About

I'm a security professional with seven years of experience in Cloud Security. Currently at Adobe, I focus on detecting cloud threats at scale. Previously at Netskope, a cloud security startup, I developed automated malware pipelines for security research. I hold a Master's in Information Security from Johns Hopkins University and a Bachelor's in Computer Science from Vellore Institute of Technology, India. I'm passionate about applying data to solve security problems, particularly in deep diving cloud environments and identifying threat actors. My research interests include building large-scale secure systems and application security.

Education

Masters of Science, Information Security 2019 – Present
The Johns Hopkins University, Baltimore, MD
» Research interests in cloud, infrastructure, network, and IoT Security  
   
Bachelor of Technology, Computer Science 2013 – 2017
Vellore Institute of Technology, Vellore, India
» GPA: 4, Research Topics include Multi cloud security, SQL Injection  
   

Experience

Senior Security Researcher, Adobe Feb 2024 – Present
On-site
» Developed the first threat intelligence pipeline based on the Model Context Protocol (MCP), leveraging Large Language Models (LLMs) to extract, enrich, and contextualize indicators of compromise (IOCs) from PDF-based threat reports, enabling structured ingestion and accelerated threat response  
» Led Project Redact, a cross-functional initiative to detect and remediate sensitive secrets—such as credentials, AWS secret keys, and tokens—within security and application logs; architected and deployed scalable solutions using Cribl and data lake pipelines, significantly enhancing data hygiene and compliance  
» Engaged with multiple security vendors to evaluate and benchmark advanced solutions, including threat intelligence platforms and deception technologies, to enhance Adobe's detection and response capabilities  
» Authored in-depth threat intelligence reports assessing the security and data governance risks of Large Language Models (LLMs), focusing on jailbreak techniques, prompt injection vulnerabilities, and exposure of sensitive data in enterprise environments  
   
Cloud Security Researcher - III, Adobe Aug 2022 – Jan 2024
» Designed and implemented an extensible, modular framework for security data schema normalization, addressing data heterogeneity across diverse security telemetry sources  
» Led the end-to-end development of a scalable security metrics framework on Databricks, integrating multi-source threat intelligence with logs from endpoint detection systems, firewalls, and network telemetry to drive actionable insights  
   
Cloud Security Researcher - II, Adobe Feb 2021 – Jul 2022
» Designing, building, and maintaining scalable infrastructure to detect high-risk firewall rules, evaluate them against a standardized risk matrix, and automate risk-based approvals across Adobe Firewalls  
» Responding to security incidents across Adobe data centers and public cloud environments, including AWS and Azure, to ensure rapid containment and resolution  
» Performing threat modeling and automating the detection of security issues across hybrid cloud environments, while developing and deploying preventive controls within Adobe's storage, network, and compute infrastructure  
» Collaborating directly with the Security Coordination Center (SCC) to triage, investigate, and remediate security incidents across on-premises and cloud platforms  
   
Security Researcher Intern, Adobe May 2020 – Aug 2020
San Jose, CA
» Team: Enterprise and Cloud Security  
» Designed and implemented an intelligent system to detect firewall rule violations and security policy breaches at the DMZ layer, reducing attack surface exposure  
» Developed a comprehensive violation matrix, published internal best practices guidelines, and featured on the Adobe Blog for impact-driven innovation  
» Spearheaded a strategy to align AWS cloud environments with Adobe's enterprise security policies, identifying gaps in existing security controls  
» Proposed and demonstrated bypass scenarios for current AWS security detections, leading to the implementation of stronger controls across public cloud infrastructure  
   
Software Engineer - 2, Netskope Apr 2018 – Jul 2019
Bangalore, India
» Malware Efficacy Project: Developed API’s and data acquisition framework for training models on file features. Increased scalability from few hundreds to 10M samples per day, helped in reducing False Positives  
» Threat Intelligence Framework: Built a proactive Threat hunting framework for insights about the latest threats using file decomposition, macro analysis and dropped file clustering, improved detection rate by 50%  
   
