visitor@srlsec.in:~$ cat about_me.txt

> Security researcher turned DevSecOps engineer

> CEH v10 · CCNA

> Building secure, scalable infrastructure

Shift left, hack right.

Hi, my name is — SARATHLAL_UP · DEVSECOPS · SECURITY_RESEARCH

Sarathlal UP

Portrait of Sarathlal UP (srlsec)
FILE: assets/profile.png · STATUS: VERIFIED

01 ./about — whoami

// DevSecOps engineer with a hacker's mindset — scope, permission, coordinated disclosure.

$ cat ./manifesto.txt

DevSecOps engineer with a hacker's mindset. I've discovered and responsibly disclosed 112+ security vulnerabilities, and now I build automated pipelines to catch them before they reach production.

I developed an automated attack surface management tool in Django to identify and monitor security risks, built and maintained a secure online examination platform with integrated security features, and publish security research and best practices for the developer community.

02 ./arsenal — technical_arsenal

// Skills from the field: security, cloud, development, systems & network.

  • security

    CEH methodology, vulnerability assessment, SAST/DAST, OWASP Top 10, penetration testing, security auditing.

  • cloud_devops

    AWS, Docker, Kubernetes, Terraform, GitHub Actions, Jenkins.

  • development

    Python, Django, Bash, Git, REST APIs, Boto3.

  • systems_network

    Linux/Ubuntu, network security, CCNA, firewalls, TCP/IP, Wireshark.

03 ./experience — professional_journey

// Roles and outcomes — authorized work and engineering impact.

2022 — present

Security researcher @ Independent

Discovered and responsibly disclosed 112+ security vulnerabilities across various platforms.

Developed automated attack surface management in Django; built and maintained a secure online examination platform; published security research and best practices for developers.

2020 — 2022

Network engineer (L1) @ Previous company

Managed network infrastructure for 500+ users with 99.9% uptime.

Implemented firewall rules and ACLs; collaborated with DevOps on cloud network security policies; cut incident response time by ~40% via automated monitoring.

04 ./intel — exfil_public_only

// Public write-ups on Medium — authorized work, coordinated disclosure where applicable.

05 ./projects — devsecops_builds

// CI/CD, cloud automation, ASM, and observability — link repos when you publish them.

  • automated-devsecops-pipeline

    PIPELINE

    End-to-end CI/CD with security scanning at every stage: SAST (Bandit), DAST (OWASP ZAP), and container scanning (Trivy) to catch vulnerabilities early.

    • GitHub Actions
    • Docker
    • Kubernetes
    • Terraform
    • AWS
  • cloud-security-automation

    AWS

    Python tooling with Boto3 for AWS: automated vulnerability scanning, security group auditing, and compliance reporting.

    • Python
    • AWS
    • Boto3
    • CloudWatch
  • attack-surface-management

    ASM

    Django-based continuous security monitoring and asset discovery — map and track external attack surface for organizations.

    • Django
    • PostgreSQL
    • Nmap
    • REST APIs
  • security-monitoring-dashboard

    LOCAL

    Grafana dashboards for real-time security monitoring of containerized workloads, wired to Kubernetes and AWS services.

    • Grafana
    • Prometheus
    • Kubernetes
    • Loki

06 ./certs — credentials

// Industry credentials.

[ EC-COUNCIL ]

Certified ethical hacker

CEH v10 · EC-Council

[ CISCO ]

CCNA

Cisco certified network associate

[ AWS ]

AWS solutions architect

Associate (in progress)

[ COMPTIA ]

CompTIA A+

Core certification

[ COMPTIA ]

CompTIA Network+

Network security

[ COMPTIA ]

CompTIA Linux+

Linux administration

07 ./contact — send_packet

// I'm looking for new opportunities in DevSecOps and security research. Whether you have a question or just want to say hi, I'll try my best to get back to you.

[!] I do not assist with unauthorized access, credential abuse, stalking, or anything outside clear legal authorization. This site is a portfolio, not an offer to break the law.