I am a hands-on Secure Systems Architect thriving to become a DevSecOps practitioner.
My professional interests focus on bridging the gap between innovative technologies and robust security engineering. When I'm not focused on system architecture, I maintain a methodical approach to problem-solving through personal technical projects and a quiet cup of tea.
Projects
- mywebsite
HTML · ★ 0 · updated 2025-11-01 - kalvinparker
PowerShell · ★ 0 · updated 2025-11-01 - ksyp_gemini-cliA security-conscious Dockerfile for the Google Gemini CLI on Alpine Linux.
Dockerfile · ★ 3 · updated 2025-11-01 - ELK-StackSecurity-hardened release of the ELK Stack configuration
Python · ★ 1 · updated 2025-11-01 - cursedsit.comThe one where we delve in. https://cursedsit.com
★ 0 · updated 2025-11-01 - My_Home_NetworkTo enhance the security, control, and resilience of the home network
★ 0 · updated 2025-08-16 - Ingredients
★ 0 · updated 2024-12-22 - KSyP.tech
HTML · ★ 0 · updated 2024-09-21 - ka-osDebian based Linux operating system with security tools in mind.
★ 0 · updated 2024-09-14 - Bitwarden
★ 0 · updated 2024-09-04 - Steam-HeadlessRemote play to Steam Link, browser etc.
★ 0 · updated 2024-09-02 - KSyP.co.ukLanding page for KSyP.tech (Keep Secure you-will-be Protected)
HTML · ★ 0 · updated 2024-08-13 - KSyP.tech_oldKSyP (Keep Secure, you-will-be Protected) offering resources for each stage of the your IT security risk management process.
Ruby · ★ 0 · updated 2024-08-07 - empiresandpuzzles
★ 0 · updated 2024-03-23
About
I am working on designing secure-by-default automation, implementing "Security as Code" principles, and performing deep-dive analyses to maintain configuration integrity across complex environments (e.g., managing code dependencies, refining CI/CD pipelines, and mitigating data exposure via history rewrites). This translates to a practical interest in integrating emerging technologies like AI into secure, auditable pipelines. My focus extends beyond theoretical exploration to include the real-world application of security controls to these systems, such as managing access tokens and ensuring code integrity for AI-related tools.The projects listed under my public profile reflects this approach, demonstrating a commitment to building a clean, verifiable, and secure technical workspace.