using Terraform, CloudFormation, and Ansible
  • Implement Zero Trust and least-privilege frameworks with IAM, SSO, and adaptive access control
  • Automate threat detection, incident response, and compliance validation using Python, Lambda, and SIEM systems
  • Develop AI-assisted defense systems for anomaly detection, data protection, and predictive analytics
  • Integrate security in CI/CD pipelines using GitHub Actions, Jenkins, and ArgoCD for end-to-end DevSecOps
  • Design serverless and containerized architectures hardened for scalability and resilience
  • Apply NIST, ISO 27001, SOC 2, and CIS frameworks to engineer compliance into every deployment

Complete Technical Toolkit

AWS (IAM, EC2, S3, Security Hub, GuardDuty, CloudTrail) Azure Security Center Google Cloud Platform Kubernetes Docker
Zero Trust Architecture SIEM (Splunk, ELK, AWS Security Hub) Identity & Access Management NIST 800-53 ISO 27001 / SOC 2 CIS Benchmarks GDPR & Data Privacy
Python Bash/Shell Go JavaScript PowerShell SQL YAML
Terraform Ansible CloudFormation GitHub Actions Jenkins ArgoCD CI/CD Security Container Hardening
Wireshark Nmap Burp Suite OpenVAS Metasploit OSINT Threat Modeling
CloudWatch Azure Monitor Prometheus Grafana Snort Suricata Splunk Enterprise
AI Security Automation Machine Learning for Threat Prediction Quantum-Resistant Cryptography Blockchain Security Serverless Security (Lambda, API Gateway) Cross-Region Replication Systems

Featured Projects

Cloud Resource Map

Cloud Resource Map

Built a Multi-cloud resource visibility tool for AWS, Azure, and GCP. to view every service running in your account or Organization Accounts, what it costs, and what region it lives in from a single dashboard. Built with FastAPI, Boto3, and Docker. Beginner friendly.

Python Boto3 Terraform docker AWS Azure GPC FlaskAPI
Deploy from GitHub
Flask CI/CD Dual Cloud Pipeline

Flask CI/CD Dual Cloud Pipeline

Owned a production Flask API end-to-end, containerized with Docker and Gunicorn, with a GitHub Actions CI/CD pipeline that tests and builds on every push. Deployed simultaneously to AWS and Azure with structured logging and real-time observability.

Python & Flask Docker & Gunicorn GitHub Actions AWS ECR & App Runner Azure ACR & Container Apps Azure Log Analytics
View Details
AI-Powered Threat Detection

AI-Powered Threat Detection

Built a machine learning model that detects anomalous behavior in cloud logs with 94% accuracy, enabling automated early warning before threats escalate into incidents.

Python TensorFlow AWS Lambda CloudWatch Logs AWS Security Hub Scikit-learn Pandas & NumPy
View Demo
AWS Zero Trust Architecture

AWS Zero Trust Architecture

Architected a Zero Trust security model across AWS environments, enforcing least-privilege IAM policies, SCPs, and network microsegmentation to eliminate implicit trust at every layer.

AWS IAM & SCPs Terraform Python VPC & Security Groups AWS Organizations CloudTrail & Config Identity Federation
View Demo
Compliance Automation Framework

Compliance Automation Framework

Automated CIS benchmark compliance checks across AWS accounts using Python and AWS Config, cutting manual audit time by 70% and enabling continuous compliance validation at scale.

AWS Config Python CIS Benchmarks Serverless
View Details
AWS Security Monitor

AWS Security Monitor

Built a Python tool that automates security posture checks across AWS environments, surfacing IAM misconfigurations and compliance gaps before they become exploitable vulnerabilities.

Python Boto3 AWS Security Hub IAM Analysis
View Details
AWS Three-Tier Web Architecture

AWS Three-Tier Web Architecture

Engineered a production-grade, highly available three-tier application on AWS with VPC networking, autoscaling, load balancing, and multi-AZ database deployment built for resilience and fault tolerance.

