Skip to content
View OyajeOmakwu's full-sized avatar

Block or report OyajeOmakwu

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
OyajeOmakwu/README.md

🚀 Oyaje Omakwu

Senior DevSecOps Engineer | Platform Security | Cloud Native

I design and build secure, scalable cloud platforms that enable developers to move fast—without compromising security.

My focus is on embedding security directly into the software delivery lifecycle through DevSecOps, platform engineering, and policy-as-code. I specialize in Internal Developer Platforms (IDPs), secure CI/CD pipelines, and Kubernetes-based infrastructure that enforce security by default.

🔥 What I Do

  • 🔐 Design and implement DevSecOps pipelines (shift-left security)
  • ☁️ Build and secure cloud-native platforms (AWS / Azure)
  • ⚙️ Automate infrastructure using Terraform & IaC frameworks
  • 🛡️ Enforce security using Kyverno / OPA / policy-as-code
  • 🚀 Create Internal Developer Platforms (IDP) with Golden Paths
  • 📉 Reduce MTTR, toil, and risk through automation & observability

🧠 Core Skills

Cloud & Infrastructure

  • AWS, Azure
  • Kubernetes (EKS, AKS)
  • Terraform, Helm

DevSecOps

  • CI/CD: GitHub Actions, Jenkins
  • SAST / DAST / SCA integration
  • Secrets management & supply chain security

Security

  • Threat Modeling (STRIDE)
  • IAM, OAuth2, SAML
  • Container & Kubernetes security

Platform Engineering

  • Internal Developer Platforms (IDP)
  • Golden Path workflows
  • Developer experience (DevEx) optimization

🏗️ Featured Projects (What You Should Look At)

🔹 1. Secure Internal Developer Platform (IDP)

A production-style platform enabling developers to deploy securely by default.

  • Self-service repo + infrastructure provisioning
  • Built-in CI/CD with security gates
  • Policy enforcement using Kyverno
  • Golden Path templates for microservices

🔹 2. End-to-End DevSecOps Pipeline

Fully automated pipeline integrating security at every stage.

  • SAST, DAST, SCA integrated into CI/CD
  • Automated vulnerability triage + ticketing
  • SBOM generation & artifact signing

🔹 3. Kubernetes Security Hardening Lab

Hardened Kubernetes cluster with enforced security controls.

  • Network policies, RBAC, Pod Security Standards
  • Admission control via Kyverno
  • Runtime threat detection

🔹 4. Threat Modeling & Secure Architecture

Applied STRIDE threat modeling on cloud-native architecture.

  • Identified attack vectors & mitigations
  • Designed secure auth (OAuth2/SAML)
  • Integrated controls into CI/CD

🔹 5. Policy-as-Code Security Framework

Reusable policy library for enforcing security across environments.

  • Terraform + Kubernetes policies
  • Compliance-as-code approach
  • Integrated into deployment pipelines

📊 Impact Mindset

I don’t just build systems—I measure outcomes:

  • Reduced manual security triage through automation
  • Improved deployment velocity with secure defaults
  • Minimized risk via policy enforcement at scale

🎯 What I’m Currently Building

  • 🧩 Internal Developer Platform (IDP) with self-service workflows
  • 🔐 Advanced Kubernetes security controls with policy-as-code
  • ⚡ Golden Path developer workflows inspired by real platform teams

🤝 Let’s Connect

⚡ My Philosophy

The secure way should be the easiest way.

Security should not slow developers down—it should be built into the platform so they don’t have to think about it.

Pinned Loading

  1. cloud-security-automation-lab cloud-security-automation-lab Public

    Python-based cloud security detection and reporting system simulating scalable security engineering workflows

    Python

  2. cloud-security-platform cloud-security-platform Public

    Secure-by-default cloud security platform with Terraform, AWS detection and response, Kubernetes policy enforcement, and CI/CD security

    HCL

  3. OyajeOmakwu OyajeOmakwu Public

  4. secure-platform-blueprint secure-platform-blueprint Public

    Secure-by-default internal platform using Terraform, Kubernetes, and policy-as-code with CI/CD security enforcement

    Python