Skip to main content

Technologies I Use

The platforms and tools that help me detect threats, automate security, and protect infrastructure at scale.

Awards & Achievements

SAT: Satellite Program — National Recognition

01

Selected for prestigious satellite technology program led by three Padma Shri laureates: Dr. Y S Rajan, Dr. Mylswamy Annadurai, and Prof. R M Vasagam. Contributed to advanced space technology research and satellite security initiatives.

Google Cloud Innovator (2020-2024)

02

Four-year tenure as Google Cloud Innovator for exceptional technical contributions to GCP security. Published research, delivered conference talks, and mentored the global cloud security community.

NVIDIA Security Excellence Award (2024)

03

Recognized for architecting zero-trust Kubernetes security across NVIDIA's AI infrastructure. Led implementation protecting next-generation GPU computing platforms serving global AI workloads.

Top Security Researcher — Chronicle Security Platform

04

Identified critical detection logic vulnerabilities in Google's Chronicle SIEM. Built detection rules and threat hunting queries used by thousands of enterprise security teams worldwide.

Google Peer Bonus Awards (Multiple)

05

Repeated recognition for exceptional incident response, advanced threat hunting, and critical cross-team security initiatives during high-stakes security events.

International Conference Speaker

06

Black Hat Asia — "AI-Powered Threat Detection in Multi-Cloud Environments". BSides Security Conference — "Zero-Trust Kubernetes: Beyond the Hype". Cloud Security Summit — "Automating Security at Enterprise Scale".

Open Source Security Impact

07

Core contributor to industry-leading security tools: Falco (runtime security), Trivy (vulnerability scanning), Chronicle YARA-L rules. Tools deployed at Fortune 500 companies protecting millions of workloads.

Security Mentorship Leadership

08

Mentored 15+ engineers into cloud security careers through structured programs at Google and NVIDIA. Multiple mentees now lead security teams at major technology companies.

Where I've Worked

Profile
Year
Senior Cloud Security Engineer | Google Partner NVIDIA
Dec 2024 - Present
Sr. Google Cloud Security Engineer | Google
Aug 2022 - Nov 2024
Google Cloud Innovator | Google
Dec 2020 - Nov 2024
Cloud Technical Solutions Engineer, Networking | Google
Feb 2020 - Aug 2022
Technology or credential icon
Technology or credential icon

Degrees & Learning

University of the People

Postgraduate Degree - Cyber Forensics & Counterterrorism

Nov 2025 - Nov 2026 (In Progress)

University of California, Berkeley

Master's Degree - Cyber Forensics & Counterterrorism

Jun 2023 - Jun 2025

Specialized in digital forensics, incident response, and advanced threat analysis. Thesis on AI-powered threat hunting in cloud environments.

Chandigarh University

Bachelor of Engineering - Computer Science

May 2023

Foundation in computer systems, networking, and security fundamentals.

Technology or credential icon
Technology or credential icon
Technology or credential icon

Credentials That Matter

Core Security

CISSP - Certified Information Systems Security Professional

(ISC)²

CEH - Certified Ethical Hacker

EC-Council

OSCP - Offensive Security Certified Professional

Offensive Security

Recommended

Cloud

Professional Cloud Security Engineer

Google Cloud

Professional Cloud Network Engineer

Google Cloud

AWS Certified Security - Specialty

Amazon Web Services

CCSP - Certified Cloud Security Professional

(ISC)²

Recommended

Kubernetes

CKS - Certified Kubernetes Security Specialist

CNCF

Recommended

CKA - Certified Kubernetes Administrator

CNCF

Recommended

SOAR & Incident

SOAR Analyst

Mandiant (Google Cloud)

SOAR Developer

Mandiant (Google Cloud)

GCIH - GIAC Certified Incident Handler

SANS

Recommended

Cisco Cybersecurity Specialist (CCS)

Cisco

Cisco

CCNP - Level 1 & 2

Cisco

Hybrid Mesh Firewall for Data Center Security

Cisco

Enterprise

Identity Governance and Administration

Infosys

Linux and Private Cloud Administration on IBM Power Systems

IBM

Technology or credential icon
Technology or credential icon
Technology or credential icon
Technology or credential icon
Technology or credential icon
Technology or credential icon

Research Papers

01

Network Security Layer Through Biometric

IEEE Conference Proceedings

Proposed novel approach to network security authentication using voice biometric technology. Explored multi-factor authentication systems combining voice recognition with traditional security controls for enhanced identity verification.

02

AI-Driven Behavioral Anomaly Detection in Multi-Cloud Environments

IEEE Cloud Security Conference 2024

Explored machine learning techniques for detecting sophisticated attacks across AWS, GCP, and Azure. Proposed novel correlation methods reducing false positives by 73% in production testing.

03

Zero-Trust Architecture Implementation Patterns for Kubernetes

ACM Conference on Cloud Computing Security 2023

Detailed practical implementation guide for service mesh security, network policies, and identity-based access control. Included case studies from production deployments.

04

Automated Compliance Validation Using Policy-as-Code

Journal of Cloud Security & Governance 2023

Framework for continuous compliance monitoring using OPA and cloud-native tooling. Demonstrated 85% reduction in audit preparation time.

05

Threat Hunting Automation in Chronicle SIEM

Google Cloud Security Research 2022

Techniques for building automated threat hunting workflows using Chronicle's YARA-L detection language and BigQuery analytics.

← Back to Home