Satyam Singh

Director of Engineering

Gurugram, Haryana, India8 yrs 4 mos experience
Highly StableAI ML Practitioner

Key Highlights

  • 8+ years in QA Automation and DevOps.
  • Expert in DDoS mitigation and network engineering.
  • Proven track record in AI-driven automation solutions.
Stackforce AI infers this person is a Telecom and IoT expert with a strong focus on automation and security.

Contact

Skills

Core Skills

Ddos DefensePythonRouting ProtocolsAutomation FrameworkQuality EngineeringRelease EngineeringFirmware EngineeringNetwork ValidationFraud PreventionTelecom SecurityTelecom IntegrationVoice Security

Other Skills

AdministrationAgile MethodologiesArtificial Intelligence (AI)AutomationComputer NetworkingCyber SecurityDDoSDDoS MitigationData AnalysisDatabase QueryingDatabase TestingDatacomDeepfake DetectionEmbedded DevicesEthical Hacking

About

About Me Dynamic QA Automation, DevOps, and Network Engineering Professional with 8+ years of experience delivering automation, protocol testing, and infrastructure validation across Telecom, IoT, and Cloud environments. I specialize in building scalable, maintainable automation systems that improve release speed, reliability, and product performance. Domain Expertise Telecom Systems | Data Science | Cloud Platforms Protocol Testing | End-to-End Automation | QA Lead AI Generative Automation Skilled in integrating Generative AI, LLMs (GPT/BERT), and Prompt Engineering into QA workflows for:• Intelligent test data generation• AI-based defect classification & clustering• RCA prediction and log summarization• LLM-powered test case creation & enhancement• Automated API behavior validation Technical Skills Automation & SDETPython | Pytest | Selenium | Robot FrameworkREST API Testing | JMeter | Postman | MicroservicesTransformers | AI-driven QA AcceleratorsNetworking & ProtocolsTCP/IP | BGP | OSPF | VLAN | MPLS | SIP | PROFINETHTTP/HTTPS | DNS | DHCP | NAT | Firewall | SSH/TelnetPacket tracing using Wireshark, ScapyDevOps & CI/CDJenkins | GitHub Actions | Git | DockerLinux/Solaris server setup (Radius, Proxy, Network Services)Testbed automation | Environment provisioningSDLC/STLC & Quality Engineering• Test strategy, planning, and requirement analysis• Automation frameworks, regression packs, and CI pipelines• Defect lifecycle ownership | Jira/ALM• Documentation, version control, coding best practices Leadership• Led a 4-member QA/Automation team• Mentored engineers in Python, debugging, and CI/CD• Managed sprints, workloads, and quality deliverables• Drove adoption of automation-first and AI-enhanced testing practices Value I DeliverAbility to architect scalable automation systemsDeep understanding of networking and distributed systemsStrong grasp of AI-powered QA innovationsMindset that balances quality, speed, and reliabilityA proactive leader focused on outcomes, clarity, and execution excellence

Experience

Akamai technologies

Senior Team Lead

Feb 2025Present · 1 yr 1 mo · Remote · Remote

  • Prolexic provides resilient defense against a wide spectrum of DDoS attacks – volumetric, protocol-layer (L3/L4), and application-layer (L7). It mitigates both high-bandwidth assaults and sophisticated multi-vector attacks through advanced traffic filtering, anomaly detection, and AI-driven analytics.
  • Traffic under attack is rerouted via Anycast DNS or BGP to Akamai’s globally dispersed scrubbing centers. These facilities leverage Generative AI models and Python-based automation pipelines hosted on AWS and Google Cloud to analyze and scrub traffic in real time. Clean traffic is forwarded back to the origin, ensuring minimal latency or service disruption.
  • Prolexic supports multiple deployment models:
  • Always-on: All inbound traffic flows through Akamai scrubbing centers with AI/ML-enabled anomaly detection in cloud environments.
  • On-demand: Security event triggers BGP prefix announcement to redirect traffic under attack, with automated orchestration via Python scripts integrated into AWS/GCP.
  • Hybrid / On-Prem (Corero-powered): Local on-premises scrubbing (via Corero) offloads frequent attacks, with cloud-native AI scrubbing fallback for large or complex threats.
  • With its Generative AI–powered insights, cloud scalability (AWS, Google Cloud), Python-based automation hooks, hybrid deployment flexibility, edge ACL capabilities, and global scrubbing capacity (20+ Tbps), Akamai Prolexic delivers a robust, scalable platform for defending against the most severe DDoS threats.
Python (Programming Language)DDoSDDoS DefensePython

Incedo inc.

