Skip to content
View AurelienKumarathas's full-sized avatar
  • London
  • 05:24 (UTC +01:00)

Block or report AurelienKumarathas

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
AurelienKumarathas/README.md

Aurélien Kumarathas

DevSecOps & Cloud Security Engineer — AWS · Terraform · Kubernetes · GitHub Actions

I help teams ship faster without shipping vulnerabilities — by building security into IaC, CI/CD pipelines, and Kubernetes from day one.

Recent focus areas:

  • Secure-by-default Terraform — hardened AWS modules, policy-as-code with OPA/Rego, SARIF reporting
  • Multi-tool DevSecOps pipelines — SAST, SCA, secrets detection, IaC and container scanning in GitHub Actions
  • Kubernetes hardening — OPA Gatekeeper constraints, network policies, runtime detection, CIS compliance
  • Threat modelling — STRIDE, DREAD, MITRE ATT&CK for regulated (healthcare/fintech) workloads

Based in London, UK — open to hybrid or remote-first roles.


🎯 Roles I'm Targeting

DevSecOps Engineer · Cloud Security Engineer · Security Engineer (Platform/Cloud)


📂 Featured Projects

Project What I built Impact Stack
Terraform AWS Security Hardening Hardened AWS stack (VPC, EC2, RDS, S3, KMS) with Checkov, tfsec & OPA wired into GitHub Actions. SARIF uploads feed the GitHub Security tab at PR level. Full SOC 2 control mapping and findings register included. 19 Checkov + 19 tfsec findings → 0 on main. All Critical/High remediated. Terraform · Checkov · tfsec · OPA/Rego · GitHub Actions · AWS
DevSecOps Pipeline Two-branch pipeline: main holds intentionally vulnerable code to prove every gate catches real issues; hardened branch is fully remediated. Open PR with before/after diffs, CVSS scores and MITRE ATT&CK mappings for every finding. 7 vulnerability classes eliminated — SQLi, SSTI, CMDi, path traversal, YAML injection, hardcoded creds, root container. GitHub Actions · CodeQL · Bandit · Trivy · Gitleaks · Docker
Kubernetes Security Portfolio Hardened a 3-node GKE cluster end-to-end: OPA Gatekeeper constraints (no root/privileged pods, required resource limits), namespace network policies, Trivy image scanning, RBAC audit, custom Falco rules. CIS non-compliance: 38% → 6% GKE · Kubernetes · OPA Gatekeeper · Falco · Trivy · Helm
Healthcare Threat Model Full threat model for a fictional NHS-style cloud platform on AWS. 31 threats across STRIDE categories, all DREAD-scored and placed in a risk register. ATT&CK Navigator layer JSON included. APT attack simulation timeline written to show where controls break real kill chains. 31 threats identified, mapped to MITRE ATT&CK, NIST CSF, NHS DSPT & UK GDPR. STRIDE · DREAD · MITRE ATT&CK · NIST CSF · AWS

🚀 Pipeline Status

IaC Security Pipeline DevSecOps Pipeline — hardened


🛠️ Core Skills

DevSecOps & CI/CD

GitHub Actions CodeQL Trivy Gitleaks

Cloud & IaC

AWS Terraform Checkov OPA

Containers & Kubernetes

Kubernetes Docker Falco

Languages

Python Bash HCL


📜 Certifications

  • HashiCorp Terraform Associate 003 (2025)
  • AWS Certified Cloud Practitioner (2025) — AWS Solutions Architect Associate in progress
  • GitHub Actions Certification (2025)
  • Google Cybersecurity Professional Certificate (2024)
  • BCS Information Security Management Principles (2024)
  • SailPoint Certified IdentityNow Associate (2024)

📫 Let's Connect

Actively seeking DevSecOps / Cloud Security Engineer roles. Happy to walk you through any of the projects above — just reach out.

Pinned Loading

  1. complete-threat-model-for-healthcare-application complete-threat-model-for-healthcare-application Public

    Healthcare platform threat model using STRIDE, MITRE ATT&CK, Cyber Kill Chain, attack trees, DREAD risk scoring, and NIST CSF control mapping. 31 threats identified across 6 categories.

  2. devsecops-pipeline-project-1 devsecops-pipeline-project-1 Public

    Production-grade DevSecOps pipeline with SAST, SCA, secret detection and IaC scanning using CodeQL, Trivy and Gitleaks. Built on GitHub Actions with AWS deployment.

    Python

  3. k8s-security-portfolio k8s-security-portfolio Public

    End-to-end Kubernetes security hardening on GKE — OPA Gatekeeper, Falco, Trivy, RBAC & Network Policies. Reduced CIS non-compliance from 38% to 6%.

  4. terraform-security-project terraform-security-project Public

    Terraform AWS security hardening - Checkov, tfsec & OPA in GitHub Actions. 19 Checkov + 19 tfsec findings → 0 on main. SARIF feeds GitHub Security tab. SOC 2 control mapping included.

    HCL

  5. AurelienKumarathas AurelienKumarathas Public

    My DevSecOps GitHub Portfolio