Aarush Gupta

Aarush Gupta

admin@aarushg: ~
admin@aarushg:~$ whoami
Cyber Security Engineer & Backend Architect
Available for Projects
aarush.gupta@gmail.com +1 613 800 5055 (CA) +91-92172-45475 (IN) LinkedIn Profile Download Resume

Professional Summary

Results-driven Cyber Security Engineer and Backend Architect with 6+ years of experience in designing and implementing secure, scalable systems. Specialized in Zero Trust architectures, post-quantum cryptography, and cloud security (AWS/Azure) with a proven track record of delivering enterprise-grade solutions that protect against emerging threats while ensuring business continuity.

I help organizations strengthen their security posture through strategic implementation of modern security frameworks, automated compliance systems, and resilient infrastructure design. My expertise spans from cryptographic service development to full-stack security architecture, enabling businesses to confidently navigate the evolving cybersecurity landscape.

Zero Trust & Cryptography Expert
Cloud Security Architect (AWS/Azure)
Backend Systems & API Security
Compliance & Risk Management

How I Can Help Your Organization

Security Architecture Design

Design and implement comprehensive security architectures including Zero Trust models, identity management systems, and secure API frameworks.

Cryptography & Key Management

Implement post-quantum cryptographic solutions, secure key management workflows, and crypto-agile architectures for future-proof security.

Cloud Security Implementation

Secure cloud infrastructure on AWS/Azure with automated compliance, infrastructure as code, and robust access management systems.

Security Audits & Compliance

Conduct comprehensive security assessments, implement compliance frameworks (SOC2, HIPAA, ISO), and develop remediation strategies.

DevSecOps Integration

Integrate security into development pipelines with automated testing, vulnerability scanning, and secure deployment practices.

Security Training & Consulting

Provide expert guidance on security best practices, team training, and strategic security planning for long-term organizational resilience.

Experience

08/24 - Current

Cyber Security Engineer

QCrypt, Canada

Design and deployed cryptographic services in Python and Docker, integrating post-quantum algorithms and secure key management workflows. Designed and maintained hybrid cloud infrastructure on AWS and on-prem HSM-backed systems, ensuring cryptographic integrity, scalability, and resilience against future threats. Generated Reports with automated cryptographic validation and dependency scanning to enforce quantum-safe compliance, recommended solutions for potential issues. Implemented and optimized crypto-agile architectures and certificate lifecycles to support rapid algorithm transitions with minimal downtime. Collaborated with security, compliance, and risk teams to align systems with NIST PQC guidance and regulatory security frameworks.

05/23 - 08/24

Cyber Security Engineer

Rush Innovate LLC, USA

Design and deployed backend services in Python and Docker, integrating secure APIs and authentication mechanisms (OAuth, MFA, SSO). Designed and maintained cloud-based infrastructure on AWS and on-prem NAS, ensuring data integrity, scalability, and reliable system operations. Developed CI/CD pipelines for automated testing and deployment, improving release speed and stability. Optimized PostgreSQL queries and schema design for secure, high-performance data storage and retrieval. Collaborated with client teams to align backend systems with compliance and data protection requirements (SOC2, ISO, HIPAA).

09/22 - 05/23

Software and System Engineer

ClinChoice, USA

Designed custom dashboards and backend scripts in Python to automate vulnerability and risk management. Managed Linux and Windows servers, IAM, and VPN systems to ensure secure, reliable user access. Implemented backend automation with PowerShell and Bash, reducing manual workload and improving system resilience. Administered PostgreSQL and Active Directory services, strengthening authentication and data integrity. Supported DevOps workflows and backend improvements to enhance performance, security, and maintainability.

10/21 - 04/22

Software Engineer

Carnegie Mellon University, USA

Built backend analytics tools in Python (Flask) and Javascript with PostgreSQL integration, enabling data insights for research projects. Developed Python scripts to automate deployment pipelines from testing to production. Implemented monitoring tools to secure software integrity and ensure reliable backend services. Deployed cloud infrastructure (AWS, Azure) and integrated backend services for data-driven research applications.

06/20 - 09/21

Software Engineering

Veem, Canada

Automated compliance verification with Python scripts, improving backend audit efficiency. Built a real-time backend security dashboard to monitor system posture and device integrity. Collaborated with infrastructure teams to perform backend vulnerability scans and improve data security.

06/18 - 09/19

Dev Sec Ops

FedEx, USA

Developed backend components and APIs for internal applications In JavaScript, enhancing system functionality and integration. Supported React and backend system development, including data pipelines and secure API endpoints. Optimized deployment strategies for enterprise applications across Linux and Windows environments.

Projects & Research

Qracker

Web App / Queue System

Designed to eliminate the need to stand in line at fast food establishments in the HUB-Robeson Center. Created a peer-to-peer system where an "Initiator" can request food and a "Courier" already waiting in line can purchase and deliver it, bypassing long lines while streamlining the establishment's preparation queue.

View Repository

Reproducible ML Benchmarking for NIDS

Independent Research on CIC-IDS2017

Authored a research paper and built a fully reproducible benchmark comparing Random Forest, XGBoost, and MLP classifiers for network intrusion detection. Addressed common dataset contamination issues through explicit preprocessing and class-weight balancing over SMOTE, achieving an external baseline F1 > 0.95 and 99% accuracy.

View Repository

Zero Trust Architecture & Control Mapping

CMU SEI Capstone Research

Conducted research in collaboration with the Software Engineering Institute to bridge the gap between NIST SP 800-53 controls and the CISA Zero Trust Maturity Model. Developed an interactive Python application (Streamlit) featuring a Decision Model and ROI Calculator to provide organizations with customized, quantitative roadmaps for Zero Trust implementation and cloud workload defense.

Read Full Paper

Certifications

AWS Certified Solution Architect

Validates advanced capability in designing resilient, high-performing, secure, and cost-optimized architectures on AWS.

AWS Certified Cloud Practitioner

Demonstrates an overall understanding of the AWS Cloud platform, covering basic security, infrastructure, and architectural principles.

Azure Fundamentals

Certifies foundational knowledge of cloud services and how those services are provided with Microsoft Azure.

Jr Penetration Tester

Proves practical skills in essential penetration testing tasks, vulnerability assessment, and offensive security methodologies.

CMMC

Cybersecurity Maturity Model Certification indicating proficiency in defending Defense Industrial Base (DIB) networks and controlled unclassified info.

vCISO

Virtual Chief Information Security Officer certification for strategizing, establishing, and managing enterprise-level security postures.

CISSP

A globally recognized standard of achievement that confirms broad knowledge bridging security architecture, engineering, and management.

Google Cyber Security Professional

Validates proficiency in security protocols, using tools like SIEM and Linux shell, and protecting networks against cyber threats.

Azure SQL

Demonstrates expertise in administering, migrating, and securing relational databases on the Microsoft Azure cloud infrastructure.

RedHat Certified System Engineer

Certifies advanced skills in automating Red Hat Enterprise Linux tasks, integrating technologies, and applying enterprise networking & security.

Terraform Associate

Confirms foundational knowledge of Infrastructure as Code concepts and hands-on skills deploying resources using HashiCorp Terraform.

IBM Data Security Center

Validates capability in deploying and managing data privacy, protection, and security posture across enterprise systems using IBM tools.

Ready to Strengthen Your Security Posture?

Let's discuss how I can help your organization implement robust security solutions and protect against emerging threats.