V

Vivek Kumar S.

Head of Design

India1 yr 9 mos experience
Most Likely To Switch

Key Highlights

  • Expert in Software Supply Chain Security and SBOM tooling.
  • Strong contributions to multiple open-source projects.
  • Hands-on experience with Kubernetes and cloud-native technologies.
Stackforce AI infers this person is a skilled contributor in Open Source and Software Supply Chain Security.

Contact

Skills

Core Skills

Open Source SoftwareSoftware Supply Chain SecurityCryptographySite Reliability EngineeringDevops

Other Skills

CLIsbomqsSBOMGo (Programming Language)PKICertificate AuthorityhashingEncryptiongolangSystem MonitoringGrafanaargocdLinux System AdministrationOperating SystemsKubernetes

About

I'm passionate about open-source software and to secure it actively contributing to improve the software supply chain security with a strong focus on SBOM (Software Bill of Materials) oss tooling at Interlynk. I contribute to and maintain several open-source projects like sbommv, sbomqs, and sbomasm, and stay actively involved in the broader SBOM community. I previously worked as a Junior SRE and Go developer at Obmondo , where I gained hands-on experience in infrastructure automation and backend development. Before that, I began my tech journey by contributing to CNCF projects like Kyverno, a Kubernetes-native policy engine, among others. So far, my path has been strongly oriented toward open source, which continues to be a central focus of my work. ๐™’๐™๐™–๐™ฉ'๐™จ ๐™ฃ๐™š๐™ญ๐™ฉ ?? In the next five years, I want to stay actively involved in software supply chain security. Itโ€™s a field thatโ€™s still growing, with many areas yet to be explored and plenty of real-world challenges to solve. Thatโ€™s exactly what drives meโ€” those challenges excites to get up from my bed to use the energy allocated for that day into solving these new challenges. At the end of the day, you become strong after tackling those challenges...

Experience

1 yr 9 mos
Total Experience
10 mos
Average Tenure
1 yr 6 mos
Current Experience

Interlynk

2 roles

Open Source Community Lead

Promoted

Oct 2024 โ€“ Present ยท 1 yr 6 mos ยท Remote

  • I lead and maintain Interlynk's open-source SBOM tooling ecosystem, including sbomqs, sbomasm, and sbommv. Working across Go based CLI development, issues, features, new releases and community driven engagement in the software supply chain security space.
CLIOpen Source SoftwareSoftware Supply chain Security

