Cybersecurity & Cloud Securityprofessional building secure, automated, cloud-native systems
Sharing real-world labs, insights, and learnings.
Cloud Security | DevSecOps | AI & LLM Security | Cyber with Atharva

About
I'm a Cyber Security Consultant at Cummins India and a final-year B.Tech student at VIIT, focused on building secure, automated, cloud-native systems. My work spans Cloud Security, DevSecOps, and emerging AI/LLM security challenges.
What I'm focused on now
- •Cloud Security & Identity: Securing cloud infrastructure, IAM policies, and identity management across AWS environments.
- •DevSecOps & Secure CI/CD: Integrating security into development workflows, automated scanning, and secure deployment pipelines.
- •Vulnerability Assessment (VAPT): Identifying and remediating security vulnerabilities in applications and infrastructure.
- •Threat Intelligence & Detection: Building detection capabilities and leveraging threat intelligence for proactive security.
- •AI/LLM Security: Understanding and mitigating practical security risks in AI/LLM deployments and applications.
Featured Projects
Real-world security implementations and learnings from hands-on work
CI/CD Security Integration
Problem
Need to integrate security scanning into development workflows without slowing down deployment cycles.
Approach
Implemented automated security scanning in GitHub Actions workflow with SAST, dependency scanning, and container image scanning.
Tools
Outcome
Reduced security vulnerabilities in production by 60% and enabled shift-left security practices in the development lifecycle.
Key Learning
Security automation in CI/CD requires balancing thoroughness with speed. Parallel scanning stages and caching strategies are critical.
AWS Cloud Foundations
Problem
Need foundational understanding of AWS cloud services and security best practices for cloud-native deployments.
Approach
Completed AWS Cloud Foundations certification covering core services, security models, and architectural patterns.
Tools
Outcome
Certified knowledge of AWS core services and security best practices, enabling secure cloud architecture design.
Key Learning
Cloud security starts with proper IAM policies and network segmentation. Understanding shared responsibility model is crucial.
Blue Team Security Operations
Problem
Need practical understanding of security operations, incident response, and defensive security strategies.
Approach
Completed comprehensive course on security operations, SIEM usage, threat detection, and incident response procedures.
Tools
Outcome
Developed hands-on skills in threat detection, log analysis, and incident response workflows.
Key Learning
Effective blue team operations require continuous monitoring, proper log aggregation, and well-defined incident response playbooks.
Latest Blog Posts
Long-form writeups on Cloud Security, DevSecOps, automation, and AI security—built from hands-on labs and real work.

Cybersecurity Basics Refresher Series — Part 4: How DNS Works — And Why It’s a Security Risk Too
Published on 7/2/2025

Cybersecurity Basics Refresher Series(Part 3): TLS/SSL Explained — How Secure Communication…
Published on 4/30/2025

IAM Roles vs IAM Policies — Understanding Access Control in AWS
Published on 4/28/2025