SECUREPATH

Wayne Howlett

API & Cloud Security Engineer • Security Architect

I design and build secure, cloud-connected systems end-to-end — threat modeling, Zero Trust boundaries, secure APIs, IAM, and evidence-driven architecture decisions.

API SecurityCloud SecuritySecurity ArchitectureZero TrustIAM / Least PrivilegeThreat ModelingLogging & SIEMNetwork Segmentation

Architecture Focus

I present work as: architecture decisions → security controls → evidence.

Secure API Design

Auth patterns, scopes/roles, rate limiting, safe errors, and secure headers.

Cloud Trust Boundaries

Identity-first access, environment separation, and cloud-ready security decisions.

Zero Trust & Least Privilege

Verify explicitly, reduce implicit trust, and scope access to only what’s needed.

Observability & IR Readiness

Logging, alerting, and evidence that supports detection, response, and improvement.

Wayne Howlett portrait

Featured Architecture & API/Cloud Security Work

Browse all →

Current and planned builds that highlight secure API patterns, cloud-ready design, and architecture-level thinking.

SecurePath Portfolio (This site)

Current

A security-first portfolio that presents work as architecture case studies — with clear controls and evidence.

  • Architecture: static-first Next.js structure + clean information hierarchy
  • API/Cloud: security-focused pages designed to host demos and cloud-ready patterns
  • Evidence: case-study format (problem → design → controls → results) + diagrams/screenshots (in progress)
View details →

Home Server & SIEM Lab (Portfolio Environment)

In Progress

Hands-on lab environment demonstrating monitoring, logging, detection, and secure network design concepts.

  • Architecture: segmented lab network + telemetry pipeline into monitoring/alerting
  • API/Cloud: demonstrates secure ingestion patterns and operational visibility
  • Evidence: lab notes + screenshots + repeatable build steps (coming to Blog/Security pages)
View details →

API Security Demo Hub

Planned

A set of small demos proving secure API patterns: authentication, rate limiting, headers, logging, and safe failure modes.

  • Architecture: minimal demo APIs + clear trust boundaries + controlled exposure
  • API/Cloud: auth (JWT/OAuth concepts), rate limiting, input validation, secure errors, security headers
  • Evidence: request/response examples + screenshots + short writeups for each control
View details →

TrackTide Health (Concept Product)

Planned

Privacy-forward health tracking concept emphasizing secure data flows, consent boundaries, and integration planning.

  • Architecture: data separation + trust boundaries for sensitive information
  • API/Cloud: secure data handling patterns, audit-friendly logging concepts, least-privilege access model
  • Evidence: threat model + data-flow diagram + security decisions write-up (planned)
View details →

Past Projects

Earlier builds that show strong engineering fundamentals and product thinking.

Driver Chat System

Past

Real-time chat concept for fleet drivers/dispatchers showing product thinking and secure messaging patterns.

  • Architecture: real-time communication flows + message states
  • API/Cloud: WebSocket concepts + server-side validation patterns
  • Evidence: feature set + UI patterns + technical notes
View details →

Maintenance Board

Past

Dashboard concept for tracking service schedules and reporting insights with a clean UI/UX approach.

  • Architecture: dashboard model + reporting concepts
  • API/Cloud: data integrity + role-based access concepts
  • Evidence: UI build + workflow notes
View details →

Bunny Hop Game

Past

2D platformer demonstrating JavaScript fundamentals: physics loops, interactions, collectibles.

  • Architecture: game loop + state management fundamentals
  • API/Cloud: n/a (focus: core engineering fundamentals)
  • Evidence: working build + technical notes
View details →

Possible Next Features

Quick wins that make your API/Cloud security skills visible and measurable.

Live Read-only API Demo

A small endpoint showing auth headers, rate limiting, safe errors, and secure logging.

See plan →

Cloud Architecture Case Study Page

One page with diagrams + threat model + decision log to reinforce “architect” credibility.

See plan →

Evidence Blocks (Screenshots + Notes)

Recruiter-friendly proof from labs: segmentation, scans, logs/alerts, and config highlights.

See plan →

Let’s Connect

Open to roles and collaboration around secure software, APIs, and cloud systems.