I build and document real-world labs focused on Linux hardening, Ansible automation, and secure remote access.
Each repository demonstrates infrastructure control, privileged access enforcement, and automation precision β aligned with remote-ready DevSecOps roles.
- π§± Linux Infrastructure Hardening
- π€ Ansible Automation & GitHub Ops
- π SSH, Firewalls, VPNs (Tailscale), and Privileged Access Control
- βοΈ Pursuing AWS & CompTIA Security+ Linux+ Certifications
- π§ Documenting hands-on labs to validate technical mastery
Project | Description | Tools |
---|---|---|
ansible-ssh-hardening |
Hardened SSH access using Ansible, fail2ban, and Tailscale VPN | Ansible , SSH , firewalld , Tailscale |
linux-storage-backup-lab |
LVM provisioning, rsync-based backup, and disaster recovery lab | LVM , rsync , bash |
linux-networking-lab |
IP configuration, firewall rules, routing, and SSH service validation | nmcli , firewalld , nmap , sshd_config |
ansible-linux-maintenance |
Automated package updates and system info reporting | Ansible , yum , bash , cron |
- πΌ LinkedIn
- π‘οΈ GitHub Repositories
- π Timezone-flexible: comfortable with EST/PST partial overlap
- βοΈ Async-native: experienced in Git-based delivery and asynchronous workflows
- π΅ Value-aligned compensation: focused on U.S. standards for remote DevSecOps delivery
- π Based in Greater London, UK β remote-native and globally adaptable
βControl is survival. Clarity is the weapon. I don't follow trends β I build systems.β
β Carlos Semeao
I proudly support:
- Jeff Geerling (geerlingguy) β Ansible roles & automation
- Thomas SjΓΆgren (konstruktoid) β Linux hardening and security
- Sebastian Gumprich (rndmh3ro) β DevSecOps and CIS/STIG compliance