Mohit Sharma

I'm Spaker

About

Senior Cloud & Security Architect | Microsoft Certified Trainer | Public Speaker

With over 17 years of experience, I design and deliver secure, scalable, and cloud-native solutions across the public sector, energy, transport, and finance industries. My expertise spans Azure, Kubernetes, Terraform, DevSecOps, and enterprise cloud governance.

I’ve led large-scale cloud transformations and data center migrations, guiding organizations from legacy infrastructure to modern cloud environments. I focus on automation-first strategies—implementing Infrastructure as Code, CI/CD pipelines, and containerized workloads to enhance speed, reliability, and compliance.

Security and governance are at the core of my work. I architect Zero Trust frameworks, integrate GDPR-compliant controls, and develop DevSecOps pipelines that bring together innovation and resilience across hybrid and multi-cloud ecosystems.

As a technical leader and mentor, I enjoy building high-performing teams and aligning technology strategy with business outcomes. My approach combines deep technical insight with collaboration, ownership, and continuous learning.

Outside of projects, I’m an active speaker and educator, sharing insights on cybersecurity, AI, and secure automation at global events including ISC2 Security Congress and the Nordic Infrastructure Conference.

Let’s connect if you’re driving secure innovation, scaling cloud platforms, or building impactful engineering teams.

Cloud Architect & Cybersecurity Expert

Innovation drives me, I like to explore the intersection of technology and practicality to create transformative change.

Years expierence

Speaker Assignment Europe, India and Americas

Certifications Completed

Technical Trainings taught and delivered

Skills & Certifications

Extensive expertise in Cloud Architecture, Cybersecurity, and Enterprise Solutions, backed by industry-recognized certifications

Cybersecurity Architect
DevOps Engineer
Azure Solutions Architect
Azure Administrator
Azure Data Scientist
Azure Network Engineer
Security Fundamentals
Cloud Engineer
Professional Cloud Architect
Docker Associate
Kubernetes Administrator
Kubernetes Developer
Terraform
CC
GitHub
GitOps
K8s for Developers
Linux Essentials
McKinsey
Microsoft Certified Trainer

Core Competencies

  • Cloud Architecture & Solution Design
  • Cybersecurity & Information Security
  • DevOps & Infrastructure as Code
  • Containerization & Orchestration
  • Enterprise Architecture
  • Security Compliance & Governance

Career

Sumary

Mohit Sharma

Innovative and deadline-driven Cybersecurity and Cloud architect with 15+ years of experience designing targetted solutions with prestine documentations.

  • Norway
  • mohit13@outlook.com

Education

Bachelor of Information Technology

2005 - 2009

Uttar Pradesh Technical University, New Delhi, India

The degree emphesised on Software engineering elements and concepts with an introduction to project management.

Master of Information Technology

Birla Institute of Technology And Science, Pilani, India

The degree was focussed on evolving and cutting edge techologies of the time like Machine learning, Natural language procesing and Data sciences.

Master of Robotics and Control

Oslo Metropolitan University , Oslo, Norway

Master's degree focussed on modern automation technologies and industrial applications. Developed expertise in robotic system design, autonomous systems, and intelligent control solutions while working with industry-standard equipment and real-world projects.

Master of Entrepreneurship and Innovation Management

University Of Oslo, Norway

Master's program focused on business creation, corporate innovation, and venture development through practical and theoretical approaches. Gained comprehensive knowledge in entrepreneurial strategy, venture creation, and innovation management while developing real business projects and corporate innovation initiatives

Professional Experience

Senior Architect, Atea Norge

Norway

  • Responsible for all aspects of Cloud, Cybersecurity, DevSecOps and AI infrastructure, covering transformation projects, hybrid migrations, and modernization across Azure, Google Cloud, and Sovereign Cloud environments.
  • Acted as Subject Matter Expert (SME) for large-scale cloud transformations and data center migrations, ensuring smooth transitions from legacy platforms to secure, cloud-native architectures.
  • Designed and implemented enterprise-scale Azure and Sovereign Cloud solutions with Kubernetes, Terraform, and Azure Bicep, focusing on scalability, automation, and security compliance.
  • Worked with AI agents and multi-agent systems to support automation, observability, and intelligent security operations within controlled and compliant environments.
  • Applied a DevSecOps approach to integrate security and automation into every stage of delivery, using CI/CD pipelines, infrastructure as code, and continuous vulnerability management.
  • Implemented Zero Trust and Cloud Governance frameworks to meet NIST CSF, GDPR, and sovereign cloud standards, ensuring consistent identity, access, and compliance controls.
  • Developed AI-assisted monitoring and defense mechanisms that support proactive threat detection, incident response, and adaptive cybersecurity in hybrid and multi-cloud environments.
  • Technical Skills: Azure, Google Cloud, Sovereign Cloud, Terraform, Bicep, Jenkins, Kubernetes, Docker, Python, AI Agents, Generative AI, GitOps, DevSecOps, Microsoft Defender, SIEM, Linux, STRIDE, Zero Trust, NIST CSF, Threat Modeling, Vulnerability Management.
  • Professional Skills: Cloud Strategy, Cybersecurity Architecture, AI Integration, Solution Design, Process Automation, Governance, Cost Optimization, and Technical Mentoring.

