“Every breath is a giveaway dance between you and the plants.”
Objectve
To secure a challenging job as a security Consultant and utilize my proven IT Security experience to help organization become more secure and efficient. With over 12+ years of experience as a security expert, specializing in vulnerability assessment and penetration testing, I have a proven track record of detecting server, web, API, embedded and Mobile vulnerabilities while adhering to OWASP guidelines. I consult on complex security issues, providing strategic advice to leadership to resolve escalated challenges, and take ownership of managing risk and strengthening controls within projects. I actively contribute to the development of new policies and procedures to support governance and mitigate risks. Skilled in cross-functional collaboration, I ensure alignment with business objectives and strategy. I conduct complex analysis using internal and external data sources, creatively solving problems, and communicating sensitive or technical information effectively to diverse audiences. Professional Summary
Techno-savvy professional with 13 years of experience
Engage Actively in Vulnerability Assessment and Penetration Testing
Conduct regular evaluations on servers, web applications, and APIs to identify vulnerabilities.
Provide real-time advice on technical aspects of cyber defense and response during assessments.
Perform Meticulous Vulnerability Assessments
Conduct thorough vulnerability assessments on web and APIs to ensure compliance with PCI-DSS, GDPR, and other standards.
Optimize technical cyber defense controls based on assessment findings.
Efficiently Manage Projects
Lead project management efforts from initiation to completion, ensuring adherence to timelines, budgets, and quality standards.
Address various applications across different categories with dedicated efforts.
Emphasize Manual Penetration Testing
Conduct penetration testing through manual analysis, creating tailored checklist scenarios for each application's requirements.
Assist in business development activities leveraging assessment results.
Produce Comprehensive Reports and Build Client Relationships
Generate detailed reports on penetration test and scan results, including recommendations for remediation.
Establish and maintain strong client relationships, understanding their needs and providing strategic solutions.
Conduct Detailed Analysis and Deliver High-Quality Work
Analyze reports to filter out false positives and highlight true positives in SAST and DAST reports.
Deliver high-quality technical work related to cyber defense and response.
Collaborate with Stakeholders and Improve Technical Work
Work closely with product owners and applications to address and remediate vulnerabilities, providing necessary clarifications.
Review and enhance technical work delivered by the team.
Utilize Industry-Leading Tools and Mentor Junior Staff
Utilize tools like BurpSuite, Fortify SCA, and Nessus proficiently, showcasing expertise in Kali Linux OS.
Provide guidance, training, and support to junior staff for skill development and project achievement.
Technical Skills
Security: Web Application Security, Web Services Security, Source Code Review, Mobile Application Security, Thick Client Security, Embedded Security, Network Security, Application Dependency Check, Red Team, Threat Modeling, CIS Hardening and Security Architecture Review.