18+ years of international experience (Iceland, Norway, Serbia) designing, deploying, and governing secure Azure-based platforms across regulated industries — banking, healthcare, energy, insurance, retail, and defense.

I'm a Microsoft-certified Cloud Security Architect and DevOps Engineer Expert with 18+ years of international experience across Iceland, Norway, and Serbia. I specialize in designing, deploying, and governing secure Azure platforms for regulated industries where failure isn't an option.
My expertise spans Zero Trust security architecture, multi-tenant identity federation, fine-grained RBAC, managed identity patterns, Key Vault CMK lifecycle management, WAF and API gateway security, container security on AKS, and SIEM-driven audit and compliance.
I consistently deliver formal security architecture deliverables — threat models, HLD/LLD, network topology diagrams, data flow diagrams, and security control matrices — aligned with the Azure Well-Architected Framework, NIST CSF, CIS Benchmarks, HIPAA, and ISO 27001.
Beyond technical delivery, I lead cross-functional teams, engage enterprise stakeholders, and provide pre-sales security architecture guidance for large enterprise bids. I'm currently running AetherOps Technologies, my independent consulting practice, and conducting research on AI workload security architecture for multi-tenant platforms.
18 years of hands-on delivery across Iceland, Norway, and Serbia — government PKI to enterprise-scale cloud security architecture.
Cloud security architecture and enterprise integration consulting for international clients. Security architecture reviews using Azure Security Benchmark and CIS Azure Foundations. Designing secure landing zones with integrated Azure Policy, RBAC, and network segmentation. Delivering threat models, security control matrices, HLD/LLD aligned with NIST CSF and Azure Well-Architected Framework. Currently conducting PoC on AI workload security: agent isolation, AKS micro-segmentation, prompt injection detection, PII redaction, and OPA-based policy engines for LLM agent deployments.
Enterprise-scale security for healthcare applications across 2,400+ Azure subscriptions. Implemented Azure WAF policies defending against OWASP Top 10. Designed Ingress-as-a-Service security architecture for consistent AKS controls at scale. Security analysis identifying HIPAA compliance gaps. Security automation scripts with GitHub Actions GHE pipelines. Secure containerisation with Podman including vulnerability scanning and image hardening.
Ahold Delhaize — Secure-by-design architecture per Azure Well-Architected Framework.
Azure API Management (OAuth 2.0, rate limiting, threat protection). CI/CD with Key Vault secrets management — deployment time ↓30%.
RBAC and least privilege — security exposure ↓40%. Security-focused HLD, LLD, threat models.
Willis Towers Watson — Azure Managed Applications with Pulumi IaC security controls.
AKS: network policies, pod security standards, RBAC. Azure Key Vault secrets management. Azure Monitor and Log Analytics for security event tracking.
Erste Bank — AD security assessment and remediation, CIS Benchmark server hardening,
RBAC/MFA/Conditional Access, security logging for regulatory compliance, SCCM patch management.
Vivanco & Telco — Fault-tolerant DRaaS architecture, Azure Backup (BaaS) with encryption controls,
retention policies, risk analysis, comprehensive HLD/LLD documentation.
Maersk Tankers — ADFS to PTA migration, MFA, Conditional Access, secure API auth, threat models/HLD/LLD.
RSA Ireland — Azure CAF, Enterprise-Scale Landing Zones, Azure Policy enforcement, Azure Blueprints (ISO compliance), Azure DevOps YAML pipelines.
COOP Denmark — PKI assessment, certificate management, hybrid integration, server hardening (2012 R2 → 2019).
Fujitsu London — MSSP architecture, security governance for multi-tenant environments.
UPM — Zero Trust: Azure AD, PIM, RBAC, Conditional Access, PAM, Rights Management Services (RMS), HLD/LLD.
DNB Bank — Database encryption, HA DHCP Failover Cluster, AD IAM with RBAC and GPO hardening.
Anglo-American — Azure AD SSO, Application Proxy for secure remote access, PIM governance.
Unilever — AD DS LLD for 5-forest Azure AD integration.
Equinor — Azure SQL encryption, SCCM Technical Lead.
easyJet — Windows Autopilot, M365, ADFS, SCCM, GPO hardening.
