Post Job Free
Sign in

Cybersecurity Engineer - DevSecOps - Cloud & IAM Expert

Location:
St. Louis, MO
Posted:
February 16, 2026

Contact this candidate

Resume:

ESHWAR JANJIRALA — Cybersecurity Engineer

646-***-**** ***********@*****.*** linkedin.com/in/eshwar-janjirala

AWS • GCP • IAM Lead • Penetration Testing • Vulnerability & Patch Management • Digital Forensics • IT Audit • GRC

PROFESSIONAL SUMMARY

Senior cybersecurity Engineer / Devsecops with 5+ years of experience across cybersecurity operations, cloud infrastructure, identity & access management, DevSecOps, networking, and security analysis. Strong hands-on background supporting AWS, Azure, Linux, Windows, IAM platforms, SIEM/EDR tooling, CI/CD pipelines, and enterprise networks. Experienced in threat detection, access governance, cloud security monitoring, vulnerability remediation, automation, and incident response support. Known for bridging security with engineering, improving reliability, and supporting compliance-driven environments without slowing delivery.

PROFESSIONAL SKILLS

• Security Operations & Incident Response: SOC Tier 2/3 support, alert triage, phishing & malware analysis, endpoint investigations, escalation handling, RCA documentation, MTTD/MTTR optimization.

• SIEM, EDR & Monitoring: Splunk, Microsoft Sentinel, Rapid7, CrowdStrike Falcon, Defender XDR; log correlation, detection tuning, threat hunting, dashboards, SOAR exposure.

• Cloud Security (AWS / Azure / GCP): IAM roles & policies, cloud logging (CloudTrail, CloudWatch, Azure Monitor), security posture reviews, hybrid cloud integrations, incident response support.

• Identity & Access Management (IAM): Active Directory, Azure Entra ID, SailPoint (exposure), CyberArk (PAM exposure), joiner/mover/leaver lifecycle, access reviews, MFA, Conditional Access, SOX evidence.

• DevSecOps & Automation: CI/CD security integration, GitHub/Jenkins, IaC concepts (Terraform exposure), policy-as-code (OPA/Rego exposure), automation using Python, Bash, PowerShell.

• Networking & Infrastructure Security: TCP/IP, DNS, DHCP, VLANs, NAT, VPNs, firewalls, routing fundamentals (BGP/OSPF exposure), Cisco & Palo Alto environments.

• Linux & Windows Administration: RHEL, Linux CLI, Windows Server, patching, hardening, system troubleshooting, scripting, VMware & virtualized environments.

• Application, API & Platform Security: OWASP Top 10, API security fundamentals, authentication & authorization flaws, secure SDLC alignment, basic SAST/DAST workflows.

• Vulnerability Management: Qualys/Tenable/Rapid7 exposure, remediation coordination, patch validation, risk prioritization, reporting.

• AI & Data Security (Foundational): AI system risk awareness, prompt injection concepts, data leakage risks, AI governance alignment, secure integration awareness.

• Compliance & Governance: SOX access reviews, audit support, NIST & ISO familiarity, documentation, control mapping, evidence preparation.

Core Technical Skills: AWS, Azure, GCP, Linux (RHEL), Windows Server, Active Directory, Entra ID, VMware, Docker, Kubernetes (EKS/AKS exposure), Splunk, Sentinel, CrowdStrike, Rapid7, Terraform (exposure), Jenkins, Git, Python, Bash, PowerShell, TCP/IP, DNS, DHCP, VPN, Firewalls, CI/CD, IAM, SIEM, EDR.

PROFESSIONAL EXPERIENCE

Bank of America — Cybersecurity Engineer Texas Sep 2023 – Present

Supported cloud security operations across AWS and Azure, including IAM policy reviews, logging enablement, and security monitoring.

Administered Active Directory and Entra ID, managing user access, MFA, Conditional Access, and privileged roles.

Performed access provisioning, deprovisioning, and SOX access reviews, producing audit-ready evidence.

Supported SIEM and EDR platforms by investigating alerts, tuning detections, and escalating incidents.

Assisted with DevSecOps initiatives, integrating security checks into CI/CD pipelines and supporting IaC reviews.

Collaborated with engineering teams to remediate vulnerabilities and improve cloud security posture.

Developed Python and PowerShell scripts to automate access reviews and operational tasks.

Assisted in security incident response, user lockouts, malware alerts, and access misuse investigations.

Supported VMware infrastructure, provisioning VMs, troubleshooting resource and network issues.

