Skip to main content

Blog

Writing

Technical notes, lab writeups, and lessons from work across DevOps, cloud infrastructure, and cybersecurity.

Latest Post
4 min read

What a Network Intrusion Actually Looks Like in Security Onion

The alert fired. Here is what came next — a walkthrough of the investigative process behind a ransomware intrusion investigation in Security Onion, from IDS alert triage through log correlation to a coherent incident timeline.

CybersecuritySOCSecurity OnionIncident Response
Read Post
4 min read

The Ansible Play That Catches What Deployment Misses

Three Ansible plays. The third makes no changes — it just asserts the deployment worked. Here's what it caught, and why automated verification is not optional.

AnsibleDevOpsIaC
3 min read

The Dependency You Forgot You Had

France is migrating 2.5 million government workstations to Linux. I migrated one Python app. The OS switch was the easy part.

linuxubuntupython
5 min read

Ansible Idempotency in Practice

Run it again. If anything changed, you have a problem. What idempotency actually means when you apply a playbook to a live system — and the specific places it breaks without warning.

AnsibleDevOpsinfrastructure
4 min read

How I Rebuilt My Technical Career — In Public, With Evidence

19 years in IT. Redundancy. A choice: retrain quietly, or build everything in the open and let the work speak. This is what building in public actually looks like — and why a portfolio beats a CV every time.

career transitionbuilding in publicDevOps
3 min read

"No Errors" Is Not the Same as "It Works"

A deployment succeeded. The pipeline went green. The app returned 403. This is the story of two projects, one hard lesson, and why verification is a distinct step from deployment — and where production incidents actually live.

AnsibleDevOpsCI/CD
9 min read

Secure the Ground Before You Build the Pipeline — Linux Hardening for DevOps Engineers

Most DevOps engineers spend serious effort on CI/CD security controls and almost none on the Linux hosts those pipelines run on. If the ground is soft, the pipeline controls do not hold. Here is what host hardening actually looks like — and how it reinforces everything above it.

LinuxhardeningDevSecOps
9 min read

Why DevOps and Security Keep Fighting (And How to Stop It)

The friction between DevOps and security teams is structural, not personal. It comes from misaligned incentives — and the fix is not compromise, it is integration. Here is what shift-left security actually looks like in practice, from someone who has lived on both sides.

DevSecOpsshift-left securityCI/CD
3 min read

What 19 Years in IT Taught Me About Cybersecurity, Cloud, and DevOps

After 19 years in enterprise IT — the last decade owning cybersecurity posture, cloud transformation, and IT governance for a regulated financial services organisation — here is what actually transfers, and why the combination is rare.

careersystems-thinkinginfrastructure
5 min read

AWS Three-Tier Architecture — The Design Decisions That Matter

Beyond the diagram: the specific design decisions behind a production-grade AWS three-tier deployment — why internal ALBs, why private subnets for RDS, and what actually validates that your architecture is secure.

AWSCloudArchitecture
3 min read

Setting Up Security Onion — What I Learned

A practical walkthrough of deploying Security Onion as a SIEM and IDS platform for the first time — what worked, what didn't, and what every SOC analyst candidate should understand before sitting in front of it.

CybersecuritySOCSecurity Onion
Blog | Sonny Enchill