Senior Consultant, Wipro Technologies

2013 - 2019

United Kingdom and Norway

  • The role involved designing and delivering hybrid cloud platforms on Azure and Google Cloud, focusing on migration strategies, infrastructure, security, and monitoring baselines as code.
  • Responsibilities included leading application and data migration projects, driving automation with tools like Azure ARM Templates, Terraform, and Jenkins, managing teams, and ensuring high-quality, secure cloud solutions while optimizing development and implementing best practices in cloud architecture and application engineering.
  • Technical Skills:Microsoft Azure, Google Cloud, DevSecOps, Microsoft Defender, SIEM, Terraform, Linux, Containers, Kubernetes, Zero Trust Architecture, Cloud Security, Monitoring
  • Professional Skills:Project Management & Ownership, Technical Leadership, Cloud Architecture Design, Solution Implementation, Infrastructure Planning

System Engineer, L&T Infotech

2010 - 2013

Bangalore, India

  • Worked as an Application management, deployment and customization engineer Worked on Data exploratory project with Excel Infrastructure engineer Application engineer
  • Technical Skills:Monitoring, Docker, Big Data, Python, Machine Learning
  • Professional Skills:Technical Implementation, Project Execution, System Administration, Application Support, Documentation

Support Specialist, Mirosoft Convergys

2009 - 2010

New Delhi, India

  • Provided technical assistance to customers for products like Windows 7 and Office 2007.
  • Awarded certificate for being an “ACE” performer and “Key contributor” in customer satisfaction and performance at Convergys India.
  • Technical Skills:Windows, Microsoft Office, Technical Troubleshooting, System Diagnostics
  • Professional Skills:Customer Service Excellence, Technical Communication, Problem-solving

Talks

Coming Up

Beyond the Hyperscalers

Beyond the Hyperscalers: The New Era of Specialized and Sovereign Clouds

Mohit Sharma

Nordic Infrastructure Conference 2025
29 Oct 2025 • 11:20 AM – 60 min
Room 4

Multi-Agent AI Governance

From Prototype to Enterprise: Multi-Agent AI Governance and Scaling in Azure

Mohit Sharma

Nordic Infrastructure Conference 2025
30 Oct 2025 • 8:30 AM – 60 min
Main Room

LLM and Cybersecurity: Are LLM Exploitable - Cybersecurity Practitioner Meetup 004

Cybersecurity Practitioner Meetup, LLM, GenAI, Cybersecurity, Exploit, Meetup

LLM and Cybersecurity: Boon or Bane - Cybersecurity Practitioner Meetup 003

Cybersecurity Practitioner Meetup, LLM, GenAI, Cybersecurity, Exploit, Meetup

XZ Backdoor and Software Supply Chain Cyber Attack - Cybersecurity Practitioner Meetup 002

Cybersecurity Practitioner Meetup, Supply Chain, Cyber Attack, Cybersecurity, XZ Backdoor, Meetup

Moderate and Detect harm in AI Content - Microsoft Governance User Group meetup005

Microsoft Governance User Group, AI Content, Moderate, Detect, Moderate and Detect harm in AI Content, Meetup

Azure Policies to Setup Ground rules - Microsoft Governance User Group meetup003

Microsoft Governance User Group, Azure, Policies, Azure Policies to Setup Ground rules, Meetup

Operational Technology security - Cybersecurity Practitioner Meetup 001

Cybersecurity Practitioner Meetup, Cybersecurity, Operational Technology, Operational Technology security, Meetup

Defender for Cloud and Bicep - Microsoft Governance User Group meetup002

Microsoft Governance User Group, Governance, Microsoft, Defender for Cloud and Bicep, Bicep, Defender, Meetup

Microsoft 365 Purview and Azure Purview - Microsoft Governance User Group meetup001

Microsoft Governance User Group, Governance, Microsoft, Microsoft 365 Purview and Azure Purview, Purview, Microsoft 365, Meetup

Microsoft Zero to Hero Community - Secure and Compliant ARM: Mastering Azure Bicep Modules

Bicep, Azure, Secure, Infra as Code, Infra, Code, ARM, Microsoft Zero to Hero

Articles

Obvious security pitfalls in Azure!!!

