{"id":10,"date":"2023-07-15T14:45:21","date_gmt":"2023-07-15T14:45:21","guid":{"rendered":"https:\/\/www.vrkaushik.com\/?page_id=10"},"modified":"2025-12-08T03:38:58","modified_gmt":"2025-12-08T03:38:58","slug":"about-me","status":"publish","type":"page","link":"https:\/\/www.vrkaushik.com\/","title":{"rendered":"># whoami"},"content":{"rendered":"\n<p><em><strong><em><strong>Senior<\/strong><\/em><\/strong><\/em> <em><strong>Software Engineer @Akamai<\/strong><\/em><\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-pullquote\"><blockquote><p>I work as a Senior Software Engineer with a focus on Cloud and Platform Security. I have worked in the domains of Vulnerability Management, Supply Chain Security, Identity and Access Management, Penetration Testing &amp; Forensics. I have also had experience managing my organization&#8217;s Bug Bounty program.<\/p><\/blockquote><\/figure>\n<\/div><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\"><strong>\ud83d\udca1 What I bring to the Table:<\/strong><\/h3>\n\n\n\n<p><strong>\ud83d\udd12 Security Engineering Expertise:<\/strong><\/p>\n\n\n\n<ul>\n<li>Proficient in vulnerability management, penetration testing, and red teaming methodologies.<\/li>\n\n\n\n<li>Skilled in conducting code, architecture, and system design reviews to ensure robust security posture.<\/li>\n\n\n\n<li>Experienced in integrating security best practices into the software development lifecycle.<\/li>\n<\/ul>\n\n\n\n<p><strong>\ud83d\udee0\ufe0f Technical Proficiency:<\/strong><\/p>\n\n\n\n<ul>\n<li> Languages: Python, C, C++, Bash, Java, React, Angular, HTML\/CSS, JavaScript, SQL.<\/li>\n\n\n\n<li>Tools: Trivy, Nessus, BurpSuite, Wireshark, Nmap, OpenSSL, Kali Linux.<\/li>\n\n\n\n<li>Technologies: ELK Stack, Osquery, Github Actions, Linux, Docker, AWS, Terraform, Saltstack.<\/li>\n<\/ul>\n\n\n\n<p><strong>\u2601\ufe0f Cloud Security &amp; Automation :<\/strong><\/p>\n\n\n\n<ul>\n<li> Engineered a Supply Chain security program in using SCA and integrated into CI\/CD pipelines.<\/li>\n\n\n\n<li> Developed automation scripts in Python for seamless integration with API endpoints.<\/li>\n\n\n\n<li> Hands-on experience with AWS services, Docker, and Terraform for infrastructure orchestration<\/li>\n<\/ul>\n\n\n\n<p><strong>\ud83e\udd1d Collaborative Approach:<\/strong><\/p>\n\n\n\n<ul>\n<li> Collaborated with development teams to embed security best practices into the development process.<\/li>\n\n\n\n<li>Triaged vulnerability reports and engaged with external security researchers in Bug Bounty programs.<\/li>\n\n\n\n<li>Led a team in a national-level CTF competition and received a Pre-Placement Offer from Deloitte.<\/li>\n<\/ul>\n\n\n\n<p><strong>\ud83c\udf93 Certifications &amp; Recognition:<\/strong><\/p>\n\n\n\n<ul>\n<li>Certified Ethical Hacker (CEH) and Red Hat Certified System Administrator (RHCSA).<\/li>\n\n\n\n<li>Working towards OSCP(Targeting this year end)<\/li>\n\n\n\n<li>Recognized for leadership capabilities and delivering informative presentations on security topics.<\/li>\n\n\n\n<li>Ready to contribute expertise to Product Security, Offensive Security, or Red Team initiatives, driving proactive security measures and ensuring organizational resilience against cyber threats. \ud83d\ude80<\/li>\n<\/ul>\n\n\n\n<p class=\"has-text-align-center\"><strong>Want to hire me?<\/strong><\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-1 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-text-align-center wp-element-button\" href=\"http:\/\/www.vrkaushik.com\/wp-content\/uploads\/2024\/03\/Resume.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Download CV<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Senior Software Engineer @Akamai I work as a Senior Software Engineer with a focus on Cloud and Platform Security. I have worked in the domains of Vulnerability Management, Supply Chain Security, Identity and Access Management, Penetration Testing &amp; Forensics. I have also had experience managing my organization&#8217;s Bug Bounty program. \ud83d\udca1 What I bring to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/www.vrkaushik.com\/index.php?rest_route=\/wp\/v2\/pages\/10"}],"collection":[{"href":"https:\/\/www.vrkaushik.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.vrkaushik.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.vrkaushik.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.vrkaushik.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=10"}],"version-history":[{"count":34,"href":"https:\/\/www.vrkaushik.com\/index.php?rest_route=\/wp\/v2\/pages\/10\/revisions"}],"predecessor-version":[{"id":154,"href":"https:\/\/www.vrkaushik.com\/index.php?rest_route=\/wp\/v2\/pages\/10\/revisions\/154"}],"wp:attachment":[{"href":"https:\/\/www.vrkaushik.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=10"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}