Portfolio Projects

Seven projects that turn "I'm studying cloud security" into "here's the work I've shipped." Each one is doable in a weekend or two of focused effort, costs nothing if you set up your home lab right, and produces an artifact you can hand a hiring manager.

Detailed view of code on a computer screen, showcasing software development
Photo by Markus Winkler on Pexels

ยท ยท Vendor-neutral ยท View source on GitHub

The honest version: A portfolio of three solid public write-ups beats three certifications with no practical work โ€” every cloud security hiring manager we know agrees on this. The projects below are what we'd want to see in a candidate's GitHub or blog. Pick three you find interesting, do them well, publish each one, and link them prominently from your LinkedIn and resume.

All seven are doable on the free tier of one cloud (or entirely locally for some) with the guardrails on the home lab page. Total cost: $0โ€“$15 across all of them if you tear down resources at end of session.

๐Ÿ“– On this page

  1. The 7 projects
  2. Where to publish your write-ups
  3. How to talk about them in interviews
  4. Common mistakes

The 7 projects

Each card links to a step-by-step walkthrough with prerequisites, deliverables, success criteria, and what hiring managers look for in the write-up.

Walk every CloudGoat scenario

The canonical AWS-attack lab. Pick a scenario, exploit it end-to-end, then write up the kill chain and remediation. Repeat for every scenario.

BeginnerAWS~6h per scenario

Build a multi-account AWS Org with SCPs

Terraform a 3-account organization with IAM Identity Center, baseline guardrail SCPs, and centralized CloudTrail. Real production-shape work.

IntermediateAWSIaC~6h

Prowler audit + remediation

Run Prowler against your own account, document every finding, and Terraform the fix for each one. Before/after screenshots are gold.

BeginnerAWSCSPM~4h

Build 5 detections in a lab SIEM

Stand up Wazuh / Elastic / Matano, ship CloudTrail to it, write Sigma rules for 5 MITRE ATT&CK Cloud techniques, validate with Stratus Red Team.

IntermediateDetection~10h

Recreate the Capital One breach in your lab

Build the vulnerable architecture (WAF + SSRF-able service + IMDSv1 + over-privileged role), exploit it, then build the controls and detections that close it.

AdvancedAWSIAM~12h

Contribute to an open-source cloud security tool

Prowler, Cloud Custodian, Pacu, ROADtools, Steampipe, KICS โ€” pick one, fix a "good first issue," ship the PR, write up what you learned.

IntermediateOpen Source~6h

Write a CNAPP comparison

Trial 3 CNAPPs against the same vulnerable account. Compare findings, false-positive rate, remediation guidance, and price-to-value. Honest write-up wins.

IntermediateCNAPP~10h
Two developers working on laptops indoors, discussing code
Photo by olia danilevich on Pexels
An unfinished project shipped publicly beats a finished project nobody can see. โ€” the only portfolio rule that matters

Where to publish your write-ups

The project is half the value; publishing it is the other half. Pick one or two surfaces โ€” don't spread yourself across five.

How to talk about them in interviews

Hiring managers ask "tell me about a project you're proud of." This is the answer. Frame each one as a STAR-style story you can tell in 90 seconds:

The "what surprised me" beat is the one most candidates miss and the one most interviewers grade on. It signals you actually did the work and reflected on it.

Common mistakes

Where next