// Cybersecurity Professional & Cloud Security Specialist

RAJATH H V

CLOUD SECURITY  |  GRC  |  PENETRATION TESTING_

Cybersecurity engineer with hands-on expertise in cloud security architecture, governance frameworks, and offensive security. Building resilient, threat-aware systems from the ground up.

0
Vulnerabilities Found
0
Security Frameworks
0
Vendor Assessments
0
% Efficiency Gained

About Me

🛡️
AUTHORIZED OPERATOR

I'm a Cybersecurity undergraduate at Garden City University (CGPA 8.8/10) with deep expertise in Cloud Security, Governance Risk & Compliance, and Penetration Testing.

Currently interning at Mitigata Cyber Resilience, I work at the intersection of cloud security evaluation, ISO 27001:2022 / SOC 2 compliance implementation, and third-party risk management — helping organisations defend their digital perimeter from modern threats.

My approach is holistic: I think offensively to defend defensively. Whether auditing a cloud infrastructure's IAM policies or popping a web app's SQLi vulnerability, I bring the same precision and rigour.

Cloud Security ISO 27001 SOC 2 NIST CSF VAPT TPRM AWS Security IDS / SIEM Python

Core Skills

☁️
Cloud Security
AWS IAM & Access Control88%
CloudTrail / CloudWatch82%
VPC & Network Security80%
CSPM & Compliance Monitoring85%
📋
GRC & Compliance
ISO 27001:202290%
SOC 2 Type I/II87%
NIST Cybersecurity Framework85%
Third-Party Risk (TPRM)88%
🔍
Penetration Testing
Burp Suite / OWASP ZAP86%
SQL Injection / XSS / CSRF88%
Nmap & Network Recon82%
Kali Linux84%
💻
Programming & Automation
Python (Security Scripting)88%
SQL80%
JavaScript74%
Java70%
🔐
Security Operations
IDS / Log Analysis87%
Incident Response80%
Threat Modelling83%
Windows / Linux Hardening82%
🌐
Infrastructure
AWS Fundamentals82%
VMware / VirtualBox78%
Container Security72%
Secure Infra Design80%

Work Experience

2025 - 2026 – Present // Full-time Internship
Cybersecurity Intern — GRC & Cloud Security
Mitigata Cyber Resilience
  • Spearheaded implementation and monitoring of ISO 27001:2022, SOC 2, and NIST CSF controls across multi-cloud client environments, significantly elevating compliance posture.
  • Conducted comprehensive cloud security evaluations — reviewing IAM configurations, VPC policies, encryption mechanisms, and logging — identifying and remediating critical misconfigurations.
  • Executed end-to-end TPRM vendor assessments including security due diligence reviews and risk-tiering for 20+ vendor relationships.
  • Collaborated with internal teams and clients to prepare audit documentation, validate controls, and drive compliance reporting for external certification audits.
  • Developed security governance policies and CSPM frameworks, strengthening both technical and human layers of organisational cloud defence.
2024 // Virtual Internship
Cybersecurity Intern — Penetration Testing
ShadowFox (Virtual)
  • Executed structured web application penetration tests using Burp Suite and OWASP ZAP, uncovering 10+ critical and high-severity vulnerabilities including SQLi, XSS, and CSRF.
  • Produced executive-ready vulnerability assessment reports with CVSS scoring, proof-of-concept chains, and prioritised remediation guidance.
  • Conducted full vulnerability validation and remediation retesting cycles, confirming effective closure of identified security gaps.
  • Applied OWASP Top 10 methodology to formulate targeted hardening recommendations adopted by client development teams.

Key Projects

01
🤖
Automatic Log Analyser for Intrusion Detection Systems
Engineered a real-time automated log analysis engine for IDS log processing — surfacing anomalous network behaviour using dual-layer detection combining rule-based signatures with behavioural anomaly algorithms. Integrates with AWS CloudTrail and VPC Flow Logs.
Python IDS / SIEM AWS Integration Threat Detection
02
🖐️
Multi-Factor Authentication via Gesture & Signature Recognition
Designed a biometric MFA system integrating computer-vision hand gesture recognition with dynamic signature verification. Validated against enterprise false-acceptance-rate (FAR) benchmarks, suitable for cloud-hosted or on-premises deployment.
Python OpenCV Scikit-learn Flask Biometrics
03
🐾
Secure Animal Welfare Pet Adoption Platform
Built a full-stack platform with RBAC, secure authentication, PCI-DSS-aligned Razorpay payment integration, and OWASP Top 10 hardening throughout the development lifecycle. Automated email notifications and structured approval workflows.
RBAC OWASP Top 10 PCI-DSS Razorpay API

Certifications & Education

🏅
Cisco Cybersecurity Certification
Cisco Networking Academy
🇮🇳
ISEA Cyber Hygiene Practitioner
Govt. of India — National Initiative
🛡️
Network Defence Essentials (NDE)
EC-Council
🎓
B.Tech Computer Science — Cybersecurity Specialisation
GARDEN CITY UNIVERSITY, BANGALORE
Expected June 2026  ·  CGPA: 8.8 / 10.0

Research & Achievements

// Peer-Reviewed Research Publication
"Privacy Challenges in Big Data Analytics:
Legal and Ethical Solutions"
Published peer-reviewed research exploring the intersection of data privacy regulation, big data analytics infrastructure, and ethical governance frameworks. The paper proposes scalable legal and technical solutions for organisations navigating privacy compliance at scale.

Impact: Cited in multiple academic publications and presented at a national-level cybersecurity conference — demonstrating thought leadership in data privacy, regulatory compliance, and ethical AI governance.

Get In Touch

Let's Build Secure Systems Together

Open to cloud security roles, GRC positions, penetration testing engagements, and research collaborations. Based in Bangalore — available for remote or on-site opportunities.

secure_msg.sh
$ ./send_message.sh --encrypted
name:
email:
msg:
$ # PII Data Notice
Data collected: Name · Email · Message content
Purpose: Response to your enquiry only
Retention: Deleted upon request
Rights: Access · Rectify · Erase (GDPR / IT Act 2000 compliant)
Contact: rajathveeraiah20@gmail.com
[✔] Message encrypted & transmitted successfully.