Over six plus years of diverse experience in Information Security, Security Testing, penetration testing and vulnerability assessments on various Web and Mobile applications including Ethical hacking. Experience in CTFs, bug bounties, and performing Threat Models. Ability to perform social engineering techniques and tools to obtain trust, infiltrate access and pivot. Ability to perform Black Box testing, white box network penetration testing and reporting. Expertise in exploiting known vulnerabilities in web applications with keen interest towards Zero Day Vulnerabilities found time to time. Adequate knowledge in software development and code sanitizing to provide security maintenance. Use of debuggers, fuzzes, scanners, analyzers and proxies to examine, identify vulnerable exploits in the web application software. Use of web-development, OWASP framework NIST standards, enumeration techniques and tools such as NMAP, Network scanners, harvesters, web crawlers, backtracking machine to manually identify web application vulnerabilities. Use of network packet, traffic sniffers, scanners and analyzers such as Wireshark. Strong understanding in cryptographic concepts, regular expression and web development. Maintainable experience and knowledge in DHCP server, DNS server and WINS server. Strong experience on AppScan tool for automating the security testing, and VoIP Security & War Dialing.
Conducted application penetration testing of 50+ business applications
Environment: JAVA, Asp.net, MySQL, App scan, Apache Kali Linux, Burp suite, Veracode, Microsoft Visual Studio, HP Fortify, NMap, Wireshark, Amazon S3,Amazon CloudWatch, AWS Lambda, Azure Functions, Ansible ,Git,Bash,Linux,Cloud Computing,Cloud Applications,DevOps, Jenkins, Amazon Web Services (AWS)
Environment: PHP, ASP, MS SQL, MY-SQL, Apache, OWASP ZAP Proxy, AppScan, Dirbuster, HP Fortify, NMap, Metasploit, SecureAssist, CheckMarx, Fortify, Jenkins, Linux, Terraform, Ansible, Puppet and Docker hands on training on AWS and Azure, IBM Qadar.
Environment: Threat modeling, Penetration testing, AppScan, Code review Software security OWASP, Vulnerability assessment, SecureAssist, CheckMarx, Fortify, IBM Qadar, WAS, Network monitoring SDLC.