Open to opportunities

Noah Frost

Former Police Constable → DevSecOps Engineer. I bring incident response instincts, compliance experience, and the ability to explain security decisions to people who aren't engineers.

Noah Frost - DevSecOps Engineer

From Incident Response to Infrastructure

18 months as a Police Constable in the Metropolitan Police taught me skills that don't appear on technical assessments: translating complex requirements for non-expert audiences, making decisions under pressure with incomplete information, and working within compliance frameworks where documentation actually matters.

I carried that into DevSecOps through intensive training at Cyber Agoge, led by a Global CISO with experience at KPMG, BAE Systems, and UK Government. Then 8 months of building — using Claude and ChatGPT to accelerate learning, but implementing and testing everything hands-on across 15 production-grade projects.

The combination is unusual: an LLM in Criminal Justice from Northumbria plus AWS, Terraform, and Kubernetes certifications. Security automation plus the instinct to document everything like it might end up in court. Technical depth plus the ability to explain why a deployment is blocked without making enemies.

15
Projects Built
8
Months Learning
3
Certifications
3
Cloud Platforms

Complete Project Archive

15 projects built in 8 months. Each repository includes documentation, architecture decisions, and working code.

Multi-Cloud Infrastructure Orchestration

Unified deployment pipeline provisioning identical web infrastructure across AWS, Azure, and GCP from single GitHub Actions workflow. Terraform with provider-specific state backends, Ansible for OS-adaptive configuration, Datadog for unified monitoring.

Terraform Ansible Datadog
View Code →

AI/ML Governance with Policy-as-Code

Dual-layer policy enforcement: Sentinel blocks non-compliant Terraform plans pre-apply, OPA Gatekeeper rejects ML deployments missing governance labels at Kubernetes admission. EU AI Act compliance built-in.

Sentinel OPA Gatekeeper EKS
View Code →

AI FinOps Platform

Real-time cost observability for AI/ML infrastructure. Kafka 3-broker cluster via Strimzi streams GPU utilisation and API spend events. OpenCost, Prometheus, and Grafana for anomaly detection when traditional billing cycles are too slow.

Kafka Strimzi OpenCost
View Code →

AI/ML Internal Developer Platform

Self-service portal for GPU workloads with cost governance. Backstage templates with budget verification, MLflow for experiment tracking, ArgoCD for GitOps. Hybrid EKS/ECS architecture — Kubernetes for ML tools, Fargate for cost tracking.

Backstage MLflow ArgoCD
View Code →

Portfolio CI/CD Pipeline

This site's infrastructure. GitHub Actions deploys to S3 with CloudFront CDN on every push. Route 53 DNS, ACM SSL certificates, path-based cache invalidation. Terraform manages all AWS resources.

GitHub Actions S3 CloudFront
View Code →

Kubernetes Observability Stack with ELK and Prometheus

Complete logging and metrics on EKS. Fluentd DaemonSet tails container logs to Elasticsearch via Logstash. Prometheus and Grafana for metrics. Environment-specific Terraform sizing — dev vs production configurations.

ELK Stack Prometheus Grafana
View Code →

Serverless E-Commerce Platform

Three-tier serverless architecture. React frontend via CloudFront/S3, single-purpose Lambda functions behind API Gateway, DynamoDB with on-demand capacity. Modular Terraform with explicit dependencies.

Lambda DynamoDB React
View Code →

CI/CD Pipeline Comparison: Jenkins vs GitLab CI

Side-by-side implementation deploying to shared infrastructure. Jenkins on EC2 with declarative pipeline for Flask, GitLab CI with Docker stages for Node.js. SSH-based deployment reflecting common migration patterns.

Jenkins GitLab CI Terraform
View Code →

MCP Kubernetes Health Monitor

Natural language cluster health querying via MCP server. EKS with ArgoCD automated sync, Prometheus/Grafana observability. Full security pipeline: Checkov, Semgrep, Gitleaks, Trivy in GitHub Actions.

MCP EKS ArgoCD
View Code →

MCP-Powered IaC Security Remediation

AI-native infrastructure security connecting Claude Desktop to Checkov results. MCP server with remediation engine for 20+ AWS security checks. GitHub Actions artifacts for audit trail.

MCP Checkov Node.js
View Code →

MCP Security Incident Response System

AI-powered security ops with automated containment. GuardDuty triggers EventBridge → Lambda isolates EC2 via security group swap. MCP server exposes five investigation tools to Claude Desktop. Slack webhooks for alerts.

MCP GuardDuty Lambda
View Code →

GitOps Pipeline with ArgoCD and Full-Stack Observability

Production-style Kubernetes deployment where Git commits flow to running workloads automatically. ArgoCD with automated sync and self-healing. kube-prometheus-stack via Helm for metrics and dashboards.

ArgoCD Prometheus Helm
View Code →

Slack MCP Assistant

MCP server connecting Claude Desktop to Slack for natural language workspace queries. Stdio transport keeps tokens local. User ID enrichment resolves names for readable summaries. Time-based filtering for focused context.

MCP Slack API Node.js
View Code →

End-to-End DevSecOps Pipeline with SIEM Integration

Four-stage security pipeline with Semgrep, Trivy, Gitleaks, Checkov gates. EKS deployment with hardened manifests. GuardDuty and CloudWatch stream via Lambda to Splunk Cloud. Documented security exceptions.

EKS GuardDuty Splunk
View Code →

Healthcare Threat Model: STRIDE Analysis

Comprehensive threat model for HIPAA-compliant platform. 15 prioritised threats across five trust boundaries. STRIDE methodology mapped to MITRE ATT&CK and HIPAA Security Rule. Remediation with working code examples.

STRIDE MITRE ATT&CK HIPAA
View Code →

Tech Stack

Cloud Platforms

AWS Azure GCP

Infrastructure as Code

Terraform CloudFormation Ansible Helm

Containers & Orchestration

Kubernetes Docker Amazon EKS Amazon ECS

CI/CD & GitOps

GitHub Actions GitLab CI Jenkins ArgoCD

Security Tools

Checkov Trivy Semgrep Gitleaks OPA Gatekeeper Sentinel GuardDuty

Observability

Prometheus Grafana Elasticsearch Logstash Kibana Datadog Splunk

Let's Connect

Open to DevOps, Cloud, Platform, and DevSecOps roles. UK-based, open to relocation and remote.