Veleda Security Logo

Veleda Security

Boutique security engineering for cloud-native teams

We help engineering and security leaders tame noisy tools, design practical guardrails, and get real-time visibility from code to cloud.

We focus on AppSec, SIEM & detection engineering, and cloud security for teams on AWS, Splunk, and modern CI/CD.

Interested in working together? Jump to How we work or Contact.


Who we work with

We work with cloud-native product companies and regulated organizations with 50–2000 engineers, often with small security teams, running primarily on AWS and Splunk. They already have tools like Snyk, GuardDuty, firewalls, and various scanners, but struggle to turn them into consistent engineering practices and reliable detections.

You're in the right place if:


Outcomes we focus on

Our work is measured in outcomes, not tool checklists:


About Us

Veleda Security started from the idea that every organization has unique challenges. We focus on hands-on security engineering: from code-to-cloud security, to real-world threat scenarios, to stakeholder alignment and continuous training.

Our team is distributed, with primary offices in Romania and the US, and we support organizations globally. We've helped clients integrate SAST, SCA, and secrets detection into CI/CD, adopt frameworks such as NIST SSDF and OWASP, and design governance programs that stay relevant over time.


Our Services

AppSec enablement

Integrate SAST/SCA and secrets scanning (e.g. Snyk, Trufflehog) into real pipelines. Tune noise, define guardrails, and coach developers so issues actually get fixed rather than ignored.

SIEM & detection engineering

Modernize Splunk and other SIEMs: tune ingest and parsing, normalize fields, design detections that match your environment, and connect to SOAR or ticketing where it makes sense. Focus on real use cases, not just feeding all logs.

Cloud guardrails on AWS

Translate cloud policies into real IaC checks, SCPs, and posture rules. Align identity, networking, and logging with clear standards and drift detection, so teams know what "good" looks like.

SOC & incident response

Help SOCs use the data they already have. Improve runbooks, triage paths, and incident workflows so signals from AppSec and cloud tools lead to faster, smarter responses instead of alert fatigue.


How we work

We focus on work that fits how your teams actually ship software:

1. Security engineering sprints (4–6 weeks)
Targeted work on specific goals such as SIEM noise reduction, AppSec rollout in CI/CD, or cloud guardrails baseline.

2. Fractional security leadership
Ongoing guidance for AppSec, detection engineering, and cloud security over several months, working with engineering and security leads.

3. Project-based delivery
Well-defined projects such as SIEM migration, AWS logging and guardrails baseline, or AppSec program design.

Example outcome


Contact

If this sounds relevant to your environment, send a short note about your current setup and what you're trying to improve.

We typically work with a small number of clients at a time to stay hands-on and close to the engineering teams.