{"id":12,"date":"2023-07-15T15:15:23","date_gmt":"2023-07-15T15:15:23","guid":{"rendered":"https:\/\/www.vrkaushik.com\/?page_id=12"},"modified":"2025-12-08T05:38:07","modified_gmt":"2025-12-08T05:38:07","slug":"work","status":"publish","type":"page","link":"https:\/\/www.vrkaushik.com\/?page_id=12","title":{"rendered":"Experience"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Skills<\/h2>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Platform Security, Software Engineering, Application Security, Vulnerability Management, Cloud Security, Supply Chain Security<\/p>\n<\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\">Akamai Technologies &#8211; Cambridge, MA<\/h2>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Senior Software Engineer<\/p>\n<cite>January 2024 &#8211; Present<\/cite><\/blockquote>\n\n\n\n<ul>\n<li>Conducted manual security design reviews of our present and upcoming features and products.<\/li>\n\n\n\n<li>Enhanced our infrastructure\u2019s security maturity by developing a centralized firewall management tool.<\/li>\n\n\n\n<li>Built and integrated a multi-language SAST (Security analysis) tool into our CI\/CD pipeline.<\/li>\n\n\n\n<li>Automated the setup of SSH-Proxies at scale for secure control plane access.<\/li>\n\n\n\n<li>Created and managed an internal Port Scanner tool to strengthen infrastructure security.<\/li>\n\n\n\n<li>Developed a tool to detect Stale IP Addresses whitelisted to our infrastructure.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Akamai Technologies &#8211; Cambridge, MA<\/h2>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Security Engineer Coop, Vulnerability Management<\/p>\n<cite>January 2023 &#8211; September 2023<\/cite><\/blockquote>\n\n\n\n<ul>\n<li>Engineered and developed a robust Supply Chain security program for the organization using Software composition analysis (SCA) and integrated it into the CI\/CD pipeline.<\/li>\n\n\n\n<li>Identified, managed, and triaged vulnerabilities within the infrastructure using various scanning technologies like SAST, DAST and secret scanning.<\/li>\n\n\n\n<li>Developed and maintained a centralized asset inventory which established visibility into the infrastructure.<\/li>\n\n\n\n<li>Created automation scripts that seamlessly integrate with various API endpoints to protect, monitor, and remediate critical corporate infrastructure.<\/li>\n\n\n\n<li>Triaged Vulnerability reports and collaborated with external security researchers and hackers in our organization\u2019s HackerOne platform.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Northeastern University &#8211; Boston, MA<\/h2>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Graduate Teaching Assistant &#8211; Cloud Security, Cyberspace Technology and Applications<\/p>\n<cite>July 2022 &#8211; December 2022<\/cite><\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\">Deloitte &#8211; Hyderabad, India<\/h2>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Security Analyst, Identity and Access Management<\/p>\n<cite>November 2020 &#8211; December 2021<\/cite><\/blockquote>\n\n\n\n<ul>\n<li>Provisioned and deprovisioned accounts(normal and privileged) on Unix Servers(Linux\u2014AIX\u2014Solaris) using Centrify and eTrust Identity Manager. Implemented Role Based Access for users and service accounts on Unix Servers.<\/li>\n\n\n\n<li>Granted Temporary Root access to users on Unix hosts, using Centrify and eTrust Identity Manager.<\/li>\n\n\n\n<li>Administered a team of 6 as a Point of contact with Senior Managers. Spearheaded various Knowledge Transfer sessions with the team, after understanding the needs of the client.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Cybrary &#8211; Remote<\/h2>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Teaching Assistant<\/p>\n<cite>September 2019 &#8211; October 2020<\/cite><\/blockquote>\n\n\n\n<ul>\n<li>Collaborated with 5 other TAs to prepare Questionnaires for Cybersecurity courses on the Cybrary online platform.<\/li>\n\n\n\n<li>Prepared Course Summaries and reviewed information guides for more than 15 courses.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Pricewaterhouse Coopers &#8211; Bangalore, India<\/h2>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Penetration Tester &#8211; Intern<\/p>\n<cite>May 2019 &#8211; June 2019<\/cite><\/blockquote>\n\n\n\n<ul>\n<li>Detected potential threats and vulnerabilities in client web applications leveraging BurpSuite and helped provide optimal business solutions to help mitigate any risks associated with it.<\/li>\n\n\n\n<li>Developed detailed Audit reports for various levels of threats detected in more than 20 client subdomains.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Fountane LLC &#8211; Hyderabad India<\/h2>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Web Application Developer &#8211; Intern<\/p>\n<cite>May 2018 &#8211; June 2018<\/cite><\/blockquote>\n\n\n\n<ul>\n<li>Analyzed Client requirements and built a technical landscape to suit their needs. Designed, developed and improved existing websites for clients.<\/li>\n\n\n\n<li>Built a chatbot for the company employees using Dialogflow.<\/li>\n\n\n\n<li>Worked as a Student community Manager for the company and organized multiple Technical seminars in college. <\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Skills Platform Security, Software Engineering, Application Security, Vulnerability Management, Cloud Security, Supply Chain Security Akamai Technologies &#8211; Cambridge, MA Senior Software Engineer January 2024 &#8211; Present Akamai Technologies &#8211; Cambridge, MA Security Engineer Coop, Vulnerability Management January 2023 &#8211; September 2023 Northeastern University &#8211; Boston, MA Graduate Teaching Assistant &#8211; Cloud Security, Cyberspace Technology and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/www.vrkaushik.com\/index.php?rest_route=\/wp\/v2\/pages\/12"}],"collection":[{"href":"https:\/\/www.vrkaushik.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.vrkaushik.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.vrkaushik.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.vrkaushik.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=12"}],"version-history":[{"count":16,"href":"https:\/\/www.vrkaushik.com\/index.php?rest_route=\/wp\/v2\/pages\/12\/revisions"}],"predecessor-version":[{"id":187,"href":"https:\/\/www.vrkaushik.com\/index.php?rest_route=\/wp\/v2\/pages\/12\/revisions\/187"}],"wp:attachment":[{"href":"https:\/\/www.vrkaushik.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=12"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}