V

Vinod Т.

DevOps Engineer

San Francisco, California, United States6 yrs 9 mos experience

Key Highlights

  • Decade of experience in enterprise security strategy.
  • Expert in cloud and application security.
  • Passionate mentor for future security professionals.
Stackforce AI infers this person is a Cybersecurity expert with a focus on cloud and application security.

Contact

Skills

Core Skills

Information SecurityCloud SecurityPenetration TestingApplication Security

Other Skills

Web2 securityautomationthreat modelinginfrastructure securitysecurity operationsCSPMvulnerability managementsecurity awareness programsbug bounty programssecurity architecturepentestingcloud pentestingmanual testingautomated testingreporting

About

I’m a cybersecurity leader with a decade of experience driving enterprise security strategy, leading complex assessments, and building resilient systems across financial, government, and private sectors. I specialize in designing and executing security programs that reduce risk, improve compliance, and align with business goals. My expertise spans application, cloud, and infrastructure security, supported by a deep technical foundation in penetration testing, incident response, threat modeling, and secure DevOps. I’ve led red team engagements, advised on cloud security architecture, and enabled engineering teams to adopt secure development practices at scale. I’m passionate about building high-performing teams, mentoring the next generation of security professionals, and contributing to the broader security community through responsible disclosure and bug bounty programs. I stay ahead of evolving threats by actively researching emerging technologies and advocating for proactive security posture. Tools and platforms I’ve worked with include Python, Bash, AWS, GCP, Azure, Docker, Kubernetes, Vault, Terraform, Burp Suite Pro, and SIEM platforms.

Experience

6 yrs 9 mos
Total Experience
1 yr 8 mos
Average Tenure
--
Current Experience

Pip labs

Staff Security Engineer

Dec 2024Present · 1 yr 4 mos · Palo Alto, California, United States · Hybrid

  • Own end-to-end Web2 security including automation, threat modeling, penetration testing, infrastructure security, and security operations while building Web3 expertise
  • Implemented Wiz as unified CSPM, CNAPP, CIEM, and DSPM solution with comprehensive coverage, intelligent alert tuning, and vulnerability management aligned to organizational SLAs
  • Evaluated and deployed JAMF + CrowdStrike enterprise security stack, managing complete device lifecycle, user provisioning, and secure system configurations across the organization
  • Drive security awareness programs tailored to blockchain company risks, ensuring teams understand Web3-specific threats and social engineering attack vectors
  • Help manage bug bounty programs, cultivate Web3 vendor relationships, and provide security architecture guidance for internal research projects
  • Bridge traditional cybersecurity with blockchain-specific requirements, supporting secure development of AI-powered Web3 applications and infrastructure
Web2 securityautomationthreat modelingpenetration testinginfrastructure securitysecurity operations+7

Hackerone

Lead Pentester

Jun 2024Dec 2024 · 6 mos · Canada · Remote

  • Conduct comprehensive pentests on web apps, APIs, and infrastructure, identifying critical vulnerabilities like RCE, SSRF, RFI, LFI, and business logic flaws.
  • Lead cloud pentesting efforts across AWS, GCP, and Azure, identifying misconfigurations, insecure IAM roles, S3 bucket exposures, and cloud-specific vulnerabilities.
  • Execute advanced manual and automated testing techniques, including exploitation of zero-day vulnerabilities, logic flaws, and chained attacks.
  • Develop custom scripts and tools to automate pentesting tasks, improving efficiency and depth of assessments.
  • Produce detailed reports with PoC exploits and risk assessments, ensuring clear communication of business impact to stakeholders.
  • Spearhead red team exercises and simulate real-world attack scenarios, testing organizational defense capabilities and uncovering hidden attack surfaces.
  • Mentor junior team members on identifying and exploiting high-severity vulnerabilities in both traditional and cloud environments.
pentestingcloud pentestingmanual testingautomated testingreportingred team exercises+3

Palette skills

Industry Reviewer - Cybersecurity

Jun 2023Present · 2 yrs 10 mos · Remote

Zapier

Sr. Cloud Security Engineer

Jan 2022May 2024 · 2 yrs 4 mos · Canada · Remote

Sonder inc.

