Hi, I'm Lal Budha
DevSecOps Engineer & Instructor | Securing Cloud Infrastructure | Training Global Teams
About Me
DevSecOps Engineer & Instructor with 8+ years of experience securing cloud infrastructure and training global teams. Specialized in zero-trust architectures, automated security, and cost-optimized solutions.
DevSecOps Engineer & Instructor at Yoll Academy, specializing in zero-trust architectures and automated security. Reduced infrastructure costs by 90% while training global teams.
Security First
Implementing security at every layer of the development lifecycle
Cloud Native
Expert in AWS, Azure, and GCP with focus on scalable architectures
Automation
Building CI/CD pipelines and Infrastructure as Code solutions
Development
Full-stack development with modern frameworks and best practices
Technical Skills
Technologies I use to build secure and scalable infrastructure
Cloud
AWS
EKS
Azure
GCP
DevOps
Kubernetes
Docker
IaC
Terraform
Ansible
CI/CD
Jenkins
GitHub Actions
GitLab CI
ArgoCD
Code
Python
Go
JavaScript
Script
Bash
Security
SonarQube
Trivy
OWASP ZAP
Nmap
Vault
Monitor
Grafana
Prometheus
Splunk
ELK Stack
OS
Linux
VCS
Git/GitHub
Network
Networking
Web Servers
Work Experience
Building secure and scalable infrastructure solutions across various industries
DevSecOps Engineer / Instructor
- β’Took initiative of integrating security into DevOps workflows using Git/GitHub, Jenkins, Terraform, Docker, K8s, AWS, SonarQube, Trivy, Grafana, Nmap, and OWASP Top 10
- β’Trained global students on DevSecOps tools and practices, equipping them with skills to excel in the DevSecOps landscape
- β’Optimized and scaled DevOps infrastructure, helping reduce costs by 90% through strategic implementation of open-source solutions
- β’Enhanced compliance and resilience across development to deployment pipelines
Associate DevSecOps Engineer
- β’Seamlessly integrated security into DevOps workflows using key tools like Git/GitHub, Jenkins, Terraform, Docker, AWS, SonarQube, Trivy, Grafana, Nmap, and OWASP Top 10
- β’Ensured compliance, resilience, and continuous improvement of security measures across development to deployment
- β’Implemented automated security scanning and vulnerability assessment processes
- β’Collaborated with cross-functional teams to establish security best practices
DevOps Engineer
- β’Streamlined software delivery by automating release pipelines, fostering collaboration across teams
- β’Optimized AWS infrastructure, tackling operational hurdles and implementing robust security measures
- β’Implemented proactive monitoring and fine-tuning to ensure peak performance and reliability
- β’Played key role in setting up monitoring and alert systems, keeping defenses vigilant
DevOps Engineer
- β’Assisted in streamlining software delivery pipelines and automated infrastructure tasks
- β’Monitored system performance and fostered collaboration between teams
- β’Optimized release management, cloud infrastructure, and ensured security throughout development lifecycle
- β’Contributed to DevOps best practices implementation across the organization
IT & Network Administrator
- β’Oversaw network and server maintenance, upgrading hardware and software
- β’Supervised staff and configured routing, switching, and firewall systems
- β’Installed security systems and analyzed network security
- β’Documented processes and ensured data backup and recovery procedures
Licenses & Certifications
Professional certifications in cybersecurity, cloud technologies, and ethical hacking
Practical Ethical Hacking
TCM Security
Practical Web Application Security and Testing
TCM Security
Certified in Cybersecurity (CC)
ISC2
AWS Academy Graduate - AWS Academy Cloud Foundations
Amazon Web Services (AWS)
Huawei Seeds For The Future 2021 Graduate
Huawei
Fortinet Fortigate Cookbook
Cybrary
Featured Projects
Real-world DevSecOps projects with measurable security outcomes
Zero-Trust Cloud Infrastructure Orchestration for Scalable E-Commerce Ecosystem
Architected a multi-region, zero-trust AWS infrastructure for a global e-commerce platform handling 1M+ daily transactions, integrating runtime encryption, automated drift detection, and AI-enhanced anomaly response to safeguard against sophisticated supply chain attacks.
Key Technologies
Key Outcomes
- β99.99% uptime during peak loads
- βReduced MTTD vulnerabilities by 70%
- βEliminated lateral movement risks
- βPCI DSS Level 1 compliance with zero audit findings
End-to-End Secure CI/CD Pipeline with Policy-as-Code for Distributed Microservices
Engineered a resilient, policy-driven CI/CD pipeline for a fintech application comprising 100+ microservices, embedding SAST/DAST/SCA scans, automated remediation workflows, and blockchain-based audit trails to ensure tamper-proof deployments in regulated environments.
Key Technologies
Key Outcomes
- βAccelerated release cycles from weekly to daily
- β95% automated vulnerability fixes
- βLowered false positives by 60%
- βSOC 2 Type II attestation maintained
Advanced Container Runtime Security and Orchestration in Multi-Tenant Kubernetes Clusters
Fortified a production-grade, multi-tenant Kubernetes setup for a healthcare SaaS provider, incorporating eBPF-based kernel-level monitoring, immutable infrastructure, and automated quarantine for compromised pods to counter zero-day exploits and ransomware.
Key Technologies
Key Outcomes
- βMitigated 150+ runtime threats in real-time
- βShrunk attack surface by 65%
- βHIPAA/HITECH compliance ensured
- βImproved pod startup time by 40%
Multi-Cloud Compliance Orchestration Platform with Automated Remediation Loops
Built a unified compliance-as-code platform spanning AWS, Azure, and GCP for a multinational enterprise, featuring real-time auditing, AI-prioritized risk scoring, and self-healing configurations to align with GDPR, ISO 27001, and NIST frameworks in dynamic environments.
Key Technologies
Key Outcomes
- βAutomated 90% of compliance workflows
- βSlashed audit cycles from months to days
- βPrevented 200+ configuration drifts annually
- β95%+ continuous compliance scoring
ML-Augmented Threat Intelligence and Response System in GitOps-Driven Workflows
Deployed an AI-powered threat detection and orchestration system within a GitOps pipeline for a logistics conglomerate, fusing log analytics, behavioral baselining, and automated incident response playbooks to preempt advanced persistent threats (APTs) and insider risks.
Key Technologies
Key Outcomes
- βIdentified and neutralized 30+ APT indicators
- βReduced MTTR by 75%
- βEnhanced threat hunting with 85% accuracy
- βIntegrated into zero-trust architectures
Get In Touch
Ready to secure your infrastructure? Let's connect!
Let's Connect
Ready to work together?
β‘ Response Time: Usually within 24 hours