KC

Cloud Security ArchitectCNAPP SpecialistPrincipal Cloud Sales EngineerCloud Native Advocate

Principal Cloud Sales Engineer

An interactive journey through cloud-native
application protection

Meet KC

Hey — I'm KC, a Principal Cloud Sales Engineer at CrowdStrike. I live and breathe cloud security. Over the past decade, I've gone from managing infrastructure in the trenches to leading technical conversations with some of the largest organizations in the world about how to secure their journey from code to cloud.

My job? Translate complex cloud security into stories that click — for engineers, for CISOs, and everyone in between. Whether it's a live demo, a proof of concept, or a whiteboard session, I'm showing teams why unified security changes everything.

10+
Years in Tech
4+
Years at CrowdStrike
8
Promotions

The Journey So Far

Principal Cloud Sales EngineerCurrent

CrowdStrike · Feb 2026Present

Senior Cloud Sales Engineer

CrowdStrike · Feb 2025Feb 2026

Cloud Sales Engineer

CrowdStrike · Apr 2024Feb 2025

Cloud Solution Architect

CrowdStrike · May 2023Apr 2024

Team Lead, Senior Corporate SE

CrowdStrike · Feb 2023May 2023

Senior Corporate Sales Engineer

CrowdStrike · Jul 2022Feb 2023

Team Lead, Corporate Sales Engineering

CrowdStrike · Feb 2022Jul 2022

Corporate Sales Engineer

CrowdStrike · May 2021Feb 2022

Sales Engineer

Executech · Dec 2020Apr 2021

Director of Technical Operations

Executech · May 2019Dec 2020

Team Lead

Executech · May 2018May 2019

IT Consultant

Executech · Jan 2017May 2018

IT Specialist

Micro Assist, LLC · Jan 2016Jan 2017

What I do every day

Let me walk you through the story
I tell customers every day.

From the moment a developer writes code on their machine to the second it's running in production — every step is a potential attack surface. Here's how I break it down.

Code
Pipeline
Infrastructure
Breach
Protection
main.tf

It Starts With Code

Every cloud journey begins with a developer writing code and pushing it to a repository. Infrastructure as code, application code, configuration — it all starts here.

Endpoint SecurityCode Review

Every cloud breach has an origin. A developer's laptop is the first link in the chain. Endpoint security ensures the code is trustworthy before it ever enters a pipeline.

The Pipeline Builds

Code flows through CI/CD pipelines that build Docker images, validate infrastructure as code, and deploy to the cloud. This is where security scanning catches problems before they reach production.

Source
Build
Scan
IaC ScanImage Scan
Test
Deploy
IaC Scanning

Infrastructure as Code

Terraform and CloudFormation templates are scanned for misconfigurations before deployment. Open security groups, unencrypted storage, overly permissive IAM — caught before they ever reach the cloud.

Image Assessment

Container Image Scanning

Docker images are assessed during the build process for known CVEs, malware, embedded secrets, and base image vulnerabilities. Shift-left security at its best.

Infrastructure Deploys

Cloud infrastructure comes alive — EKS clusters spin up pods, EC2 instances process workloads, and data flows through managed services. This is where runtime security becomes critical.

Runtime SecurityK8s MonitoringCSPM

Misconfigurations on EKS clusters, vulnerabilities on EC2 instances, and exposed container images are continuously monitored. Every resource is assessed for risk in real time.

VPC
EKS Cluster
pod-1
pod-2
pod-3
EC2-1
EC2-2
RDS
S3

The Breach

What happens when something slips through? A single vulnerability becomes an entry point for a full cloud compromise.

01

Initial Access

Vulnerable container image deployed to production with unpatched CVE

The attacker identifies a known CVE in a base image that was never scanned during the CI/CD pipeline.

02

Credential Theft

Attacker harvests IAM credentials from EC2 instance metadata service

Using SSRF, the attacker queries the instance metadata endpoint (169.254.169.254) to steal temporary IAM role credentials.

03

Lateral Movement

Pivoting across cloud resources using stolen IAM role permissions

The overly permissive IAM role allows the attacker to enumerate S3 buckets, access other EC2 instances, and assume additional roles.

04

Data Exfiltration

Sensitive data accessed and exfiltrated from S3 buckets and databases

Customer PII and proprietary data is copied to an external bucket. Without CDR, the exfiltration goes undetected for weeks.

Without visibility across the full stack, an attacker can move from a single misconfigured container to full cloud compromise in minutes. Lateral movement using IAM permissions, privilege escalation through role chaining, and data exfiltration from unmonitored resources. This is why point solutions fail.

Why It All Matters

Cloud security isn't one thing — it's securing every stage from code to cloud. A unified platform that connects the dots across the entire application lifecycle.

Code
CI/CD
Cloud
Runtime

Cloud Native Application Protection

From the developer's endpoint to runtime in production, every stage is secured, monitored, and connected — providing complete visibility and stopping threats before they escalate.

Code Security

Endpoint protection for developers, secret scanning, and code review

CI/CD Security

IaC scanning, image assessment, and pipeline integrity

Cloud Security

CSPM, misconfiguration detection, and cloud posture management

Runtime Protection

K8s monitoring, workload protection, and threat detection

Code SecurityCI/CDRuntimeCSPMCIEMCDR

Let's Connect

Interested in cloud security, want to talk CNAPP strategy, or just want to geek out about infrastructure? I'd love to hear from you.

Connect on LinkedIn

Built with Next.js + Framer Motion · Deployed on Vercel

© 2026 KC Kuhns