Senior Cloud Architect designing secure, scalable AWS environments for government & enterprise clients across Canada.
I'm Pierre-François Houessou — a Senior Cloud Architect with 10+ years of IT experience specializing in AWS Landing Zone design, multi-account governance, hybrid cloud networking, and Infrastructure as Code.
I've spent the last 5 years architecting compliant AWS platforms for government ministries and regulated-sector clients in Quebec — delivering environments that are secure by default, automated end-to-end, and built to scale.
I hold 8 active AWS certifications including Solutions Architect Professional, DevOps Professional, Advanced Networking Specialty, and Security Specialty. Bilingual French/English. Based in Alberta.
Outside of architecture work, I write about AWS on my blog, mentor cloud practitioners, and fly FPV drones.
Cofomo · MRNF (anonymized) · 2022–2023
Situation
A major Quebec government ministry was beginning its cloud adoption journey with no existing AWS foundation. Dozens of project teams were waiting to migrate workloads but had nowhere to land — no accounts, no networking, no security controls, and no repeatable process for onboarding new teams. Every new account was being set up manually, taking days, and the ministry faced strict Canadian government security requirements (CCCS-Medium / PBMM) that could not be compromised.
Challenge
Design and deliver a compliant, scalable cloud platform from scratch — one that would serve as the secure foundation for 100+ workloads across multiple departments, enforce security by default on every account, and be automated enough that the operations team could run it without deep AWS expertise. An additional technical constraint emerged mid-project: the ministry's on-premises equipment did not support MACsec encryption for Direct Connect, requiring a custom encryption solution to meet government security requirements without delaying the project.
What I Built
Results
Cofomo · Government Client (anonymized) · 2023
Situation
A government client operated a geospatial data processing platform (FME) on-premises, running fixed-capacity infrastructure that could not handle peak workloads without degrading performance for all users. Migrating to AWS was approved, but the platform had a unique constraint: FME licensing is tied to specific engine instances, ruling out standard EC2 Auto Scaling or managed services. Separately, onboarding a new data source client required 3–4 days of manual work by the operations team — a process involving security group updates, IAM permissions, database connection objects, and S3 bucket configurations, all done by hand.
Challenge
Design a cloud architecture that solves the scaling problem within the licensing constraints — without simply running permanently oversized instances and wasting budget. At the same time, design a fully automated self-service onboarding flow that removes the operations team from the critical path for every new client connection.
What I Built
Results
Side project · Amazon Bedrock · 2024
Situation
During large-scale cloud migrations, I repeatedly observed the same pattern: traditional security teams were highly skilled in their domain but struggled to operate effectively in AWS. Security Hub was generating hundreds of findings across dozens of accounts, but the teams reading those findings didn't have the cloud context to triage them quickly. Concepts like "IMDSv1 on EC2 instance i-0abc1234" or "S3 bucket policy allows public access" required translation into traditional security language before anyone could act — adding hours of delay to every incident response cycle.
Challenge
Build a tool that lets traditional security professionals query cloud security posture in the language they already speak — without requiring them to learn AWS-specific concepts first. The tool also needed strict guardrails: in a regulated environment, no automated remediation could execute without explicit human approval, and every interaction had to be auditable.
What I Built
Results
Technical write-up · blogs.houessou.com · July 2024
Situation
One of the most common challenges I encounter on enterprise cloud projects is hybrid network design — specifically, how to connect on-premises infrastructure to AWS in a way that is secure, centrally managed, and operationally maintainable. Most guides cover either the networking primitives or the security controls, but rarely both together as a deployable architecture. I wrote this guide to fill that gap: a complete, production-grade hybrid network reference architecture with working Terraform code.
Challenge
Design and document an architecture that addresses the full set of hybrid networking requirements in one coherent solution: centralized routing across multiple VPCs, perimeter traffic inspection without creating bottlenecks, seamless DNS resolution between cloud and on-premises, and a VPN setup realistic enough to validate BGP routing and failover — all deployable from scratch with Terraform.
Architecture
Key Takeaways
Cofomo · Quebec, QC · Jun 2022 – Present
Independent Projects · Feb 2020 – May 2022
U.S. Department of State · Cotonou, Benin · Oct 2017 – May 2022
UN World Food Programme · Cotonou, Benin · Aug 2014 – Sep 2017