anshumaan security-systems
Resume
secure-by-default โ€ข systems engineering โ€ข evidence-driven

Hi ๐Ÿ‘‹, I'm Anshumaan Singh

Security Systems Engineer | DevSecOps | Cloud & Application Security
"I engineer security like reliability โ€” as a system property enforced through architecture, policy boundaries, and continuous verification."

I build security control planes across CI/CD, artifact integrity, Kubernetes runtime guardrails, and cloud governance so that insecure paths become operationally hard and secure delivery becomes the default.

๐Ÿ“ Bengaluru, India ๐Ÿข InfoSec Analyst (IC-2) @ ZEE ๐Ÿงฉ AppSec + DevSecOps + Kubernetes Security
0+
Microservices secured in scope
0+
CI/CD security gates enforced
Dev โ†’ UAT โ†’ Prod
Controlled promotions + approvals
SBOM + Evidence
Attestation-ready delivery
Security Engineering
Anshumaan Singh
Anshumaan Singh
Security Systems Engineer
security invariants
โ€ข identity โ†’ short-lived, keyless, verifiable
โ€ข CI/CD โ†’ deterministic verification + evidence
โ€ข artifacts โ†’ immutable + controlled promotion
โ€ข runtime โ†’ least privilege + enforcement
โ€ข governance โ†’ guardrails (policy) not docs

๐Ÿ”ฅ About Me (Security Systems Engineering)

I design and implement secure-by-default delivery systems where security is treated as a platform property, not a manual review step. My work focuses on building non-bypassable controls across source governance, CI/CD verification, artifact integrity, Kubernetes runtime guardrails, and cloud governance boundaries.

I optimize for outcomes that hold under attacker behavior: least privilege enforcement, drift resistance, tamper-evident artifacts, deterministic security gates, and audit-ready evidence that moves with the release from Dev โ†’ UAT โ†’ Prod.

โš–๏ธ Engineering Philosophy

Shift Smart, Not Just Left

Security should be abstracted into the platform. If the paved road is secure, teams ship faster with less risk.

Identity is the Control Plane

Network boundaries are porous. Strong workload identity + OIDC federation enables keyless, verifiable trust.

Guardrails over Gates

Guardrails preserve velocity while preventing catastrophic failures. Enforce safety without blocking delivery.

Detection as Code

Alerts must map to response playbooks. If an alert has no action, it becomes noise and reduces trust.

๐Ÿ› ๏ธ Implementation (What I actually built)

This is the execution layer โ€” real pipelines, real controls, real enforcement. Not slideware.

CI/CD Security Control Plane

  • Engineered multi-stage DevSecOps pipelines enforcing security at build โ†’ scan โ†’ deploy โ†’ validate stages.
  • Implemented PR-only merges + CODEOWNERS approvals + branch protections to eliminate bypass paths.
  • Standardized dependency graph: verify โ†’ build โ†’ tag โ†’ scan โ†’ push โ†’ deploy โ†’ post-deploy validation.
  • Integrated Slack notifications with build metadata (commit, author, workflow run, status).
  • Stored scan results as pipeline artifacts to support audit trails, RCA, and compliance evidence.

Supply Chain Integrity + SBOM

  • Enforced immutable image versioning (v1.0) and removed โ€œlatestโ€ to eliminate deployment drift.
  • Built controlled promotion workflow: QA promotes scanned images Dev โ†’ UAT โ†’ Prod (no rebuilds in prod).
  • Ensured only approved + scanned digests are eligible for deployment via registry path enforcement.
  • Created evidence chain: scan outputs + approvals + image digest tracking.

Kubernetes Runtime Guardrails

  • Implemented kubeaudit checks to detect risky workload patterns and enforce baseline hygiene.
  • Standardized secure deployment baseline: probes, limits, safe defaults, namespace patterns.
  • Reduced runtime risk by preventing privileged workloads and unsafe configurations.

AppSec + Secrets Remediation

  • Led response for hardcoded Azure storage keys, OAuth secrets, and leaked tokens in repositories.
  • Coordinated secure secret rotation without production impact.
  • Performed web/API/mobile penetration testing and delivered actionable remediation guidance.

๐Ÿง  System Design (Security as a platform property)

I design security like reliability: as a system-level invariant enforced through identity, policy boundaries, deterministic verification, and runtime enforcement.

Core Security Invariants

  • Identity is the control plane โ†’ short-lived credentials, least privilege, verifiable trust.
  • Verification is deterministic โ†’ CI gates are non-bypassable and produce evidence.
  • Artifacts are immutable โ†’ digests + version tags + controlled promotion (no rebuilds in prod).
  • Runtime is constrained โ†’ policy + RBAC + secure contexts reduce attacker movement.
  • Everything is auditable โ†’ logs + scan outputs + approvals move with the release.