2 roles

Test Lead

Nov 2021Jan 2025 · 3 yrs 2 mos · Gurugram, Haryana, India

  • Routers & Networking Stack
  • Hands-on experience building multi-vendor routing labs using Cisco, Juniper, and MikroTik platforms with full topology simulation. Implemented core protocols including OSPF, BGP, SIP, Diameter, and Profinet to replicate telecom and enterprise environments.
  • Automation Framework (Python + Cloud)
  • Designed an end-to-end automation framework using Python, PyTest, and Robot Framework for scalable router validation. Deployed distributed test agents across AWS EC2 and Google Cloud. Provisioned cloud testbeds using Terraform and Ansible for dynamic and repeatable infra creation.
  • AI & Generative AI Integration
  • Leveraged LLMs to auto-generate router configs, CLI sequences, and troubleshooting workflows. Built models that detect anomaly patterns from NetFlow/sFlow, analyze syslogs & SNMP traps, predict failures, and auto-generate test summaries and RCA reports.
  • Monitoring & Traffic Analysis
  • Integrated real-time packet analysis using Wireshark with custom Python parsers. Centralized logs into Elastic Stack on AWS OpenSearch and applied AI-driven correlation to surface early warnings and proactive alerts.
  • DDoS Defense Simulation (Prolexic-style)
  • Developed attack simulations including volumetric, L3/L4, and L7 traffic using JMeter and custom Python tooling. Modeled cloud-based scrubbing center behavior with AWS/GCP load balancers, applying AI-driven filtering before routing clean traffic back to the lab.
Session Initiation Protocol (SIP)ProfinetRouting ProtocolsAutomation Framework

Senior Internet Protocol Engineer

Nov 2021Sep 2023 · 1 yr 10 mos · Gurugram, Haryana, India

  • Delivered ELX1-LTE-A, the first gateway product built on the new IGP (Intelligent Gateway Platform) to replace legacy ICX, PLX35, and PLX3x/8x gateways. Contributed to a unified hardware–software platform supporting modern Industrial IoT, Industry 4.0, edge computing, and secure OT/IT integration. The platform introduced centralized management, improved performance, enhanced reliability, and extensible software capabilities for long-lifecycle industrial deployments.
  • Roles & Responsibilities
  • Release Engineering & Platform Setup
  • Performed base installations, patch upgrades, and environment configuration aligned with the Release Matrix.
  • Supported full firmware lifecycle: upgrades, regression testing, rollback validation, and backward compatibility checks.
  • Collaborated with DevOps to streamline builds into CI/CD flows (Jenkins/GitLab).
  • Documented release notes, installation guides, and troubleshooting steps.
  • Quality Engineering & Test Strategy
  • Authored and prioritized test cases using risk-based methods; mapped user stories to validation workflows.
  • Executed test suites in TFS/Azure DevOps for functional, service, migration, and adaptive modulation features.
  • Prepared demo validations and feature review artifacts for engineering management.
  • Performed firmware-level validation including IPMS buffer message tracing, PDU parsing, and packet-level debugging.
  • Designed semi-automated workflows aligned with modern QA automation practices.
  • Network, Protocol & Firmware Validation
  • Validated LTE-A gateway behavior, routing accuracy, throughput, and reliability.
  • Conducted packet decoding, deep PDU inspection, and end-to-end message flow verification across industrial and telecom protocols.
JiraTest PlanningQuality EngineeringRelease Engineering

Landis+gyr

Firmware Engineer

Jan 2020Oct 2021 · 1 yr 9 mos · Noida, Uttar Pradesh, India

  • Contributed to a large-scale Wi-SUN certified interoperability solution enabling Cisco and Landis+Gyr devices to operate seamlessly across shared mesh networks. Cisco’s IoT Field Network Director (FND) served as the Network Management System, while Landis+Gyr’s GridStream Command Center (CC) acted as the Device Management System / HES, with shared components to reduce redundancy and support unified device and network operations.
  • Roles & Responsibilities
  • Performed flashing, provisioning, and installation of Wi-SUN network devices; created full FAN environments and executed regular firmware and version upgrades.
  • Validated user stories, prepared demo tasks for management, and created/prioritized test cases using risk-based testing in Azure DevOps/TFS.
  • Executed functional test suites for Service flows, PAN Migration, Adaptive Modulation, routing behavior, and mesh connectivity.
  • Conducted firmware packet parsing, PDU-level decoding, and mesh routing message analysis using Wireshark and custom parsers.
  • Queried backend databases (PostgreSQL/MySQL/SQL Server) to validate device provisioning, routing tables, telemetry data, PAN membership, and firmware upgrade history.
  • Wrote SQL queries for data integrity checks, debugging sync issues between FND & CC, and supporting reporting/analytics.
Internet Protocol Suite (TCP/IP)WiresharkFirmware EngineeringNetwork Validation

Agnity

3 roles

Member of Technical Staff

Promoted

Jan 2019Jan 2020 · 1 yr

  • DEFEND (Fraud Prevention System | Customer: SBTM| Time-Period: July 2019- January 2020)
  • Defend provides solutions for detecting fraud calls in almost real-time. The Call which pass-through above filters are treated as suspicious calls. Suspicious calls are fed to transcription Engine (VERBIO) through SBC, which converts ongoing communication to text. Those texts are further analyzed for fraud words. Once the call is identified as a fraud call, feedback is provided to subscriber’s family over Email, SMS or IVR.
  • Defend service includes Inbound call, Outbound Call, and Bi-directional Call features.
  • Defend Application handles sip signaling for fraud call scenarios.
  • Roles and Responsibilities:
  •  Base Installation with CAS, SMS, FEE, MPH and EMS patches according to Release-Matrix.
  •  Writing test cases and prioritizing the test cases using Risk-based test-link.
  •  Execution of test-link cases of Service, SMS, EMS and other functional cases.
  •  Sipp, Shell, and Python scripting for automation framework designing.
  •  Regression testing through automation and error analysis.
  •  Bug reporting and tracking through JIRA
OCCASSession Initiation Protocol (SIP)Fraud PreventionTelecom Security

