Cybersecurity Consultant & Strategist

Cybersecurity ConsultantCloud Security & DevSecOps Strategist

Bridging the gap between technical infrastructure and business risk for Fortune 500 enterprises.

GRC & Cloud Security | DevSecOps | AI Governance | Enterprise Risk Strategy

Atharva's profile

About

Cybersecurity Consultant at Cummins India, where I advise on enterprise cloud security architecture, GRC frameworks, and DevSecOps transformation. I specialize in translating complex technical risks into actionable business strategies for organizations navigating cloud adoption, regulatory compliance, and emerging AI threats.

Core Practice Areas

  • Governance, Risk & Compliance (GRC): Designing and implementing security governance frameworks, risk assessments, and compliance strategies aligned with ISO 27001, NIST, and industry regulations.
  • Cloud Security Architecture: Securing enterprise cloud infrastructure, IAM policy design, and zero-trust architecture across AWS and multi-cloud environments.
  • DevSecOps Strategy: Embedding security into CI/CD pipelines and development workflows to enable shift-left security at enterprise scale.
  • AI Governance & LLM Security: Developing governance frameworks and security controls for enterprise AI/LLM deployments, addressing data privacy, model integrity, and regulatory risk.
  • Enterprise Risk Strategy: Conducting threat landscape assessments and building risk-informed security programs that align with business objectives.

Featured Projects

Real-world security implementations and learnings from hands-on work

Project

CI/CD Security Integration

Problem

Need to integrate security scanning into development workflows without slowing down deployment cycles.

Approach

Implemented automated security scanning in GitHub Actions workflow with SAST, dependency scanning, and container image scanning.

Tools

GitHub Actions
Trivy
Snyk
Docker
AWS

Outcome

Reduced security vulnerabilities in production by 60% and enabled shift-left security practices in the development lifecycle.

Business Impact

Enabled shift-left security that reduced production risk and ensured regulatory compliance for enterprise-scale deployments.

Key Learning

Security automation in CI/CD requires balancing thoroughness with speed. Parallel scanning stages and caching strategies are critical.

Project

AI Intake Standard Operating Procedure (SOP)

Problem

Enterprises adopting AI/LLM tools lack standardized governance processes, exposing them to data privacy, compliance, and operational risks.

Approach

Designed and authored a comprehensive AI Intake SOP framework covering risk classification, data handling requirements, vendor assessment criteria, and approval workflows for enterprise AI tool adoption.

Tools

GRC Frameworks
NIST AI RMF
Risk Assessment
Policy Design
Compliance Mapping

Outcome

Created a repeatable governance framework that enables organizations to evaluate and onboard AI tools with consistent risk controls and audit trails.

Business Impact

Reduced unvetted AI tool proliferation and established a scalable governance process that aligns AI adoption with enterprise risk appetite and regulatory requirements.

Key Learning

Effective AI governance requires balancing innovation velocity with risk controls—overly restrictive policies stifle adoption, while lax governance creates unacceptable exposure.

Project

Automated AI Security Scanner

Problem

Manual security assessments of AI/LLM deployments are time-intensive and inconsistent, leaving gaps in coverage across enterprise AI portfolios.

Approach

Built an automated security scanning tool that evaluates AI/LLM applications against common vulnerability patterns including prompt injection, data leakage, model manipulation, and insecure API configurations.

Tools

Python
OWASP LLM Top 10
API Security
Automated Testing
Risk Scoring

Outcome

Automated the detection of critical AI security vulnerabilities, enabling continuous assessment across multiple AI deployments with consistent risk scoring.

Business Impact

Enabled proactive risk mitigation for AI deployments, reducing manual assessment overhead and providing leadership with quantifiable risk metrics for informed decision-making.

Key Learning

AI security scanning must evolve with the threat landscape—static rule-based checks are insufficient; adaptive testing frameworks that account for model-specific behaviors are essential.

Certification

AWS Cloud Foundations

Problem

Need foundational understanding of AWS cloud services and security best practices for cloud-native deployments.

Approach

Completed AWS Cloud Foundations certification covering core services, security models, and architectural patterns.

Tools

AWS
IAM
VPC
CloudWatch
S3

Outcome

Certified knowledge of AWS core services and security best practices, enabling secure cloud architecture design.

Key Learning

Cloud security starts with proper IAM policies and network segmentation. Understanding shared responsibility model is crucial.

Experience

Blue Team Security Operations

Problem

Need practical understanding of security operations, incident response, and defensive security strategies.

Approach

Completed comprehensive course on security operations, SIEM usage, threat detection, and incident response procedures.

Tools

SIEM
Threat Intelligence
Incident Response
Log Analysis

Outcome

Developed hands-on skills in threat detection, log analysis, and incident response workflows.

Key Learning

Effective blue team operations require continuous monitoring, proper log aggregation, and well-defined incident response playbooks.

Insights & Research

In-depth analysis on cloud security strategy, GRC frameworks, AI governance, and enterprise risk—informed by real-world consulting engagements.

Research Paper

Zero Trust Reference Architecture for OT Networks

A comprehensive reference architecture for implementing Zero Trust security principles in Operational Technology (OT) environments, addressing the unique challenges of securing industrial control systems while maintaining operational reliability.

Read the Full Paper

Video & Media

beyond root

Cybersecurity deep-dives, technical walkthroughs, and security research breakdowns.

Watch on YouTube →

The Nadkarnees

Creative content and perspectives at the intersection of technology and culture.

Watch on YouTube →
Cybersecurity Basics Refresher Series — Part 4: How DNS Works — And Why It’s a Security Risk Too

Cybersecurity Basics Refresher Series — Part 4: How DNS Works — And Why It’s a Security Risk Too

Published on 7/2/2025

🔒Cybersecurity Basics Refresher Series — Part 4: How DNS Works — And Why It’s a Security Risk TooEver Wonder How Websites Know Where to Take You?You ...
Read on Medium
Cybersecurity Basics Refresher Series(Part 3): TLS/SSL Explained — How Secure Communication…

Cybersecurity Basics Refresher Series(Part 3): TLS/SSL Explained — How Secure Communication…

Published on 4/30/2025

🔒Cybersecurity Basics Refresher Series — Part 3: TLS/SSL Explained — How Secure Communication Actually WorksEver wonder what actually happens when yo...
Read on Medium
IAM Roles vs IAM Policies — Understanding Access Control in AWS

IAM Roles vs IAM Policies — Understanding Access Control in AWS

Published on 4/28/2025

🔐 Cybersecurity Basics Refresher — Part 2 : IAM Roles vs IAM PoliciesCybersecurity Basics Refresher Series: Part 2Cloud security starts with knowing ...
Read on Medium