Results-oriented security architect, consultant, analyst, and leader with a Certified Ethical Hacker certification. Specializes in application vulnerability assessment, penetration testing, security as code, API security testing, DevSecOps, container image assessment, software composition analysis (SCA), secure design reviews, static application security testing, threat modeling, and security architecture. Proven expertise in leading the application security vertical and ensuring the highest level of security for organizations. Extensive experience with OWASP Top 10 web and API vulnerabilities, as well as SANS Top 25 vulnerabilities. Skilled in DAST, SAST, SCA, DevSecOps, API security, container image security, threat modeling, SSDLC, security architecture, and product security. Additionally, adept at application performance tuning and analysis. Known for providing exceptional support to a large customer base and possessing strong proficiency in Java/J2EE languages. Offers 19 years of experience in IT with over 17 years of expertise in the application security assurance area.
A highly skilled Threat Modeling Expert with extensive experience in identifying, assessing, and mitigating security risks throughout the software development lifecycle. Adept at developing comprehensive threat models and implementing security controls across various domains, including authentication, authorization, data protection, logging , monitoring and vulnerability management. Strong expertise in disaster recovery and business continuity planning, ensuring resilient and secure systems.
Threat Modeling
Application security
Security Architecture
DevSecOps
SAST
DAST
Pen Testing
Cloud Security
Data Security
API Security
Source Code Reviews
Training
OWASP TOP 10
OWASP TOP 10 API
HP Webinspect
Burp Suite Professional
IBM Appscan
Fortify
Shift Left
Postman
Net Sparker
Checkmarx
Veracode
Aqua
OWASP ZAP
Azure Devops
Jenkins