0% found this document useful (0 votes)
4 views3 pages

Ramireddy - Devsecops - Piramal

The document outlines the qualifications and experience of a professional with 5.8 years in DevOps, DevSecOps, and cloud security, emphasizing expertise in building secure pipelines and architectures. It highlights skills in various tools and methodologies for security testing, compliance, and cloud services, along with a proven track record of integrating security into the software development lifecycle. The individual has hands-on experience with multiple security technologies and has successfully implemented security practices across various environments.

Uploaded by

shobitg
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views3 pages

Ramireddy - Devsecops - Piramal

The document outlines the qualifications and experience of a professional with 5.8 years in DevOps, DevSecOps, and cloud security, emphasizing expertise in building secure pipelines and architectures. It highlights skills in various tools and methodologies for security testing, compliance, and cloud services, along with a proven track record of integrating security into the software development lifecycle. The individual has hands-on experience with multiple security technologies and has successfully implemented security practices across various environments.

Uploaded by

shobitg
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

RAMIREDDY

Summary

Having 5.8 years of expertise in DevOps, DevSecOps, and cloud security to support agile application building,
scaling a secure pipeline, developing a secure architecture
Extensive experienced building secure DevOps pipelines using Git, GitHub, Jenkins, and GitHub Actions
Skilled in debugging and maintaining Jenkins build pipelines, including fixing broken builds
Hands-on experience with cloud security testing using Kubernetes-goat and AWS-goat
Proven track record designing secure SDLC architectures and implementing security requirements
Expertise in CI/CD pipeline tools like Jenkins, GitHub Actions and AWS Code Pipeline
Proficient in black box and white box testing methodologies like OWASP, etc
Experienced using SAST tools like SonarQube and Snyk to analyze code and maintain quality gates
Skilled in using DAST tools like Burp Suite and IBM Appscan to find vulnerabilities through simulated attacks
Implemented security best practices like running containers as non-root user, using read-only file systems
Scanned container images for vulnerabilities using tools like Clair, Anchore, Snyk
Enforced security policies and compliance requirements for container deployments

Skills

• AWS services EC2, EKS, Fargate, CloudFront,


CloudFormation, AWS inspector, AWS config, AWS
Guard duty
Expert in Jenkins, Git Action, Jira, Confluence, Identity
and Access Management
Kubernetes, Docker, Terraform, Helm charts.
Security Orchestration, Automation, and Response
Security in terms DevSecOps, CSPM, CWPP,
CNAPP, Container security.
Design a Secure architecture for Entire pipeline.
Security Technologies like Secure Branch, IDE
Secret Management, SCA, SAST, DAST, and
RASP are both open Source and commercial
Tools as well. Endpoint logging key Fluent
in shell, Yaml and Python
• Cloud Security Proficiency
• Open web application (OWASP)
• Identify and access management
• Security Architecture Design
• Access Control Management
Experience

DevSecOps & Cloud Native Security Engineer

Development of an architecture for application and implementation of monolithic services, microservices and
cloud-based services
Identifying security weaknesses and recommending remediation actions
Collaborated with development teams to integrate security practices into the software development lifecycle,
ensuring the delivery of secure applications
Completed around 109 DevSecOps application integration in check Marx, white source and burp suite
Developed and enforced security policies, standards, and procedures to maintain compliance with relevant
regulations and industry frameworks (e.g., GDPR, ISO 27001)
Designed and implemented cloud security architectures and solutions, leveraging industry best practices and
standards (e.g., AWS, Azure, GCP)
Conducted code reviews and provided guidance to development teams on secure coding practices and application
security principles
Hands-on Experience LDAP integration of our security tools and TLS/SSL certificate to implement
OnPremisesDevOpsimplementationcoveringsecuritytoolchainintegrationincluding credential scanner, SAST &
SCA, DAST and container image scanners with CI build pipeline such as SonarQube, Chekov, Trivy, and Anchor
Engine to identify vulnerabilities
Reviewed and implemented identity & access including RBAC design per business processes, data encryption &
key management, cloud infrastructure and cloud-native services security and audit configurations reducing the
security risk by 60%.

DevSecOps .

Creating a secure SDLC for DevSecOps lifecycle


Following OWASP Guidelines for SCA, SAST, DAST Technology to SDLC lifecycle
Consulted on the agile-based AWS & On-Premises DevOps implementation covering security toolchain Building
a secure Branching strategy for DevOps pipeline
Integrating pipelines including Credential scanner, SAST & SCA, DAST and container Security with CI build
pipelines such as SonarQube, Black duck, Snyk, Trivy, Falco Anchore, Burp suite, Check Marx, White Source
Engines to identify vulnerabilities
Using helm chart to manage the Kubernetes resources to reduces the intricate of deployment
Using Service mesh like Istio Inserting security, dedicated infrastructure layer for facilitating service-to-service
communications between services or microservices
Managed Docker orchestration and Docker containerization using Kubernetes
And implemented various Security stacks, in pipeline to delivered Secured pipeline
Proven working experience in CSPM and CWPP (Cloud security posture management)
Reviewed the violation of the cloud environment and developed mitigation plans
Designing and implementing infrastructure and application hardening methodologies (Storage, Network users,
VMs)
Experience in securing workloads, including server, VM, container, and serverless on-premises
Proficiency with CNAPP cloud native platform protection technologies, such as Sysdig, Aqua security, Orca
security, and Palo Alto Prisma cloud
Significant experience in AWS goat as well as Kubernetes-goat environment.
SAST & DAST Security Engineer

• Performing DAST (Dynamic Analysis Security Testing) & SAST(Source code Analysis Security Testing)
on BNYM(Bank of New York Mellon) related Web Apps and Services
• Performing in delivering VAPT in Web and API endpoints
• hands on experience into security testing of various Application technologies
• working experience on RIA and thick client Applications
• Preparing reports per BNY Policies & standards and distributing to DEV Teams for review meetings and
uploading those report findings to issue tracker/JIRA to Archer for tracking
• Prepared templates for vulnerabilities with proof of concept and SOP’s for automation testing with tools
and check lists for manual testing
• Prepared VMM’s – Vulnerability mitigation methods with source code for development teams reference
• Working experience on tools i.e. IBM App Scan std, Veracode, Burp suite Pro, Soap UI, Postman &
Nmap

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy