About me

Louis Moyo

DevSecOps Engineer

Certifications

Verified expertise in cloud security, compliance, and governance.

I’m Louis, a founder-turned–cloud security / DevSecOps engineer with a background in building pipeline for B2B software companies and cybersecurity vendors. For the last 13+ years I’ve lived on the commercial side of tech – running Omni-Channel Marketing, working with security and SaaS vendors, and helping sales teams generate and close pipeline. That gave me a very clear view of how real companies actually buy, ship and operate software in the wild.

Over the past couple of years I’ve taken that experience and gone deep into the engineering side – specialising in AWS, cloud security and DevSecOps. I’ve built dozens of hands-on projects covering VPC networking, three-tier and serverless architectures, CI/CD pipelines, Terraform, IAM hardening, logging/monitoring and security automation. Everything is documented in GitHub with clear READMEs and walkthroughs.

My sweet spot is acting as the bridge between business and security engineering: I understand sales, stakeholders and deadlines, but I can also design, secure and automate the pipelines and cloud environments that teams rely on every day.

What I Work On

Rather than just collecting certificates, I’ve focused on building realistic, end-to-end projects that look like the work you’d expect from a DevSecOps or cloud security engineer.

Here’s how my portfolio breaks down.

1. Networking & VPC Design

Projects: Access S3 from a VPC, Build a Virtual Private Cloud, VPC Endpoints, VPC Peering, VPC Traffic Flow and Security, VPC Monitoring with Flow Logs, Creating a Private Subnet, Launching VPC Resources, Testing VPC Connectivity, Visualise a Relational Database

I design and deploy AWS networks from scratch – VPCs, public/private subnets, route tables, security groups and VPC endpoints – then validate connectivity and visibility with flow logs and monitoring. The focus is on least privilege networking and understanding exactly how traffic moves through the environment.

2. Application & Three-Tier Architectures

Projects: Build a Three-Tier Web App, APIs with Lambda + API Gateway, Fetch Data with AWS Lambda, Website Delivery with CloudFront

These projects simulate real production web apps: front-end, application layer and database, fronted by CloudFront and/or API Gateway. I use them to practise secure architecture decisions – where to place components, how to protect data in transit and at rest, and how CI/CD deploys into each layer.

3. Cloud Security & Threat Detection

Projects: Build a Security Monitoring System, Cloud Security with AWS IAM, Encrypt Data with AWS KMS, Secure Secrets with Secrets Manager, Threat Detection with GuardDuty

Here I focus on identity, encryption and detection. I harden IAM with roles and policies based on least privilege, use KMS for key management, keep application and database secrets in Secrets Manager, and turn on GuardDuty plus logging to catch suspicious behaviour. These labs form the backbone of my Cloud Security Posture Assessment and SOC-style readiness demos.

4. DevOps / DevSecOps & CI/CD

Projects: Build a CI/CD Pipeline with AWS, Connect a GitHub Repo with AWS, Continuous Integration with CodeBuild, Infrastructure as Code with CloudFormation, Create S3 Buckets with Terraform, Deploy a Web App with CodeDeploy, Secure Packages with CodeArtifact, Multi-Cloud Data Transfer with AWS and GCP, Set Up a Web App in the Cloud, Join the 7 Day DevOps Challenge!

This is where I tie everything together. I’ve built pipelines that start from a Git push and run tests, SAST/SCA, secret scanning and IaC checks before deploying infrastructure and applications into AWS using Terraform/CloudFormation. I also integrate package security with CodeArtifact and experiment with multi-cloud data movement. The goal is secure, repeatable delivery from commit to production.

5. Containers & Kubernetes

Projects: Deploy an App with Docker, Deploy an App Across Accounts, Launch a Kubernetes Cluster, Create Kubernetes Deployment, Deploy Backend with Kubernetes, Set Up Kubernetes Deployment

These projects cover containerising applications with Docker and running them on Kubernetes (including Amazon EKS). I use them to understand orchestration, deployment strategies and basic cluster security – and how container workloads fit into wider DevSecOps and cloud security patterns.

6. Databases & Data Layer

Projects: Connect a Web App with Aurora, Get Hands On with AWS Databases!, Load Data into DynamoDB, Query Data with DynamoDB, Visualise a Relational Database

Here I work with both relational and NoSQL services, focusing on secure connectivity, encryption, IAM-based access and performance patterns. These projects support my three-tier and serverless apps and give me a solid grasp of how the data layer behaves and should be protected.

How This Relates to Roles I’m Targeting

All of this is geared towards roles like:

  • DevSecOps Engineer

  • Cloud Security Engineer (AWS)

  • Security-minded DevOps / Platform Engineer

In practice, that means I can:

  • Design and secure AWS architectures (serverless or three-tier)

  • Build CI/CD pipelines (GitHub Actions / AWS CodePipeline) with shift-left security

  • Use Terraform/CloudFormation to manage infrastructure as code

  • Harden IAM, secrets, encryption, logging and monitoring

  • Analyse misconfigurations and produce clear remediation plans and documentation

If you’re reading this as a recruiter or hiring manager and want to see how I work, I’m happy to share short Loom demos of my pipelines, security setups and audits, walking through my thinking step-by-step.