About

About

Who I Am

I’m a security engineer with a passion for building secure, resilient systems. My journey into cybersecurity took an unconventional path - I spent 10 years in technical support solving complex problems for enterprise customers before transitioning to security engineering in 2024.

My Background

2013 - 2018: Enterprise Technical Services, Dell EMC

Role: Senior Analyst Focus: Isilon NAS Systems
Scale: Petabytes of data, thousands of users, enterprise customers
Key Learning: Complex systems fail in complex ways

I supported enterprise-scale storage systems that served petabytes of data to thousands of users. The problems I solved ranged from network protocol issues (SMB, NFS, FTP) to complex file system problems that could bring entire organizations to a halt.

2018 - 2024: CSS, Atlassian India LLP

Role: Senior Support Engineer 3 Focus: Java-based Applications (Bitbucket, Bamboo, Jira Align)
Specialization: Git, JVM Performance, GC, Log Analysis, RCA, Databases
Key Learning: Deep system understanding enables effective troubleshooting

I specialized in Java application performance, Git version control systems, JVM tuning, garbage collection optimization, comprehensive log analysis, root cause analysis, and database troubleshooting. This role taught me how to diagnose complex system issues through methodical analysis and deep technical understanding.

2024 - Present: Security Operations Engineer, Detections & Response, Atlassian India LLP

Transition: 2-year preparation while working full-time
Focus: Cryptography, Network Security, Secure Development
Achievement: Successfully transitioned to Security Operations Engineer at Atlassian

What I Do

I build security systems that work in the real world. My projects range from AI-powered communication tools to cryptographic security implementations. I believe that the best security is invisible to users but impenetrable to attackers.

My technical expertise includes:

Domain Technologies & Skills
Cryptography AES-GCM, HMAC, SHA-256, Key Management
Network Security WebRTC, Peer-to-Peer, Secure Protocols
AI & Machine Learning Local AI Processing, Secure AI Integration
Digital Forensics Email Analysis, Threat Detection, Evidence Collection
Distributed Systems Decentralized Architectures, Fault Tolerance
Secure Development Input Validation, Authentication, Authorization

What Makes Me Different

“I understand how systems actually work in production, not just in theory.”

My background in technical support gives me a unique perspective on security engineering. I’ve seen how security controls fail under real-world conditions, and I know what it takes to implement security that doesn’t just look good on paper but actually works when the system is under stress.

My Approach to Security Problems:

  1. Think like a troubleshooter - Trace problems through complex systems
  2. Identify root causes - Don’t just treat symptoms
  3. Implement practical fixes - Solutions that work in production
  4. Consider human factors - The weakest link is often human behavior

My Approach

I build with security in mind from the ground up. Every system I design incorporates security principles as a fundamental part of the architecture, not as an afterthought. I understand that the weakest link in any security system is often human behavior, so I design systems that are secure by default but also usable.

What I’m Working On

Current Focus: AI + Cybersecurity

I’m exploring the intersection of artificial intelligence and cybersecurity, building systems that demonstrate how AI can enhance security while maintaining privacy and control.

Active Projects:

  • Secure AI Communication Networks - Peer-to-peer AI assistants with end-to-end encryption
  • Intelligent Threat Detection - AI-powered email forensics and analysis
  • Privacy-Preserving AI - Local AI processing for enhanced security
  • Distributed Security Systems - Decentralized architectures for resilience

Beyond the Code

“When I’m not building security systems, I’m thinking about them.”

What I’m Reading: New attack vectors, cryptographic protocols, emerging cybersecurity technologies
What I’m Studying: Zero-trust architectures, quantum-resistant cryptography, federated learning
What I Believe: Staying current in cybersecurity requires continuous learning and experimentation

I’m passionate about understanding not just how security systems work, but how they fail. This drives my continuous exploration of new technologies and attack methods.

Let’s Connect

I’m always interested in discussing new security challenges, collaborating on interesting projects, or exploring opportunities to contribute to innovative security initiatives. If you’re working on something that pushes the boundaries of what’s possible in cybersecurity, I’d love to hear about it.

Whether you’re looking for a security engineer who understands both theory and practice, or you just want to discuss the latest developments in the field, feel free to reach out. I’m particularly interested in opportunities that involve building secure AI systems, implementing zero-trust architectures, or developing new approaches to distributed security.


Get in Touch


“Building things that make me curious — and hopefully help others too.”