Development
Secure software engineering with built‑in security controls and sane defaults.
Development • Assessment • Security • Automation
I help teams ship faster without leaving security behind, through practical AppSec consulting, secure architecture, and automation that fits modern developer workflows.
DEVAesia services
Clean deliverables, pragmatic recommendations, and work that fits how your team actually ships.
Secure software engineering with built‑in security controls and sane defaults.
Practical security reviews and vulnerability assessment for web apps and APIs.
Technical analysis and research - turning signals into clear, prioritized actions.
Developer-friendly security awareness and enablement (not fear‑based training).
Security posture insights and monitoring guidance for modern application stacks.
CI/CD automation that catches issues early and keeps releases moving.
Featured projects
A couple of projects that reflect how I like to build: fast, readable, and security-first.
Security scanner built for developers
A privacy-first security analysis platform designed for quick signals and a clean report flow.
Cybersecurity notes for developers
Practical write-ups on security headers, TLS, application security workflows, hardening, and lessons learned from building.
Want the full picture?
Automated tools are great for quick signals. But they can miss auth flows, business logic, and real exploitability. If you want a thorough review, I can help.
Tip: If you already have scan output, share it and I’ll help prioritize what matters.
FAQs
Quick answers about assessments, automation, and how the work is delivered.
Vulnerability assessments, targeted pentests, secure architecture reviews, API testing, and pragmatic hardening guidance. The focus is on validated issues with clear remediation.
I integrate security checks into CI/CD and developer workflows: dependency alerts, config checks, baseline scanning, and guardrails that reduce regressions.
webscan.dev is designed to be quick and easy to explore. Great for initial posture signals (TLS, headers, public files, basic fingerprinting). For deeper testing, pair it with a manual assessment.
Yes. I can build custom checks, internal dashboards, or automation that fits your stack. Especially when off‑the‑shelf tools don’t match your workflow.
Follow the blog at techsplicer.com for write-ups, patterns, and practical guidance.
Yes. The goal is to fit into what you already use (GitHub/GitLab, CI/CD, issue trackers) so the security work is actionable and easy to keep up to date.
Get in touch
Tell me what you’re building, what you’re worried about, and what “done” looks like.
Interested in improving your application security or implementing automated security testing? Let’s discuss what makes sense for your team.