Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings
@17J
17J
Follow
View 17J's full-sized avatar
🧿
Consistency

Rahul Joshi 17J

🧿
Consistency
Cloud & DevSecOps Engineer |CI/CD|Terraform|Docker| |Kubernetes|Observability Stack |Ansible|AWS|Azure|

Block or report 17J

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
17J /README.md

Hi, I'm Rahul Joshi πŸ‘‹

πŸ›‘οΈ DevSecOps Engineer

A passionate DevSecOps Engineer dedicated to integrating security-first automation into the continuous delivery lifecycle, operating within Agile/DevOps methodologies.

I possess a strong technical foundation in security tooling, cloud infrastructure, and CI/CD pipeline development, with expertise in designing and implementing secure, resilient, and fully automated deployment systems leveraging GitOps principles to ensure infrastructure immutability and security compliance at scale.

Specialized in shift-left security, implementing comprehensive security scanning (SAST, DAST, SCA, SBOM) across the entire SDLC, from code commit to production runtime monitoring.


πŸŽ“ Education

  • Jaipur Engineering College (JEC)
    • Bachelor of Technology - B.Tech, Computer Science and Engineering

πŸ› οΈ Core DevSecOps Stack

Infrastructure, Automation, & Cloud

DevOps Tools


πŸ” Security Arsenal & Toolchain

πŸ” Secret & Credential Detection

TruffleHog Gitleaks

πŸ›‘οΈ Infrastructure as Code (IaC) Security

Checkov TerraScan TFSec Prowler

πŸ” Static & Dynamic Analysis (SAST / DAST)

SonarQube Snyk Nuclei OWASP ZAP

🐳 Container, Image Security & πŸ” Kubernetes Security

Trivy Dockle Grype Kubesec Falco OPA

πŸ“¦ Dependency & Supply Chain Security (SCA)

OWASP Dependency-Check Snyk SBOM Syft

πŸ“Š Observability & Monitoring Stack

Prometheus Grafana OpenTelemetry Jaeger ELKB Stack Datadog

πŸš€ GitOps & Continuous Deployment

ArgoCD Helm Kustomize

☁️ Cloud Security & Compliance

AWS Security Hub Azure Security Cloudflare


πŸ’» Day-to-Day Tools & Collaboration

Development Environment

VS Code Git Linux Bash

Collaboration & Project Management

Jira Confluence Slack PagerDuty ServiceNow


πŸ’‘ About My Work & Focus Areas

  • πŸŽ“ Education: B.Tech in Computer Science and Engineering from Jaipur Engineering College
  • πŸ’– Core Focus: DevSecOps, GitOps, Cloud-Native Security, Supply Chain Security, and Observability
  • πŸ‘¨πŸ½β€πŸ’» Currently Deepening Knowledge in:
    • Advanced Kubernetes Security (Admission Controllers, RBAC, Network Policies, Pod Security Standards)
    • Azure DevOps & Security Services (Azure Defender, Sentinel, Key Vault)
    • Container Security Hardening (Distroless images, Runtime security with Falco)
    • Software Supply Chain Security (SBOM, SLSA framework, Sigstore/Cosign)
    • Zero Trust Architecture implementation
  • πŸ“š Key Technologies & Methodologies:
    • Agile/Scrum development practices with security integration
    • CI/CD Security Pipelines: GitLab CI, Jenkins, GitHub Actions with comprehensive scanning
    • Infrastructure as Code: Terraform, Ansible, CloudFormation
    • Container Orchestration: Docker, Kubernetes, EKS, AKS, GKE
    • Security Automation: Python, Bash scripting for security workflows
    • Databases: MySQL, PostgreSQL, MongoDB, Redis
    • Observability Stack: Prometheus, Grafana, Jaeger, ELK, OpenTelemetry, AlertManager
  • πŸ”’ Security In Depth:
    • Secret Management: TruffleHog, Gitleaks for credential detection
    • Dependency Scanning: OWASP Dependency-Check, Snyk SCA
    • Container Security: Trivy, Dockle for image hardening
    • Vulnerability Assessment: Nuclei, OpenVAS for infrastructure scanning
    • IaC Security: Checkov, Terrascan, TFSec for Terraform/CloudFormation
    • SAST/DAST: SonarQube, OWASP ZAP
    • K8s Security: Kube-bench, Kube-hunter, Falco runtime protection
  • πŸ€” Currently Exploring:
    • Advanced vulnerability scanning with fuzzing techniques
    • Building self-healing infrastructure patterns
    • eBPF-based security monitoring with Tetragon
    • Service Mesh security with Istio/Linkerd
    • Policy-as-Code with OPA/Rego
  • πŸ– Getting Better At:
    • Python automation for DevSecOps workflows
    • Advanced Bash scripting for CI/CD pipelines
    • Go programming for cloud-native tooling
    • Threat modeling and security architecture design
  • πŸ‘€ Interests: Cloud & DevSecOps Engineering, Security-as-Code, Platform Engineering, SRE practices

πŸ“¬ Get in Touch

Email

πŸ’¬ Ask me about:

  • Kubernetes & Cloud-Native Security
  • GitOps & ArgoCD implementation
  • CI/CD pipeline security automation
  • Container security hardening (Trivy, Dockle)
  • Secret detection & management (TruffleHog, Gitleaks)
  • Vulnerability scanning (Nuclei, OWASP Dependency-Check)
  • IaC security best practices
  • Comprehensive observability stacks
  • Supply chain security & SBOM

πŸ“Š GitHub Stats

GitHub Stats

GitHub Streak

Top Languages


Profile Views

⚑ "DevOps is not a goal, but a never-ending process of continual improvement" - Jez Humble

Pinned Loading

  1. DevSecOps-Three-Tier-Todo-Application-Pipeline DevSecOps-Three-Tier-Todo-Application-Pipeline Public

    Three-Tier To-Do Application app built with frontend (React), Backend (JAVA), providing robust Todo List features (filtering, authentication)

    TypeScript 3 2

  2. GitOps-Three-Tier-Todo-App-CI GitOps-Three-Tier-Todo-App-CI Public

    A comprehensive GitOps-based CI/CD pipeline for a Three-Tier Todo Application. This project demonstrates automated deployment using Jenkins, Docker, and Kubernetes (ArgoCD), following DevSecOps bes...

    TypeScript 2 1

  3. OTEL-Unified-Observability-Stack OTEL-Unified-Observability-Stack Public

    A unified observability stack For Dev Stage built around OpenTelemetry (OTel), providing a complete, open-source solution for collecting, processing, and visualizing metrics, traces, and logs in di...

    TypeScript 2 1

  4. Terraform-AWS-EKS Terraform-AWS-EKS Public

    Enterprise-grade Amazon Elastic Kubernetes Service (EKS) infrastructure as code with integrated DevSecOps security scanning

    HCL 1

  5. K8sShield-Enterprise K8sShield-Enterprise Public

    K8sShield-Enterprise is a hands-on learning repository that demonstrates enterprise-grade Kubernetes security patterns through a fully functional two-tier application deployment.

    Shell 1

  6. Terraform-Azure-AKS Terraform-Azure-AKS Public

    Terraform code for end-to-end provisioning of an Azure AKS cluster, including supporting Azure VNet, Security Groups, and service principles.

    HCL 1 1

AltStyle γ«γ‚ˆγ£γ¦ε€‰ζ›γ•γ‚ŒγŸγƒšγƒΌγ‚Έ (->γ‚ͺγƒͺγ‚ΈγƒŠγƒ«) /