Welcome
Hey, I’m Jay Tillu, a Cybersecurity Professional & Content Creator.
Driven by Real-World Experience, I Specialize in making Cloud Security Simple, Effective, and Audit-Ready—because trust isn’t claimed, it’s earned.

About me
Who I Am. What I Secure. Why It Matters.
Hi, I’m Jay Tillu — Manager – Information Security at Clik.ai. I help businesses protect what matters most: Their Data. I started my career as a developer, but my curiosity about how systems stay secure naturally led me into cybersecurity.
Today, I secure AWS environments using tools like IAM, GuardDuty, and Control Tower, while supporting ISO 27001 and SOC 2 compliance. I’m certified in AWS CCP, Azure Fundamentals, and Google Cybersecurity.
Beyond the 9-to-5, I break down complex cybersecurity topics on my YouTube channel and Blogs—making security simple, practical, and accessible for those ready to level up.

My Expertise
I specialize in a range of security disciplines that help organisations strengthen their security and compliance posture.
Cloud Security
ISO 27001
ISO 27701
SOC 2
VAPT
Incident Response
Network Security
Threat Modeling
AWS GuardDuty
AWS Inspector
AWS Shield
AWS Macie
Microsoft Intune
Microsoft Entra
Azure Security Center
Microsoft Sentinel
Work Experience
Translating Code into Compliance and ideas into Secure Systems.
Manager – Information Security
Clik.ai
May 2025 – Present
As an Information Security Specialist at Clikai, I secure AWS cloud environments and support SOC 2 and ISO 27001 compliance using tools like IAM, GuardDuty, and CloudTrail. I also collaborate on security audits, risk assessments, and vulnerability remediation with DevOps and SecOps teams.
Information Security Engineer
Simple2Call
March 2022 – May 2025
At Simple2Call, I was promoted from Software Engineer to Information Security Engineer, where I contributed to ISO 27001 and 27701 implementations, patch management, and threat intelligence. Improved SharePoint security and reduced critical vulnerabilities through team collaboration.
Software Engineer
NovumLogic Technologies
June 2021 – September 2021
At NovumLogic Technologies, I developed cross-platform mobile apps using Flutter, integrated secure Firebase backends, and implemented real-time data management with Cloud Firestore. I also improved app performance, scalability, and security through team collaboration.
My Videos
Cybersecurity concepts, tools, and frameworks explained on my YouTube channel — in a simple, engaging way.
My Blogs
Articles that simplify complex security concepts and help you grow in your cybersecurity journey.

What Are AWS Bastion Hosts and How Do They Work?
A Bastion Host is a secure EC2 instance in a public subnet that acts as a gateway to access private EC2s. It allows you to SSH into your private instances without exposing them to the internet.

How to Resolve SSH Access Issues on EC2 Instance Connect Even After IP Whitelisting
EC2 Instance Connect failed even after IP whitelisting? That’s because AWS uses its own backend IPs-not yours. Fix it by allowing EC2 Connect IP ranges or use pem SSH.

How to Set Up a Private EC2 Network on AWS with NAT and Secure SSH Access
Set up a secure AWS network with a private EC2, NAT Gateway, and Bastion Host—no public access, just clean architecture and real-world best practices.

Understanding AWS IAM Permission Boundaries
IAM Permission Boundaries in AWS act like a safety fence, limiting what IAM users or roles can ever do — regardless of their assigned permissions. They ensure even powerful policies can’t exceed predefined boundaries, enabling safer delegation of access.

AWS SCPs Explained: The Key to Cloud Security
AWS Service Control Policies (SCPs) act as account-level guardrails that define the maximum permissions within an AWS Organization. They don’t grant access but restrict what IAM users and roles can ever do — ensuring centralized control and security.

How IAM Conditions Improve AWS Security with Detailed Access Permissions
IAM Conditions let you define when, where, and how permissions apply, adding powerful context-based control to your AWS policies. From enforcing MFA to restricting access by IP, they enable secure, least-privilege access.

Simplified Guide to Key Terms in SOC Reports
Understanding terms like CUECs, Carve-Outs, CSOCs, and Bridge Letters helps you navigate SOC reports with confidence. This quick guide breaks them down in plain English.

Understand the Essential Requirements for ISO 27001
A global standard for managing information security risks—this guide breaks down key requirements like risk assessment, access control, and continuity planning in simple terms.

Understanding OWASP Security Principles
OWASP offers global best practices to secure software—like least privilege, input validation, and defense in depth—helping developers build safer, more resilient applications.