Skip to content

keerthanap8898/bio

Repository files navigation

Keerthana Purushotham

aka - K.P.

◯ ☽ Computer Scientist ◐ Software Developer ◑ Research Engineer ❨ ☼

( Last updated on Dec 28, 2025 - 03:40am PST )

Table of Contents


✧ Keerthana currently works at Amazon Linux, AWS in the Threat, Security & Vulnerability Management team, in EC2's Kernels & Operating Systems org ( KaOS ) 🙆🏻‍♀️.

✧ As a Software developer at Amazon Linux ( AL ), she, along with the rest of her team drive CVE( Common Vulnerabilities & exposures ) Management; i.e., the vulnerability life-cycle across all AWS OS instances, shells, VMs, Hypervisors, EC2 servers (& containers), etc.; spanning distros non-exclusively including including- AL12, AL1, AL2, AL2023, bare metal instances etc., amongst others.

  • She works at the intersection of AI, Distributed Systems, & Correctness; exploring how large-scale intelligent systems can be made more reliable, interpretable, & aligned with design intent.
  • Her work integrates research-driven inquiry with production-grade engineering.

✧ Keerthana has developed deep expertise in threat modeling & remediation, i.e, detecting new bugs i.e., CVE(s) & patching them; across more than 1,500 CVEs for multiple Amazon Linux (AL) distributions.

  • These threat detections & patches regularly touched every single one of the millions of AWS instances deployed globally including all of EC2 servers, AWS hypervisors, etc., during AL's fortnightly security releases.
  • Also involved orchestrating automated tests spanning various linux VM instances offered by AWS for packages whose vulnerability lifecycles she's managed end-to-end;
  • This non-exclusively includes packages like docker, kernel, openssl, nss, python, java, mozilla, etc., amongst all packages seen on AL2023 & more.

✧ She is a full-stack SDE with expertise in cybersecurity, cloud, NLP, & statistics.

  • At AWS, she has integrated AWS CDK, C, Rust, Python, JavaScript, node.js, most major AWS tools & services, APIs, containers & shells, load-balanced edge-APIs & Lambdas, running high frequency, global, federated, throttled workflows orchestrating async requests, to collect critical threat data as soon as they're released; to streamline, plus reliably execute engineering workflows.
  • She's also tasked with accurately evaluating these bugs, finding &/or designing their corresponding patches from scratch if unavailable- in order to design, plan & prove remediation plans for every CVE, without delay.
  • A large part of her work also involves building predictive automation tools for CVE evaluation, designs scalable cloud infrastructure, & supporting threat detection & mgmt for Amazon Linux.

✧ Keerthana's strong computer science foundation from UCSD, enabled her to build deep expertise & skills across NLP, recommender systems, Algorithms & Complexity Theory, Statistics, cloud architectures, etc., and continue doing so.

  • She has contributed significantly to system design efforts, ensuring that critical security information is incorporated effectively into real-world defenses.
  • Her niche in AI, NLP, & computational statistics enables her to apply rigorous statistical methods to security analysis, threat modeling, & security R&D.
✧ Between 2021 & 2025, she's successfully published multiple research articles that have accumulated about 50 citations as of 2025, in conferences & journals like IEEE, ACL, OpenAire, etc.

❄️🏂🏻 She seeks impactful roles where she can drive innovation at scale. 🤶🏻⛄


back to index

☎️ Contact

➀ 🗓️ Calendly: calendly.com/keerthanap0808/30min
➂ 📱 Phone: » +1 360-328-1182 | » USA eight-five-eight_203_8957
# Category Links
❶. Matrix ( Element ) / Pagure @keepur:fedora.im / pagure.io/user/keepur
❷. Fedora / fedora:WIKI / Redhat accounts.fedoraproject.org/user/keepur / fedoraproject.org/wiki/user:keepur / access.redhat.com/account/57599301
❸. Website ( personal ) / LinkedIn keerthanap8898.github.io/keerthanap8898 / linkedin.com/in/keerthanapurushotham
❹. GitHub / github-Repositories github.com/keerthanap8898 / github.com/keerthanap8898?tab=repositories
❺. Mastodon / Bluesky @[email protected] / @keepur8.bsky.social
❻. Google-Scholar / ResearchGate scholar.google: user=tWzF13sAAAAJ / ResearchGate: Keerthana Purushotham
❼. Medium / Substack Medium: @keerthanapurushotham / Substack: @keerthanapurushotham
❽. X ( twitter ) / Discord X: keepur8 / Discord: 747152507184349195 - ( keepur8 )
❾. AI Chatbot notebooklm.google.com/notebook/fe2125af-e6e0-4815-8181-041b267e3b8b

back to index


🔗 Links

Resume:

( Note: She's not a CISO / CISSP as she's uncertified but she does have comparable experience. )

Portfolio:

( Transcripts, certificates, & LORs. )

LinkedIn: linkedin.com/in/keerthanapurushotham

GitHub: keerthanap8898.github.io/keerthanap8898 | github.com/keerthanap8898 | github.com/keerthanap8898?tab=repositories

Public Mention: forum.posit.co/t/r-language-openssl-vulnerability/186809/5

AI Chatbot trained on Keerthana's Profile:

( googleLM )

Research:

Other:

back to index


🛠️ Projects

New WIP

  • 🅰 Cve Toad :

    [ Security | OSS ]

A command‐line tool that launches a temporary containerised runtime to perform AI-assisted CVE impact analysis.