Collaborated with security and audit teams to prepare QAR and access evidence.

Supported AWS and Azure cloud security, reviewing IAM roles and policies, enabling logging (CloudTrail, CloudWatch, Azure Monitor), and assisting with security posture improvements.

Partnered with DevOps teams to integrate security controls into CI/CD pipelines, including access controls, secrets handling, and pipeline reviews.

Assisted in cloud incident response, analyzing suspicious activity, compromised credentials, and IAM misconfigurations.

Developed PowerShell and Python scripts to automate access validations, reporting, and operational security tasks.

Collaborated with compliance, audit, and risk teams to align security controls with NIST, ISO 27001, SOX, and internal policies.

Created and maintained technical documentation, SOPs, and runbooks for IAM, cloud security, and operational procedures.

Support secure-by-design initiatives, providing architecture feedback during early development and cloud migration phases.

Citi Bank — Cybersecurity Engineer Remote Dec 2022 – Jul 2023

Provided day-to-day L1/L2 network support including VLAN changes, switch troubleshooting, DNS/DHCP issues, and break/fix activities.

Worked with Cisco devices (CCNA-level tasks) and assisted with Arista switches.

Operated as a Tier 2/3 SOC analyst, monitoring and responding to alerts across SIEM and EDR platforms (Splunk, Microsoft Sentinel, Rapid7, CrowdStrike).

Investigated phishing attacks, malware infections, suspicious logins, lateral movement indicators, and cloud security alerts.

Conducted threat hunting and log analysis across Windows, Linux, network devices, and cloud platforms (AWS, Azure).

Supported incident response lifecycle including detection, analysis, containment, escalation, and post-incident reporting.

Tuned SIEM detection rules to reduce false positives and improve alert fidelity.

Assisted with vulnerability management, reviewing scan results (Qualys/Tenable exposure), coordinating remediation, and validating fixes.

Investigated phishing, malware, suspicious logins, endpoint alerts, and cloud security events.

Conducted threat hunting and log analysis using SIEM platforms.

Synack Red Team — Security Researcher Remote Nov 2022 – Dec 2023

Conducted high-assurance penetration testing and security research for enterprise clients across web applications, APIs, and cloud environments under Synack Red Team standards.

Discovered and reported critical and high-severity vulnerabilities, including access control failures, injection flaws, insecure deserialization, and cloud misconfigurations.

Specialized in manual testing using Burp Suite Pro, focusing on attack surface expansion, request manipulation, authorization testing, and logic flaw discovery.

Automated reconnaissance and exploit validation workflows to improve assessment efficiency and consistency.

Discover Financial Services — IT Security Support Analyst Hyderabad, IN Mar 2022 – Aug 2022

Provided day-to-day L1/L2 network support including VLAN changes, switch troubleshooting, DNS/DHCP issues, and break/fix activities.

Worked with Cisco devices (CCNA-level tasks) and assisted with Arista switches.

Supported DevSecOps initiatives, embedding security into CI/CD pipelines using Jenkins, GitHub, and IaC concepts.

Reviewed Terraform and cloud configurations for security best practices and access controls.

Assisted application teams with OWASP Top 10 issues, API security fundamentals, and secure authentication patterns.

Supported cabling, terminations, and plant/refinery environments, following safety and compliance protocols.

Participated in infrastructure upgrades and migrations, documenting changes and validating connectivity.

Assisted with firewall rule updates and connectivity troubleshooting.

Automated IAM enforcement checks for web apps with JavaScript and PowerShell and contributed to SOC SOPs and phishing playbooks.

PROJECTS

• SIEM Content Modernization — Detection engineer

Built a modular content library in Splunk and Securonix with ATT&CK-mapped correlation rules and UEBA policies. Automated IOC enrichment with Python. Delivered dashboards for incident timelines and risk scoring used by SOC and audit teams.

• Phishing Triage Automation — SOAR engineer

Orchestrated phishing playbooks in XSOAR integrating email gateways and ticketing. Enriched with CrowdStrike and URL detonation results to prioritize response. Documented runbooks for analysts and improved consistency of containment steps.

EDUCATION

• M.S., Computer Science — Saint Louis University, Aug 2022 – May 2024

• B.Tech, Computer Science — JNTUH, India, Jun 2018 – May 2022

CERTIFICATIONS

• Azure Security Engineer Associate (AZ-500) — Jan 2025

• Offensive Security Certified Professional (OSCP) — Oct 2024

• CompTIA PenTest+ — Jan 2024; CompTIA CySA+ — Feb 2024



Contact this candidate