Secure infrastructure for Norwegian government. Architected AD with hardening and access controls. PKI design for certificate-based authentication. DirectAccess always-on VPN with device authentication. Hybrid cloud architecture combining on-premises and Azure (IaaS/PaaS/SaaS). PoC: Azure Data Lake, Azure Stream Analytics, Azure SQL Elastic Pools with encryption and RBAC.
Designed PKI for NATO, Petoro, University of Stavanger, and Premier Oil. Secure authentication: DirectAccess, RADIUS, certificate-based. SQL encryption and Failover Clustering for DNB and SpareBank1. High-availability datacentre achieving 4–5 nines uptime. Pre-sales security architecture for enterprise bids, HLD/LLD, and architecture design sessions with C-level stakeholders.
Full-time IT specialist delivering Windows Server and AD administration, Exchange Server maintenance, VPN administration, and pre-sales technical assistance for SMB and enterprise clients across Iceland. Foundations in infrastructure engineering that underpin 18 years of career growth.
Deep expertise across the full Azure security and cloud-native toolchain, with 18 years of delivery from PKI to Zero Trust to AKS.
Architecture, security engineering, and DevSecOps delivery across Fortune 500, banking, healthcare, and government clients.
Enterprise-scale security engineering for a major US healthcare platform. Implemented Azure WAF defending against OWASP Top 10 threats. Designed Ingress-as-a-Service architecture for consistent AKS security controls at subscription scale. Security analysis across 2,400+ subscriptions identifying HIPAA compliance gaps. Security automation integrated into GitHub Actions GHE pipelines. Secure containerisation with Podman: vulnerability scanning and image hardening.
Azure Well-Architected Framework security pillar. Azure API Management (OAuth 2.0, rate limiting, threat protection). CI/CD + Key Vault secrets — deployment time ↓30%. RBAC and least privilege — security exposure ↓40%. HLD, LLD, threat models for REST API integration patterns.
Azure Managed Applications with Pulumi IaC security controls. AKS: network policies, pod security standards, RBAC. Azure Key Vault secrets management. Azure Monitor and Log Analytics for security event tracking and alerting.
Azure Cloud Adoption Framework with enterprise-scale Landing Zones, security baselines, and Azure Policy enforcement. Azure Blueprints with embedded ISO 27001 compliance validation. Azure DevOps YAML pipelines for governed CI/CD.
Migrated ADFS to Pass-Through Authentication (PTA) improving security posture. MFA and Conditional Access policy design. Secure API integrations. Threat model, HLD, and LLD for complete authentication architecture.
Zero Trust architecture using Azure AD, PIM, RBAC, Conditional Access. AD security assessment identifying critical vulnerabilities. Identity governance with PAM. Rights Management Services (RMS) for data protection. HLD/LLD documentation.
PKI solutions for NATO, Petoro, University of Stavanger, and Premier Oil. DirectAccess, RADIUS, certificate-based authentication. SQL encryption and Failover Clustering for DNB and SpareBank1. High-availability datacentre infrastructure: 4–5 nines uptime.
AD security assessment and remediation. CIS Benchmark server hardening. RBAC, MFA, Conditional Access. Security logging for regulatory compliance auditing. SCCM patch management workflows. Full compliance with banking regulatory requirements.
In-depth articles published on LinkedIn, covering cloud security architecture, Azure governance, and enterprise engineering.
Applying all five pillars of the Azure Well-Architected Framework in real-world enterprise scenarios — from security to cost optimization.
Step-by-step guide to deploying Enterprise-Scale Landing Zones with security baselines, Azure Policy governance, and network topology design.
Practical Zero Trust on Azure: identity, network segmentation, Conditional Access, PIM, and audit logging across regulated environments.
Production-grade Kubernetes deployments: pod security standards, network policies, image scanning, and GitOps-driven delivery.
API gateway security patterns: OAuth 2.0, rate limiting, threat protection, CSRF defence, and input validation across microservices architectures.
Ongoing research: agent isolation, AKS micro-segmentation, prompt injection detection, PII redaction, and OPA policy engines for LLM deployments.
More publications available on LinkedIn Articles →
Available for senior contractor roles in cloud security architecture, Azure DevOps engineering, and enterprise security consulting. B2B · Remote · CET.
Get in touch
bojandjokic74@hotmail.comAZ-305 Expert · AZ-400 Expert · 18 years of international delivery across 20+ enterprise clients.