The shell initialises with short-lived authentication tokens (≤ 8 hours) and dynamically installs approved AI model clients (e.g., OpenAI, Anthropic) inside the container. Once execution completes, the container and all secrets are destroyed, leaving no footprint on the host.

  • 🅱 Understanding-Testing-Frameworks :

    [ SDLC | Chapter or Booklet ]

A comprehensive, formal, & practical framework for software testing across the entire SDLC, from code to continuous verification.

Key ideas:

  1. ┈ Every SDLC stage corresponds to a different NP-hard decision problem.
  2. ┈ Tests are complexity-reduction mechanisms.
  3. ┈ Determinism is engineered; not assumed.
This project is early, but the core structure is there.

back to index

Text To Video App

Async API using the Genmo Mochi-1 model hosted on 8×H100 GPU Kubernetes work nodes.


Accuracy Is Not Enough

Confusion Matrix Metrics That Actually Work in CVE Impact Prediction

An applied research summary introducing advanced confusion-matrix metrics that outperform accuracy in predicting CVE exploitability impact.

Cloud Storage Security Risks, Practices & Measures: A Review [IEEE] | 40 cites — Jan 1 2020

Comprehensive review of security threats, mitigation practices, and compliance measures in enterprise cloud storage systems.


Image Denoising using Auto-encoders & Spatial Filters for Gaussian Noise [IEEE] | 7 cites — Mar 15 2021

( MSRIT Final Year Project )

Proposes a hybrid auto-encoder + spatial filter framework to denoise medical images affected by Gaussian noise.


Context-Based Filtering of Conversational Data [ACL] | 2 cites — May 22 2021

( internship at Samsung R&D )

Introduces a context-aware comment filtering system for NLP pipelines using semantic relevance modeling.


Automated EDI Mapping

( internship at Cleo )

Analysis & automation of types of EDI mapping (to help facilitate the manual data mapping in data transformation systems) - using RNNs, Logistic Regression, & Fuzzy Logic to generate results and comparison the three approaches.

Repo includes the apk code executing a function to read customer requirement documents as a user-input & automatically generate a ruleset file dynamically.

back to index

. Build a Neural CRF for Constituency Parsing : [ Advanced-Statistical-NLP | CSE291]

Implemented a neural CRF parser using the CKY algorithm on the Penn Treebank (PTB) dataset. Computed the partition function within the NLL loss via the inside algorithm and trained models on Google Colab GPU for optimal performance.


. Build a Neural CRF NER Tagger - How to build a baby BERT : [ Advanced-Statistical-NLP | CSE291]

Developed BiLSTM + CRF architectures for Named Entity Recognition (NER), compared to a baseline BiLSTM tagger. Implemented and benchmarked both on GPU-enabled Colab environments.


. System Measurement - Ubuntu : [ Operating-Systems | CSE221]

Performed experiments to measure OS-level components including CPU scheduling, memory allocation, networking, and filesystem latency on Ubuntu systems; analyzed bottlenecks in system services.


. Automation of Irrigation Systems - using either Arduino &/or RaspberryPi: [ IoT-using-Arduino | undergrad]

IoT-based Arduino project using either Arduino &/or RaspberryPi with moisture sensors & pumps to maintain optimal soil moisture by plant species. Awarded 2nd place in freshman Robotics & Engineering competition at MSRIT.


back to index


🎨 Images

Skills Mindmap

Fed KP's data into AI things, then asked it to make a mindmap.


Skills Mindmap

back to index


Radar Chart: Skills Distribution Across Top Experiences

Fed KP's data into AI things, then asked it to analyze her overall skill distribution.


Radar Chart: Skills Distribution Across Top Experiences

back to index


Weighted Technical Value by Experience

Fed KP's data into AI things, then asked it to identify & analyze her individual experiences of significance.


Weighted Technical Value by Experience

back to index


Weighted Technical Value by Skill

Fed KP's data into AI things, then asked it to analyze all her skills & their depth.


Weighted Technical Value by Skill

back to index


Portfolio Balance by Skill Group

Fed KP's data into AI things, then asked it to make a high-level pie-chart.


Portfolio Balance by Skill Family

back to index


Copyright Ⓒ 2025  Keerthana Purushotham <[email protected]>.
All rights reserved.

This repository and its contents may not be copied, modified, distributed, or used
without explicit written permission from the author. See LICENSE for details.

About

This is where it's all at 💫 (˙ᵕ˙) ྀི —— Scroll down to the README

Topics

Resources

License

Stars

Watchers

Forks

Contributors 2

  •  
  •