Security Engineer | DevSecOps | Cloud Security | Identity & Access Management (IAM)
As a security engineer specializing in DevSecOps, Cloud Security, and Identity & Access Management (IAM), I am dedicated to strengthening enterprise security postures through access control, threat detection, and cloud security governance. My hands-on experience spans securing critical infrastructures, managing privileged access, and implementing zero-trust architecture across multi-cloud environments.
I have a strong foundation in IAM platforms such as CyberArk, Okta, SailPoint, and Microsoft Entra ID (Azure AD)—enhancing organizational security by safeguarding user access, managing entitlements, and preventing unauthorized access. Additionally, my experience with SIEM tools like Splunk allows me to monitor, detect, and respond to security incidents in real-time, ensuring fast and efficient incident response.
With a proven background in Cloud Security, I specialize in Azure and AWS security governance, securing applications, enforcing zero-trust principles, and implementing multi-layered security frameworks. My certifications from industry-recognized vendors, including CompTIA, Microsoft, AWS, and more, validate my technical competence in infrastructure security, vulnerability management, and access governance.
- Identity Access Management (IAM): CyberArk, Okta, SailPoint, Azure Active Directory (Entra ID), Privileged Access Management (PAM)
- Cloud Security: Azure Security, AWS Security, Cloud Governance, Multi-Factor Authentication (MFA), Role-Based Access Control (RBAC)
- DevSecOps: Security Automation, Vulnerability Remediation, Zero-Trust Network Access (ZTNA), Cloud Infrastructure Hardening
- SIEM & Incident Response: Splunk, Incident Detection and Response, Threat Hunting, Security Monitoring
- Compliance & Risk Management: Governance, Risk, and Compliance (GRC), ISO 27001, NIST, HIPAA, PCI DSS, SOC 2, SOX, and GDPR
- Managing Permissions – Configured IAM policies for Linux & Windows environments using chmod, NTFS, and share permissions.
- Remote Access Configuration – Implemented SSH and RDP security best practices across Windows & Kali Linux systems.
- Security Baselines & Compliance – Evaluated system configurations using Microsoft Policy Analyzer to align with security frameworks.
- Performing Reconnaissance – OSINT research using WHOIS, DNS enumeration, and Google Dorking.
- Exploiting Web Applications – Conducted SQL injection, directory traversal, and web shell attacks for vulnerability assessment.
- Social Engineering Simulations – Reverse shell phishing attack demonstration to understand real-world cyber threats.
- Cloud IAM Hardening – Enforced least privilege access, MFA policies, and automated IAM role assignments.
- Docker & Container Security – Managed secure deployments and implemented user access controls within containerized environments.
- Virtualization & Network Security – Configured Hyper-V, private network segmentation, and firewall policies.
- Performing Vulnerability Scans – Used Greenbone Security Assistant (GSA) to identify security flaws.
- Analyzing Malware & Threat Feeds – Reviewed IoCs, threat feeds, and CVE vulnerabilities for proactive security defense.
- System Log Monitoring – Configured centralized Windows Event Forwarding (WEF) for log aggregation and security auditing.
- CompTIA Security+ (2024 - 2027)
- CompTIA A+ (2023 - 2027)
- Google IT Support & Project Management (2024)
- Cloud Computing Security (CISA, 2024)
- Generative AI & Responsible AI (Accenture, 2024)
- Introduction to PowerShell (Microsoft, 2024)
- NDG Linux Unhatched (Cisco Networking Academy, 2024)
- Microsoft Entra ID & IAM Security (2024)
- AWS Security & Cloud Governance (2024)
Securing enterprise infrastructures, minimizing security risks, and optimizing access governance frameworks to protect organizational assets. My mission is to help companies build and maintain a strong cybersecurity posture by implementing cutting-edge IAM solutions, enforcing robust security policies, and reducing the attack surface across cloud and on-premise environments.