Design Principles I enforce

  • Guardrails over manual reviews.
  • Secure paved roads for engineering velocity.
  • Risk-based gating (severity + exploitability + probability).
  • Policy as code, evidence as artifacts.
  • Traceability: commit โ†’ build โ†’ digest โ†’ deployment.

๐Ÿ—๏ธ Reference Architecture: Secure-by-Default Delivery (End-to-End)

A complete view of how secure delivery is enforced from source to production with evidence and controlled promotions.

Pipeline Evidence Snapshot
SBOM / Attestation / Scan pipeline view
SBOM
SBOM Security Pipeline
This image is used as a proof-of-implementation artifact.

Flow Explanation (No insecure release reaches production)

1) Source Governance
  • Pre-commit checks + signed commits + PR-only merges
  • CODEOWNERS + branch protection + required checks
  • Main branch becomes single source of truth
2) CI Verification Boundary
  • Ephemeral runners execute deterministic security gates
  • SAST + SCA + Secrets + IaC scanning enforced
  • Quality gate controls pass/fail and stores evidence artifacts
3) Supply Chain Integrity
  • Build once โ†’ scan โ†’ generate SBOM โ†’ attach provenance
  • Image digest tracking + immutability prevents drift
  • Evidence moves with release across Dev โ†’ UAT โ†’ Prod
4) Runtime Enforcement + Operations
  • Admission policy blocks unsafe workloads before deployment
  • RBAC + namespaces reduce blast radius
  • Audit logs + SIEM detections + IR playbooks contain impact

๐Ÿ“Œ Case Studies (Real problems solved)

Real-world security engineering outcomes across pipelines, supply chain, and Kubernetes delivery.

Secrets Leakage Response

  • Detected hardcoded Azure Storage keys + OAuth secrets in repos and validated exposure scope.
  • Coordinated secure rotation and remediation without production downtime.
  • Implemented prevention guardrails: secret scanning + branch protections + required checks.
  • Outcome: reduced recurrence through enforcement + governance + audit evidence.

Prisma twistcli inconsistent vulnerability results

  • Observed Prisma returning zero vulnerabilities for known-vulnerable base images.
  • Cross-validated findings using Trivy + public CVE references to confirm true risk.
  • Improved pipeline trust by enforcing scan evidence retention + validation gates.
  • Outcome: fewer production pipeline failures caused by scanner inconsistency.

Controlled Promotions (Dev โ†’ UAT โ†’ Prod)

  • Implemented โ€œbuild once, promote manyโ€ model to prevent rebuild risk and drift.
  • Added approval gates + registry path enforcement to block unauthorized deployment paths.
  • Outcome: digest-level traceability strengthened across environments.

OWASP ZAP DAST with Kubernetes dynamic URL

  • Automated DAST using runtime service discovery via kubectl for real endpoint validation.
  • Ensured post-deploy security checks reflect production-like behavior.
  • Outcome: improved coverage beyond static environment assumptions.

๐Ÿงจ Threat Model (How attackers actually break systems)

I model threats using attacker behavior, not just compliance checklists. Controls are mapped to kill-chain stages so enforcement blocks real attack paths.

Primary Threat Vectors

  • Credential theft (tokens, OAuth secrets, cloud keys)
  • Pipeline compromise (runner persistence, secret exposure)
  • Dependency compromise (typosquatting, malicious packages)
  • Container base image vulnerabilities + drift via latest tags
  • Kubernetes privilege escalation (privileged pods, host mounts)
  • Lateral movement (east-west traffic abuse)
  • Data exfiltration (egress misuse, weak PII boundaries)

Control Mapping (Kill Chain โ†’ Defense)

  • Recon โ†’ WAF + rate limiting
  • Initial Access โ†’ secrets scanning + SAST + admission deny
  • Privilege Escalation โ†’ RBAC + securityContext hardening
  • Lateral Movement โ†’ segmentation + mesh + mTLS
  • Exfiltration โ†’ egress restrictions + PII boundaries
  • Impact โ†’ SIEM detections + incident response containment

๐Ÿงพ Evidence (Audit-ready security delivery)

Proof that controls exist, ran, and produced outputs. Evidence is attached to releases, not stored in memory.

Evidence Pack includes

  • Scan outputs: SAST, SCA, Secrets, IaC, Image scan, DAST reports
  • Build metadata: workflow run ID, commit SHA, branch, actor
  • Artifact metadata: image digest, tags, registry path
  • Promotion approvals: QA / release gates / policy decisions
  • Retention: artifacts stored per pipeline for compliance and RCA

SBOM Snapshot (Implementation proof)

This image is used as proof-of-implementation artifact.