Azure Security, Cloud Misconfigurations, IAM, Network Security, Compliance, Azure Security Center, Threat Detection, Data Protection, Role-Based Access Control (RBAC), Monitoring and Logging, Key Vault, Secure Cloud Practices, Security Best Practices, Firewall Configuration, Cost Optimization Risks

Achieving DevSecOps — Part 1: Prologue

DevSecOps, Secure SDLC, DevOps, CI/CD Security, Shift-Left Security, Automation, Cultural Change, Risk Management, Application Security, Compliance Automation, Security-as-Code, DevOps Best Practices, Continuous Security, Governance, Threat Modeling

Achieving DevSecOps — Part 2: Baselines

Security Baselines, Compliance Standards, CIS Benchmarks, Policy Enforcement, Secure Configurations, Infrastructure Hardening, DevOps Security, Cloud Security Posture, Access Controls, Secure Coding, Compliance Audits, Vulnerability Scanning, Zero Trust, Encryption Standards

Achieving DevSecOps — Part 3: Threat Modeling

Threat Modeling, Risk Assessment, Attack Vectors, Security Design, STRIDE, DREAD, Mitigation Strategies, Security Posture, Secure Design Patterns, Application Threats, Secure Software Architecture, Threat Analysis, OWASP Top 10, Risk Mitigation

Achieving DevSecOps — Part 3.5: Data Flow Diagram

Data Flow Diagrams, Information Security, Data Movement, Risk Identification, Flow Visualization, Security Architecture, Secure Data Handling, Data Flow Mapping, Threat Vectors, Privacy Considerations, Data Protection, System Dependencies, Compliance Mapping

Achieving DevSecOps — Part 4.1: Control thy Infrastructure

Infrastructure as Code (IaC), Bicep, Automation, Cloud Governance, Access Control, Deployment Pipelines, Secure Cloud Environments, Configuration Management, Security Policies, Azure Resource Manager (ARM), Terraform, Infrastructure Security, Change Management, Scalability

Achieving DevSecOps — Part 4.2: Coding governance, Infrastructure as Code: Producers

Code Governance, Secure Coding, Bicep, IaC Best Practices, Code Reviews, Compliance Automation, Developer Responsibilities, Secure Pipelines, Continuous Deployment, Version Control, Policy as Code, Secure Collaboration, DevOps Governance, Coding Standards

Achieving DevSecOps — Part 4.3: Coding governance, Infrastructure as Code: Consumers

Infrastructure Deployment, Bicep, Security Best Practices, Configuration Compliance, User Access Control, Cloud Governance, Deployment Monitoring, IaC Consumers, Runtime Security, Automation Frameworks, Operational Security, Environment Segmentation, Incident Response

CyberSecurity — Billion Dollar Pig butchering

Pig Butchering Scams, Cyber Fraud, Social Engineering, Financial Scams, Cryptocurrency Security, Investment Fraud, Online Scams, Scam Awareness, Money Laundering, Phishing, Cybercrime Tactics, Scam Prevention, Digital Fraud, Identity Theft

Governance — Get Disaster Recovery for your App Services in order, NOW!!!

Disaster Recovery, Business Continuity, Cloud Resilience, Azure Backup, App Services Failover, Data Redundancy, Recovery Time Objective (RTO), Recovery Point Objective (RPO), Cloud DR Strategies, High Availability, Backup Automation, Incident Response, Failover Planning

Governance- Naming convention, relevant or redundant?

Naming Conventions, Cloud Governance, Resource Organization, Policy Compliance, Standardization, Infrastructure Management, Automation Friendly Naming, Cloud Strategy, Resource Tracking, Governance Best Practices, Cost Allocation, Operational Efficiency

UserGroups

Microsoft Governance User Group

In partnership with Glen Nygaard

Cybersecurity Practitioner User Group

Projects

Coming Soon

Let's Connect

Professional Network

Connect on LinkedIn for professional discussions

Let's Connect

Tech Community

Check out my projects and contributions

View Projects

Knowledge Sharing

Watch technical content and tutorials

Watch Content

Join User Groups

Be part of our tech communities

Location

Asker, Norway