Open to Azure Cloud Roles · Bengaluru

Cloud that
you need
secured.

Building secure Azure environments with IaC, CI/CD pipelines, and cloud security. Microsoft AZ-900 Certified.

Scroll downto see projects
Azure VNet
NSG Hardening
RBAC Governance
Log Analytics
KQL Queries
Microsoft Defender
Azure Policy
Azure Monitor
AZ-900 Certified
AWS CCP
Terraform
GitHub Actions
CI/CD Pipeline
Azure VNet
NSG Hardening
RBAC Governance
Log Analytics
KQL Queries
Microsoft Defender
Azure Policy
Azure Monitor
AZ-900 Certified
AWS CCP
Terraform
GitHub Actions
CI/CD Pipeline
About me

Meet
Prasanth.

I'm a fresher Azure Cloud Engineer based in Bengaluru, specializing in cloud security, monitoring, and governance. I hold a Post Graduate Diploma in Cloud Data Management from Conestoga College, Canada.

I've built two enterprise Azure projects — CloudGuard (6-phase secure cloud infrastructure covering VNet, NSG, RBAC, KQL monitoring, Azure Policy, and Defender for Cloud) and CloudGuard IaC Pipeline (Terraform + GitHub Actions CI/CD automating full Azure infrastructure deployment).

Azure AdministrationCloud SecurityLog AnalyticsKQLRBAC & IAMAzure PolicyNSGDefender for CloudAzure MonitorGRC
Azure Cloud EngineerCloudGuard ProjectJan 2026 – Mar 2026
CloudGuard IaC PipelineTerraform + GitHub ActionsApr 2026 - Apr 2026
PG Diploma – Cloud Data MgmtConestoga College, Canada2025
B.E. Computer ScienceKumaraguru College of Technology2023
Prasanth Panneer Selvam
Prasanth Panneer Selvam
Azure Cloud Engineer · Bengaluru
LinkedIn ↗GitHub ↗
Recent Works
All Projects ↗
CloudGuard
View on GitHub ↗
CloudGuard
Azure Secure Cloud Infrastructure · 6 Phases
▶ terraform apply
azurerm_resource_group.rg: Creating...
azurerm_virtual_network.vnet: Creating...
azurerm_subnet.public: Creating...
azurerm_network_security_group.nsg: Creating...
Apply complete! 5 resources added.
✓ GitHub Actions CI/CD
✓ Terraform IaC
✓ Azure VNet + NSG
View on GitHub ↗
CloudGuard IaC Pipeline
Terraform + GitHub Actions CI/CD · Auto Deploy
Capabilities

What I build & protect

Focused on enterprise-grade Azure environments — from secure network architecture to centralized monitoring, governance, and compliance.

2
Projects completed
2
Cloud certifications
AZ-900
Microsoft certified
🔒
Cloud Security
NSG hardening, Microsoft Defender for Cloud, Zero-Trust principles, threat detection and response.
📊
Monitoring & KQL
Log Analytics Workspace, custom KQL queries, Azure Monitor alerts and diagnostic settings.
🏛️
Governance & Policy
Azure Policy enforcement, compliance scoring, resource tagging, and RBAC role assignments.
🌐
Networking
VNet design, subnet segmentation, route tables, peering, and Azure Firewall configuration.
⚙️
Infrastructure as Code
Terraform provisioning, Azure resource automation, GitOps workflow, and repeatable infrastructure deployment.
🔄
CI/CD Pipelines
GitHub Actions automated pipelines, Terraform plan and apply workflows, push-triggered deployments.
Azure Virtual NetworkNetwork Security GroupsAzure FirewallRBAC & IAMMicrosoft Defender for CloudLog Analytics WorkspaceKQLAzure MonitorTerraformGitHub ActionsAzure Virtual NetworkNetwork Security GroupsAzure FirewallRBAC & IAMMicrosoft Defender for CloudLog Analytics WorkspaceKQLAzure MonitorTerraformGitHub Actions
Azure PolicyCompliance AssessmentAzure ADManaged IdentitiesARM TemplatesAzure CLIResource GroupsAZ-900AWS CCPCI/CD PipelineGitOpsAzure PolicyCompliance AssessmentAzure ADManaged IdentitiesARM TemplatesAzure CLIResource GroupsAZ-900AWS CCPCI/CD PipelineGitOps
$ az group create --name CloudGuard-Sec-RG --location southindia
provisioningState: Succeeded

$ az network nsg rule create --name AllowMyIP --priority 100
provisioningState: Succeeded

$ az monitor log-analytics workspace create --workspace-name law-phase3
provisioningState: Succeeded

$ az monitor metrics alert create --name phase4-admin-change-alert
provisioningState: Succeeded

$ az role definition create --role-definition phase5-monitor-reader.json
roleType: CustomRole

$ az security pricing create --name VirtualMachines --tier Standard
Microsoft Defender: Enabled
How I work

Process

Hover over each phase to explore. 8 structured phases across 2 projects building a complete enterprise Azure security environment.

View CloudGuardSee Projects
01
🏗️
Infrastructure Setup
Built VNet with public/private subnets, Storage Account, and Log Analytics Workspace from scratch on Azure Portal.
02
🔒
Network Security
Configured NSG inbound rules with IP whitelisting (/32 CIDR), attached to private subnet, validated logs with KQL.
03
📊
Security Monitoring & Log Analytics
Deployed dedicated Log Analytics Workspace, streamed Activity Logs, ran KQL queries to detect failed operations.
04
🚨
Alerting & Incident Notifications
Set up Azure Monitor Alert Rules targeting admin error events with Action Groups for automated email notifications.
05
🛡️
Security & Governance
Created custom RBAC role with least-privilege permissions and enforced mandatory resource tagging via Azure Policy.
06
🔍
Defender for Cloud
Assessed Secure Score, investigated security recommendations, and mapped controls to Azure Security Benchmark.
07
🏗️
Infrastructure as Code
Wrote Terraform configs (main.tf, vnet.tf, nsg.tf) to provision Azure Resource Group, VNet, subnets, and NSG — no manual portal clicks.
08
🔄
CI/CD Pipeline Automation
Built GitHub Actions workflow triggering on every push — runs terraform init, plan, and apply automatically to Azure.
FAQ
Answers.

Common questions about my background, skills, and how to get in touch.

Azure Cloud Engineer, Azure Administrator, Cloud Security, and GRC-adjacent roles in Bengaluru, Hyderabad, Chennai, or Coimbatore. Open to remote and hybrid positions.
Microsoft Certified: Azure Fundamentals (AZ-900) and AWS Certified Cloud Practitioner (AWS CCP). Currently targeting AZ-104 as the next milestone.
CloudGuard is my enterprise-grade Azure project covering 6 phases: secure networking, NSG hardening, Log Analytics monitoring with KQL, automated alerting, custom RBAC governance, Azure Policy, and Microsoft Defender for Cloud.
CloudGuard IaC Pipeline is my second Azure project — it automates the entire infrastructure deployment using Terraform and GitHub Actions CI/CD. Every push to GitHub triggers an automated pipeline that provisions Azure VNet, subnets, and NSG — eliminating manual portal clicks.
Zero days — I'm available to join immediately. Currently based in Bengaluru and actively applying for cloud roles.
Email me at prasanthp.080902@gmail.com or connect on LinkedIn at linkedin.com/in/prasanthpanneer. I typically respond within 24 hours.
Available for Work

Curious about what we can build together? Let's make it happen.