$ whoami

David
Campman

Senior Infrastructure Security Engineer

10+ years securing cloud & hybrid environments across architecture, IAM, AppSec, and automation.

Rochester, NY
10+ Years
Experience
scroll

Building secure systems at scale.

I'm a Senior Infrastructure Security Engineer with over a decade of hands-on experience hardening cloud and hybrid environments. My work spans cloud security architecture, identity and access management, application security reviews, and security automation across AWS, Azure, and GCP.

My focus: bridging the gap between engineering velocity and security rigor to design platforms that are secure by default, compliant by design, and resilient under pressure.

SOC 2 ISO 27001 PCI DSS NIST 800-53
10+ Years in Security Engineering
3 Cloud Platforms (AWS · Azure · GCP)
4 Compliance Frameworks
Attack Surfaces Reduced

What I do

Cloud Security

Detection engineering and SIEM/SOAR integration across AWS, Azure, and GCP. End-to-end cloud security architecture from landing zone to workload.

  • AWS · Azure · GCP
  • SIEM / SOAR Integration
  • Detection Engineering
  • Security Architecture

IAM & Architecture

Cloud security architecture and identity guardrails. Designing secure-by-default platforms with least-privilege principles baked in from day one.

  • IAM Guardrails
  • Zero Trust Architecture
  • Secure-by-Default Design
  • Policy Enforcement

Compliance

Navigating complex regulatory landscapes. I design controls and evidence workflows that satisfy auditors while minimising engineering overhead.

  • SOC 2 Type II
  • ISO 27001
  • PCI DSS
  • NIST 800-53

AppSec

OWASP-based application security reviews and Burp Suite-driven assessments. Vulnerability triage, remediation guidance, and developer enablement.

  • OWASP Top 10
  • Burp Suite
  • Vulnerability Triage
  • Secure Code Review

Automation

Scripting and automating security workflows so engineers can ship fast without cutting corners. Turning manual toil into reliable, repeatable pipelines.

  • Python
  • PowerShell
  • Bash
  • SQL

Vulnerability Management

End-to-end VM program design: scanning, prioritisation, SLA tracking, and remediation workflow orchestration across hybrid environments.

  • Program Design
  • Risk Prioritisation
  • SLA Workflows
  • Remediation Tracking

Selected work

02

OpenClaw Gateway Hardening & AWS Automation

Technical build log of hardening an OpenClaw gateway on AWS, including auth consistency fixes, safe remote access patterns, and repeatable S3/CloudFront deployment operations.

AWS S3 CloudFront Auth Security
03

AWS Athena WAF Log Optimisation

Reworked log analysis functionality to minimise data scanning, reduce associated expenses, and accelerate security investigation workflows.

AWS Athena WAF Log Analysis Cost Optimisation
04

3D Printing Workshop & Functional Design

Hands-on 3D printing work on a Bambu Lab X1 Carbon, focused on functional parts, fast iteration in Fusion, and reliable print workflows across PLA, PETG, and ABS.

Bambu Lab X1C Fusion 360 CAD Hardware

Latest writing

28 Feb, 2026

OpenClaw Security Hardening for Self-Hosted Environments: An Operator's Checklist

A practical, field-tested checklist for securing self-hosted OpenClaw deployments with clear boundaries, validation steps, and incident-ready controls.

14 Nov, 2025

My Cloud Hardening Checklist Before Exposing Any Service

The exact hardening sequence I run before exposing any service: auth, network scope, IAM, secrets, logging, rollback, and post-exposure validation.

09 Apr, 2024

PETG vs PLA vs ABS for Functional Prints: What Failed in Real Use

What actually held up in my functional print workflow on a Bambu X1 Carbon, and where PLA, PETG, and ABS failed under real usage constraints.

Let's connect

Open to interesting roles, collaborations, and conversations around cloud security, infrastructure hardening, or anything in between.