Welcome

Hey, I’m Jay Tillu, a Cybersecurity Professional & Content Creator.

Driven by Real-World Experience, I Specialize in making Cloud Security Simple, Effective, and Audit-Ready—because trust isn’t claimed, it’s earned.

Jay Tillu Image

About me

Who I Am. What I Secure. Why It Matters.

Hi, I’m Jay Tillu — Manager – Information Security at Clik.ai. I help businesses protect what matters most: Their Data. I started my career as a developer, but my curiosity about how systems stay secure naturally led me into cybersecurity.

Today, I secure AWS environments using tools like IAM, GuardDuty, and Control Tower, while supporting ISO 27001 and SOC 2 compliance. I’m certified in AWS CCPAzure Fundamentals, and Google Cybersecurity.

Beyond the 9-to-5, I break down complex cybersecurity topics on my YouTube channel and Blogs—making security simple, practical, and accessible for those ready to level up.

jay tillu certifications

My Expertise

I specialize in a range of security disciplines that help organisations strengthen their security and compliance posture.

Cloud Security

ISO 27001

ISO 27701

SOC 2

VAPT

Incident Response

Network Security

Threat Modeling

AWS GuardDuty

AWS Inspector

AWS Shield

AWS Macie

Microsoft Intune

Microsoft Entra

Azure Security Center

Microsoft Sentinel

Work Experience

Translating Code into Compliance and ideas into Secure Systems.

Manager – Information Security
Clik.ai
May 2025 – Present

As an Information Security Specialist at Clikai, I secure AWS cloud environments and support SOC 2 and ISO 27001 compliance using tools like IAM, GuardDuty, and CloudTrail. I also collaborate on security audits, risk assessments, and vulnerability remediation with DevOps and SecOps teams.

Information Security Engineer
Simple2Call
March 2022 – May 2025

At Simple2Call, I was promoted from Software Engineer to Information Security Engineer, where I contributed to ISO 27001 and 27701 implementations, patch management, and threat intelligence. Improved SharePoint security and reduced critical vulnerabilities through team collaboration.

Software Engineer
NovumLogic Technologies
June 2021 – September 2021

At NovumLogic Technologies, I developed cross-platform mobile apps using Flutter, integrated secure Firebase backends, and implemented real-time data management with Cloud Firestore. I also improved app performance, scalability, and security through team collaboration.

My Videos

Cybersecurity concepts, tools, and frameworks explained on my YouTube channel — in a simple, engaging way.

My Blogs

Articles that simplify complex security concepts and help you grow in your cybersecurity journey.

fea9e207 283e 41ed b2fa 74f9992c4dc2

What Are AWS Bastion Hosts and How Do They Work?

A Bastion Host is a secure EC2 instance in a public subnet that acts as a gateway to access private EC2s. It allows you to SSH into your private instances without exposing them to the internet.

93ded3eb 7eaf 482b b257 b630199ac70b

How to Resolve SSH Access Issues on EC2 Instance Connect Even After IP Whitelisting

EC2 Instance Connect failed even after IP whitelisting? That’s because AWS uses its own backend IPs-not yours. Fix it by allowing EC2 Connect IP ranges or use pem SSH.

How to Set Up a Private EC2 Network on AWS with NAT and Secure SSH Access

Set up a secure AWS network with a private EC2, NAT Gateway, and Bastion Host—no public access, just clean architecture and real-world best practices.

Understanding AWS IAM Permission Boundaries

IAM Permission Boundaries in AWS act like a safety fence, limiting what IAM users or roles can ever do — regardless of their assigned permissions. They ensure even powerful policies can’t exceed predefined boundaries, enabling safer delegation of access.

AWS SCPs Explained: The Key to Cloud Security

AWS Service Control Policies (SCPs) act as account-level guardrails that define the maximum permissions within an AWS Organization. They don’t grant access but restrict what IAM users and roles can ever do — ensuring centralized control and security.

How IAM Conditions Improve AWS Security with Detailed Access Permissions

IAM Conditions let you define when, where, and how permissions apply, adding powerful context-based control to your AWS policies. From enforcing MFA to restricting access by IP, they enable secure, least-privilege access.

Simplified Guide to Key Terms in SOC Reports

Understanding terms like CUECs, Carve-Outs, CSOCs, and Bridge Letters helps you navigate SOC reports with confidence. This quick guide breaks them down in plain English.

Understand the Essential Requirements for ISO 27001

A global standard for managing information security risks—this guide breaks down key requirements like risk assessment, access control, and continuity planning in simple terms.

Understanding OWASP Security Principles

OWASP offers global best practices to secure software—like least privilege, input validation, and defense in depth—helping developers build safer, more resilient applications.