Experienced Information Security Analyst with hands-on skills in security and compliance. Expert in cloud security, endpoint security, network security, perimeter defense, and identity and access management. Adept in designing, deploying, configuring, and monitoring secure hybrid environments. Proven ability to identify vulnerabilities and gaps in security and recommend and implement solutions to improve overall security posture and comply with regulatory and security requirements. Proficient in conducting security assessments, penetration tests, and security audits. Extensive experience in cloud deployments using AWS, Azure, GCP and other Cloud Infrastructure providers, and security compliance standards such as PCI and ISO.
Designed, implemented, and managed Kubernetes and Docker-based cloud deployments for high availability, reliability, and scalability.
Provided technical expertise in operations management, including monitoring, disaster recovery, security compliance/auditing, networking, storage, and build packs.
Developed and delivered automation scripts using Ansible for continuous improvement of platform functionality, availability, and manageability.
Conducted research on new technologies and provided technical expertise.
Reduced infrastructure costs by 30% by designing cloud solutions on AWS, Azure, and GCP.
Conducted regular security assessments and developed protocols and policies to meet and achieve PCI DSS accreditation in 4 months
Automated infrastructure deployment using Ansible, reducing deployment time by 40%.
Analyzed various analytics tools to observe signs of unauthorized access for Clients.
Analyzed and resolved mixed content issues on ecommerce and financial focused sites.
Collaborated with web developers, content creators, and other stakeholders to optimize website content and structure for search engines.
Recommend high quality content for client websites which drive further traffic and increase adoption of their services
Service delivery, conducting research, performing technical testing, writing reports and communicating regularly with clients and colleagues.
Disclosed vulnerabilities to clients on their discovery to enhance site security
Container Security
On-prem and Cloud Security
HA and Load balanced deployment
Setup and configure a Palo Alto Firewall
Setup and configure custom network using PF sense
Secure AWS Cloud Setup
Identify and Exploit OWASP Top 10
Pentest Vulnerable Active Directory, Windows Machine and Linux Machine
Cisco Packet Tracer
Router Configuration
Port Security
A LLM retrained model focused towards answering security compliance questions and documentation.
Please find a demo on the same below!
An Image classifier to identify apparel and provide with high accuracy attributes. The project was built to run 3 different ways i.e. Command Line Interface, Web-Based and an App.
The aim of the project was to create an API based apparel classification service for smaller ecommerce sites which could be expanded to other ecommerce goods.
Web-Based Model for Apparel Classification
2nd International Conference on Advances in Science & Technology (ICAST) 2019
Security Features:
A private chat self hosted on a Raspberry Pi 4.
Security Features: