About
Specializing in Information Security, I focus on the intersection of AI resilience and defensive infrastructure.
I identify structural weaknesses through adversarial assessments and threat modelling, while designing autonomous AI automation workflows to streamline complex security operations and high-performance systems..
Services
Cloud security
Securing cloud infrastructure and workloads across AWS, GCP, and Azure using automated auditing.
- IAM Policy Hardening
- IaC Auditing
- Container & K8s Security
Threat Modelling & Security Architecture
Structured risk analysis — identifying attack surfaces and design weaknesses before they become incidents.
- STRIDE & DREAD threat modelling
- Attack surface mapping & DFD analysis
- Security design reviews & gap analysis
AI & LLM Security
Adversarial assessment of LLMs — testing for safety failures, prompt injection, and systemic vulnerabilities.
- Prompt injection & jailbreak testing
- Robustness & alignment auditing
- OWASP LLM Top 10 assessments
ML-Driven Security Analytics
Leveraging ML to detect threats, model behavior, and surface anomalies across complex data pipelines.
- Behavioural anomaly detection (UEBA)
- Threat intelligence & log correlation
- AI-augmented SIEM & automated triage
Full Stack Web Development
Building responsive, high-performance, and secure web solutions using modern full-stack frameworks.
- Next.js & React Architectures
- Secure API Design & Integration
- Performance Optimization & SEO
AI Agents & Automation
Designing and deploying autonomous AI agents to streamline workflows and automate complex processes.
- Autonomous Workflow Design
- RAG System Optimization
- Multi-agent Orchestration
Project
An automated tool for scanning AWS IAM policies to identify over-privileged roles and simplify the principle of least privilege.
Tech Stack
Monitors S3 bucket permissions in real-time, automatically remediating public access misconfigurations.
Tech Stack
A comprehensive cloud security orchestration platform that integrates IAM auditing, resource scanning, and real-time threat detection across multi-cloud environments.
Tech Stack
