Security by Design,
Not by Afterthought.
With a Minor's Degree in Cybersecurity from IIT Guwahati, security isn't an add-on in my engineering process—it's the foundation. I think like an attacker so I can build like a defender, embedding security into every layer of your system.
From threat modeling at the design phase to continuous security monitoring in production, I ensure your digital assets are protected against evolving threats without compromising user experience or development velocity.
What I Secure
Secure Architecture Design
Security baked into every architectural decision. Zero-trust networking, defense-in-depth strategies, and threat modeling that identifies vulnerabilities before they become breaches.
Application Security
Secure coding practices, OWASP compliance, input validation, authentication systems, and authorization frameworks. Every endpoint hardened, every data flow encrypted.
Cloud Security & Compliance
Secure cloud configurations, IAM policies, encryption at rest and in transit, compliance frameworks (SOC 2, GDPR, HIPAA), and continuous security monitoring across your infrastructure.
Security Audits & Assessment
Comprehensive security reviews of existing systems. Code audits, infrastructure assessments, dependency vulnerability scanning, and actionable remediation roadmaps.
Security Practices
Threat Modeling
Identify attack surfaces and potential threat actors before writing code. STRIDE methodology applied to every system design.
DevSecOps Integration
Security automated into CI/CD pipelines. SAST, DAST, dependency scanning, and container security checks on every deployment.
Incident Response Planning
Prepare for the inevitable. Runbooks, alerting systems, forensic readiness, and recovery procedures that minimize breach impact.
Security Training
Empower your development team with secure coding workshops, code review guidelines, and security awareness training.
Security Stack
Security Tools
Identity & Access
Infrastructure
Monitoring
“Every system I build assumes adversarial conditions. Security isn't a checkbox—it's a mindset embedded in how I think and architect.”
Need to secure your digital infrastructure?
Let's assess your current security posture and build a roadmap that protects your business, your users, and your reputation.
Start a Project