Skip to content
View OueSan's full-sized avatar

Block or report OueSan

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
OueSan/README.md

Lucas Oue

Cloud & Security Engineer Specialized in AWS, Cloud Security, DevOps, and Infrastructure Automation

Cloud and security-focused engineer with hands-on experience designing, securing, and automating cloud-native and network environments. Strong background in AWS infrastructure, DevOps practices, security controls, and offensive security techniques, with a continuous focus on building resilient, scalable, and secure systems.


Professional Focus

  • Cloud Engineering & AWS Architecture
  • DevOps & Site Reliability Engineering (SRE)
  • Infrastructure as Code (Terraform)
  • Kubernetes & Container Security
  • CI/CD, Automation & Security Pipelines
  • Cloud Security Engineering AWS
  • Network Security, Segmentation & Zero Trust
  • Security Automation & Scripting

Certifications & Formal Training

  • AWS Certified Cloud Practitioner
  • AWS Certified Solutions Architect – Associate
  • CCNA – Cisco Certified Network Associate

In Progress

  • LPIC-1 - Linux Certificate
  • Certified Kubernetes Administrator (CKA)
  • HashiCorp Certified: Terraform Associate
  • DESEC Security Certification
  • ITIL 4 – Foundation
  • COBIT 2019 Foundation
  • Certified Cloud Security Professional (CCSP)

GitHub Activity

Lucas's GitHub stats


Professional Links

LinkedIn LeetCode


Open to remote opportunities in Cloud Engineering, DevOps, SRE, and Cloud Security.

Pinned Loading

  1. aws-secure-landing-zone aws-secure-landing-zone Public

    Enterprise-grade AWS multi-account foundation using Organizations, SCPs, centralized logging (CloudTrail + S3), IAM Identity Center, and governance controls. Demonstrates how large companies design…

    HCL

  2. aws-cloud-security-hardening-lab aws-cloud-security-hardening-lab Public

    Attack-to-defense narrative showcasing an AWS environment transformation. Phase 1 exposes real misconfigurations (public S3, over-permissioned IAM, open security groups). Phase 2 applies full harde…

    HCL

  3. aws-threat-detection-ir-pipeline aws-threat-detection-ir-pipeline Public

    Automated incident response pipeline built with GuardDuty, CloudTrail, EventBridge, and Lambda. Detects threats and triggers responses including EC2 isolation, IAM credential revocation, malicious …

    Python

  4. aws-devsecops-secure-pipeline aws-devsecops-secure-pipeline Public

    Secure CI/CD pipeline integrating security at every stage without slowing delivery. Implements Terraform IaC scanning, SAST, secrets detection, policy-as-code enforcement, and least-privilege deplo…

    HCL

  5. aws-cloud-asset-scanner aws-cloud-asset-scanner Public

    Read-only cloud security scanner designed for AWS environments. Detects public S3 buckets, over-permissioned IAM roles, open security groups, and untagged resources. Safe-by-design using IAM permis…

    Python

  6. cracking_LeetCode cracking_LeetCode Public

    Solving All the LeetCode's Problems

    Java