Erudite leader and subject matter expert, currently playing dual role as chief architect and portfolio manager for Threat and Vulnerability Management Services. Equipped with an advanced certification in exploit research, and 17 years of total experience in Information Technology, steering both TVM engineering and 24x7 global operations
Responsible end to end for automated as well as manual assessments for infrastructure components including penetration testing, periodically defining strategies as well as improvising tactics, to achieve organization goals for secured digital business
Being thoroughly hands on, highly motivated to direct/manage information security research oriented functions and jobs, that need in depth theoretical knowledge coupled with innovation and deep problem solving ability
An avid reader, a serious student and a humourmonger
Highlights:
Highlights:
Highlights:
Highlights:
Highlights:
Highlights:
Highlights:
Threat and Vulnerability Management
GIAC GXPN[Exploit Research and Advanced Penetration Testing]
GIAC GXPN[Exploit Research and Advanced Penetration Testing]
ISO 27001 LA
CLIP BS 10012:2017
CCNA
Cognizant needed to import HPE Fortify scanner results/reports inside OWASP Defectdojo, a popular open source vulnerability management tool(https://owasp.org/www-project-defectdojo/). The parser for Fortify scanner was not available at that time and hence needed to write the parser in Python. It is available for use and published here: https://github.com/DefectDojo/django-DefectDojo/blob/master/dojo/tools/fortify/parser.py
Kolkata, West Bengal
The profile and the content presented here are true to the best of my knowledge.