πŸ” Security Infrastructure Engineer

Iyanu Aworanti

Identity & Access Systems. Security Automation. Developer Advocate.

I build and support security infrastructure that empowers engineering teams. With 6+ years of experience, I've designed identity and access management systems at enterprise scale, built internal automation and tooling that scales knowledge across distributed teams, and turned recurring security problems into durable engineering assets. I solve complex security challenges through pragmatic automation, clear communication, and deep understanding of developer workflows.

6+
Years Enterprise Security
50K+
Assets Secured
85%
SOC Efficiency Gain

Measurable Impact

Quantified contributions to enterprise security, risk reduction, and operational efficiency

πŸ€–
60+
Security processes automated through SOAR platform, eliminating manual toil
⚑
2 hrs
Incident response time achieved through automation (down from 8 hours)
πŸ“š
200+
Detection rules as code, enabling peer review and knowledge transfer
πŸ”
5K+
Endpoints managed with automated access controls at scale
πŸ“Š
85%
Workload reduction through automation, freeing teams for complex work
🎯
78%
Data exfiltration incidents reduced through automated enforcement

How I Support Security at Scale

Principles that guide infrastructure design, automation, and partner success

πŸ” Root Cause Before Symptoms

I investigate end-to-end, moving beyond firefighting to understand systemic issues. Every incident becomes a learning opportunityβ€”turning recurring problems into automated solutions and clear documentation.

πŸ› οΈ Scaling Through Automation & Tooling

Manual work doesn't scale. I build internal tools, dashboards, and runbooks that distribute knowledge across teams, enabling faster problem-solving and reducing dependency on individual experts.

πŸ‘₯ Developer-First Mindset

Security that blocks innovation fails. I work to understand engineering workflows, reduce friction, and make security guidance pragmatic and actionable for development teams.

πŸ“Š Data-Driven Investigation

I leverage logs, metrics, and signals to identify root causes and validate hypotheses. Every recommendation is backed by evidence, not assumptions.

🌐 Distributed Team Collaboration

Working across time zones requires clear communication and well-documented decisions. I prioritize written clarity and asynchronous collaboration patterns.

πŸ” Infrastructure as Knowledge

Security infrastructure should be self-service, self-documenting, and intuitive. I design systems that empower teams to solve problems independently while maintaining security guardrails.

Professional Experience

6+ years building enterprise security solutions

Staff Corporate Security Engineer

Cockroach Labs

July 2023 – Present
  • Designed and implemented comprehensive security controls and Zero Trust architecture across AWS and Azure cloud infrastructure
  • Led implementation of security controls aligned with GDPR, SOC 2, and ISO 27001 standards
  • Architected and deployed AI-powered SOC analyst agents using OpenAI MCP for automated alert triage and threat assessment
  • Developed and deployed security detections in PyPanther SIEM, creating correlation rules and scheduled queries
  • Led security incident investigations and implemented preventive measures to optimize SOC operational efficiency
  • Built and tuned DLP policies in Netskope to prevent unauthorized data transfers across SaaS environments

Cybersecurity Engineer

Aviso Wealth

January 2022 – July 2023
  • Steered Proof of Value (POV) initiative for Darktrace, evaluating AI-driven cybersecurity solutions
  • Implemented and managed file integrity monitoring (FIM) systems for critical infrastructure
  • Conducted comprehensive risk assessments and developed mitigation strategies for IT infrastructure
  • Led review and approval process for change management tickets ensuring security and compliance

IT Security Specialist

IBM

December 2020 – January 2022
  • Monitored and analyzed security alerts from various sources within a 24x7 Security Operations Center (SOC)
  • Executed and reported on internal controls testing for IT infrastructure and project/program management
  • Supported analysis of issues and risks, identifying root causes and business impacts

IT Security Analyst

Canada Life

January 2017 – December 2020
  • Conducted ISO 22301 gap assessments and business continuity focused risk assessments
  • Managed multi-level incident responses and conducted cyber-security training
  • Designed, implemented, and maintained security protocols, policies, and systems
  • Conducted information security management system reviews and remediation activities

Notable Projects

Enterprise-scale security initiatives and automation frameworks

AI-Powered SOC Agent Architecture

OpenAI | Model Context Protocol | N8N | Python

Architected and deployed an intelligent SOC analyst agent leveraging multiple Model Context Protocols (MCPs) and OpenAI GPT models integrated with N8N workflow automation. The system autonomously performs alert triage, threat assessment, and incident classification with human-in-the-loop validation, reducing alert fatigue by 40% and enabling security analysts to focus on complex investigations. Implemented context aggregation from multiple threat intelligence sources and automated response recommendations based on organizational risk tolerance.

