Strategic Defense & Engineering

Description

I am a Security Engineer and Researcher with a proven track record of securing global-scale infrastructure. My focus shifts beyond traditional defense to ‘Secure-by-Design’ engineering—architecting systems that are inherently resilient. I have successfully led initiatives that secured thousands of CI/CD pipelines and built autonomous GenAI agents to reduce manual incident response time by 95%.

 

My approach is defined by automation and scalability. I don’t just manage risk; I engineer it out of the system. I have designed prevention-first strategies that suppressed tens of thousands of false positives, saving over 100,000 engineering hours and allowing teams to focus on critical threats. My expertise spans Cloud Security, Supply Chain Defense, and Adversarial ML, combining practical engineering with the theoretical rigor of my ongoing PhD research.

  

I am currently seeking challenges where I can apply this mix of high-velocity engineering and strategic depth. If you are looking for a partner who can navigate the complexities of AI Security and Governance to deliver measurable, automated risk reduction, I am ready to deliver results.

  • Autonomous GenAI Agents: Built GenAI Agents (using Python, RAG, and MCP) that automated campaign generation, reducing manual incident prep time by 95% and scaling team output by 2.5x.
  • Pipeline Security: Secured over 2,000+ CI/CD pipelines by implementing Kill Chain-based blocking logic to prevent malicious code injection and supply chain attacks.
  • AI-Driven Triage: Engineered a False Positive Analyzer using NLP clustering to automate root-cause analysis, reducing manual alert triage effort by 30-45%.
  • Critical Risk Remediation: Led Security Assurance campaigns to identify and remediate critical Remote Code Execution (RCE) vectors across internal applications and 3rd-party dependencies.
  • Massive Efficiency Savings: Served as Technical Bar Raiser for 106 campaigns, filtering out 214,000+ false positives and saving the organization 107,000 engineering hours.
  • Automated Anomaly Detection: Designed a “Circuit Breaker” mechanism to automatically suspend low-fidelity security campaigns, suppressing 16,000+ non-actionable findings.
  • Secure-by-Design Strategy: Architected a “Prevention-First” methodology enabling developers to resolve risks pre-commit; selected to present this framework at WebDevCon to a global audience.
  • Infrastructure as Code (IaC): Deployed secure-by-default IaC templates that cut average remediation time by 90%, transforming 60-hour operational fire drills into planned efforts taking less than 6 hours.
  • Supply Chain Defense: Executed rapid-response operations for embargoed and emergent threats, effectively blocking supply chain attacks under strict SLAs.
  • Standardization & Onboarding: Codified subjective “Edge Case” criteria into deterministic Security Assessment Agent prompts, reducing new hire onboarding time from 4 weeks to 1 week.
  • Threat Intelligence: Integrated specific threat signals to proactively block emerging attack vectors across the enterprise environment.
  • Developed and implemented advanced correlation rules and use cases in the Next-Gen SIEM, leveraging diverse threat intelligence feeds and data sources for real-time detection and response to complex cyber threats.
  • Collaborated cross-functionally to identify data requirements, built automated categorizations reducing manual effort by 20%, and enhanced global intelligence of 50+ enterprise products.
  • Resolved high-priority technical issues, optimizing data ingestion pipelines, and reducing ingestion time by 8-24 hours, ensuring data integrity and preventing loss.
  • Conducted extensive research on emerging threat intelligence trends, including zero-day attacks, and integrated findings into Securonix’s ATS system development saving client’s 110 manual hours monthly.
  • Constructed and operated a comprehensive threat intelligence system, filtering false positives and delivering detailed reports to stakeholders preventing 40+ critical incidents.
  • Enhanced the Autonomous Threat Sweep system based on customer feedback, introducing new features and capabilities for improved threat intelligence gathering and analysis, while ensuring data accuracy through custom Regex parsers.
  • Spearheaded MISP adoption for threat intelligence sharing and installed a comprehensive attacker database, enabling quick identification of threats and faster response times.
  • Conducted threat modeling exercises, collaborating with development teams to implement security controls and countermeasures against potential attack vectors and vulnerabilities in critical systems for clients from diverse industries.
  • Developed an open-source DevSecOps framework, seamlessly integrating security practices into the CI/CD pipeline for automated security testing, including the detection of vulnerabilities, misconfigurations, and anomalies.
  • Implemented robust hardening measures across the entire CI/CD pipeline, complying with industry-leading frameworks (NIST, MITRE, OWASP, CIS), and reducing critical vulnerabilities by 40%.
  • Designed and built custom security tools and automation scripts, streamlining security testing, threat detection, and remediation within the CI/CD workflow, improving overall efficiency by 25%.
  • Engineered customized penetration testing tools aligned with the MITRE ATT&CK framework, OWASP Top 10, and SANS Top 20, improving the comprehensiveness and accuracy of security assessments by 35%.
  • Leveraged container security technologies, such as Docker while Conducting rigorous scanning of container images, networks, hosts, and systems, identifying and mitigating 95% of vulnerabilities and misconfigurations.
  • Optimized security tool configurations, resulting in a 50% reduction in false positives. Leveraged powerful log analysis and correlation tools to enhance the accuracy and efficiency of security monitoring within the CI/CD environment.
  • Monitored, analyzed, and responded to global incidents reported through the ticketing queue, collaborating with NetOps, IT, and Engineering teams across 19 countries.
  • Strengthened intrusion detection and endpoint security systems, reducing false positives and enhancing Threat Modeling using solutions like CrowdStrike Falcon, Carbon Black, Darktrace, and Cylance.
  • Led the transition to cloud-based ticketing systems (ServiceNow, Jira Service Desk) for improved scalability and efficiency.
  • Revamped motorized Phishing/SPAM handling, reducing noise by 80% using solutions such as Proofpoint and Mimecast.
  • Automated case generation and handling through ServiceNow and Splunk Phantom.
  • Spearheaded the development of incident response playbooks using SOAR platforms like Phantom and Cortex XSOAR.
  • Brought in machine learning based PhishER platform, to address high volume of potentially malicious email messages, while fine tuning PhishML algorithm case-by-case to prioritize and differentiate malicious mails with least false positives.

