Mukesh Bhakar
Verified Expert in Engineering
Cloud Security Developer
Mukesh is a professional with over 14 years of experience in cybersecurity. He has expertise in designing and implementing security solutions across multi-cloud platforms like AWS, Azure, and GCP. His background also includes DevSecOps, security operations, cloud security assessment, endpoint security, and data security. Mukesh has worked in various roles as an individual contributor and in leadership positions.
Portfolio
Experience
Availability
Preferred Environment
Container Security, Network Security, Application Security, Cloud Security, DevSecOps, Amazon Web Services (AWS), Security Architecture, Threat Modeling, SOC 2, Infrastructure as Code (IaC), Linux Administration, Artificial Intelligence (AI), Vulnerability Assessment, GCP Security, Firewalls
The most amazing...
...thing I've designed was a robust, scalable, and secure multi-cloud architecture, incorporating industry best practices to safeguard enterprise data and systems.
Work Experience
Platform Cloud Security Engineer
Commonwealth Financial Network
- Developed a multi-cloud security orchestration platform for managing security policies, identity management, and threat detection across AWS and Azure using CSPM.
- Implemented a comprehensive access governance solution, utilizing AWS SSO and Azure Active Directory for centralized user authentication and authorization.
- Designed and implemented a multi-account architecture in AWS, segregating workloads and applications into distinct AWS accounts using AWS SRA and Control Tower.
- Designed and implemented cloud governance, establishing policies, procedures, and controls for cloud framework using NIST 800-53, CIS, and PCI DSS.
Senior Cloud Security Architect
ValueLabs
- Performed security and privacy assessments, which included vulnerability assessment and penetration testing in determining compliance and security posture in the cloud.
- Implemented AWS Security Hub, AWS Organizations, GuardDuty, SSO, WAF, and AWS native security tools.
- Conducted vulnerability assessment using Burp Suite Enterprise, Nmap, Nessus, OWASP ZAP, sqlmap, Scout Suite, and PACU.
- Automated cloud security controls, data, and processes to provide better metrics and operational support.
- Identified security threats and risks related to cloud infrastructure services and planned remediation activities.
- Implemented Azure Sentinel, Azure Security Center, Azure WAF, and Application Gateway.
Cloud Security Architect
Mundo Startel S.A.
- Designed secure cloud architecture using best practices.
- Audited and implemented compliance as per regulatory requirements.
- Designed, implemented, and maintained cloud infrastructure security, identified technical gaps, and provided solutions.
- Gained extensive experience in cloud-based DDoS protection services such as AWS Shield Advanced.
Application Security Engineer
Ericsson
- Developed processes and implemented tools and techniques to perform ongoing security assessments of the environment.
- Analyzed security test results, drew conclusions from results, and developed targeted testing as deemed necessary.
- Collaborated with external vendors to perform penetration tests on network devices, operating systems, databases, and applications as necessary.
Security Engineer
Vodafone Idea
- Conducted vulnerability assessments of IT infrastructure for government agencies and private companies. Identified and prioritized vulnerabilities based on risk assessment and provided recommendations for remediation.
- Conducted audits for organizations processing credit card data to ensure compliance with the Payment Card Industry Data Security Standard (PCI DSS). Identified and reported non-conformities and provided guidance on remediation measures.
- Conducted a financial institution's comprehensive IDS/IPS vulnerability assessment, identifying misconfigurations and tuning recommendations to optimize threat detection accuracy and minimize false positives.
Senior Engineer
Vodafone Idea
- Performed manual, external, and internal penetration testing.
- Collaborated with external vendors to perform penetration tests on network devices, operating systems, and databases.
- Provided assistance to system users regarding information system security.
- Performed routine vulnerability scans against specified systems, analyzed the results, and worked with business units to remediate systems.
IT Security Engineer
Huawei Technologies Co.
- Implemented data loss prevention (DLP) policies and technologies to prevent unauthorized data exfiltration and ensure compliance with data privacy regulations.