SBOM Evidence Snapshot

๐Ÿงฎ Risk Engine (Policy-driven release decisions)

Security gating should reflect exploitability reality. I design release gates using severity + probability + exploit maturity so teams ship safely without unnecessary friction.

Inputs to Risk Scoring

  • CVSS โ†’ technical severity baseline
  • EPSS โ†’ likelihood of exploitation in the wild
  • Exploit maturity โ†’ weaponization / public exploit availability
  • Reachability โ†’ exposed surface + runtime path
  • Compensating controls โ†’ RBAC, WAF, egress, segmentation

Policy Gate Outcomes

  • Block โ†’ exploitable critical vulnerabilities or policy violations
  • Allow with evidence โ†’ low-risk findings with traceability and audit pack
  • Allow with exception โ†’ tracked risk acceptance + expiry and follow-up actions
  • Auto-promote โ†’ clean evidence + approved digest across environments

๐Ÿข Experience (Impact)

Categorized impact points with measurable security engineering outcomes.

ZEE Entertainment Enterprises Ltd โ€” Bengaluru, India
Information Security Analyst (IC-2) | AppSec + DevSecOps | Jun 2023 โ€“ Present
350+ microservices CI/CD gates SBOM + evidence K8s guardrails
Scope & Scale: Security engineering across cloud-native delivery for 350+ microservices. Enforced secure SDLC from code โ†’ pipeline โ†’ registry โ†’ Kubernetes runtime.
CI/CD Security Control Plane
  • Engineered a CI/CD Security Control Plane enabling deterministic enforcement across build, scan, deploy, and post-deploy validation stages.
  • Implemented PR-only merge governance with CODEOWNERS enforcement, branch protections, and required checks to eliminate direct-to-main release risk.
  • Built multi-language SAST coverage for JavaScript/HTML and standardized scan artifact retention for audit evidence and RCA workflows.
  • Implemented SCA enforcement for Maven + Node ecosystems with policy thresholds to block high-risk dependency introduction.
  • Deployed organization-wide secret scanning controls to prevent leakage of OAuth secrets, cloud keys, and hardcoded tokens across repositories.
  • Integrated container vulnerability scanning using Prisma Cloud (twistcli) and enforced cross-validation using Trivy to reduce scanner trust failures.
  • Implemented IaC scanning to prevent insecure Kubernetes manifests and cloud misconfigurations from reaching runtime environments.
  • Automated OWASP ZAP DAST with Kubernetes service discovery (kubectl-based dynamic URL extraction) for post-deploy validation coverage.
  • Standardized pipeline execution order and dependency flow: verify โ†’ build โ†’ tag โ†’ scan โ†’ push โ†’ deploy โ†’ validate โ†’ notify.
  • Built evidence retention strategy: scan outputs, logs, approvals, and digests retained as artifacts to support compliance and investigations.
  • Implemented Slack-based release telemetry with commit/build/author context to improve engineering visibility and reduce release ambiguity.
  • Optimized pipeline execution using parallel scanning stages while preserving enforcement integrity and coverage.
Supply Chain Security + SBOM + Attestation
  • Implemented controlled artifact promotion workflow where QA promotes images separately for UAT/Prod (no rebuilds in prod).
  • Enforced immutable versioning (v1.0) and prevented use of latest tags to eliminate deployment drift.
  • Ensured only scanned + approved images are eligible for deployment using digest-level validation patterns.
  • Built evidence model: scan results + approvals + image digest tracking = attestation-ready delivery.
  • Strengthened traceability from commit โ†’ build โ†’ image digest โ†’ deployment across environments.
  • Added promotion gates to prevent deploying images not present in approved registry paths.
Kubernetes Security Engineering
  • Implemented Kubernetes security checks using kubeaudit to detect risky cluster/workload configurations.
  • Reduced runtime risk by preventing privileged workloads and unsafe patterns via baseline enforcement.
  • Standardized secure deployment baselines: probes, limits, safe defaults, namespace patterns.
  • Assisted in Kubernetes cluster setup and validation using kubeadm (v1.28.1).
  • Improved blast radius control through workload boundary checks and least privilege patterns.
  • Mapped runtime risks to enforcement and operational response expectations.
Cloud Governance + Migration Security
  • Supported secure cloud governance strategy across environments and teams.
  • Designed secure identity and access boundaries to reduce cloud exposure.
  • Worked on GCP migration initiatives and security design for HIPI project.
  • Implemented posture improvements aligned with production delivery requirements.
  • Supported ingress/CDN exposure patterns and service hardening approaches.
  • Built governance as guardrails (policy) instead of documentation-only controls.
AppSec + Secrets Remediation
  • Performed web, API, and mobile penetration testing as part of application security responsibilities.
  • Identified and validated auth, access control, API misuse, and security misconfiguration issues.
  • Supported secure design review and remediation guidance for engineering teams.
  • Led response for hardcoded Azure Storage Account keys found in repositories.
  • Remediated hardcoded OAuth credentials and leaked secrets across source control.
  • Coordinated secret rotation safely without production impact.
  • Improved repo hygiene using scanning + governance + enforcement patterns.
  • Reduced false positives by tuning policies and aligning severity with exploitability.
  • Defined deployment decisions: block/allow based on thresholds and risk acceptance workflows.
  • Acted as bridge between AppSec + DevOps + QA + Engineering to ensure secure releases at scale.

