Mohit Sharma

I'm Spaker

About

I am a Certified Cloud and Cybersecurity Architect with over 15 years of experience and three master’s degrees in Artificial Intelligence, Robotics, and Innovation. As a Microsoft Certified Trainer and a frequent speaker at national and international events, I enjoy sharing insights on technology, security, and innovation.

Cloud Architect & Cybersecurity Expert

Innovation drives me, I like to explore the intersection of technology and practicality to create transformative change.

Years expierence

Speaker Assignment Europe, India and Americas

Certifications Completed

Technical Trainings taught and delivered

Skills & Certifications

Extensive expertise in Cloud Architecture, Cybersecurity, and Enterprise Solutions, backed by industry-recognized certifications

Cybersecurity Architect
DevOps Engineer
Azure Solutions Architect
Azure Administrator
Azure Data Scientist
Azure Network Engineer
Security Fundamentals
Cloud Engineer
Professional Cloud Architect
Docker Associate
Kubernetes Administrator
Kubernetes Developer
Terraform
CC
GitHub
GitOps
K8s for Developers
Linux Essentials
McKinsey
Microsoft Certified Trainer

Core Competencies

  • Cloud Architecture & Solution Design
  • Cybersecurity & Information Security
  • DevOps & Infrastructure as Code
  • Containerization & Orchestration
  • Enterprise Architecture
  • Security Compliance & Governance

Career

Sumary

Mohit Sharma

Innovative and deadline-driven Cybersecurity and Cloud architect with 15+ years of experience designing targetted solutions with prestine documentations.

  • Norway
  • mohit13@outlook.com

Education

Bachelor of Information Technology

2005 - 2009

Uttar Pradesh Technical University, New Delhi, India

The degree emphesised on Software engineering elements and concepts with an introduction to project management.

Master of Information Technology

Birla Institute of Technology And Science, Pilani, India

The degree was focussed on evolving and cutting edge techologies of the time like Machine learning, Natural language procesing and Data sciences.

Master of Robotics and Control

Oslo Metropolitan University , Oslo, Norway

Master's degree focussed on modern automation technologies and industrial applications. Developed expertise in robotic system design, autonomous systems, and intelligent control solutions while working with industry-standard equipment and real-world projects.

Master of Entrepreneurship and Innovation Management

University Of Oslo, Norway

Master's program focused on business creation, corporate innovation, and venture development through practical and theoretical approaches. Gained comprehensive knowledge in entrepreneurial strategy, venture creation, and innovation management while developing real business projects and corporate innovation initiatives

Professional Experience

Senior Architect, Atea Norge

Norway

  • The role focused on coordinating transformation projects, data center migrations, and hybrid application engineering for Azure and Google Cloud.
  • Key responsibilities included designing and deploying enterprise-scale Azure solutions, automating cloud operations with tools like Azure ARM Templates, Terraform, and Jenkins, and migrating workloads to Kubernetes. Governance, security, and monitoring baselines were implemented as code, along with DevOps practices for monitoring and ticketing, ensuring seamless cloud deployment and platform management.
  • Technical Skills:Microsoft Azure, Google Cloud, Python, GitOps, DevSecOps, Microsoft Defender, SIEM, Terraform, Bicep, Linux, Containers, Docker, Kubernetes, STRIDE, Zero Trust Architecture, NIST CSF, Threat Modeling, Vulnerability Management
  • Professional Skills:Technical Leadership, Process Implementation, Migration, Solution Architecture & Design, Process & Cost Optimization and Technical Mentoring

Senior Consultant, Wipro Technologies

2013 - 2019

United Kingdom and Norway

  • The role involved designing and delivering hybrid cloud platforms on Azure and Google Cloud, focusing on migration strategies, infrastructure, security, and monitoring baselines as code.
  • Responsibilities included leading application and data migration projects, driving automation with tools like Azure ARM Templates, Terraform, and Jenkins, managing teams, and ensuring high-quality, secure cloud solutions while optimizing development and implementing best practices in cloud architecture and application engineering.
  • Technical Skills:Microsoft Azure, Google Cloud, DevSecOps, Microsoft Defender, SIEM, Terraform, Linux, Containers, Kubernetes, Zero Trust Architecture, Cloud Security, Monitoring
  • Professional Skills:Project Management & Ownership, Technical Leadership, Cloud Architecture Design, Solution Implementation, Infrastructure Planning

System Engineer, L&T Infotech

2010 - 2013

Bangalore, India

  • Worked as an Application management, deployment and customization engineer Worked on Data exploratory project with Excel Infrastructure engineer Application engineer
  • Technical Skills:Monitoring, Docker, Big Data, Python, Machine Learning
  • Professional Skills:Technical Implementation, Project Execution, System Administration, Application Support, Documentation

Support Specialist, Mirosoft Convergys

2009 - 2010

New Delhi, India

  • Provided technical assistance to customers for products like Windows 7 and Office 2007.
  • Awarded certificate for being an “ACE” performer and “Key contributor” in customer satisfaction and performance at Convergys India.
  • Technical Skills:Windows, Microsoft Office, Technical Troubleshooting, System Diagnostics
  • Professional Skills:Customer Service Excellence, Technical Communication, Problem-solving

Talks

LLM and Cybersecurity: Are LLM Exploitable - Cybersecurity Practitioner Meetup 004

Cybersecurity Practitioner Meetup, LLM, GenAI, Cybersecurity, Exploit, Meetup

LLM and Cybersecurity: Boon or Bane - Cybersecurity Practitioner Meetup 003

Cybersecurity Practitioner Meetup, LLM, GenAI, Cybersecurity, Exploit, Meetup

XZ Backdoor and Software Supply Chain Cyber Attack - Cybersecurity Practitioner Meetup 002

Cybersecurity Practitioner Meetup, Supply Chain, Cyber Attack, Cybersecurity, XZ Backdoor, Meetup

Moderate and Detect harm in AI Content - Microsoft Governance User Group meetup005

Microsoft Governance User Group, AI Content, Moderate, Detect, Moderate and Detect harm in AI Content, Meetup

Azure Policies to Setup Ground rules - Microsoft Governance User Group meetup003

Microsoft Governance User Group, Azure, Policies, Azure Policies to Setup Ground rules, Meetup

Operational Technology security - Cybersecurity Practitioner Meetup 001

Cybersecurity Practitioner Meetup, Cybersecurity, Operational Technology, Operational Technology security, Meetup

Defender for Cloud and Bicep - Microsoft Governance User Group meetup002

Microsoft Governance User Group, Governance, Microsoft, Defender for Cloud and Bicep, Bicep, Defender, Meetup

Microsoft 365 Purview and Azure Purview - Microsoft Governance User Group meetup001

Microsoft Governance User Group, Governance, Microsoft, Microsoft 365 Purview and Azure Purview, Purview, Microsoft 365, Meetup

Microsoft Zero to Hero Community - Secure and Compliant ARM: Mastering Azure Bicep Modules

Bicep, Azure, Secure, Infra as Code, Infra, Code, ARM, Microsoft Zero to Hero

Articles

Obvious security pitfalls in Azure!!!

Azure Security, Cloud Misconfigurations, IAM, Network Security, Compliance, Azure Security Center, Threat Detection, Data Protection, Role-Based Access Control (RBAC), Monitoring and Logging, Key Vault, Secure Cloud Practices, Security Best Practices, Firewall Configuration, Cost Optimization Risks

Achieving DevSecOps — Part 1: Prologue

DevSecOps, Secure SDLC, DevOps, CI/CD Security, Shift-Left Security, Automation, Cultural Change, Risk Management, Application Security, Compliance Automation, Security-as-Code, DevOps Best Practices, Continuous Security, Governance, Threat Modeling

Achieving DevSecOps — Part 2: Baselines

Security Baselines, Compliance Standards, CIS Benchmarks, Policy Enforcement, Secure Configurations, Infrastructure Hardening, DevOps Security, Cloud Security Posture, Access Controls, Secure Coding, Compliance Audits, Vulnerability Scanning, Zero Trust, Encryption Standards

Achieving DevSecOps — Part 3: Threat Modeling

Threat Modeling, Risk Assessment, Attack Vectors, Security Design, STRIDE, DREAD, Mitigation Strategies, Security Posture, Secure Design Patterns, Application Threats, Secure Software Architecture, Threat Analysis, OWASP Top 10, Risk Mitigation

Achieving DevSecOps — Part 3.5: Data Flow Diagram

Data Flow Diagrams, Information Security, Data Movement, Risk Identification, Flow Visualization, Security Architecture, Secure Data Handling, Data Flow Mapping, Threat Vectors, Privacy Considerations, Data Protection, System Dependencies, Compliance Mapping

Achieving DevSecOps — Part 4.1: Control thy Infrastructure

Infrastructure as Code (IaC), Bicep, Automation, Cloud Governance, Access Control, Deployment Pipelines, Secure Cloud Environments, Configuration Management, Security Policies, Azure Resource Manager (ARM), Terraform, Infrastructure Security, Change Management, Scalability

Achieving DevSecOps — Part 4.2: Coding governance, Infrastructure as Code: Producers

Code Governance, Secure Coding, Bicep, IaC Best Practices, Code Reviews, Compliance Automation, Developer Responsibilities, Secure Pipelines, Continuous Deployment, Version Control, Policy as Code, Secure Collaboration, DevOps Governance, Coding Standards

Achieving DevSecOps — Part 4.3: Coding governance, Infrastructure as Code: Consumers

Infrastructure Deployment, Bicep, Security Best Practices, Configuration Compliance, User Access Control, Cloud Governance, Deployment Monitoring, IaC Consumers, Runtime Security, Automation Frameworks, Operational Security, Environment Segmentation, Incident Response

CyberSecurity — Billion Dollar Pig butchering

Pig Butchering Scams, Cyber Fraud, Social Engineering, Financial Scams, Cryptocurrency Security, Investment Fraud, Online Scams, Scam Awareness, Money Laundering, Phishing, Cybercrime Tactics, Scam Prevention, Digital Fraud, Identity Theft

Governance — Get Disaster Recovery for your App Services in order, NOW!!!

Disaster Recovery, Business Continuity, Cloud Resilience, Azure Backup, App Services Failover, Data Redundancy, Recovery Time Objective (RTO), Recovery Point Objective (RPO), Cloud DR Strategies, High Availability, Backup Automation, Incident Response, Failover Planning

Governance- Naming convention, relevant or redundant?

Naming Conventions, Cloud Governance, Resource Organization, Policy Compliance, Standardization, Infrastructure Management, Automation Friendly Naming, Cloud Strategy, Resource Tracking, Governance Best Practices, Cost Allocation, Operational Efficiency

UserGroups

Microsoft Governance User Group

In partnership with Glen Nygaard

Cybersecurity Practitioner User Group

Projects

Coming Soon

Let's Connect

Professional Network

Connect on LinkedIn for professional discussions

Let's Connect

Tech Community

Check out my projects and contributions

View Projects

Knowledge Sharing

Watch technical content and tutorials

Watch Content

Join User Groups

Be part of our tech communities

Location

Asker, Norway