Cyber Security Consultant @ Cummins India

Cybersecurity & Cloud Securityprofessional building secure, automated, cloud-native systems

Sharing real-world labs, insights, and learnings.

Cloud Security | DevSecOps | AI & LLM Security | Cyber with Atharva

Atharva's profile

About

I'm a Cyber Security Consultant at Cummins India and a final-year B.Tech student at VIIT, focused on building secure, automated, cloud-native systems. My work spans Cloud Security, DevSecOps, and emerging AI/LLM security challenges.

What I'm focused on now

  • Cloud Security & Identity: Securing cloud infrastructure, IAM policies, and identity management across AWS environments.
  • DevSecOps & Secure CI/CD: Integrating security into development workflows, automated scanning, and secure deployment pipelines.
  • Vulnerability Assessment (VAPT): Identifying and remediating security vulnerabilities in applications and infrastructure.
  • Threat Intelligence & Detection: Building detection capabilities and leveraging threat intelligence for proactive security.
  • AI/LLM Security: Understanding and mitigating practical security risks in AI/LLM deployments and applications.

Featured Projects

Real-world security implementations and learnings from hands-on work

Project

CI/CD Security Integration

Problem

Need to integrate security scanning into development workflows without slowing down deployment cycles.

Approach

Implemented automated security scanning in GitHub Actions workflow with SAST, dependency scanning, and container image scanning.

Tools

GitHub Actions
Trivy
Snyk
Docker
AWS

Outcome

Reduced security vulnerabilities in production by 60% and enabled shift-left security practices in the development lifecycle.

Key Learning

Security automation in CI/CD requires balancing thoroughness with speed. Parallel scanning stages and caching strategies are critical.

Certification

AWS Cloud Foundations

Problem

Need foundational understanding of AWS cloud services and security best practices for cloud-native deployments.

Approach

Completed AWS Cloud Foundations certification covering core services, security models, and architectural patterns.

Tools

AWS
IAM
VPC
CloudWatch
S3

Outcome

Certified knowledge of AWS core services and security best practices, enabling secure cloud architecture design.

Key Learning

Cloud security starts with proper IAM policies and network segmentation. Understanding shared responsibility model is crucial.

Experience

Blue Team Security Operations

Problem

Need practical understanding of security operations, incident response, and defensive security strategies.

Approach

Completed comprehensive course on security operations, SIEM usage, threat detection, and incident response procedures.

Tools

SIEM
Threat Intelligence
Incident Response
Log Analysis

Outcome

Developed hands-on skills in threat detection, log analysis, and incident response workflows.

Key Learning

Effective blue team operations require continuous monitoring, proper log aggregation, and well-defined incident response playbooks.

Latest Blog Posts

Long-form writeups on Cloud Security, DevSecOps, automation, and AI security—built from hands-on labs and real work.

Cybersecurity Basics Refresher Series — Part 4: How DNS Works — And Why It’s a Security Risk Too

Cybersecurity Basics Refresher Series — Part 4: How DNS Works — And Why It’s a Security Risk Too

Published on 7/2/2025

🔒Cybersecurity Basics Refresher Series — Part 4: How DNS Works — And Why It’s a Security Risk TooEver Wonder How Websites Know Where to Take You?You ...
Read on Medium
Cybersecurity Basics Refresher Series(Part 3): TLS/SSL Explained — How Secure Communication…

Cybersecurity Basics Refresher Series(Part 3): TLS/SSL Explained — How Secure Communication…

Published on 4/30/2025

🔒Cybersecurity Basics Refresher Series — Part 3: TLS/SSL Explained — How Secure Communication Actually WorksEver wonder what actually happens when yo...
Read on Medium
IAM Roles vs IAM Policies — Understanding Access Control in AWS

IAM Roles vs IAM Policies — Understanding Access Control in AWS

Published on 4/28/2025

🔐 Cybersecurity Basics Refresher — Part 2 : IAM Roles vs IAM PoliciesCybersecurity Basics Refresher Series: Part 2Cloud security starts with knowing ...
Read on Medium