๐ŸŽ“ Education

M.Tech โ€” Software Systems (Cybersecurity) โ€ข Jan 2026 โ€“ Dec 2028 โ€ข Pursuing
Postgraduate
Work-integrated postgraduate program focused on secure software engineering, applied security architecture, cloud security patterns, identity & access control, and security assurance across SDLC.
Secure SDLC Threat Modeling Cloud Security IAM Security Engineering
B.Tech โ€” Electronics & Communication Engineering โ€ข Jun 2019 โ€“ May 2023
Undergraduate
Undergraduate engineering degree with strong foundations in systems, networks, embedded concepts, signal processing, and computing fundamentals.
Systems Networking Problem Solving

๐Ÿงฉ Projects

Engineering projects that demonstrate secure delivery, automation, and system design.

Netflix Clone โ€” Secure CI/CD Pipeline

  • Built CI/CD pipeline with SAST, SCA, secrets scanning, Trivy image scan, and controlled deployment.
  • Implemented Slack notifications with build + commit metadata.
  • Focused on immutable image tags (v1.0) and evidence retention.

Kubernetes Security Validation Toolkit

  • Combined kubeaudit + cluster checks for misconfiguration detection.
  • Designed baseline enforcement for risky workload patterns.
  • Mapped findings to remediation playbooks for engineering teams.

๐Ÿงญ Explorer (What Iโ€™m building next)

Active areas of engineering exploration: making security controls faster, stronger, and more measurable.

Secure Build Provenance

  • Expanding provenance metadata to include environment and runner identity.
  • Improving attestations for artifact traceability across Dev โ†’ UAT โ†’ Prod.

Policy as Code Expansion

  • Strengthening policy gates for Kubernetes workload hardening.
  • Improving enforcement for registry paths + digest allowlisting.

Risk-based Security Gates

  • Reducing false positives by aligning severity with exploitability.
  • Tracking risk acceptance and expiry-based exceptions.

Security Metrics & KPIs

  • Measuring gate pass rate, mean time to remediate, recurrence of secrets leakage.
  • Building dashboards for release integrity and evidence coverage.

๐Ÿงฐ Skills (Security Systems Engineering)

Grouped by real-world engineering domains.

DevSecOps + CI/CD

  • GitHub Actions, Jenkins, pipeline orchestration
  • Branch protection, CODEOWNERS, PR-only enforcement
  • Artifact retention, evidence generation, release governance

Supply Chain Security

  • SBOM generation, artifact signing, digest traceability
  • Immutable versioning + controlled promotions
  • Container security scanning: Prisma twistcli, Trivy

Application Security

  • Web/API/Mobile penetration testing
  • AuthZ/AuthN testing, misconfigurations, API abuse validation
  • Remediation guidance + secure design reviews

Kubernetes Security

  • RBAC, namespaces, workload hardening baselines
  • kubeaudit-based checks and enforcement patterns
  • Ingress exposure and blast radius reduction

๐Ÿ… Certifications (Verified)

Clickable cards with verification links.

Skills Boost profile: View Profile โ†’

๐Ÿ† Achievements

Verified impact + certifications + security engineering outcomes.

Certifications

  • CKS โ€” Certified Kubernetes Security Specialist
  • CKA โ€” Certified Kubernetes Administrator
  • GCP Professional Cloud Security Engineer
  • GCP Professional Cloud Architect
  • Terraform Associate

Security Engineering Outcomes

  • Implemented security enforcement across 350+ microservices delivery scope.
  • Built CI/CD security gates with evidence retention and audit-ready outputs.
  • Enabled controlled promotions with immutability and digest-level traceability.
  • Reduced secrets exposure risk through scanning + governance + rotation response.

๐Ÿ“ซ Connect

Ready