- Designed and deployed secure network segmentation strategies to minimize the attack surface and limit the potential impact of security breaches.
- Conducted physical security assessments to identify vulnerabilities in physical access controls and recommend improvements.
Cyber Security Analyst
Ericsson
- Assessed and optimized the existing vulnerability management program, identifying gaps and inefficiencies.
- Implemented vulnerability scanning tools on various platforms (endpoints, network devices, applications) and prioritized identified vulnerabilities based on risk assessment.
- Automated vulnerability patching processes and tracked remediation progress across different systems.
Experience
Implementation of AWS Security Architecture
Protection Against Ransomware
AWS Organization Multi-account Architecture Implementation
Skills
Tools
Metasploit, AWS IAM, Sentinel, Azure Key Vault, VPN, GCP Security, Amazon Cognito, Amazon Virtual Private Cloud (VPC), AWS CloudFormation, Terraform, Boto 3
Paradigms
Penetration Testing, DevSecOps, DevOps
Platforms
Azure, AWS Lambda, AWS ALB, Amazon Web Services (AWS), Microsoft, AWS Elastic Beanstalk, Amazon EC2, Kubernetes, Google Cloud Platform (GCP)
Industry Expertise
Network Security, Cybersecurity
Storage
Azure Active Directory, Amazon S3 (AWS S3)
Other
OWASP Top 10, Application Security, Cloud Security, Networking, Computer Science, Security Architecture, IT Service Management (ITSM), Security, Kubernetes Security, AWS Organizations, Security Hub, GaurdDuty, Single Sign-on (SSO), Amazon Route 53, Cyber Threat Hunting, SecOps, Architecture, Identity & Access Management (IAM), IT Security, OWASP, Web Security, Vulnerability Management, Security Audits, Okta, Microsoft Azure, Technical Hiring, Source Code Review, Interviewing, Task Analysis, Cloud, APIs, Team Management, Compliance, Consulting, Data Protection, GDPR, Ethical Hacking, Hacking, NIST, Security Management, Microsoft 365, Identity, Security Analysis, Business Continuity Planning (BCP), Disaster Recovery Plans (DRP), Information Security Management Systems (ISMS), SOC 2, CISM, Azure Resource Manager (ARM), Networks, Data Loss Prevention (DLP), IDS/IPS, Firewalls, Threat Intelligence, Linux Administration, Vulnerability Assessment, Network Architecture, Network Engineering, Team Leadership, Network Design, Network Monitoring, Endpoint Detection and Response (EDR), SIEM, Audits, Leadership, SaaS Security, Web Application Firewall (WAF), Container Security, Dynamic Application Security Testing (DAST), Static Application Security Testing (SAST), CI/CD Pipelines, Web App Security, CISO, ISO 27001, Threat Modeling, Risk Management, Infrastructure as Code (IaC), Artificial Intelligence (AI), Secure Containers, AWS Certified Solution Architect, AWS Control Tower, AWS WAF, Risk Assessment, Information Security, Security Operations Centers (SOC), Patch Management, Managed Security Service Providers (MSSP)
Languages
Python 3
Education
Master's Degree in Cyber Security
Southern New Hampshire University - New Hampshire
Bachelor's Degree in Electronics and Communication Engineering
University of Rajasthan, Jaipur - Jaipur, India
Certifications
Certified Information Security Manager (CISM)
ISACA
Microsoft Certified: Cybersecurity Architect Expert
Microsoft
Certified Kubernetes Security Specialist (CKS)
The Linux Foundation
Microsoft Certified: Azure Security Engineer Associate
Microsoft
Certificate of Cloud Security Knowledge (CCSK)
CSA
AWS Certified Security – Specialty
Amazon Web Services
CKA: Certified Kubernetes Administrator
The Linux Foundation
AWS Certified Solutions Architect Associate
AWS
ITIL
Axelos
How to Work with Toptal
Toptal matches you directly with global industry experts from our network in hours—not weeks or months.
Share your needs
Choose your talent
Start your risk-free talent trial
Top talent is in high demand.
Start hiring