Hey, I'm Ilya
Cloud Security Engineer | AI Speaker | Digital Transformation Architect_
Where security meets innovation, and technology serves purpose. I architect AI-powered solutions that don't just protect systems—they transform how organizations think about security, automation, and digital evolution.
Through expertise in Microsoft Azure, Docker, Python, AI Security, and cloud infrastructure, I bridge the gap between cutting-edge technology and real-world impact—from enterprise AI gateways to conference stages, from secure automation platforms to social impact initiatives.


+
Years Experience
+
Projects Completed
+
Satisfied Clients
+
Certifications
Key Achievements and
Recognition_
Youth Villages Lived Experience Impact Grant
Secured grant funding for the SUN Pathways AI platform development
CyberCincy Conference Speaker
Featured speaker at Cincinnati's largest AI community conference
Congressional Panelist
Testimony before a special congressional committee that drove bipartisan legislation to address inequities in foster youth communities
Guest Lecturer at Harvard University
Delivered a lecture at the Harvard Kennedy School on the relationship between at-risk communities and access to technology
3 months:
Optifacts Legacy System Modernization2 months:
Privileged Access Management (PAM) Jump Server4 months:
KC Fireflies Secure Meeting Bot3 months:
AI Gateway (Light LLM Proxy)4 months:
Open Web UI (Lux GPT) - Secure Internal AI Platform
Security solutions customized to meet your requirements
Cloud Security & Infrastructure
Securing hybrid and cloud-native environments on Microsoft Azure with containerization, network segmentation, and robust security architectures.
Vulnerability Management & Compliance
Proactive vulnerability scanning, audit remediation, and compliance automation using tools like OpenVAS, NESSUS, and custom automation solutions.
Privileged Access Management
Designing and implementing secure jump servers and PAM solutions with session recording, LDAP integration, and multi-protocol support (SSH, RDP, VNC).
Legacy System Modernization
Modernizing legacy applications with containerization (Docker), API development (FastAPI), and load balancing to enhance reliability without full rewrites.
Security Automation
Automating security processes with Python, Power Automate, SharePoint, and Azure APIs to create centralized asset inventories and compliance dashboards.
AI Security & Ethics
Securing AI applications, implementing ethical AI practices, and providing thought leadership on LLM value systems and utility convergence for secure business solutions.
Excited to take on new projects and collaborate.
Let's chat about your ideas. Reach out!

+13 years of passion for cybersecurity & innovation
Luxottica
Mar 2024 - PresentThe Conrad Group
Sep 2023 - PresentCJR
Jul 2023 - Mar 2024Alfa IT
Jul 2022 - Dec 2023System Administrator
Working with the North American point-of-sale retail team to develop internal digital solutions that bolster cyber security compliance and empower talented teams to achieve more, collaborate better, and modernize systems and processes by using industry leading standards and technologies including but not limited to generative AI, Microsoft Azure and Microsoft PowerApps.
- Architected and developed a containerized failover and load-balancing solution using Docker and Python/FastAPI, eliminating a critical single point of failure and ensuring business continuity for a fragile legacy application
- Spearheaded the adoption of Apache Guacamole as a secure jump server by building a POC that demonstrated web-based privileged access (SSH/RDP), LDAP integration, and session recording, directly meeting critical IT audit requirements
- Initiated and implemented an internal vulnerability management program using OpenVAS/Greenbone to provide on-demand security scanning, reducing reliance on infrequent external scans
- Developed and demoed an automated cloud asset inventory solution using SharePoint, Power Automate, and the Azure Management API to create a centralized source of truth for all cloud resources
- Architected and developed KC Fireflies, a containerized microservice meeting bot solution using TypeScript, Node.js, and Playwright that automates meeting recording across Microsoft Teams, Google Meet, and Zoom, achieving operational costs of $0.30 per 90-minute meeting and integrating seamlessly with Knowledge Central and CIAO Planner for context-rich, traceable action items
- Developed AI Gateway (Light LLM Proxy), a secure internal AI endpoint with vendor-agnostic backend support, custom security guardrails, comprehensive cost tracking, and rate limiting capabilities, enabling cost optimization and enhanced compliance while integrating with Azure infrastructure via MCP for real-time, factually dense AI interactions
- Designed and implemented Open Web UI (Lux GPT), a standalone secure internal AI conversational platform that demonstrates advanced IAM skills through LDAP authentication and user tracking, integrated with the Light LLM proxy for security guardrails and vector solutions, and extended with custom MCP tools (AZ Tools and Guacamole) enabling real-time Azure infrastructure querying and seamless secure access workflows

Education
2021:
Central Connecticut State UniversityBachelor of Science - BS in Cyber/Electronic Operations and Warfare(Attended)
2019:
University of New HavenCyber Security & Networks in Cyber Security(Attended)
Graduated:
Farmington High SchoolHigh School Diploma in Business, Management, Marketing, and Related Support Services
Certifications
Certified:
Prompt Engineering for ChatGPTVanderbilt University
Certified:
Cybersecurity Tools & Cyber AttacksIBM
Certified:
Advanced Concepts in Cloud ArchitectureLinkedIn
Certified:
Building and Auditing a Cyber Security ProgramNational Association of State Boards of Accountancy (NASBA)

My Skills
Cloud & Infrastructure
Security
Development
AI & Automation
Integration
Other
From Blog
Zero Trust Architecture in Cloud Environments: A Practical Implementation Guide
Zero Trust Architecture represents a fundamental shift in cybersecurity philosophy: never trust, always verify. In cloud environments where traditional network perimeters no longer exist, Zero Trust becomes not just a best practice but a necessity. This article provides a practical, actionable guide to implementing Zero Trust principles in cloud infrastructure, covering identity verification, micro-segmentation, continuous monitoring, and least-privilege access. Learn from real-world implementations and discover how to build a security posture that adapts to the dynamic nature of cloud computing.
AI-Powered Threat Detection: Beyond Traditional Security
Traditional cybersecurity approaches rely heavily on known threat signatures and rule-based detection systems. While effective against known threats, these methods struggle with zero-day attacks, advanced persistent threats (APTs), and sophisticated social engineering campaigns. Artificial intelligence and machine learning are transforming threat detection by enabling systems to learn from patterns, detect anomalies, and predict potential attacks before they occur. This article explores the cutting-edge AI technologies reshaping cybersecurity and how organizations can leverage them to build more resilient defense systems.
Building Resilient Systems: Lessons from Production Incidents
Every production incident teaches valuable lessons about system resilience. Whether it's a database failure, a cloud provider outage, or an unexpected traffic spike, these incidents reveal the true strength of our architectures. This article distills key lessons from real production incidents, covering topics like graceful degradation, circuit breakers, redundancy strategies, and incident response. Learn how to build systems that don't just avoid failure, but handle it gracefully when it inevitably occurs.