EliTechZđź“§ info@elitechz.com
>

About

EliTechZ. Infrastructure that performs. Security that holds.

I help organizations run platforms that are reliable, secure, automated, and cost‑efficient. From critical legacy estates to cloud‑native delivery, I build systems leadership can trust, engineered with defense‑in‑depth and validated with an attacker mindset. Infrastructure that performs, and security that holds.

Anyone can deploy infrastructure. Few can engineer it to stay secure under real attack.

Be in control. Uptime, cost, and risk are managed with automation, guardrails, and continuous verification.

Why leaders hire me

  • Operational confidence: stability and resilience designed in, not patched on.
  • Security by design: identity, network controls, and hardening built into architecture.
  • Cost discipline: aggressive optimization without sacrificing performance.
  • Speed with guardrails: automation and standards that scale across teams.

How I deliver

  • Assess: architecture, identity, controls, reliability, cost, and delivery flow.
  • Design: target state with secure defaults and measurable outcomes.
  • Implement: build with IaC, CI/CD, and enforceable guardrails.
  • Validate: realistic testing, clear reporting, and retest to prove reduction.
<>

Infrastructure

Cloud & Platform Engineering.

I design and deliver platforms that stay up under pressure: Kubernetes, IaC, CI/CD, secure identity, strong networking, and real observability-across on‑prem, hybrid, and cloud.

Common engagements

Stabilize • Secure • Standardize

Reduce incidents with hardening, identity controls, patch/config hygiene, segmentation, and defense‑in‑depth reviews.

Migrate • Modernize • Replatform

Execute migrations to cloud, between clouds, or back on‑prem (repatriation)-landing zones, networking, identity, security controls, workload refactoring, plus Microsoft 365 / Google Workspace migration programs when the workplace is part of the change.

Microsoft 365 • Google Workspace

Tenant management and hardening: identity, email, device access, security baselines, and migrations between tenants or platforms (Microsoft 365 ↔ Google Workspace).

Upgrade & lifecycle delivery

Planned upgrades and modernization: Windows 11 endpoint programs and Windows Server 2025 refreshes with minimal downtime and maximum control.

Capabilities

The building blocks leaders care about: performance, uptime, security, cost control, and delivery speed.

Cloud architecture (AWS / Azure / GCP)Kubernetes platform engineeringTerraform / Infrastructure as CodeCI/CD & GitHub workflowsHybrid cloud (Nutanix)On‑prem: VMware / vSphere / ESXiIdentity: IAM / AD / Conditional AccessZero Trust principlesEndpoint management (Intune / MDM)Network security & segmentationFirewalls & secure connectivityObservability & incident readinessSRE reliability practicesFinOps cost optimizationMicrosoft 365 / Office 365 administrationGoogle Workspace administrationM365 & Workspace migrations (tenant/platform)Email & identity modernisation

Credentials & recognition

Hall of Fame (Security Disclosure)

Awards

  • Maersk STARS Awards-Dec 2022; Mar 2024; Jul 2025
  • Maersk SPOT Awards-Nov 2022; Apr 2025
  • NASA VDP letters-Mar & Jun 2024

Certifications & training

  • ITIL® Foundation (IT Service Management)
  • PRINCE2® Foundation (Project Management)
  • Microsoft Azure Fundamentals (AZ‑900)
  • Azure Network Security Ninja Training
  • Nutanix Hybrid Cloud Fundamentals (NHCF)
  • AWS Training: Architecting on AWS + Migrating to AWS
  • Microsoft Certified IT Professional (MCITP): Enterprise Desktop Support Technician
<>

Red Team

Offensive Security that drives action.

Realistic testing across web, APIs, cloud, identity, plus mobile apps and binaries-with outcomes leaders can use: validated impact, clear priorities, and remediation your teams can execute.

Where I test (and what you get)

Web • API • Cloud

Adversary paths, data exposure, auth flaws, misconfigurations-then fixes ranked by real business impact.

Identity • IAM • Active Directory

Privilege escalation paths, abuse opportunities, and hardening verification (not just recommendations).

Apps • Binaries • Mobile

Reverse engineering, exploit paths, insecure storage, auth/session flaws, and practical fixes with retest validation.

Proof of work

Public profiles and competitive validation:

  • Bugcrowd - Paulus1337
  • TryHackMe - Paulus1337
  • HackerOne - Paulus1337
  • Competitive validation: Top ~2% globally across major security CTFs (including top 0.88% and top 1.34% solo placements)
  • TryHackMe: Top 1% globally multiple 1st‑place league placements (Bronze–Diamond), backed by hands‑on labs and continuous practice.
  • Responsible disclosure: NASA VDP letters of appreciation.

Deliverables leaders actually use

  • Executive summary: what matters, what it enables, and what it could cost if ignored.
  • Prioritized remediation plan: fix order by impact + exploitability + effort.
  • Technical evidence: steps to reproduce, affected scope, and clear proof of impact.
  • Retest option: validate fixes and show measurable risk reduction.

The goal isn’t noise-it’s decisions, closed gaps, and a stronger baseline that stays strong.

<

Contact

Be in control. Reduce risk. Move faster.

If you’re accountable for uptime, security, cost, or delivery speed-this is for you. I deliver practical, measurable improvements: fewer incidents, lower run‑rate, safer change, and provable risk reduction.

Fastest way to start

Email me with (1) your goal (stability / cost / migration / security testing), (2) your environment (cloud / on‑prem / hybrid / M365 / Workspace), (3) your timeline-and I’ll reply with a clear next step and a tight scope.

When you should call

  • You need a platform that won’t fail under load or during change.
  • You’re migrating and want it secure, controlled, and cost-aware.
  • You want proof your defenses withstand real attacker behavior-and a plan to close gaps.
  • You want one person who can speak to engineering and leadership with equal clarity.

Principle

Anyone can deploy infrastructure. Few can engineer it to stay secure under real attack.

Stay in control. Keep uptime high, costs disciplined, and risk reduced through automation, guardrails, and continuous verification.

Chromium HSTS preloadMozilla HTTP Observatory GradeW3C ValidationUptime Robot ratio (30 days)