Portrait of Abdul Hardi Umar

Abdul Hardi Umar

A-LIGN

Security Consultant, CMMC Team

About me

I am a cybersecurity professional with experience across cloud security, identity and access management, secure infrastructure, compliance readiness, and day to day security operations. My work has centered on helping organizations strengthen their security posture through practical improvements, stronger controls, and steady operational support. I value security work that is not only well designed on paper, but also effective in real environments where teams need clarity, consistency, and resilience.

Over the years, I have worked across enterprise and regulated environments, supporting cloud and hybrid systems, identity governance, endpoint security, system hardening, and monitoring. My experience includes helping teams improve visibility, reduce risk, strengthen access controls, and align security practices with business and compliance needs. I have supported efforts where security had to be both technically sound and operationally realistic, which has shaped the way I approach risk, implementation, and continuous improvement.

At A-LIGN, I work as a Security Consultant on the CMMC team, supporting readiness and assessment activities for organizations operating in regulated environments. My role involves reviewing security controls, assessing evidence, understanding operational practices, and helping ensure that security requirements are implemented in practical and sustainable ways. This work has strengthened my ability to evaluate how policies, technical safeguards, and day to day processes come together in real operating environments.

Before this, I supported network and security operations at T-Solutions, where I worked on infrastructure support, system security, troubleshooting, and operational resilience in mission focused environments. That experience gave me a stronger appreciation for the importance of reliability, disciplined operations, and security practices that support both mission needs and long term stability. It also deepened my understanding of how technical issues, operational demands, and security priorities intersect in practice.

I have also worked in identity and access management at 3D Systems, supporting user lifecycle processes, access governance, MFA, SSO, and directory services in enterprise environments. That work sharpened my understanding of identity as a core security function and reinforced how access decisions, authentication practices, and directory hygiene directly affect an organization’s broader security posture.

Across these roles, I have developed an approach that combines technical depth with practical execution. I care about security work that is clear, measurable, and grounded in real operational needs. Whether the task involves reviewing controls, supporting cloud security improvements, helping teams strengthen access and endpoint protections, or contributing to readiness efforts, I focus on work that improves resilience and helps organizations operate with greater confidence.

My professional interest continues to center on cloud security, security engineering, identity, compliance readiness, and secure operations. I am especially drawn to work that sits at the intersection of technical controls, operational discipline, and long term risk reduction. I want the systems I support to be secure, dependable, and understandable to the people responsible for maintaining them.