About us

Software, cloud & security expertise for critical operations

We bring together deep security experience from defence sector with proven track record scaling technology teams and products in commercial environments.

Our approach

We combine defence-grade security expertise with pragmatic startup and enterprise experience. This unique blend enables us to deliver high-security solutions without sacrificing speed or commercial viability.

Our background

Defence sector experience

Technical R&D leadership in defence industry environments. Experience delivering secure systems under strict requirements for critical infrastructure and sensitive operations. Familiar with classified system requirements and defence procurement processes.

Platform engineering & consolidation

Platform engineering leadership at enterprise SaaS scale. Led cloud consolidation from 3 hyperscalers to 1, reducing costs and complexity. Aligned technology stacks and ways of working across teams post-M&A. Built technical foundations using Architectural Decision Records (ADRs) enabling golden paths and self-service capabilities for development teams.

Enterprise cloud platforms

Built developer-facing cloud platforms at enterprise scale for major video streaming services, enabling fast, secure automated deployments. Experience with video streaming, SaaS, and high-traffic applications.

Startup scaling & M&A

Scaled development teams from 1 to 20+ developers, established security-first cultures, and navigated successful acquisitions. Expert in post-M&A technical integration, aligning teams and technology stacks. Deep understanding of both technical and business perspectives.

GDPR & compliance

Built GDPR-compliant SaaS platforms for legal and HR tech industries. Practical experience with DPA audits, information security policies, and compliance management.

Personal security & operational security

Extensive experience applying OPSEC principles at the individual level—protecting people in high-risk environments rather than just organisations. Deep expertise in digital privacy, anonymisation, online footprint reduction, and personal threat assessment. This background, combined with a trusted network of physical security partners, underpins our personal security advisory for executives, public figures, and high-net-worth individuals.

Certifications & continuous learning

GIAC Defending Advanced Threats (GDAT)
SANS SEC595: Applied Data Science and AI/ML for Cybersecurity
SANS SEC599: Defeating Advanced Adversaries - Purple Team Tactics
SpecterOps Adversary Tactics: Detection
OffSec WEB200: Advanced web application security
AWS Solutions Architect - Associate
AWS Landing Zone Accelerator
Security Engineering & Ethical Hacking education

What makes us different

Defence industry experience meets commercial agility

We bring defence-grade security expertise combined with the speed and pragmatism learned from scaling startups and enterprise platforms. Understand both strict security requirements and business realities.

Post-M&A integration expert

Proven track record consolidating platforms and aligning teams after acquisitions. Led cloud consolidation from 3 hyperscalers to 1, unified technology stacks, and established shared ways of working. We understand the technical and cultural challenges of merging engineering organizations.

Both sides of the table

We've both built companies and evaluated them. This dual perspective is invaluable for technical due diligence, understanding investor needs while respecting founder concerns.

Hands-on technical depth + strategic leadership

We can write production code and architect systems, but also manage senior technical teams and communicate effectively with non-technical stakeholders at board level. Platform engineering leadership experience at enterprise SaaS scale.

Security that enables, not blocks

GIAC GDAT certified with hands-on experience implementing NIST 800-53 rev 5 and CCMv4 frameworks — but focused on making security work for fast-moving organizations without sacrificing protection or compliance.

Operational discretion

We understand that some projects shouldn't be discussed openly. Experience working with classified systems, highly sensitive environments, and providing personal security advisory to high-profile individuals has taught us what operational security means in practice — protecting not just your data, but your strategic intentions and identity. We don't publicise client names without permission, avoid unnecessary details in communications, and know when meetings need to happen in person rather than over digital channels.

Let's discuss your needs

We offer flexible engagement models: project-based, interim leadership, advisory, or retainer-based services.

Get in touch

Choose your preferred contact method

Send email

Standard email to our team

Open email client

Encrypted email

For sensitive communications, use our PGP public key to encrypt your message

Download key file
How to use PGP encryption

PGP (Pretty Good Privacy) encrypts your email so only the intended recipient can read it. This is recommended for sensitive business communications.

  1. Install a PGP-capable email client (Thunderbird with Enigmail, Apple Mail with GPG Suite, or Outlook with Gpg4win)
  2. Import our public key using the download or copy button
  3. Compose your email to info@sharedjourney.se
  4. Select our key for encryption before sending