A driven cloud support engineer specializing in DevOps and DevSecOps, Cloud Security and Identity & Access Management (IAM), I'm dedicated to strengthening enterprise security postures through access control, threat detection and cloud security governance. My hands-on experience spans securing critical infrastructures, managing privileged access and implementing zero-trust architecture across multi-cloud environments.
- Identity Access Management (IAM): CyberArk, Okta, SailPoint, Azure Active Directory (Entra ID), Privileged Access Management (PAM)
- Cloud Security: Azure Security, AWS Security, Cloud Governance, Multi-Factor Authentication (MFA), Role-Based Access Control (RBAC)
- DevSecOps: Security Automation, Vulnerability Remediation, Zero-Trust Network Access (ZTNA), Cloud Infrastructure Hardening
- SIEM & Incident Response: Splunk, Incident Detection and Response, Threat Hunting, Security Monitoring
- Compliance & Risk Management: Governance, Risk, and Compliance (GRC), ISO 27001, NIST, HIPAA, PCI DSS, SOC 2, SOX, and GDPR
- Managing Permissions – Configured IAM policies for Linux & Windows environments using chmod, NTFS, and share permissions.
- Remote Access Configuration – Implemented SSH and RDP security best practices across Windows & Kali Linux systems.
- Security Baselines & Compliance – Evaluated system configurations using Microsoft Policy Analyzer to align with security frameworks.
- Performing Reconnaissance – OSINT research using WHOIS, DNS enumeration, and Google Dorking.
- Exploiting Web Applications – Conducted SQL injection, directory traversal, and web shell attacks for vulnerability assessment.
- Social Engineering Simulations – Reverse shell phishing attack demonstration to understand real-world cyber threats.
- Cloud IAM Hardening – Enforced least privilege access, MFA policies, and automated IAM role assignments.
- Docker & Container Security – Managed secure deployments and implemented user access controls within containerized environments.
- Virtualization & Network Security – Configured Hyper-V, private network segmentation, and firewall policies.
- Performing Vulnerability Scans – Used Greenbone Security Assistant (GSA) to identify security flaws.
- Analyzing Malware & Threat Feeds – Reviewed IoCs, threat feeds, and CVE vulnerabilities for proactive security defense.
- System Log Monitoring – Configured centralized Windows Event Forwarding (WEF) for log aggregation and security auditing.
- CompTIA A+ (2024 - 2028)
- CompTIA Network+ (2025 - 2028)
- CompTIA Security+ (2024 - 2027)
My objective is to help companies build and maintain a strong cybersecurity posture by implementing cutting-edge IAM solutions, enforcing robust security policies and reducing the attack surface across cloud and on-premise environments. Securing enterprise infrastructures, minimizing security risks and optimizing access governance frameworks to protect organizational assets. Always open to collaborate.