Skip to content
View HackerM0nk's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report HackerM0nk

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
HackerM0nk/README.md
Shivam Vaishampayan banner

Building Secure Cloud-Native Systems

Website · GitHub · LinkedIn · Email

HELLO 👋

I’m a Software Security Engineer focused on securing cloud-native Platforms and Products.

Security isn’t a side quest—it’s part of how we build. I lean on code and IaC as the ground truth, use sensible defaults, and track a few meaningful signals. The aim: make the right thing easy and drift impossible to miss.


What I Do

I’m a software security engineer who builds security into how cloud-native systems are designed, built, shipped, and run. My bias: security should feel like part of engineering—not a separate lane. I treat application code and IaC as the source of truth, set sane defaults, and measure the few signals that actually show whether we’re safe and compliant. The goal is simple: make the secure path the easy path, and make drift obvious.

Design & Threat Modeling: Map data flows early, call out risks, choose controls that match the feature. Encode decisions in CI/CD (required checks, signatures, policies).

Code security: Keep secrets out of source; run Gitleaks/secret rotation, SAST where it pays off, SCA with license policy; container image scanning; protect against dependency confusion/typosquatting via scoped registries, verified publishers, and pinning.

Delivery & Supply Chain: Reproducible builds, artifact signing/attestations, minimal images, SBOMs, and policy gates on merge and deploy. Clear, repeatable promotion between environments.

IaC & cloud posture: Terraform/Helm as truth, policy-as-code guardrails, drift detection, and CNAPP coverage that turns findings into issues—not dashboards.

Distributed Systems: Service identity and scoped communication (mTLS/mesh), network segmentation, timeouts/backpressure, idempotency, multi-tenant defaults, and observability that traces calls across the platform.


Tech Stack

  • Languages: C++, Python, Go, Node.js
  • Cloud: AWS, Azure, GCP
  • Orchestration: Containers & Kubernetes (EKS/AKS/GKE)
  • Pipelines & IaC: GitHub Actions, GitLab CI, Terraform, Helm, Ansible
  • Data & Messaging: PostgreSQL, Redis, MongoDB, Kafka
  • Observability: Prometheus, Grafana, OpenTelemetry
  • Security (practical): secrets management, image signing & SBOMs, policy-as-code in CI, least-privilege by default
  • Systems: Linux, eBPF, debugging in prod

Based in India (IST, UTC+5:30). Open to roles focused on secure SDLC and cloud-native platforms.

Latest posts

GitHub stats

GitHub stats
GitHub streak
Top languages

Contributions (fun)
snake

Pinned Loading

  1. buildkite-secure-cicd-pipeline buildkite-secure-cicd-pipeline Public

    Secure CI/CD pipeline built using Buildkite to deploy GO based microservices

    Go 1

  2. HackerM0nk.github.io HackerM0nk.github.io Public

    Personal Website

    SCSS

  3. RepoAgent RepoAgent Public

    Forked from OpenBMB/RepoAgent

    An LLM-powered repository agent designed to assist developers and teams in generating documentation and understanding repositories quickly.

    Python

  4. Secure-Database-Query-Execution Secure-Database-Query-Execution Public

    Python 1

  5. sds-ebpf sds-ebpf Public

    Leveraging eBPF for observability of Distributed Systems

    Go

  6. localstack-aws-cloud-infra localstack-aws-cloud-infra Public

    Shell