Welcome, I am

Anubhav Gain

Enterprise Security Solutions | Infrastructure Design | Advanced Security Operations

Delivering comprehensive security architectures with expertise in XDR/OXDR platforms, infrastructure hardening, and automated security frameworks for enterprise environments.

Professional Networks

Services

icon-1
icon-2
icon-3
icon-4
icon-5

XDR/OXDR Platform Development

I specialize in designing and implementing comprehensive XDR/OXDR platforms that integrate threat detection, incident response, and security automation. Using cutting-edge technologies like Rust and OpenSearch, I create scalable security solutions that provide real-time monitoring, automated response capabilities, and advanced threat analytics for enterprise environments.

icon-1
icon-2
icon-3
icon-4
icon-5

Security Automation & DevSecOps

I develop comprehensive security automation solutions and integrate security practices into DevOps workflows. From automated vulnerability scanning to security-as-code implementation, I ensure robust security controls are embedded throughout the development lifecycle. My solutions include containerized security environments, automated compliance checking, and security policy enforcement.

icon-1
icon-2
icon-3
icon-4
icon-5

Infrastructure Security

I architect secure infrastructure solutions with a focus on defense-in-depth strategies. My expertise includes hardening Linux systems, implementing secure cloud architectures, configuring firewalls and security appliances, and establishing robust access controls. I ensure your infrastructure maintains security best practices while remaining scalable and efficient.

icon-1
icon-2
icon-3
icon-4
icon-5

Security Monitoring & Incident Response

I implement end-to-end security monitoring and incident response capabilities using modern SIEM technologies. This includes setting up real-time threat detection, creating incident response playbooks, configuring security alerts, and establishing SOC workflows. I ensure your organization can effectively detect, respond to, and mitigate security threats.

icon-1
icon-2
icon-3
icon-4
icon-5

Threat & Vulnerability Management

I establish robust threat and vulnerability management programs that include automated scanning, risk assessment, and remediation tracking. My approach combines automated tools with manual analysis to identify security weaknesses, prioritize risks, and implement effective controls. I ensure your security posture continuously improves through systematic vulnerability management.

icon-1
icon-2
icon-3
icon-4
icon-5

Security Architecture & Consulting

I provide expert security architecture and consulting services, helping organizations design and implement comprehensive security programs. Using industry frameworks like MITRE ATT&CK and ISO 27001, I develop security strategies, policies, and controls that align with business objectives while ensuring robust protection against evolving threats.

Experiences

Jul 2024 - Present

Software Engineer

@Infopercept Consulting

Spearheading development of Invinsense XDR/OXDR platform with multi-tenant architectures

Developing custom OpenSearch Dashboard plugins and cross-platform monitoring tools using Rust

Architecting Docker-based environments integrating Wazuh, OpenSearch, and Kibana

Implementing automated security testing and vulnerability remediation in CI/CD pipelines

Managing containerized deployments using Docker and container orchestration tools

Aug 2020 - Present

Owner & Aquaculturist

@Gain Fisheries

Managing sustainable fish hatchery operations combining traditional and modern practices

Implementing eco-friendly practices for optimal fish health and population growth

Maintaining rigorous quality standards in water management and fish care

Partnering with local communities for fish distribution and food security

Balancing commercial success with environmental stewardship

Nov 2023 - Present

DevSecOps Engineer

@Atcults

Architecting automated security testing pipelines for vulnerability detection

Optimizing AWS cloud infrastructure and implementing Infrastructure as Code

Establishing security-as-code practices across development workflows

Creating automated incident response and vulnerability management systems

Implementing comprehensive security monitoring and alerting solutions

Oct 2023 - Nov 2023

Security Engineer

@Lucid Growth

Designed and implemented comprehensive security architecture

Established security protocols and frameworks for digital assets

Developed incident response and threat mitigation strategies

Conducted thorough risk assessments of critical systems

Implemented SMTP Relay solutions for enhanced monitoring

Nov 2022 - Oct 2023

IT Specialist

@Parul University

Managed Palo Alto Networks firewalls and network security protocols

Implemented AWS cloud infrastructure for university applications

Conducted security assessments and vulnerability management

Administered Red Hat Linux and Windows server environments

Implemented Microsoft Endpoint Configuration Manager for system administration

Jul 2023 - Jul 2023

Data Analyst - Fraud Detection

@JPMorgan Chase & Co.

