Summary
Overview
Work History
Education
Skills
Websites
Certification
Coursework
Timeline
Generic

Akhil Kurian

Kottayam

Summary

Proficient in Web, Mobile (Android & iOS), and Network Infrastructure Penetration Testing with hands-on experience executing daily vulnerability assessments, threat assessments, mitigation, and reporting activities to ensure information security. Experienced Information Security Analyst specializing in OWASP Top 10 Vulnerability Assessment for internet-facing point of sale web applications and web services. Conducted Dynamic and Static Application Security Testing (SAST & DAST) to identify and address vulnerabilities in software applications. Performed vulnerability scanning on internal and external systems, identifying and mitigating vulnerabilities. Monitored IDS/IPs events logs to proactively mitigate malicious or suspicious activities. Managed and maintained the web security gateway, investigating and controlling user and suspicious web activity. Demonstrated expertise as a Certified Ethical Hacker, providing consultation on technical solutions for a wide range of complex problems, ensuring proposed solutions are imaginative, thorough, practicable, and aligned with organizational objectives.

Overview

3
3
years of professional experience
1
1
Certification

Work History

Cybersecurity Engineer

Tegain
08.2024 - 04.2025
  • Worked with teams to develop company-wide information assurance, security standards and procedures.
  • Coordinated with third-party security information and event management (SIEM) providers to maintain protections and predict threats.
  • Applied Center for Internet Security (CIS) benchmarks to verify performance of ongoing security measures.
  • Authored security and vulnerability reports, detailing logged incursions and suggesting remediation efforts.
  • Created policies and procedures for emerging security technologies and proposals.
  • Collaborated with external vendors to perform penetration tests on network devices, operating systems and databases.
  • Conducted risk analysis, system certifications, auditing, security documentation and security testing.
  • Developed risk assessment reports to identify threats and vulnerabilities.
  • Conducted IT audit assessments for systems or applications to recommend solutions to mitigate risks.
  • Designed tests and tools to break into security-protected applications and networks to probe for vulnerabilities.
  • Recommended IT security improvements to achieve system confidentiality, integrity and availability.
  • Assessed threats, risks and vulnerabilities from emerging security issues to advise pertinent stakeholders on appropriate measures.
  • Analyzed security policies for usefulness and value to suggest security policy improvements.
  • Simulated attack scenarios using threat actors' tactics and techniques.
  • Assisted with development of cybersecurity policies and procedures to prevent and defend against unauthorized access to systems, networks, and data.
  • Used analysis from attack simulations to identify gaps in threat detection or response.
  • Provided cybersecurity expertise on applications development projects, enabling appropriate operating environment configurations.
  • Conducted breach and attack simulation operations against systems.
  • Researched latest security threats and vulnerabilities to stay abreast of trends and threat actors.
  • Documented entire penetration testing lifecycle during engagements for future review.
  • Reviewed proposed new systems, networks, and software designs for potential security risks.
  • Recommended measures to protect systems from modification, disclosure, or destruction.
  • Identified weaknesses and vulnerabilities in network systems.

Cyber Security Engineer

SMK
03.2024 - 08.2024
  • Conducted comprehensive security assessments to identify vulnerabilities and recommended effective solutions to mitigate risks.
  • Implemented and managed firewall configurations, intrusion detection and prevention systems, and VPNs to safeguard network infrastructure.
  • Collaborated with cross-functional teams to design and implement security policies and procedures in alignment with industry best practices.
  • Provided expert guidance on securing cloud environments, specializing in Microsoft Azure, ensuring a robust and compliant cloud security architecture.

Cyber Security Consultant

ATMIC SYSTEMS
09.2023 - 03.2024
  • Conducted comprehensive security assessments to identify vulnerabilities and recommended effective solutions to mitigate risks.
  • Implemented and managed firewall configurations, intrusion detection and prevention systems, and VPNs to safeguard network infrastructure.
  • Collaborated with cross-functional teams to design and implement security policies and procedures in alignment with industry best practices.
  • Provided expert guidance on securing cloud environments, specializing in Microsoft Azure, ensuring a robust and compliant cloud security architecture.
  • Responsible for pen-testing and consulting them about their security.

