Security Solutions

Security by Design,

Not by Afterthought.

With a Minor's Degree in Cybersecurity from IIT Guwahati, security isn't an add-on in my engineering process—it's the foundation. I think like an attacker so I can build like a defender, embedding security into every layer of your system.

From threat modeling at the design phase to continuous security monitoring in production, I ensure your digital assets are protected against evolving threats without compromising user experience or development velocity.

Securityisnotafeatureyoushipitisapropertyyoursystemeitherhasordoesn't.Thereisnoin-between.

What I Secure

01

Secure Architecture Design

Security baked into every architectural decision. Zero-trust networking, defense-in-depth strategies, and threat modeling that identifies vulnerabilities before they become breaches.

02

Application Security

Secure coding practices, OWASP compliance, input validation, authentication systems, and authorization frameworks. Every endpoint hardened, every data flow encrypted.

03

Cloud Security & Compliance

Secure cloud configurations, IAM policies, encryption at rest and in transit, compliance frameworks (SOC 2, GDPR, HIPAA), and continuous security monitoring across your infrastructure.

04

Security Audits & Assessment

Comprehensive security reviews of existing systems. Code audits, infrastructure assessments, dependency vulnerability scanning, and actionable remediation roadmaps.

Security Practices

Threat Modeling

Identify attack surfaces and potential threat actors before writing code. STRIDE methodology applied to every system design.

DevSecOps Integration

Security automated into CI/CD pipelines. SAST, DAST, dependency scanning, and container security checks on every deployment.

Incident Response Planning

Prepare for the inevitable. Runbooks, alerting systems, forensic readiness, and recovery procedures that minimize breach impact.

Security Training

Empower your development team with secure coding workshops, code review guidelines, and security awareness training.

Security Stack

Security Tools

OWASP ZAPBurp SuiteSonarQubeSnykTrivy

Identity & Access

OAuth 2.0JWTSAMLKeycloakAWS IAM

Infrastructure

AWS Security HubCloudTrailWAFVPCKMS

Monitoring

SIEMELK StackPrometheusGrafanaPagerDuty

“Every system I build assumes adversarial conditions. Security isn't a checkbox—it's a mindset embedded in how I think and architect.”

— Cybersecurity by conviction

Need to secure your digital infrastructure?

Let's assess your current security posture and build a roadmap that protects your business, your users, and your reputation.

Start a Project