Experience

Roles, outcomes, and credentials.

Career history with emphasis on production ownership, observability, security execution, and the kind of work that holds up after launch.

OTel-first

Tracing, metrics, and logs designed into service workflows

1,000+

Security alerts enriched and triaged through automation

13+

Services and infrastructure components monitored in production

20%

Reduction in manual security and operations toil

Execution Pattern

How I run work from design to post-release learning.

I focus on habits that keep systems easier to ship, observe, and repair instead of treating production as someone else’s phase.

Pattern

Architecture to Operations

I scope work with an explicit path to deployment, telemetry, and fallback behavior before implementation starts.

Pattern

Measure Before Opinion

I prioritize instrumentation and direct evidence to isolate performance or security bottlenecks before proposing fixes.

Pattern

Close the Loop

After shipping, I focus on runbooks, automation, and prevention patterns so the same class of failure is less likely to return.

Role Fit

Current industry areas where the work maps cleanly.

These are the hiring lanes where my portfolio has the strongest evidence: backend ownership, security automation, AI security, and low-level debugging.

Hiring signal

Backend and Platform Engineering

Services, APIs, event-driven workflows, deployment safety, and production debugging across Go, Python, Linux, and cloud infrastructure.

Best fit: backend, platform, infrastructure, and reliability-focused software roles.

Hiring signal

Security Engineering

Security automation, detection logic, application-security guardrails, IAM workflows, and secure CI/CD controls that engineering teams can maintain.

Best fit: product security, AppSec, detection engineering, and security tooling roles.

Hiring signal

AI and Agentic Security

Threat modeling for LLM-enabled tools, prompt-injection risk, tool-use boundaries, policy gateways, and auditable automation flows.

Best fit: AI security, agent platform safety, and automation governance work.

Hiring signal

Systems Debugging and Low-Level Analysis

Runtime evidence, packet captures, Linux behavior, GDB, memory analysis, and root-cause work when the useful answer sits below the surface symptom.

Best fit: teams that need debugging depth, incident learning, and strong technical writing.

Career

Where performance, observability, and security converge.

Most effective where the stack is wide, the debugging trail is messy, and someone needs to keep quality and delivery moving together.

January 2025 - Present

DMV Music Alliance

Washington, DC

Software Engineer (Security & Systems)

Architect and maintain distributed backend services in Go and Python, focusing on operational resilience, latency reduction, and observability.

  • Built backpressure-aware event ingestion and observability paths with queue-backed workers, retry behavior, and clear failure signals.
  • Instrumented end-to-end OpenTelemetry tracing across microservices, reducing mean time to identify (MTTI) production bottlenecks by 40%.
  • Automated infrastructure provisioning and security baseline enforcement using Terraform, integrating policy-as-code into CI/CD workflows.
GoPythonOpenTelemetryDistributed SystemsTerraformCI/CD

June 2023 - December 2024

RapidResponse Ops

Remote

Security Operations Engineering Intern

Developed security automation and hardened deployment pipelines for cloud-native infrastructure, reducing manual triage effort.

  • Built Python-based automation scripts that triaged and enriched over 1,000 security alerts per week, eliminating repetitive toil.
  • Implemented Semgrep and CodeQL scanning in GitHub Actions, blocking OWASP Top 10 vulnerabilities before merging to the main branch.
  • Configured robust SIEM dashboards and alerts in ELK, mapping anomalous logs to the MITRE ATT&CK framework for faster incident response.
PythonSIEM (ELK)CI/CD SecuritySemgrepAutomation

June 2021 - December 2022

Code Gurukul

Pune, India

Backend Testing & Reliability Intern

Profiled Linux-based backend services, improved API latency, and supported release automation across staging setups.

  • Optimized Linux backend services and improved API responsiveness for 4,300+ active users by removing redundant database queries.
  • Automated server configuration and deployment validation routines with Bash-based tooling, accelerating server rollouts by 30%.
  • Identified and patched memory constraint issues in C++ worker processes via comprehensive crash dump analysis.
LinuxBashBackend APIsPerformanceC++

Credentials

Graduate study and security training that strengthen the engineering work.

Master of Engineering in Cybersecurity

August 2023 - May 2025

University of Maryland, College Park

Graduate study centered on cybersecurity engineering, secure systems, and applied defensive practice.

Bachelor of Technology in Computer Engineering

August 2018 - July 2022

Vishwakarma University, Pune

Completed the IBM Cybersecurity and Forensics graduate program track alongside core computer engineering coursework.

Offensive Security Certified Professional (OSCP)

Offensive Security

Hands-on certification focused on exploitation, privilege escalation, and adversarial problem solving.

IBM Cyber Security and Forensics Graduate

IBM

Program work focused on applied cybersecurity and forensics fundamentals.

Technical range

Toolsets that keep showing up across systems, reliability, and security work.

Engineering and Infrastructure

12 tools
GoPythonRustFastAPIBashSQLKubernetesDockerAWSAzureTerraformMicroservices

Debugging and Operations

9 tools
OpenTelemetryPrometheusGrafanaWiresharkGDBGitGitHub ActionsCI/CDLinux Internals

Security Tooling

8 tools
SemgrepCodeQLELKLLM SecurityTCP/IP Packet InspectionSocket ProgrammingLatency ReductionRoot Cause Analysis