I'm

Sesugh Agena

Cloud Security Analyst, Web Developer, DevOps Engineer, Cloud Network Engineer, Cloud Solutions Architect
Hero Image
Image

Learn About Me

I am a highly motivated and results-driven cloud professional with a strong focus on building, securing, and managing scalable infrastructure on Amazon Web Services (AWS). My portfolio demonstrates my practical expertise in core cloud computing and cybersecurity principles, showcasing my ability to tackle complex, real-world challenges.

What I do

Awesome Quality Services

Cloud Security Analyst

I specialize in protecting cloud infrastructure by identifying and mitigating security risks. I have hands-on experience with incident response, security governance, and implementing robust IAM policies.

Web Development

I build and deploy dynamic websites on secure, scalable cloud platforms. I can handle the entire process, from designing the network architecture to launching the application on an EC2 instance, ensuring it's both functional and protected.

DevOPs Engineer

I focus on automating and streamlining the software delivery lifecycle. I have experience with infrastructure provisioning, access management, and creating efficient workflows to help teams work faster and more reliably

Cloud Network engineer

I design and manage secure network architectures on AWS. I am skilled in creating custom VPCs, configuring network security rules, and building multi-account network topologies to ensure your cloud resources are connected efficiently and safely.

My Resume

Working Experience

June - August, 2025

Cloud Security Analyst

• Incident Response & Risk Management: Analyzed a simulated security incident involving data exfiltration, ransomware, and firewall/IAM tampering. Identified and classified some key risks, including malware attacks and unauthorized access, and defined a post-mitigation residual risk strategy.

• Security Posture & Compliance: Utilized AWS Config to proactively identify and remediate security vulnerabilities. Successfully enforced compliance by fixing non-compliant EC2 instances that lacked key pairs and did not use the secure IMDSv2 protocol.

• IAM & Access Control Hardening: Secured a multi-account AWS environment by designing and implementing fine-grained, role-based access policies via AWS Identity Center. Enforced Multi-Factor Authentication (MFA) for all users to prevent unauthorized access.

June - August, 2025

Web Development

• Cloud-Native Web Deployment: Designed and deployed a functional website on an Amazon EC2 instance. The project involved creating an end-to-end solution from network to application layer.

• Virtual Network Architecture: Constructed a custom Virtual Private Cloud (VPC) to provide a secure and isolated network foundation for the web application, ensuring all components were logically separated and protected.

• Resource Management & Configuration: Launched and configured a web server instance, managing key parameters and security settings to ensure both performance and security.

June - August, 2025

DevOps Engineer

• Multi-Account Governance & Automation: Implemented a foundational AWS Organization structure for a simulated company, creating dedicated accounts for Dev, Staging, and Production. This established a scalable and governed environment for all future projects.

• Centralized Identity Management: Leveraged AWS Identity Center to manage five users across three teams (Admin, DevOps, Developer) and three accounts. Defined and assigned specific permissions using Permission Sets to streamline access and enforce the principle of least privilege.

• Secure & Efficient Workflows: Created a system where team access is centralized but permissions are granular, allowing all users to access all accounts while their role dictates their capabilities, improving both security and operational efficiency.

June - August, 2025

Cloud Network Engineer

• AWS VPC Design & Implementation: Architected a Virtual Private Cloud (VPC) to host a website, including the configuration of subnets, route tables, and security groups to control traffic flow and secure resources.

• Network Security: Implemented firewall rules using Security Groups to protect the web server, ensuring only necessary traffic was allowed to reach the application.

• Multi-Account Network Strategy: Contributed to a multi-account environment by deploying network resources in dedicated accounts (Dev, Staging, Prod), demonstrating an understanding of network segmentation and isolation for security and cost management.