Associate Member of Technical Staff

Promoted

Mar 2018Mar 2019 · 1 yr

  • zI specialize in designing, integrating, automating, and validating large-scale telecom and enterprise communication platforms with a strong focus on Oracle Communications Cloud Application Server (OCCAS) and adjacent technologies such as SIP, Diameter, SBCs, voice security platforms, and next-gen AI-powered call center ecosystems. My experience spans multiple layers of the modern communications stack—routing, signaling, media, security, orchestration, monitoring, cloud deployment, LLM automation, and advanced analytics—making me a versatile engineer capable of handling both product engineering and real-world deployment challenges.
  • OCCAS Platform Expertise
  • I have extensive hands-on experience in deploying, configuring, validating, and integrating Oracle OCCAS as part of carrier-grade cloud communication environments. This includes working with:
  • 1. SIP & SIP Servlet Applications
  • Hosting custom SIP applications on OCCAS for call handling, routing logic, IVR flows, SIPREC recording, and media manipulation.
  • Implementing SIP flows aligned with RFC 3261, session control, dialog/state management, transaction behavior, routing headers, Record-Route handling, and error branches.
  • 2. Diameter and Interconnect Workflows
  • Enabling OCCAS to function as a Diameter application server for PCRF/OCS interactions.
  • Validating CCR/CCA flows, subscriber charging, and integration with policy and charging elements.
  • 3. SBC Integration
  • Worked with Oracle SBC, Acme Packet, and third-party SBCs during OCCAS deployments to validate:
  • Signaling normalization
  • Interoperability
  • Media anchoring
  • SIPREC integration
  • Failover and high availability scenarios
  • 4. SIPREC & Recorder Integration
  • Validated SIPREC flows connecting OCCAS, SBC, and recording servers to offload RTP streams for compliance recording and media analytics.
Session Initiation Protocol (SIP)Internet Protocol Suite (TCP/IP)Telecom IntegrationVoice Security

Associate Software Engineer

Sep 2017Mar 2018 · 6 mos

  • Voice Security Layer Integration (SecureLogix, Mutare, Deepfake Detection)
  • As part of modernizing OCCAS-based call center architectures, I integrated voice-security add-ons including:
  • SecureLogix Voice Firewall
  • Ingesting call signaling from OCCAS/SBC.
  • Filtering spoofed calls, robocalls, TDoS, and suspicious traffic.
  • Running L3–L7 inspection on SIP and RTP flows.
  • Creating testbed scenarios for behavior under DDoS and anomaly conditions.
  • Mutare Voice Traffic Filter
  • Identifying spam-trigger messages, silent calls, dead air, and nuisance traffic.
  • Integrating Mutare with OCCAS signaling path to block unwanted inbound calls at the pre-routing stage.
  • Resemble.AI Deepfake Detection
  • Integrating voice biometrics + deepfake scoring with OCCAS SIP sessions.
  • Running test flows where calls are SIPREC’d → passed to a deepfake detection engine → results affect call treatment or policy execution.
  • Automating test cases for recognition accuracy, FN/FP behavior, and voice tampering scenarios.
  • This multi-layer integration creates a secure, intelligent call center environment, with OCCAS as the central orchestration platform and AI-based components adding next-gen threat mitigation capabilities.
  • OCCAS Deployment & Cloud Architecture
  • I have deployed OCCAS in:
  • OCI (Oracle Cloud Infrastructure)
  • AWS
  • Google Cloud Platform (GCP)
  • On-prem lab setups
  • Cloud Skills Applied
  • Terraform for provisioning VM, VCN/VPC, Load Balancers, Security Groups
  • Ansible for app installation, configuration automation
  • Dockerizing supporting services
  • Automating SIP endpoints and test clients via cloud VMs
  • Routing, Networking & Protocol Engineering
  • Beyond OCCAS, I have deep experience with IP networks, routing protocols, and industrial/IoT communications.
  • Routers & Multi-Vendor Networking
  • Hands-on with:
  • Cisco
  • Juniper
  • MikroTik
  • Industrial routers (Landis+Gyr, Cisco FAN, Wi-SUN)
  • Protocols
  • OSPF, BGP
  • SIP, SDP, RTP/RTCP
  • Diameter
  • Profinet, Modbus
  • IPv6, RPL, Wi-SUN
  • NetFlow, sFlow

Education

Dr. A.P.J. Abdul Kalam Technical University

Bachelor of Technology - BTech — Computer science and engineering

Jan 2013Jan 2017

Stackforce found 100+ more professionals with Ddos Defense & Python

Explore similar profiles based on matching skills and experience