Stephen Alexander

Cloud Security Architect, Technical Innovator & AI Builder

Architecting secure cloud solutions for complex enterprise missions. Creating effective, AI-enhanced tools that make cloud technology more engaging and useful. Transforming technical challenges into practical, scalable implementations that drive mission impact.

Featured Projects

Assay Document Analysis
Assay Document Analysis
An advanced AI-powered platform that transforms complex PDF documents into multiple types of actionable insights, from simple summaries to technical analyses, structured outlines, and smart FAQs.
AI/ML
NLP
RAG
Embeddings
Document Analysis
PDF Processing
Operation: BlackSwan
Operation: BlackSwan
A turn-based network architecture strategy game where you design and deploy critical infrastructure under budget, time, and operational constraints. Balance connection types (Dedicated, Hosted, IP Tunnel, Site-to-Site), manage outages and mid-game events, and optimize throughput while staying within budget. A simulation that blends strategic planning, risk management, and network resilience.
Strategy Game
Network Architecture
Infrastructure Design
Risk Management
Network Resilience
Simulation
Cloud CTF Challenge
Cloud CTF Challenge
A cyberpunk-themed security training platform that gamifies AWS security learning through narrative-driven CTF challenges. Users become cyber operatives protecting AI systems from data poisoning attacks.
Cloud Security
GenAI
CTF
Encryption
Cloud Security Training
Gamification
AWS Service Analogies Generator
AWS Service Analogies Generator
A serverless AI-powered service that generates witty analogies for AWS services, using multiple LLM models including Claude-3 and GPT-4. Makes cloud computing concepts more approachable through creative comparisons.
Serverless
GenAI
LLM Gateway
Claude
GPT-4
Content Generation
Humor

Speaking Engagements

Creating Quorum Based Access Control built on Nitro Enclaves
AWS re:Invent
Las Vegas

Demonstrated innovative security architecture using AWS Nitro Enclaves for enhanced access control mechanisms.

Cloud SecurityZero TrustNitro EnclavesAccess ControlABAC
KMS Asymmetric Encryption Workshop
AWS re:Inforce
Boston

Led hands-on workshop exploring advanced encryption patterns using AWS KMS asymmetric encryption capabilities.

Cloud SecurityEncryptionPrivacyWorkshop
Monitoring AWS Organizations at Enterprise Scale
Splunk .Conf
Las Vegas

Shared strategies for implementing effective monitoring across multi-account AWS environments at enterprise scale.

Cloud SecurityObservabilityEnterprise ScaleSplunk
Enabling 'Authority to Operate' Faster, Cheaper and Better
AWS WWPS DC Summit
Washington DC

Presented approaches to streamline ATO processes while maintaining security and compliance requirements.

Cloud SecurityComplianceGovernanceRisk ManagementATO
CloudTrail Lake Workshop: The Truth is Out There
AWS WWPS DC Summit
Washington DC

Workshop demonstrating advanced log analysis and security investigation techniques using CloudTrail Lake.

Cloud SecurityLoggingObservabilityComplianceInvestigations

Skills & Expertise

Product Management
Product strategy, go-to-market planning, customer discovery and validation, technical product development, and market positioning for enterprise solutions
Infrastructure & Serverless Architecture
Serverless design patterns, AWS services (Lambda, DynamoDB, API Gateway), scalable system design
Cloud Security Architecture
Enterprise security patterns, encryption strategies, IAM/ABAC, observability, GRC frameworks, and zero-trust architectures
AI Solutions Architecture
LLM integration, RAG implementation, prompt engineering, model governance, and performance/cost management