I’m a Software Security Engineer focused on securing cloud-native Platforms and Products.
Security isn’t a side quest—it’s part of how we build. I lean on code and IaC as the ground truth, use sensible defaults, and track a few meaningful signals. The aim: make the right thing easy and drift impossible to miss.
I’m a software security engineer who builds security into how cloud-native systems are designed, built, shipped, and run. My bias: security should feel like part of engineering—not a separate lane. I treat application code and IaC as the source of truth, set sane defaults, and measure the few signals that actually show whether we’re safe and compliant. The goal is simple: make the secure path the easy path, and make drift obvious.
Design & Threat Modeling: Map data flows early, call out risks, choose controls that match the feature. Encode decisions in CI/CD (required checks, signatures, policies).
Code security: Keep secrets out of source; run Gitleaks/secret rotation, SAST where it pays off, SCA with license policy; container image scanning; protect against dependency confusion/typosquatting via scoped registries, verified publishers, and pinning.
Delivery & Supply Chain: Reproducible builds, artifact signing/attestations, minimal images, SBOMs, and policy gates on merge and deploy. Clear, repeatable promotion between environments.
IaC & cloud posture: Terraform/Helm as truth, policy-as-code guardrails, drift detection, and CNAPP coverage that turns findings into issues—not dashboards.
Distributed Systems: Service identity and scoped communication (mTLS/mesh), network segmentation, timeouts/backpressure, idempotency, multi-tenant defaults, and observability that traces calls across the platform.
- Languages: C++, Python, Go, Node.js
- Cloud: AWS, Azure, GCP
- Orchestration: Containers & Kubernetes (EKS/AKS/GKE)
- Pipelines & IaC: GitHub Actions, GitLab CI, Terraform, Helm, Ansible
- Data & Messaging: PostgreSQL, Redis, MongoDB, Kafka
- Observability: Prometheus, Grafana, OpenTelemetry
- Security (practical): secrets management, image signing & SBOMs, policy-as-code in CI, least-privilege by default
- Systems: Linux, eBPF, debugging in prod
Based in India (IST, UTC+5:30). Open to roles focused on secure SDLC and cloud-native platforms.
- Musings on Antifragile
- Gödel, Escher, Bach — A Timeless Meditation on Minds, Patterns, and the Infinite
- IPO-Ready Security for Distributed Systems: A Friendly, Thorough Guide
- Crypto-Shredding in Practice: Field-Level Encryption with Vault Transit at Scale
- Designing Security into Distributed Systems: A Friendly, Thorough Guide