An infosec enthusiastic with more than 5 years for professional experience of handling appsec & VAPT exercises
Since 2016, I work professionally as a Pen-Tester & Security Researcher. I have developed my InfoSec skills from my assignments of testing web applications, databases, systems, and networks for clients from various sectors such as Hospitals & Pharmaceuticals sector, IT services, Banking & Finance sector, Manufacturing sectors, Management portals, e-Commerce websites, etc.
I hold cybersecurity certifications including:
► CompTIA Pentest+
► Certified Penetration Testing Expert (CPTE)
I'm also pursuing my study for eCPPT certification.
Apart from all these, I have proficiently performed security assessments on mobile applications as well. With regards to ensuring perimeter security, I can perform both Internal & External assessments. My current research is focused on learning Wireless Network security as an addition.
I work with most standard pentesting methodology and my analysis covers all OWASP Top 10, SANS Top 25, and more. Based on application & backend technology, I use multiples Vulnerability Assessment tools for automated scans; however, I do conduct manual analysis during Penetration Testing to discover the logical flaws & business risks.
The project deliverable would be a professional report that will contain below pointer:
► Summary - Focused & described in terms that are understandable by a single glance
► Findings - Containing all vulnerabilities found, along with detailed descriptions, the proofs, impacts & risks
► Solutions - This will contain my recommendations to mitigate the risks and the vulnerability itself
► Graphical representations - Graphs & charts will be included in the report wherever necessary for a better visual understanding
This standard reporting format can be adapted & modified accordingly as needed by the client
Work Terms
Services I offer:
1. Web Application Penetration Testing
2. Network Penetration Testing
3. Mobile Application Penetration Testing
4. Cloud Security Assessments
5. Information Security Training
I operate generally as per IST timezone. And prefer Skype or eMail communications.