Amazon VPC EC2 Auto Scaling Application Load Balancer Aurora MySQL CloudWatch
View Details
Fuel Finder Nigeria Platform

Gas Finder

Designing a scalable Gas discovery platform that helps drivers locate nearby stations based on real-time availability, pricing, and queue status using serverless AWS infrastructure and location APIs.

React.js (PWA) AWS Lambda & ECS Google Maps API DynamoDB & Aurora Terraform
View Details
The Bibliotheca - Digital Literary Curator
Archival Preview

Digital Literary Curator (The Bibliotheca)

Built a serverless API for curating literary collections, leveraging AWS Lambda to interface with the Google Books Archive with keyword discovery, temporal filtering, and paginated archival responses.

AWS Lambda DynamoDB Terraform Google Books API
View Archival Documentation

Cloud Security Lab

Interactive demonstrations of cloud security concepts and attack simulations

IAM Policy Simulator

Test cloud IAM policies against sample API actions to understand access control patterns and least privilege principles.

IAM Policy

Test Actions

Results

Real-time Attack Simulation

Simulate common cloud attack patterns and see how security controls can prevent them.

Zero Trust Architecture

Explore how Zero Trust principles apply to cloud environments with this interactive demo.

Core Principles

🔐
Verify Explicitly

Authenticate and authorize every request based on all available data points

📉
Least Privilege

Grant just-in-time and just-enough-access with risk-based adaptive policies

🔄
Assume Breach

Minimize blast radius and segment access to prevent lateral movement

🔍
Continuous Monitoring

Real-time analysis of all network traffic and access patterns

🧩
Microsegmentation

Divide networks into secure zones with individual access controls

🤖
Automated Response

Implement AI-driven threat detection and automated remediation

📜
Policy Enforcement

Consistent security policies across all environments and devices

🔗
Encryption Everywhere

Data encryption in transit and at rest by default

Network Security

Visualize security groups and network ACLs in a cloud environment.

VPC Architecture

Public Subnet
Web Server
NAT Gateway
Private Subnet
App Server
Database

Security Group Details

Click on an instance to view its security group rules

Latest Articles

Certifications

Sort by:

Professional Resume

Resume Preview
Download PDF

Testimonials

"Kachi implemented a comprehensive security framework for our AWS infrastructure that helped us achieve SOC 2 compliance. His expertise in IAM and network security was invaluable."

Anne Usang

Anne Usang

Solutions Architect, Neo Cloud Technologies

"The threat detection system Kachi designed reduced our incident response time by 60%. His ability to explain complex security concepts to our team was exceptional."

Jerry Brown

Jerry Brown

Chief Information Security Officer (CISO), Neo Cloud Technologies

"Kachi led the implementation of our Zero Trust model with remarkable precision. His strategic vision significantly boosted our cloud security posture."

Godstime Edet

Godstime Edet

Lead Software Engineer, Neo Cloud Technologies

"From automating our AWS security monitoring to tightening IAM controls, Kachi delivered results that saved us time and prevented multiple vulnerabilities."

Adenike Aromolaran

Adenike Aromolaran

Cloud Solutions Architect, Neo Cloud Technologies

"Kachi's input and technical guidance during our Solutions Architect internship program were invaluable. He has a gift for teaching and leading by example."

Glory Ugochukwu

Glory Ugochukwu

DevOps Engineer, Neo Cloud Technologies

"Kachi's commitment to advancing cybersecurity standards is commendable. His contributions have significantly bolstered our initiatives at Drauig."

ThankGod Ofem

ThankGod Ofem

CEO & Founder, Drauig Nigeria LMT

Get In Touch

Contact Information

Have a project in mind or want to discuss cloud security?
Reach out through the form or directly via email.

+2349131219185
GMT +2
×
💻

Desktop Experience Recommended

This project contains detailed architectural diagrams and technical documentation that are best viewed on a laptop or desktop screen.

Please switch to a larger device for the complete experience.