During my tenure as a teaching assistant at Northeastern University, I had the privilege of instructing a remarkable cohort of master’s students in the domain of computer networks and security. My responsibilities included designing and delivering customized lectures, labs, and projects that catered to their unique learning needs, fostering a highly interactive and engaging educational milieu for my students. Over the span of the semester, I observed my students evolve and enhance their proficiencies in ways that were truly inspiring. Witnessing their accomplishments and observing the impact of my pedagogy and mentorship on their lives was a profoundly fulfilling experience that I will always treasure. As a teaching assistant, I made it my foremost priority to furnish my students with constructive feedback on a regular basis, aiding them in recognizing areas where they could improve and offering them the necessary support and guidance to unlock their full potential. I am overwhelmingly grateful for the opportunity to have developed my teaching and mentorship abilities at Northeastern University and am eager to continue assisting students in accomplishing their aspirations and maximizing their potential in the years to come.

  • Successfully resolved complex hardware, network, and operating system-related issues, demonstrating an in-depth understanding of advanced troubleshooting techniques.
  • Held the crucial responsibility of being the designated on-call Subject Matter Expert (SME) for Quality Assurance and Average Handling Time, ensuring swift and effective resolution of critical network incidents during after-hours support.
  • Displayed exemplary expertise in crafting comprehensive training manuals, effectively communicating complex cybersecurity concepts to diverse audiences and promoting a culture of continuous learning and upskilling.

Stay In Touch

“Hey there, tech-savvy friend! If you want to be a hero and help us keep our cyber security on point, just drop your email in my on-call list. Don’t worry, I won’t spam you with cat videos or share your info. Thanks for being the Batman to our Gotham City!”