
Praveen Chaitanya Jakku
Individual Researcher/DevOps Engineer
Actions
With over six years of experience in DevOps, automation, and security, I’ve honed my skills across a wide range of modern tools and technologies. My journey began with Ansible development, and I’ve since become an expert in cloud infrastructure, CI/CD, and ensuring systems are secure from the ground up. As a DevOps Engineer, I now specialize in building secure, highly available cloud environments.
Security is at the heart of everything I do. I manage Identity and Access Management (IAM) policies, implement encrypted storage solutions, and leverage cloud-native monitoring tools to maintain a strong security posture. I’ve led the migration of applications to the cloud, focusing on security by integrating IAM, as well as managing key services like managed databases, compute instances, and Virtual Private Networks (VPNs).
Additionally, I’ve moved microservices to Kubernetes, implementing container orchestration with robust security practices such as Role-Based Access Control (RBAC) and network policies to secure containerized environments.
I automate infrastructure provisioning and configuration management using tools like Ansible, creating efficient deployment processes for both Linux and Windows environments. I also streamline management with tools like Ansible Tower, ensuring consistency and security at scale.
Throughout my career, I’ve delivered measurable results, such as optimizing cloud infrastructure to reduce costs by 25% and improving incident response times by 30%. My work on enhancing CI/CD pipelines led to a 40% increase in deployment frequency and a 50% reduction in deployment-related issues. I am passionate about embedding security into every stage of the DevOps lifecycle.
In addition to my technical skills, I've actively contributed to both academic and professional communities. I've written and presented research on emerging topics like DevOps, cloud computing, security, AI, and automation, helping others better understand these areas. I've also reviewed papers for well-known journals, offering valuable feedback on the latest research. Furthermore, I've been invited to judge prestigious industry events, where I recognize and evaluate outstanding contributions to technology, innovation, and AI.
Links
Trust No One, Protect Everything: Building Resilient CI/CD Pipelines with Zero Trust
In today's fast-paced digital landscape, traditional security models are no longer adequate. The Zero Trust framework—built on the principle of "Trust No One"—has emerged as a cornerstone of modern security strategies, particularly in Continuous Integration/Continuous Deployment (CI/CD) pipelines.
This session will explore how integrating Zero Trust principles within CI/CD environments can secure every phase of the software development lifecycle. Attendees will learn actionable strategies to implement strict identity verification, robust access controls, and continuous monitoring, ensuring that no entity, whether internal or external, is trusted by default.
By adopting the Zero Trust model, organizations can effectively counter insider threats, close vulnerabilities, and preempt security breaches before they escalate. The session will cover practical techniques like micro-segmentation, least privilege access, and real-time threat detection, offering attendees the tools they need to secure modern development environments.
To bring these concepts to life, real-world case studies will highlight how Zero Trust has been successfully incorporated into CI/CD pipelines. These examples will demonstrate how organizations have strengthened their security posture, streamlined operations, and embraced resilient development practices.
Join us to discover how a "Trust No One, Secure Everything" mindset can transform your approach to security, delivering proactive protection and ensuring the success of your software development journey.
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top