Summary
Overview
Work History
Education
Skills
Certification
Accomplishments
Timeline
Generic

Ravindra Annam

Cyber Security Professional
Hyderabad

Summary

Results-oriented security architect, consultant, analyst, and leader with a Certified Ethical Hacker certification. Specializes in application vulnerability assessment, penetration testing, security as code, API security testing, DevSecOps, container image assessment, software composition analysis (SCA), secure design reviews, static application security testing, threat modeling, and security architecture. Proven expertise in leading the application security vertical and ensuring the highest level of security for organizations. Extensive experience with OWASP Top 10 web and API vulnerabilities, as well as SANS Top 25 vulnerabilities. Skilled in DAST, SAST, SCA, DevSecOps, API security, container image security, threat modeling, SSDLC, security architecture, and product security. Additionally, adept at application performance tuning and analysis. Known for providing exceptional support to a large customer base and possessing strong proficiency in Java/J2EE languages. Offers 19 years of experience in IT with over 17 years of expertise in the application security assurance area.

Overview

18
18
years of professional experience
7
7
years of post-secondary education
2
2
Certifications

Work History

Secure Prodcut Development/ Threat Modeling Expert

NTT Data
01.2024 - Current

A highly skilled Threat Modeling Expert with extensive experience in identifying, assessing, and mitigating security risks throughout the software development lifecycle. Adept at developing comprehensive threat models and implementing security controls across various domains, including authentication, authorization, data protection, logging , monitoring and vulnerability management. Strong expertise in disaster recovery and business continuity planning, ensuring resilient and secure systems.


  • Conduct comprehensive threat modeling exercises to identify potential security threats and vulnerabilities in applications and systems.
  • Assess risks associated with various attack vectors and develop mitigation strategies to address identified risks.
  • Collaborate with development teams to integrate security controls into the software development lifecycle (SDLC).
  • Conducted thorough assessments of authentication protocols and identified potential risks in authentication flows.
  • Implemented secure password policies and session management practices.
  • Evaluated and refined authorization processes to minimize risks associated with privilege escalation.
  • Collaborated with development teams to integrate authorization checks within application workflows.
  • Regularly reviewed and refined logging configurations to ensure compliance with security policies and regulations.
  • Conducted data privacy impact assessments (DPIAs) and ensured alignment with data protection regulations like GDPR.
  • Led vulnerability identification, assessment, and remediation processes to ensure the organization's systems are protected against known threats.
  • Utilized automated scanning tools and manual techniques to identify vulnerabilities in applications, networks, and systems.
  • Collaborated with development teams to integrate secure coding practices and remediation strategies within the software development lifecycle (SDLC).
  • Conducted regular disaster recovery tests to validate the effectiveness of recovery strategies and improve response times.
  • Coordinated with cross-functional teams to ensure critical systems and data are recoverable within defined RTOs (Recovery Time Objectives) and RPOs (Recovery Point Objectives).
  • Conducted business impact analyses (BIAs) to identify critical business functions and dependencies.
  • Led training and awareness programs to ensure that employees are prepared to execute the BCP in the event of an incident.
  • Reviewed and enforced secure coding practices related to input validation across development teams.
  • Conducted threat modeling exercises to identify and mitigate input validation vulnerabilities early in the SDLC.


Security Architect

EY
3 2021 - 12.2023
  • As Application Security Architect/Consultant my responsibilities include but not limited to, Develop security requirements, design patterns and templates for teams, Develop threat models to prioritize scope, Security design reviews of applications, systems, and networks, Define security best practices and standards, Continuously review and identify security improvement opportunities in existing processes, services, and workflows, Participate in architecture design reviews with senior engineering and product management to provide guidance on defining and incorporate effective threat modeling (STRIDE) and security standards into product design, Deployed controls within CI/CD pipelines for SAST, DAST and Third-Party library analysis, Work with the product teams to support proactive research in the area of security coding and integrate new languages and investigate new tooling to mitigate new emerging threats, vulnerabilities, tactics, techniques, and procedures, Integrated application security toolsets into product teams CI/CD pipelines, Perform Web application assessments, source-code reviews, SCA and API security Testing, Integrated SAST findings into product team agile management tooling (e.g., Jira) Triaging and writing PoC for true vulnerabilities, Experience on container image scanning using aqua security tool, Setting up assurance policies, runtime policies and enforcers, Guide vendor security activities to ensure 3rd-party software and development meets security standards, Collaborate with engineering/development teams to evolve Software assurance process to address security risks, and help teams learn and adopt shift- security-to-left practices, Managing team of security experts on day-to-day work, Publishing security metrics to senior management and customers periodically, Suggesting and researching on new trends in security area, Hiring and Grooming team on security, Continuous learning and researching in security related trends and best practices, Provide guidance to application team on application security best practices, Provide advice and support remediation effort and track open issues and follow up to ensure remediation, Provide Remediation guidance and secure code snippets to the development teams