Software Engineer - 2, Netskope Apr 2018 – Jul 2019
Bangalore, India
» Malware Efficacy Project: Developed API's and data acquisition framework for training models on file features. Increased scalability from few hundreds to 10M samples per day, helped in reducing False Positives  
» Threat Intelligence Framework: Built a proactive Threat hunting framework for insights about the latest threats using file decomposition, macro analysis and dropped file clustering, improved detection rate by 50%  
   
Software Engineer - 1, Netskope Jun 2017 – Mar 2018
Bangalore, India
» Developed URL Heuristics engine using Machine Learning modelled on lexical features, dropped file extract, third-party reputation which improved the efficacy by 60%  
» Integrated Cuckoo Sandbox for Ransomware File Encryption system and used this in generating threat intelligence, which acted as a key differentiator for Netskope threat capabilities  
» Streamlined malware analysis with a task scheduling framework, integrated signature matching, static and dynamic analysis eliminating hours of manual effort at a cost reduction of 85%  
   
Threat Researcher, Netskope Threat Research Labs Jun 2017 – Jul 2019
Bangalore, India
» Contributed to a world-class team focused on cloud threat and malware research. Worked on building cutting-edge security products that protect enterprises from advanced threats using machine learning, heuristics, sandboxing, and other detection technologies  
» Played a key role in identifying and mitigating emerging cloud-based attacks  
   
Student Intern, Netskope Jan 2017 – Jun 2017
Bangalore, India
» Automated Malware Analysis Pipeline: Developed a scalable malware analysis service with a plug-and-play architecture, RESTful APIs, task scheduling, batch processing, and a secure file upload portal  
» Built on Celery and Redis, the system efficiently scaled to handle over 1 million files per day, significantly accelerating threat detection workflows  
   
Summer Intern, Krify Jun 2015 – Jul 2015
Kakinada, India
» Developed cross platform applications  
   

Teaching

Teaching Assistant, Cloud computing Aug 2020 – Dec 2020
» Designed cloud ssignments utilizing GCP and AWS platforms  
» Graded programming assignments and conducted office hours to assist grad students  
   
Teaching Assistant, Cloud computing Jan 2020 – May 2020
» Conducted office hours to assist students on Mininet, GCP Programming Labs  
   
Course Assistant, Cloud computing security Aug 2019 – Dec 2019
» Graded programming assignments and conducted office hours to assist grad students  
   

Publications and Blogs

Malware and Threat Analysis and Remediation of Cloud SaaS Traffic May 2019
Journal of Computational and Theoretical Nanoscience
» Paper on different cloud attacks and methods to prevent them from an enterprise perspective using variety of detection mechanisms  
   
Practicing Proper DMZ and Firewall Hygiene Aug 2020
Adobe Security BLog
» Develop practices that can improve the overall security posture of DMZ configurations and general firewall hygien  
   

Projects

Network Security and Attacks
» Project aimed at implementing a HTTP Server on RPI box and test various network attacks  
» Capture the network interactions, analyze using wireshark, created both server and client on docker  
   
Malicious URL Detector
» A open-source Machine Learning Model to detect malicious urls using lexical features  
» It includes Deep File Analysis on attributes from the dropped executables  
   
Malware Organiser
» A tool to organise large malicious and benign files into a organised Structure  
» Helps in classification of Malwares according to tags, family names and mime type  
   
Ransomware C2C Server Detector
» Open Source Machine Learning Based Ransomware generated Command and Control Server Domain Detector  
» Identifies domains which are not humanly generated with good accuracy  
   
Generic Parser
» A single open-source library to extract meta information, static analysis and detect macros within the files  
» Works on popular file formats like doc, docx, pdf, xml etc  
   
CTF Writeups
» A collection of all Capture the Flag Writeups and Tools  
» Includes HacktheBox, Vulnhub and popular CTF Solutions  
   
Yara Finder
» A open-source tool to find the yara matches on a file  
» Easily extensible to custom Yara rules  
   

Awards and Recognition

Winner, HopHacks CTF Sep 2019
» Northrop Grumman along with Hophacks organized a Capture the Flag event  
» Won first place by capturing hidden flags in six machines in a time sensitive competition  
   
Finalist, Netskope - Hackathon Dec 2017
» Led two teams to the final five of the annual hackathon at Netskope, presented both ideas to the CTO and Chief Scientist