Analyzed large datasets of fraud in financial payment services

Applied statistical methods and machine learning for fraud detection

Conducted data preprocessing adhering to strict privacy standards

Identified fraud patterns using advanced data analysis techniques

Contributed to developing fraud prevention strategies

Jul 2023 - Jul 2023

Digital Forensics Intern

@ANZ

Conducted social engineering investigations in digital forensics

Analyzed psychological manipulation techniques in cyber threats

Investigated tactics employed by social engineers

Documented investigation processes and findings

Developed countermeasures against social engineering attacks

Jun 2023 - Jul 2023

Cybersecurity Intern

@Mastercard

Designed and implemented phishing email simulations

Evaluated employee awareness of cybersecurity threats

Analyzed simulation results to identify security vulnerabilities

Developed recommendations for improving security awareness

Created training materials based on simulation findings

Jun 2023 - Jul 2023

Security Analyst Intern

@Datacom

Analyzed Advanced Persistent Threat (APT) breach impacts

Investigated sophisticated cyber-attack patterns

Assessed organizational security vulnerabilities

Developed response strategies for APT incidents

Created comprehensive security assessment reports

May 2023 - Jul 2023

Malware Response Specialist

@Telstra

Developed comprehensive malware response strategies

Conducted malware analysis and impact assessment

Implemented malware mitigation techniques

Performed incident postmortems and documentation

Created security improvement recommendations

May 2023 - Jul 2023

Information Security Intern

@PwC

Implemented Integrated Information Defense strategies

Conducted risk assessments and security baseline development

Designed network segmentation solutions

Created security protocols and documentation

Analyzed potential security threats and vulnerabilities

Apr 2023 - Jul 2023

Cybersecurity Specialist

@AIG

Responded to zero-day vulnerabilities

Developed strategies to bypass ransomware attacks

Protected digital assets from evolving cyber threats

Implemented emergency response procedures

Created security incident documentation and reports

Mar 2023 - Jul 2023

Legal Security Intern

@Clifford Chance

Provided guidance on ICO Dawn Raid procedures

Handled data leak damages claims

Assessed legal implications of security breaches

Developed response strategies for data-related claims

Created documentation for legal security procedures

Skills

Security Engineering

logo-XDR/OXDR Development

XDR/OXDR Development

logo-SIEM

SIEM

logo-Incident Response

Incident Response

Security Operations

logo-Threat Analysis

Threat Analysis

logo-Vulnerability Management

Vulnerability Management

logo-Security Monitoring

Security Monitoring

logo-APT Defenses

APT Defenses

Infrastructure Security

logo-Linux Security

Linux Security

logo-Network Security

Network Security

logo-Endpoint Security

Endpoint Security

DevSecOps

logo-Terraform

Terraform

logo-Docker Swarm

Docker Swarm

logo-Kubernetes

Kubernetes

logo-Jenkins

Jenkins

Security Development

logo-Rust

Rust

logo-Python

Python

logo-eBPF

eBPF

Security Frameworks

logo-MITRE ATT&CK

MITRE ATT&CK

logo-ISO 27001

ISO 27001

logo-OCSF

OCSF

Cloud Security

logo-AWS Security

AWS Security

logo-Container Security

Container Security

logo-Cloud Native Security

Cloud Native Security

Security Tools

logo-OpenSearch/Elasticsearch

OpenSearch/Elasticsearch

logo-Palo Alto

Palo Alto

logo-SSO/IAM

SSO/IAM

Security Analysis

logo-Threat Modeling

Threat Modeling

logo-Risk Assessment

Risk Assessment

logo-Security Architecture

Security Architecture

Recent Works

project-eBPF File Monitor

eBPF File Monitor

Public

A sophisticated Rust program for kernel-level file monitoring using eBPF and inotify API, providing real-time threat detection and audit logging capabilities.

Rust

eBPF

Linux

Security Monitoring

project-OCSF JSON Crawler

OCSF JSON Crawler

Public

A robust security data collection tool built in Rust for harvesting OCSF-formatted security events, featuring rate limiting, error handling, and secure API interactions.

Rust

OCSF

Security Data

API

project-Minimal Linux Image

Minimal Linux Image

Public

A security-hardened minimal Linux distribution with custom kernel compilation, reduced attack surface, and containerization support for secure embedded systems.

Linux

Kernel

Security Hardening

project-Rust Security Logger

Rust Security Logger

Public

A high-performance security logging utility built with Rust's memory safety guarantees, providing robust audit trails and security event monitoring capabilities.

Rust

Security Logging

Audit

project-Secure Network Shell

Secure Network Shell

Public

An ethically-implemented secure network communication tool in Rust, featuring multithreaded architecture and configurable security controls.

Rust

Network Security

Shell

project-PU Assets Security System

PU Assets Security System

Public

A comprehensive asset management system with integrated security controls, audit trails, and compliance monitoring for educational institutions.

PHP

MySQL

Security Controls

Audit

project-PU Secure Support Portal

PU Secure Support Portal

Public

A security-enhanced help desk system implementing secure authentication, encrypted communications, and comprehensive logging for customer support.

PHP

MySQL

Security

Support