Vasant Kumar, Developer in Sunshine Coast, Queensland, Australia
Vasant is available for hire
Hire Vasant

Vasant Kumar

Verified Expert  in Engineering

IT Security Developer

Location
Sunshine Coast, Queensland, Australia
Toptal Member Since
December 13, 2022

Vasant has been practicing cyber security professionally for around 12 years. He has been primarily working on designing, building, and maintaining strategy and security structures for cloud infrastructure and container orchestration platforms. Securing CI/CD pipelines, security automation, and applications based on microservices architecture by closely working with developers and DevOps is a focus of Vasant’s. He enjoys bridging the gap between teams in organizations.

Availability

Part-time

Preferred Environment

Amazon Web Services (AWS), Kubernetes, Jenkins, CircleCI, GitHub, Web Security, IT Security, Infrastructure, Cloud Security, Secure Containers, Python 3

The most amazing...

...security auditing tool I've designed is open source and secures Kubernetes cluster security issues.

Work Experience

Security Architect

2019 - 2021
mx51
  • Acted as a subject matter expert for information security on various assignments and projects. Worked across internal security architecture, research, and development. Furthered our services and customer offerings.
  • Utilized Terraform, cloud formation templates, Buildkite, and other configuration management (CM) tools. Built and reviewed CI/CD pipelines security.
  • Set up and adjusted pipelines with security controls and tooling to give clients more control.
  • Helped Agile and DevOps teams understand scan results and create more secure workflows.
  • Assisted with building security tooling. Included dynamic application security testing (DAST), static application security testing (SAST) and open source software. Included continuous integration (CI) and continuous deployment through to production.
  • Provided consulting on containers (Docker, Kubernetes, ECS, and AWS Fargate). Worked with AWS security matters regarding development, engineering, and network operations teams.
  • Managed vulnerability assessment, penetration testing activities, and PCI DSS and GDPR compliance activities.
Technologies: Amazon Web Services (AWS), Cloud Security, Infrastructure, IT Security, Kubernetes, Kubernetes Security, Container Security, Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), Software Composition Analysis (SCA), Web Security, DevSecOps

Kubestriker

https://www.kubestriker.io/
Kubestriker aims to enhance visibility by acting as a security auditing tool for Kubernetes. It is a platform-agnostic tool and compatible with various platforms such as self-hosted Kubernetes, Amazon EKS, Azure AKS, and Google Kubernetes Engine (GKE). It is specially designed to tackle Kubernetes cluster security issues due to misconfigurations and will help strengthen the overall IT infrastructure of any organization.

It performs numerous in-depth checks on a range of services and open ports on Kubernetes platform to identify any misconfigurations which make organizations an easy target for attackers. In addition, it helps safeguard against potential attacks on Kubernetes clusters by continuously scanning, monitoring, and alerting of any anomalies. Furthermore, it comprises the ability to see some components of Kubernates infrastructure and provides visualized attack paths of how hackers can advance their attacks.

Languages

Python 3

Tools

GitHub, Jenkins, CircleCI, Google Kubernetes Engine (GKE), Amazon EKS, Azure Kubernetes Service (AKS)

Platforms

Amazon Web Services (AWS), Kubernetes

Industry Expertise

Cybersecurity

Other

Infrastructure, Cloud Security, Secure Containers, IT Security, Web Security, Kubernetes Security, Container Security, Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), Software Composition Analysis (SCA), Security Architecture

Paradigms

DevSecOps

2007 - 2010

Bachelor's Degree in Computer Science

Andhra University - Visakhapatnam, India

FEBRUARY 2021 - PRESENT

SABSA

The SABSA Institute

JUNE 2017 - PRESENT

CISSP

(ISC)²

FEBRUARY 2014 - PRESENT

OSCP

Offensive Security

Collaboration That Works

How to Work with Toptal

Toptal matches you directly with global industry experts from our network in hours—not weeks or months.

1

Share your needs

Discuss your requirements and refine your scope in a call with a Toptal domain expert.
2

Choose your talent

Get a short list of expertly matched talent within 24 hours to review, interview, and choose from.
3

Start your risk-free talent trial

Work with your chosen talent on a trial basis for up to two weeks. Pay only if you decide to hire them.

Top talent is in high demand.

Start hiring