Application Security Consultant/Architect

Majesco Limited
07.2013 - 03.2021
  • As Application Security Consultant responsibilities include but not limited to, 10+ Years of hands-on experience in Application Security Area, Hands of experience on DevSecOps, Develop and implement application security program in-line with industry best practices and compliance across all of product/Non product engineering teams, Perform application and source-code reviews, threat modeling, penetration tests and API Security Testing to build application visibility, Proactively identify and mitigate against application security risks or incidents, Provide security training to internal engineering, DevOps and infrastructure teams, Raise awareness of application security requirements through development and review of application security standards, policies and secure SDLC processes, Participate in architecture of mobile and web applications including interface and database design, process and API flows, networking, cloud infrastructure, protocol communication, security and appropriate technology use, Monitor and manage web and mobile application infrastructure to detect anomalies and security incidents, Evaluate, recommend, and deploy tools on Security awareness to enhance cyber-security detection and/or prevention of evolving threats, Research and evaluate vulnerabilities, attack vectors, and associated risks to our systems, applications, and technology, Continuous learning and researching in security related trends and best practices, Guide vendor security activities to ensure 3rd-party software and development meets security standards, Attend security technology conferences and events, Conduct threat modeling Create a software source code review process that is a part of development life cycle, Conduct application security testing for applications to assess vulnerabilities

Application Security Analyst

Mastek Limited
01.2010 - 07.2013
  • Worked as Application Security Engineer, Involved in Application VAPT using OWASP TOP 10 Methodologies, Knowledge about OWASP TOP 10 and SANS TOP 25, Knowledge in SAST and DAST Analysis, Experience in tools like HP Web inspect, IBM App scan, Burp suite professional, OWASP ZAP, Postman, SOAP UI

Senior Software Engineer

Mastek
01.2008 - 09.2010
  • Involved in coding, design and testing the Java/J2ee based Applications, Worked with project managers, developers, quality assurance and customers to resolve technical issues, Trained and mentored junior developers and engineers, teaching skills in Java/J2ee and working to improve overall team performance, Gathered and defined customer requirements to develop clear specifications for creating well- organized project plans, Collaborated with cross-functional development team members to analyze potential system solutions based on evolving client requirements

Application Performance Analyst

Mastek Limited
01.2008 - 01.2010
  • Worked as Application Performance analysis, Knowledge about Heap Dump and Thread dump Analysis, Knowledge about IBM MAT and Thread Dump Analysis Tools

Software Engineer

Mastek Limited
01.2007 - 09.2008
  • Involved in coding of Applications

Education

Master of Computer Applications - Computer Applications

Kakatiya University
Warangal, TG
07.2000 - 04.2004

Bachelor Of Science - Science

Kakatiya University
Warangal, TG
07.1997 - 05.2000

Skills

Threat Modeling

Application security

Security Architecture

DevSecOps

SAST

DAST

Pen Testing

Cloud Security

Data Security

API Security

Source Code Reviews

Training

OWASP TOP 10

OWASP TOP 10 API

HP Webinspect

Burp Suite Professional

IBM Appscan

Fortify

Shift Left

Postman

Net Sparker

Checkmarx

Veracode

Aqua

OWASP ZAP

Azure Devops

Jenkins

Certification

Certified Ethical Hacker

Accomplishments

  • Certified | Ethical Hacker (C|EH) V10
  • Application Security Consultant
  • Experience in Application VAPT Methodologies and Tools
  • Knowledge of OWASP TOP 10 2017 and API TIP 10 Vulnerabilities
  • Experience DAST
  • Experience in SAST
  • Knowledge about SANS TOP 25 Vulnerabilities
  • Knowledge in CWE and MITRE
  • Experience in tools like HP WebInspect, Burp Suite Professional, Fortify, Checkmarx, OWASP ZAP, Nessus, and IBM Appscan, Dependecy Tracker, Dependency Checker, Postman, Netsparker, Shiftleft, Veracode, Aqua security and IBM Static Security Client and Jenkins
  • Experience in Application performance tuning
  • Secure Design Reviews
  • Experience in Eclipse MAT (Heap Dump & Thread Dump Analysis)
  • Experience in Heap dump and Thread dump analysis Certifications Certified | Ethical Hacker (C|EH) V10 .

Timeline

Secure Prodcut Development/ Threat Modeling Expert

NTT Data
01.2024 - Current

Application Security Consultant/Architect

Majesco Limited
07.2013 - 03.2021

Application Security Analyst

Mastek Limited
01.2010 - 07.2013

Senior Software Engineer

Mastek
01.2008 - 09.2010

Application Performance Analyst

Mastek Limited
01.2008 - 01.2010

Software Engineer

Mastek Limited
01.2007 - 09.2008

Master of Computer Applications - Computer Applications

Kakatiya University
07.2000 - 04.2004

Bachelor Of Science - Science

Kakatiya University
07.1997 - 05.2000

Security Architect

EY
3 2021 - 12.2023
Ravindra AnnamCyber Security Professional