Details
Skills
CORE COMPETENCIES
Security Testing & Assessments: Proficient in Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), and Interactive Application Security Testing (IAST). Handling vulnerability remediation, analyzing security events, and automating security processes. Hands on experience with attack surface management and continuous monitoring.
Threat & Vulnerability Management: Expertise in network security, vulnerability assessment, patching, tracking and security risk analysis.
Application Security & Secure Coding: Conducting secure code assessments, reviewing application security posture, and mitigating OWASP Top 10 and CWE 25 vulnerabilities.
Risk & Compliance: Knowledgeable in MITRE ATT&CK, NIST, and PCI DSS frameworks.
Technical Leadership: Strong experience in managing security operations, reporting vulnerabilities, and driving remediation strategies, enhancing security workflows, and collaborating with cross-functional teams.
TECHNICAL SKILLS
Threat and Vulnerability Management Tools: Tenable Security Center, Qualys WAS, Fortify SCA, AppScan Enterprise, Burp Suite, Invicti Security (Acunetix), Contrast Security, Checkmarx, Synopsys(seeker), Cyberpion(IONIX), BitSight Security.
Network and Threat Analysis Tools: Nessus, NMAP, Wireshark, Metasploit, Ettercap, Aircrack-NG, Splunk.
Compliance & GRC Tools: ServiceNow, SAP, Archer RSA Suite, JIRA Service Management, CodeDX, Confluence.
Programming & Scripting Languages: Python, Shell Scripting, GoLang, SQL, C, C++, Java, ASP.NET, Bash, PowerShell.
Forensics & Incident Response Tools: Autopsy, HashKeeper, Bulk Extractor, FTK Imager, Volatility.
About
Experienced Cyber Security Specialist with 4+ years of hands-on experience in threat and vulnerability management (TVM), network assessment, vulnerability assessments & penetration testing(VAPT). Skilled in securing enterprise, non-enterprise, banking, and telecommunications systems. Identifying critical vulnerabilities, assessing and remediating critical vulnerabilities while ensuring compliance with industry standards. Recognized by global organizations for exceptional contributions to security hardening and innovation in cyber threat response. Adept at leveraging advanced security tools to protect enterprise applications and networks against evolving cyber threats.