Security by Design,
Not Afterthought.
With a Minor's in Cybersecurity from IIT Guwahati, security isn't an add-on — it's the foundation. I think like an attacker so I can build like a defender.
What I Secure
End-to-end security coverage.
Secure Architecture Design
Security baked into every architectural decision. Zero-trust networking, defense-in-depth strategies, and threat modeling that identifies vulnerabilities before they become breaches.
Application Security
Secure coding practices, OWASP compliance, input validation, authentication systems, and authorization frameworks. Every endpoint hardened, every data flow encrypted.
Cloud Security & Compliance
Secure cloud configurations, IAM policies, encryption at rest and in transit, compliance frameworks (SOC 2, GDPR, DPDP Act), and continuous security monitoring across your infrastructure.
Security Audits & Assessment
Comprehensive security reviews of existing systems. Code audits, infrastructure assessments, dependency vulnerability scanning, and actionable remediation roadmaps your team can execute.
Protecting Bengaluru's digital businesses.
As Bengaluru's startup ecosystem handles increasingly sensitive data — payments, healthcare, identity — the cost of a breach has never been higher. I build systems that protect what matters.
- India DPDP Act 2023 compliance architecture
- RBI digital payments security guidelines
- ISO 27001 readiness roadmaps
- CERT-In incident reporting compliance
Security Practices
How I embed security throughout.
Threat Modeling
Identify attack surfaces and potential threat actors before writing code. STRIDE methodology applied to every system design.
DevSecOps Integration
Security automated into CI/CD pipelines. SAST, DAST, dependency scanning, and container security on every deployment.
Incident Response Planning
Runbooks, alerting systems, forensic readiness, and recovery procedures that minimize breach impact.
Security Training
Empower your dev team with secure coding workshops, code review guidelines, and security awareness sessions.
Security Stack
Industry-standard security tooling.
Security Tools
Identity & Access
Infrastructure
Monitoring
“Every system I build assumes adversarial conditions. Security isn't a checkbox — it's a mindset embedded in how I think and architect.”
Need to secure your digital infrastructure?
Let's assess your current security posture and build a roadmap that protects your business, your users, and your reputation.