Open Source Developer

Jun 2024 โ€“ Sep 2024 ยท 3 mos ยท Remote

  • ๐–ณ๐—๐–พ ๐—‹๐—ˆ๐—…๐–พ ๐—‚๐—Œ ๐—๐—ˆ ๐—†๐–บ๐—‡๐–บ๐—€๐–พ ๐–บ ๐–ฎ๐—‰๐–พ๐—‡ ๐–ฒ๐—ˆ๐—Ž๐—‹๐–ผ๐–พ ๐–ฏ๐—‹๐—ˆ๐—ƒ๐–พ๐–ผ๐—๐—Œ ๐–ป๐–บ๐—Œ๐–พ๐–ฝ ๐—ˆ๐—‡ ๐–ฒ๐—ˆ๐–ฟ๐—๐—๐–บ๐—‹e. ๐–ฒ๐—Ž๐—‰๐—‰๐—…๐—’ ๐–ข๐—๐–บ๐—‚๐—‡ ๐–ฒ๐–พ๐–ผ๐—Ž๐—‹๐—‚๐—๐—’. ๐–ฅ๐–บ๐—‹ ๐—‡๐—ˆ๐— ๐—๐—ˆ๐—‹๐—„๐–พ๐–ฝ ๐—ˆ๐—‡ ๐—๐—๐–พ๐—Œ๐–พ ๐—๐–บ๐—„๐—Œ:
  • ๐–จ๐—†๐—‰๐—…๐–พ๐—†๐–พ๐—‡๐—๐–พ๐–ฝ ๐—๐—๐–พ ๐–ญ๐–ณ๐–จ๐–  ๐—†๐—‚๐—‡๐—‚๐—†๐—Ž๐—† ๐–พ๐—…๐–พ๐—†๐–พ๐—‡๐—๐—Œ ๐–ฒ๐–ก๐–ฎ๐–ฌ ๐—‹๐–พ๐—Š๐—Ž๐—‚๐—‹๐–พ๐—†๐–พ๐—‡๐—๐—Œ ๐–ผ๐—ˆ๐—†๐—‰๐—…๐—‚๐–บ๐—‡๐–ผ๐–พ ๐—‹๐–พ๐—‰๐—ˆ๐—‹๐—.
  • ๐– ๐–ฝ๐–ฝ๐–พ๐–ฝ ๐—Œ๐—Ž๐—‰๐—‰๐—ˆ๐—‹๐— ๐–ฟ๐—ˆ๐—‹ ๐—†๐–พ๐—‹๐—€๐—‚๐—‡๐—€ ๐–ฒ๐–ก๐–ฎ๐–ฌ๐—Œ ๐–ฝ๐—‚๐—‹๐–พ๐–ผ๐—๐—…๐—’ ๐—Ž๐—Œ๐—‚๐—‡๐—€ ๐–ฏ๐—‹๐—ˆ๐—ƒ๐–พ๐–ผ๐— ๐–จ๐–ฃ๐—Œ/๐–ฟ๐—‚๐—…๐–พ๐—Œ ๐–ฟ๐—‹๐—ˆ๐—† ๐–ฃ๐–พ๐—‰๐–พ๐—‡๐–ฝ๐–พ๐—‡๐–ผ๐—’ ๐–ณ๐—‹๐–บ๐–ผ๐—„
  • ๐–จ๐—†๐—‰๐—…๐–พ๐—†๐–พ๐—‡๐—๐–พ๐–ฝ ๐–ฎ๐—‰๐–พ๐—‡๐–ผ๐—๐–บ๐—‚๐—‡ ๐–ณ๐–พ๐—…๐–ผ๐—ˆ ๐–ฒ๐–ก๐–ฎ๐–ฌ ๐–ข๐—ˆ๐—†๐—‰๐—…๐—‚๐–บ๐—‡๐–ผ๐–พ ๐—‹๐–พ๐—‰๐—ˆ๐—‹๐— ๐—‚๐—‡ ๐—Œ๐–ป๐—ˆ๐—†๐—Š๐—Œ.