Detection as Code Framework

Panther SIEM | PyPanther | Python | GitHub

Established a Detection-as-Code (DaC) practice using Panther SIEM and PyPanther SDK, enabling security teams to version-control and peer-review detection logic. Developed 200+ correlation rules and scheduled queries covering threat patterns across cloud, network, and endpoint domains. Implemented CI/CD automation for detection validation and staged deployments, achieving 99.2% detection accuracy while reducing false positives by 35% through iterative tuning and community threat intelligence integration.

Enterprise Chrome Deployment & Management

Google Chrome Enterprise | Group Policy | MDM | Active Directory

Orchestrated enterprise-wide managed Chrome deployment across 5,000+ endpoints with centralized policy enforcement. Configured granular security policies including certificate pinning, extension allowlisting, and safe browsing controls. Implemented automated compliance monitoring and real-time reporting dashboards. Reduced browser-based attacks by 67% through policy-driven hardening while maintaining user productivity and minimizing help desk tickets.

Vulnerability Management Program

Qualys | Tenable | ServiceNow | Risk Prioritization | CVSS

Built and operationalized a comprehensive vulnerability management program managing 50,000+ assets across cloud and on-premises infrastructure. Developed risk-based prioritization algorithms that rank vulnerabilities using CVSS scores, exploit availability, and asset criticality. Orchestrated remediation workflows in ServiceNow with SLA-driven escalation and executive reporting. Achieved 87% remediation rate for critical vulnerabilities within 30 days and reduced overall vulnerability exposure by 62% year-over-year.

Endpoint Security Hardening Initiative

CrowdStrike | Microsoft Defender | EDR | YARA | Threat Hunting

Led enterprise endpoint security strategy consolidation from multiple EDR platforms to a unified CrowdStrike and Microsoft Defender architecture. Implemented behavioral threat detection rules, YARA signatures, and custom threat hunting playbooks to detect advanced persistent threats. Configured kernel-level monitoring and response automation for malware, fileless attacks, and lateral movement. Conducted proactive threat hunts identifying 23 previously undetected compromises and enabled incident response to contain threats within 2 hours of detection.

Security Automation & Orchestration Platform

Tines | N8N | Python | REST APIs | SOAR

Architected a Security Orchestration, Automation, and Response (SOAR) platform using Tines and N8N to automate 60+ routine security processes. Built playbooks for incident response, user access provisioning/deprovisioning, threat intelligence enrichment, and compliance scanning. Integrated 40+ security tools and cloud services through native connectors and custom APIs. Achieved 85% reduction in manual security operations workload and 50% faster incident response time through systematic automation of repeatable workflows.

Data Loss Prevention (DLP) Framework

Netskope | Content Inspection | Cloud Access Security | Incident Response

Deployed and optimized a comprehensive DLP solution using Netskope to protect sensitive data across SaaS applications, cloud storage, and web channels. Configured content inspection policies using regex patterns and machine learning to identify PII, PHI, and intellectual property. Implemented graduated enforcement ranging from logging and alerting to blocking and quarantining based on data classification and user context. Reduced unauthorized data exfiltration incidents by 78% and achieved 99.1% detection accuracy while maintaining business continuity through context-aware policy exceptions.

Technical Expertise

Proficiency across security tools and cloud platforms

Security Tools

SIEM (QRadar, Sentinel, Panther) EDR (CrowdStrike, Defender) Darktrace Netskope IDS/IPS WAF

Cloud & Infrastructure

AWS Security Azure Security GCP Docker Kubernetes Zero Trust Architecture

Compliance & Standards

SOC 2 ISO 27001 GDPR NIST ISO 22301 Change Management

Operating Systems

Windows macOS Linux Database Management Networking

Development & Process

SDLC Agile CI/CD Python SOAR

Leadership & Strategy

Incident Response Risk Management Business Continuity Stakeholder Management Team Leadership

Certifications

Industry-recognized credentials

πŸ›‘οΈ CISSP

Certified Information Systems Security Professional (ISCΒ²)

πŸ” CHFI

Computer Hacking Forensic Investigator

☁️ Akamai Kona Site Defender

Web Application Security

πŸ“Š IBM Qradar SIEM

Security Information & Event Management

Education

Academic foundation in security and computer science

Master of Science in Security Studies

University of Massachusetts Lowell, Lowell, MA

Concentration: Cybersecurity

Bachelor of Science in Computer Science & Information Technology

Bowen University, Iwo

Let's Connect

Open to security consulting, speaking engagements, and collaboration opportunities

βœ‰οΈ
πŸ”—
Send Email