Resourceful Penetration Tester and Cybersecurity Professional with comprehensive experience in conducting comprehensive security assessments, identifying vulnerabilities, and recommending mitigation strategies. Proficient in utilizing industry-standard penetration testing tools like Metasploit, Burp Suite, Nmap, and Wireshark. Adept at collaborating with cross-functional teams to ensure robust security postures. Complemented by a strong background in software development, and customer service. Driven to leverage technical expertise and problem-solving abilities to safeguard organizational assets from emerging cyber threats.
• Assisted senior penetration testers in conducting comprehensive security assessments of systems, networks, and applications.
• Conducted vulnerability scans and manual penetration testing under supervision, identifying and documenting security weaknesses.
• Researched new attack vectors, tools, and methodologies to enhance the team's understanding of emerging threats.
• Contributed to the development of detailed reports outlining vulnerabilities discovered, their potential impact, and recommendations for remediation.
• Demonstrated proficiency in using penetration testing tools and frameworks such as Metasploit, Nmap, Burp Suite, Wireshark, etc.
• Collaborated effectively with cross-functional teams including network administrators, developers, and system architects to ensure comprehensive security testing.
• Conducted comprehensive and systematic assessments on various fronts including Web Apps, APIs, and Mobile Apps.
• Utilized expertise in both manual testing and analysis, as well as automated web application vulnerability scanning and testing tools such as Nessus, Burp Suite, Wpscan, Appscan, MobSF, Immuniweb, and Nmap.
• Successfully uncovered critical vulnerabilities including SQL injection, XXE, CSRF, and authentication bypass in dynamic web applications through in-depth web application penetration testing.
• Meticulously identified vulnerabilities and efficiently distinguished false positives during Vulnerability Assessment.
• Actively collaborated with development and security teams, providing support in remediating identified vulnerabilities.
• Reports served as valuable resources for stakeholders to understand the security posture and take necessary steps to strengthen their systems.
• Provided technical support, diagnosing, and resolving hardware and software issues promptly to minimize downtime.
• Managed and maintained technical equipment and software, ensuring optimal performance and up-to-date systems.
• Conducted training sessions for staff on new technologies and software applications, enhancing team competence and efficiency.
• Maintained detailed records and documentation of technical operations, equipment inventory, and troubleshooting procedures.
• Assisted in network and systems maintenance, ensuring robust and secure IT infrastructure.
VAPT
undefinedCyber Security
• CEH V11
• CompTIA Security + (SY0-601)