  • ๐–จ๐—†๐—‰๐—‹๐—ˆ๐—๐–พ ๐–ฝ๐–ป ๐—‰๐–พ๐—‹๐–ฟ๐—ˆ๐—‹๐—†๐–บ๐—‡๐–ผ๐–พ ๐—๐—๐—‹๐—ˆ๐—Ž๐—€๐— ๐—‹๐–พ๐–ฟ๐–บ๐–ผ๐—๐—ˆ๐—‹๐—‚๐—‡๐—€, ๐—ˆ๐—‰๐—๐—‚๐—†๐—‚๐—“๐—‚๐—‡๐—€ ๐–บ๐—‡๐–ฝ ๐—‚๐—†๐—‰๐—‹๐—ˆ๐—๐—‚๐—‡๐—€ ๐—‚๐— ๐–ป๐—’ ๐—๐—๐–พ ๐–ป๐—’ ๐—๐—๐–พ ๐—‚๐—†๐—‰๐—…๐–พ๐—†๐–พ๐—‡๐—๐–บ๐—๐—‚๐—ˆ๐—‡ ๐—ˆ๐–ฟ ๐—†๐–บ๐—‰๐—Œ ๐—‚๐—‡๐—Œ๐—๐–พ๐–บ๐–ฝ ๐—ˆ๐–ฟ ๐—Œ๐—๐—‹๐—Ž๐–ผ๐—.
  • ๐–ฏ๐–บ๐—‹๐—๐—‚๐–ผ๐—‚๐—‰๐–บ๐—๐–พ ๐—‚๐—‡ ๐–ผ๐—ˆ๐–ฝ๐–พ ๐—‹๐–พ๐—๐—‚๐–พ๐—๐—Œ, ๐—‰๐—‹๐—ˆ๐—๐—‚๐–ฝ๐—‚๐—‡๐—€ ๐–ผ๐—ˆ๐—‡๐—Œ๐—๐—‹๐—Ž๐–ผ๐—๐—‚๐—๐–พ ๐–ฟ๐–พ๐–พ๐–ฝ๐–ป๐–บ๐–ผ๐—„ ๐–บ๐—‡๐–ฝ ๐–ฟ๐—ˆ๐—Œ๐—๐–พ๐—‹๐—‚๐—‡๐—€ ๐–บ ๐–ผ๐—ˆ๐—…๐—…๐–บ๐–ป๐—ˆ๐—‹๐–บ๐—๐—‚๐—๐–พ ๐–พ๐—‡๐—๐—‚๐—‹๐—ˆ๐—‡๐—†๐–พ๐—‡๐—.
  • ๐–ด๐—๐—‚๐—…๐—‚๐—“๐–พ ๐–ผ๐—ˆ๐—‡๐–ผ๐—Ž๐—‹๐—‹๐–พ๐—‡๐–ผ๐—’ ๐—‰๐–บ๐—๐—๐–พ๐—‹๐—‡๐—Œ (๐—€๐—ˆ๐—‹๐—ˆ๐—Ž๐—๐—‚๐—‡๐–พ๐—Œ, ๐–ผ๐—๐–บ๐—‡๐—‡๐–พ๐—…๐—Œ) ๐—๐—ˆ ๐—ˆ๐—‰๐—๐—‚๐—†๐—‚๐—“๐–พ ๐—‰๐–พ๐—‹๐–ฟ๐—ˆ๐—‹๐—†๐–บ๐—‡๐–ผ๐–พ.
  • ๐–ค๐—‡๐—Œ๐—Ž๐—‹๐—‚๐—‡๐—€ ๐–ผ๐—ˆ๐–ฝ๐–พ ๐—Š๐—Ž๐–บ๐—…๐—‚๐—๐—’, ๐—‰๐–พ๐—‹๐–ฟ๐—ˆ๐—‹๐—†๐–บ๐—‡๐–ผ๐–พ, ๐–บ๐—‡๐–ฝ ๐—‹๐–พ๐—…๐—‚๐–บ๐–ป๐—‚๐—…๐—‚๐—๐—’ ๐—๐—๐—‹๐—ˆ๐—Ž๐—€๐— ๐–ผ๐—ˆ๐—†๐—‰๐—‹๐–พ๐—๐–พ๐—‡๐—Œ๐—‚๐—๐–พ ๐—๐–พ๐—Œ๐—๐—‚๐—‡๐—€ ๐–บ๐—‡๐–ฝ ๐—ˆ๐—‰๐—๐—‚๐—†๐—‚๐—“๐–บ๐—๐—‚๐—ˆ๐—‡. ๐– ๐–ฝ๐–ฝ๐—‚๐—‡๐—€ ๐–ฟ๐—Ž๐—‡๐–ผ๐—๐—‚๐—ˆ๐—‡๐–บ๐—… ๐—๐—‚๐—Œ๐–พ ๐—๐–พ๐—Œ๐— ๐–บ๐—Œ ๐—๐–พ๐—…๐—… ๐–บ๐—Œ ๐–พ๐Ÿค๐–พ ๐—๐–พ๐—Œ๐—.
Software Supply chain SecuritysbomqsCLISBOMOpen-Source SoftwareGo (Programming Language)+1

