Cybersecurity ConsultantCloud Security & DevSecOps Strategist
Bridging the gap between technical infrastructure and business risk for Fortune 500 enterprises.
GRC & Cloud Security | DevSecOps | AI Governance | Enterprise Risk Strategy

About
Cybersecurity Consultant at Cummins India, where I advise on enterprise cloud security architecture, GRC frameworks, and DevSecOps transformation. I specialize in translating complex technical risks into actionable business strategies for organizations navigating cloud adoption, regulatory compliance, and emerging AI threats.
Core Practice Areas
- •Governance, Risk & Compliance (GRC): Designing and implementing security governance frameworks, risk assessments, and compliance strategies aligned with ISO 27001, NIST, and industry regulations.
- •Cloud Security Architecture: Securing enterprise cloud infrastructure, IAM policy design, and zero-trust architecture across AWS and multi-cloud environments.
- •DevSecOps Strategy: Embedding security into CI/CD pipelines and development workflows to enable shift-left security at enterprise scale.
- •AI Governance & LLM Security: Developing governance frameworks and security controls for enterprise AI/LLM deployments, addressing data privacy, model integrity, and regulatory risk.
- •Enterprise Risk Strategy: Conducting threat landscape assessments and building risk-informed security programs that align with business objectives.
Featured Projects
Real-world security implementations and learnings from hands-on work
CI/CD Security Integration
Problem
Need to integrate security scanning into development workflows without slowing down deployment cycles.
Approach
Implemented automated security scanning in GitHub Actions workflow with SAST, dependency scanning, and container image scanning.
Tools
Outcome
Reduced security vulnerabilities in production by 60% and enabled shift-left security practices in the development lifecycle.
Business Impact
Enabled shift-left security that reduced production risk and ensured regulatory compliance for enterprise-scale deployments.
Key Learning
Security automation in CI/CD requires balancing thoroughness with speed. Parallel scanning stages and caching strategies are critical.
AI Intake Standard Operating Procedure (SOP)
Problem
Enterprises adopting AI/LLM tools lack standardized governance processes, exposing them to data privacy, compliance, and operational risks.
Approach
Designed and authored a comprehensive AI Intake SOP framework covering risk classification, data handling requirements, vendor assessment criteria, and approval workflows for enterprise AI tool adoption.
Tools
Outcome
Created a repeatable governance framework that enables organizations to evaluate and onboard AI tools with consistent risk controls and audit trails.
Business Impact
Reduced unvetted AI tool proliferation and established a scalable governance process that aligns AI adoption with enterprise risk appetite and regulatory requirements.
Key Learning
Effective AI governance requires balancing innovation velocity with risk controls—overly restrictive policies stifle adoption, while lax governance creates unacceptable exposure.
Automated AI Security Scanner
Problem
Manual security assessments of AI/LLM deployments are time-intensive and inconsistent, leaving gaps in coverage across enterprise AI portfolios.
Approach
Built an automated security scanning tool that evaluates AI/LLM applications against common vulnerability patterns including prompt injection, data leakage, model manipulation, and insecure API configurations.
Tools
Outcome
Automated the detection of critical AI security vulnerabilities, enabling continuous assessment across multiple AI deployments with consistent risk scoring.
Business Impact
Enabled proactive risk mitigation for AI deployments, reducing manual assessment overhead and providing leadership with quantifiable risk metrics for informed decision-making.
Key Learning
AI security scanning must evolve with the threat landscape—static rule-based checks are insufficient; adaptive testing frameworks that account for model-specific behaviors are essential.
AWS Cloud Foundations
Problem
Need foundational understanding of AWS cloud services and security best practices for cloud-native deployments.
Approach
Completed AWS Cloud Foundations certification covering core services, security models, and architectural patterns.
Tools
Outcome
Certified knowledge of AWS core services and security best practices, enabling secure cloud architecture design.
Key Learning
Cloud security starts with proper IAM policies and network segmentation. Understanding shared responsibility model is crucial.
Blue Team Security Operations
Problem
Need practical understanding of security operations, incident response, and defensive security strategies.
Approach
Completed comprehensive course on security operations, SIEM usage, threat detection, and incident response procedures.
Tools
Outcome
Developed hands-on skills in threat detection, log analysis, and incident response workflows.
Key Learning
Effective blue team operations require continuous monitoring, proper log aggregation, and well-defined incident response playbooks.
Insights & Research
In-depth analysis on cloud security strategy, GRC frameworks, AI governance, and enterprise risk—informed by real-world consulting engagements.
Zero Trust Reference Architecture for OT Networks
A comprehensive reference architecture for implementing Zero Trust security principles in Operational Technology (OT) environments, addressing the unique challenges of securing industrial control systems while maintaining operational reliability.
Read the Full PaperVideo & Media
beyond root
Cybersecurity deep-dives, technical walkthroughs, and security research breakdowns.
Watch on YouTube →The Nadkarnees
Creative content and perspectives at the intersection of technology and culture.
Watch on YouTube →
Cybersecurity Basics Refresher Series — Part 4: How DNS Works — And Why It’s a Security Risk Too
Published on 7/2/2025

Cybersecurity Basics Refresher Series(Part 3): TLS/SSL Explained — How Secure Communication…
Published on 4/30/2025

IAM Roles vs IAM Policies — Understanding Access Control in AWS
Published on 4/28/2025