About Me

  • Full Name:Harsh Minesh Bhimani
  • Email:harshbhmn5@gmail.com

Experienced Information Security Analyst with hands-on skills in security and compliance. Expert in cloud security, endpoint security, network security, perimeter defense, and identity and access management. Adept in designing, deploying, configuring, and monitoring secure hybrid environments. Proven ability to identify vulnerabilities and gaps in security and recommend and implement solutions to improve overall security posture and comply with regulatory and security requirements. Proficient in conducting security assessments, penetration tests, and security audits. Extensive experience in cloud deployments using AWS, Azure, GCP and other Cloud Infrastructure providers, and security compliance standards such as PCI and ISO.

My Resume

  • Work Experience

  • Cloud Network Security Administrator

    Avetti.com Corporation - 2022 - Present

    Designed, implemented, and managed Kubernetes and Docker-based cloud deployments for high availability, reliability, and scalability.

    Provided technical expertise in operations management, including monitoring, disaster recovery, security compliance/auditing, networking, storage, and build packs.

    Developed and delivered automation scripts using Ansible for continuous improvement of platform functionality, availability, and manageability.

    Conducted research on new technologies and provided technical expertise.

    Reduced infrastructure costs by 30% by designing cloud solutions on AWS, Azure, and GCP.

    Conducted regular security assessments and developed protocols and policies to meet and achieve PCI DSS accreditation in 4 months

    Automated infrastructure deployment using Ansible, reducing deployment time by 40%.

  • Analyst

    Performics India - 2019 - 2021

    Analyzed various analytics tools to observe signs of unauthorized access for Clients.

    Analyzed and resolved mixed content issues on ecommerce and financial focused sites.

    Collaborated with web developers, content creators, and other stakeholders to optimize website content and structure for search engines.

    Recommend high quality content for client websites which drive further traffic and increase adoption of their services

    Service delivery, conducting research, performing technical testing, writing reports and communicating regularly with clients and colleagues.

    Disclosed vulnerabilities to clients on their discovery to enhance site security


  • Education

  • Information Technology Infrastructure

    Post Graduation Certificate
    Conestoga College - 2022 - 2023

    Container Security

    On-prem and Cloud Security

    HA and Load balanced deployment

  • Information Systems Security

    Post Graduation Certificate
    Georgian College - 2021 - 2022

    Setup and configure a Palo Alto Firewall

    Setup and configure custom network using PF sense

    Secure AWS Cloud Setup

    Identify and Exploit OWASP Top 10

    Pentest Vulnerable Active Directory, Windows Machine and Linux Machine

  • Electronics and Telecomm.

    Bachelors Degree
    K.J Somaiya Institute of Engg. & IT - 2015 - 2019

    Cisco Packet Tracer

    Router Configuration

    Port Security

Projects

Compliance and Security Focused LLM

A LLM retrained model focused towards answering security compliance questions and documentation.

Please find a demo on the same below!

Image Classifier using Machine Learning

An Image classifier to identify apparel and provide with high accuracy attributes. The project was built to run 3 different ways i.e. Command Line Interface, Web-Based and an App.

The aim of the project was to create an API based apparel classification service for smaller ecommerce sites which could be expanded to other ecommerce goods.

Publications:

Web-Based Model for Apparel Classification

2nd International Conference on Advances in Science & Technology (ICAST) 2019

Paper Link

Security Features:

  • Air Gapping

Python70%

HTML30%

Secure Private Chat Server

A private chat self hosted on a Raspberry Pi 4.

Security Features:

  • Personal Hardware
  • GridFS to Store Data
  • Secure Sandbox installation
  • No Media Storage on User Device
  • End-to-End Encryption
  • User Connection using VPN

Linux100%

Other Credentials

Hack The Box

Try Hack Me

Cybersecurity Essentials

Introduction To Cybersecurity

AWS Cloud Foundation