Sigstore

Open Source Contributor

Nov 2023 โ€“ Feb 2024 ยท 3 mos ยท United States ยท Remote

  • Sigstore is a suite of tools, including Cosign, Fulcio, and Rekor, built on cryptographic principles. Cosign signs software artifacts, Fulcio issues certificates, and Rekor provides a public log for verifying these certificates. To effectively contribute to Cosign, I had to acquire a solid foundation in cryptography, encompassing concepts like public and private keys, encryption, decryption, PKI, certificate authorities, hashing, and many more concepts. This knowledge was crucial for comprehending Cosign's core functionalities and enabled me to start contributing to the project. And then contributed to few issues and features of Cosign tool. Which helped me to understand project bit in more detail. The fun part I enjoyed the concept of Fulcio which issues a CA for 10 minutes and that where the concept of Keyless verification came. This removes the burden of storing private keys.
PKICertificate AuthorityhashingEncryptionCryptographygolang

Career break

Career transition

Aug 2023 โ€“ Oct 2023 ยท 2 mos ยท Indore, Madhya Pradesh

Enableit.dk

Site Reliability Engineer

Jan 2023 โ€“ Jul 2023 ยท 6 mos ยท Denmark ยท Remote

  • The company is responsible for managing customers' Linux servers and Kubernetes clusters. In my role, I have primarily worked as a Junior SRE and Golang Developer. The required technologies include Puppet, Linux, networking, Kubernetes, containers, Golang, troubleshooting, Prometheus, Grafana, GitOps, Argo CD, security policies, and more. One of the great aspects of working here is the opportunity to learn something new every day.
System MonitoringGrafanaargocdLinux System AdministrationOperating SystemsKubernetes+8

Cloud native computing foundation (cncf)

2 roles

Open Source Contributor

Promoted

Sep 2021 โ€“ Oct 2022 ยท 1 yr 1 mo ยท United States ยท Remote

  • Contributed to CNCF projects such as Kyverno, KubeArmor, Kubernetes, etc.
YAMLKubernetespolicy as a codegolangOpen Source Software

Open Source Contributor

Jun 2021 โ€“ Sep 2021 ยท 3 mos ยท United States ยท Remote

  • Kyverno, which serves as a policy engine specifically designed for Kubernetes. During my internship at Nirmata, I had the opportunity to work on Kyverno, where I contributed by adding essential features, addressing bugs, writing policies, and creating test cases. Throughout this experience, I had the privilege of working under a mentor for three months, which proved to be an incredible learning opportunity. Even after the conclusion of my internship, I remained dedicated to continuing my contributions to the Kyverno project.
  • During my time at Kyverno, I gained valuable experience in various technologies, including Golang, Docker, Kubernetes, testing, YAML, and more. Additionally, I had the opportunity to develop important soft skills such as teamwork, effective communication, presenting ideas in meetings, and providing assistance to others within the team.
LinuxContainerOperating SystemsDebianYAMLGo (Programming Language)+3

Linuxworld informatics pvt ltd

2 roles

Training on Kubernetes (CKA/CKAD)

Jan 2021 โ€“ Mar 2021 ยท 2 mos

Red Hat Enterprise Linux (RHEL)Operating SystemsAmazon Web Services (AWS)TroubleshootingSecure Shell (SSH)

Student Intern

Dec 2020 โ€“ May 2021 ยท 5 mos

  • This is where my tech journey started. With the help of a mentor, I learned about many different technologies, starting from Linux and even diving into the fascinating world of Artificial Intelligence. It was like exploring different fields of technology to get a feel for each one and deciding which one I loved the most.
  • Later, I made the decision to build my career in the field of cloud-native technologies, open source, and specifically focusing on Kubernetes. With that goal in mind, I took the next step and started contributing to open source projects.
Red Hat LinuxSecure Shell (SSH)

Education

Jabalpur Engineering College

Bachelor of Engineering - BE โ€” Computer Science

Jan 2019 โ€“ Apr 2023

Sunbeam School Bhagwanpur , Varanasi

Feb 2009 โ€“ Jun 2015

Stackforce found 100+ more professionals with Open Source Software & Software Supply Chain Security

Explore similar profiles based on matching skills and experience