┌─────────┐ │ ░░░░░░░ │ │ ░░ ░░ │ │ ░░ ░░ │ ┌─┴─────────┴─┐ │ ┌───────┐ │ │ │ ◉ ◉ │ │ │ │ ▼ │ │ │ │ ═══ │ │ │ └───────┘ │ │ ZERO TRUST │ └─────────────┘
jakub@stedry:~$ whoami

Jakub Stedry

Security & Zero Trust Consultant
Available for engagements

About

Independent security consultant specializing in Zero Trust architecture, identity-centric security, and pragmatic risk reduction. I help organizations move beyond perimeter-based thinking and build resilient, verifiable security postures.

Background in infrastructure security, cloud-native environments, and security architecture for regulated industries. I don't sell fear — I build systems that verify everything and trust nothing.

Services

Zero Trust Architecture

Design and implement ZTA frameworks — identity verification, micro-segmentation, least-privilege access, continuous validation.

Security Architecture Review

Audit existing infrastructure and application security. Identify gaps, map threat models, deliver actionable remediation plans.

Cloud Security

Harden cloud environments across AWS, Azure, GCP. IAM policies, network controls, secrets management, compliance alignment.

Identity & Access Management

SSO, MFA, conditional access, RBAC/ABAC design. Make identity the new perimeter — properly.

Security Strategy & Roadmaps

Translate business objectives into security programs. Prioritize investments, define milestones, build organizational buy-in.

Incident Readiness

Incident response planning, tabletop exercises, detection engineering. Be ready before you need to be.

Approach

Contact

Let's talk about your security challenges.

{
  "email": "jakub@stedry.com",
  "linkedin": "/in/jakubstedry",
  "location": "Czech Republic / Remote"
}