Cyber Security and Pen-testing Engineer

CodePeak Technologies
02.2023 - 09.2023
  • Verified and improved the security of a company's computer system and performed web application Security Training and vulnerability assessment.
  • Updated knowledge of the Information not limited to security news, articles, technology, exploits tools, techniques, methodologies, baselines, and standards.
  • Conducted Configuration Assessments, report preparation Client interactions/report presentation, and Network & Systems Audits.
  • Created scripts that test for vulnerabilities including penetration testing and risk assessment.
  • Performed risk assessment across the entire network including hardware and software systems.
  • Created suggestions for security upgrades and Developed low-level tools that improve Security Training and monitoring.
  • Studied ethical hacking can be applied by security pros across industries and in a multitude of sectors.
  • Provided training to students.
  • Developed comprehensive test plans for vulnerability assessments and penetration testing using tools such as Metasploit and Burp Suite, resulting in a 40% reduction of security risks over a 12-month period.

Cyber Security Intern

Red Team Hacker Academy
06.2022 - 11.2022
  • Implementing preventative and detective information security controls to secure the company's data, information, and resources.
  • Conducting a risk assessment to minimize the company's security, financial, and legal exposure.
  • Conducting vulnerability scanning on internal and external systems to identify and mitigate identified vulnerabilities.
  • Monitoring IDs/IPs events log to mitigate malicious or suspicious activities.
  • Monitoring and maintaining the web security gateway, investigating and controlling user and suspicious web activity.
  • Implemented and developed pen testing processes.
  • Performance analysis and monitoring of operational processes.
  • Ensured the IT security requirements are met.
  • Derived recommendations for action for the specialist departments.
  • Experience working with Kali Linux, Metasploit, NMap, and BurpSuite.
  • Tested the IT systems of our customers for weaknesses and configuration errors.
  • Reported by showing our customers the identified weak points and documented suitable measures to close them sustainably.
  • Assisted in performing vulnerability assessments on company networks and systems, utilizing tools like Nessus and Wireshark, which led to the identification and remediation of 20 critical security issues.

Education

Bachelor of Commerce -

MG UNIVERSITY
Kottayam, Kerala
01.2022

DIPLOMA IN CYBER SECURITY -

RED TEAM HACKER ACADEMY
Kochi
01.2022

Skills

  • Cyber Security Analyst
  • Cybersecurity
  • Vulnerability Assessment
  • Vulnerability Scan
  • Remediation
  • Mitigation
  • Audit
  • Soc
  • Siem
  • Pen-testing
  • Threat analysis
  • Malware analysis
  • Cryptography
  • Ethical hacking
  • Vulnerability assessment
  • Application security
  • Penetration testing
  • Patch management
  • Cloud security
  • Reverse engineering
  • Cybersecurity frameworks
  • Network security
  • Access control

Certification

  • CCNA, Infocampus, 2024
  • MCSE, Infocampus, 2024
  • Certified Network Security Practitioner (CNSP), The SecOps Group, 2024
  • Certified Ethical Hacker (CEH), EC-Council, 2023
  • Certified IT Infrastructure and Cyber SOC Analyst (CICSA), Red Team Hacker Academy, 2022

Coursework

CICSA (Cyber Security), Red Team Hacker Academy, 2022

Timeline

Cybersecurity Engineer

Tegain
08.2024 - 04.2025

Cyber Security Engineer

SMK
03.2024 - 08.2024

Cyber Security Consultant

ATMIC SYSTEMS
09.2023 - 03.2024

Cyber Security and Pen-testing Engineer

CodePeak Technologies
02.2023 - 09.2023

Cyber Security Intern

Red Team Hacker Academy
06.2022 - 11.2022

Bachelor of Commerce -

MG UNIVERSITY

DIPLOMA IN CYBER SECURITY -

RED TEAM HACKER ACADEMY
Akhil Kurian