Dynamic and results-oriented Information Security Consultant with 2 years of experience in the Information Security domain. Proficient in various security technologies, including Web and Mobile Application Penetration Testing, Network Penetration Testing, Vulnerability Management, and Security Configuration Reviews. Successfully operated in challenging environments, including public and private sector banks, delivering robust security solutions and enhancing system resilience.
• Collaborated with public (government) and private sector banks, executing end-to-end security solutions.
• Conducted penetration testing on a diverse range of web and mobile applications across public and private networks.
• Performed comprehensive penetration testing and vulnerability assessments on targets including:
• Operating Systems: Windows, Unix, Linux
• Network Devices: Routers, firewalls, and switches
• Applications: Web and mobile platforms
• Conducted security configuration reviews for Windows and Linux servers to ensure compliance with best practices.
• Identified, confirmed, and exploited security vulnerabilities on both client and server sides.
• Enhanced and executed Red Team engagements for clients in the banking and private sectors, ensuring timely delivery and high-quality results.
• Managed and tracked vulnerability data, ensuring timely remediation based on risk assessments.
• Assisted in the execution of application security penetration tests, including scheduling, tool execution, and reporting.
• Provided actionable security advice to improve operations and maintain compliance with security controls and regulations.
• Identified potential security threats and recommended mitigations to safeguard customers’ networks, assets, and applications.
Experience: 2 years of hands-on experience in the Information Security domain
Operating Systems Expertise: In-depth knowledge of Windows and Linux operating systems
Penetration Testing:
Skilled in performing penetration testing of Networks, APIs, Mobile, and Web Applications
Extensive understanding of security vulnerabilities, exploitation methods, and remediation strategies
Configuration Audits: Proven experience in auditing and reviewing configurations on Windows and Unix-based platforms
Security Tools Proficiency: Expertise with a wide range of tools, including:
Nessus, Qualys Guard, NMAP, Burp Suite, Kali Linux, Acunetix, Nikto, Metasploit, MobSF, Postman, Wireshark, and open-source tools
Vulnerability Assessments: Experience conducting both automated and manual penetration tests within Agile environments