Senior Product Security Engineer

Nov 2020Dec 2021 · 1 yr 1 mo · Canada · Remote

  • As a first security hire, helped build the risk register, processes, policies, and vulnerability management program.
  • Started and managed a responsible disclosure program which was later transitioned into a private bug bounty program.
  • Helped implement AWS account lifecycle and user access control via gitops in AWS Organization. Coordinated the AWS SSO implementation effort to ensure the use of AWS STS via an internally built CLI tool. The CLI tool helped engineers download the AWS config profiles and kubeconfig.
  • Implemented Crowdstrike CSPM for detecting cloud security misconfigurations, asset management, and alerts on real time malicious activities in the AWS accounts.
  • Collaborated with SREs to implement container runtime security using crowdstrike in daemonset mode. Triaged the findings and worked with SREs to get the issues fixed.
  • Implemented Zscaler Private Access to provide engineers with secure access to the internal infrastructure. The ZPA was tied to the device posture profile to ensure no engineers were using their personal machines to connect to the internal infrastructure.
  • Implemented Signal Sciences waf in the containerized microservices workload. Created custom waf rules to tackle new threats.
risk managementvulnerability managementresponsible disclosureAWS account lifecycleuser access controlcloud security+3

Freshbooks

Lead Security Engineer

Jul 2019Oct 2020 · 1 yr 3 mos · Toronto, Ontario, Canada

  • Implemented static application security testing in CI pipeline (Jenkins) to detect platform-specific vulnerabilities, third-party library analysis, and secret detection. The process breaks the build when a High or Critical finding is detected. The automation also included an exception framework in case there is no patch for the vulnerability or if it is a false positive.
  • Improved and automated IAM for provisioning and de-provisioning access in Google Cloud. The implementation involved creating custom and predefined roles and forcing users to impersonate a service account for elevated privileges. Any sensitive operation will generate an alert, and all access can be audited if required.
  • Built data classification standards based on the organizational risk matrix to identify potential threats
  • Automated detection and removal of secrets, PII, and passwords in version control and storage services
  • Built automation and alerts for detecting misconfigurations in Google Cloud and AWS
  • Prepared per-service incident response plan and led security incidents
  • Performed security assessments of applications & services periodically
  • Triage and manage security issues reported from responsible disclosure
static application security testingIAM automationincident responsesecurity assessmentsApplication SecurityCloud Security

Amazon

Security Engineer II

Nov 2017Jul 2019 · 1 yr 8 mos · Santa Monica

  • Identify, triage, and provide remediation steps for application security issues
  • Help in design, implementation & assurance of secure software architecture
  • Identify common misconfigurations with AWS config and write automation using Lambda to mitigate security issues as soon as detected
  • Perform threat modeling for microservices, applications & IoT devices
  • Help in running SAST & DAST in CICD
  • Perform security assessments of applications & products periodically
  • Organize and manage penetration testing program for upcoming products and services
  • Triage and manage security issues reported from external sources
application securitysecure software architecturethreat modelingSASTDASTApplication Security+1

Truecar, inc.

Security Engineer I

Jan 2017Nov 2017 · 10 mos · Santa Monica

  • Implemented Security Scan in CI/CD Model
  • Participated in design & implementation of a Slack chatbot to solve user access issues
  • Handled identity and access management for SaaS apps through OKTA
  • Gave security guidance on a constant stream of new products and technologies
  • Triaged and investigated malicious events in Rapid7 IDR
  • Suggest and implement automation of recurring tasks
  • Analyze, assess, and respond to various internet threats
  • Conduct regular security assessments
security policiesmalware analysispenetration testingInformation Security

Jefferies

Security Engineering Intern

Oct 2016Dec 2016 · 2 mos · Greater New York City Area

  • Identify, triage, analyze and close security incident alerts from splunk
  • Implement and manage security policies on Bluecoat proxy
  • Performing malware analysis on suspicious attachments, files etc. delivered through social engineering
  • Conducting periodic web application and network penetration testing
  • Automate common information security tasks using phantom orchestration
security incident alertsmalware analysispenetration testingInformation Security

Cigital, inc (a part of synopsys)

Security Consulting Intern

May 2016Aug 2016 · 3 mos · Bloomington, Indiana, United States · On-site

  • Conducted Web app, Web services & Mobile app automated and manual ethical hacks on different platforms and technologies
  • Used Burp Suite Pro, DirBuster, IBM Appscan, Nessus, and a variety of internal tools and scanners to perform the assessment
  • Discovered various security issues and wrote a report with findings, proof of concept, and remediation
  • Interacted with clients to help them understand vulnerabilities and remediation
ethical hackingvulnerability reportingInformation Security

Aks information technology services

Information Security Consultant

Jul 2012Jul 2015 · 3 yrs · Mumbai, Maharashtra, India · On-site

  • Was deployed as Team lead at State Data Center, Mantralaya, Mumbai
  • Employed various technical methods to safeguard data storage and handling
  • Served as Security Consultant to Maharashtra Government
  • Coordinated activities of information security policies
  • Handling Application Security testing Part & providing best solutions to clients
  • Training Government departments on "secure application development"
data securityapplication securityInformation Security

Education

Stevens Institute of Technology

Master's degree — Computer Science

Jan 2015Jan 2016

University of Mumbai

Bachelor of Engineering - BE — Information Technology

Jan 2007Jan 2012

Stackforce found 100+ more professionals with Information Security & Cloud Security

Explore similar profiles based on matching skills and experience