Jonathan Davis

CLOUD SECURITY

I am a multi-certified AWS/Azure specialist with 20+ years of experience administering, maintaining, and operating existing security solutions for high profile corporations. My professional experience includes designing secure infrastructure, configuring and implementing solutions, troubleshooting various problems, maintaining several organizations’ IT systems for a consistent level of reliability, working closely with my colleagues, and researching new technology. I work as a Senior IT Security Advisor where I build, implement, and operate controls to secure cloud-based systems. I provide reliable and professional assessments of cloud platforms such as Azure, o365, and AWS and enabling monitoring of CloudWatch, CloudTrail, GuardDuty, AWS WAF and Azure Firewall.

I established performance monitoring and anomaly detection capabilities for multi-cloud environments. I have developed skills in data protection with proven experience in strengthening information systems, running tests, developing network defense, preventing unauthorized access, and detecting abnormal activity. I have provided support remotely to application and infrastructure teams in designing architect infrastructure (network, OS, databases) and applications to protect against attackers. Additionally, I possess the ability to work as part of a team or individually, multi-task, prioritize and work under pressure.


Below is a list of all the services I am leveraging in AWS to host this website.


1. First I created an AWS account and enabled MFA on the Root account.

2. I used Identity and Access Management (IAM) to create an IAM user with proper privileges to setup the services required for this website.

3. I purchased the domain name securingthecloud.org via Route53.

4. Created an S3 bucket with the matching name securingthecloud.org.

5. Set proper permissions on the s3 bucket for static website hosting.

6. Setup Route53 DNS Hosted Zone to point my URL to the website.

7. Created a CloudFront distribution to globally host the website as a Content Delivery Network (CDN).

8. Used AWS Certificate manager to create an SSL certificate.

9. Integrated the SSL certificate with CloudFront and force the usage of TLSv1.2_2021.

10. Enabled CloudTrail logging in CloudFront and pointed the logs to a logging S3 bucket.

11. Enabled Cookie Logging in CloudFront

12. Created the email address jonathan@securingthecloud.org using AWS Workmail.