Designing tailored training programs and courseware on Security Solutions for the organization.
Delivering more than 40+ training programs yearly, with 300+ professionals overall.
Performed Internal and External Vulnerability Assessment & Penetration Test.
Stronghold on gathering publicly available Intelligence (OSINT).
Performed Cyber Threat Intelligence & Digital Forensics.
Excellent track record on exam success rate for professionals.
Update and tailor course curricula to meet the needs of working professionals, to keep courses and skills up to date with current standards, versions of courses (materials and certification exams) and technologies (current and emerging).
Crucial role in development of secure applications as per the best market standard followed by assessment for any known vulnerabilities
Identified application related vulnerabilities based on OWASP areas like SQL Injection, Cross-Site scripting, etc. on the web applications.
Prepared detailed report depicting the findings and the recommendations for the identified vulner-abilities during testing.
Performed system hardening and Security Group configuration. Performed forensics looking for sensitive information.
Performed Tool based analysis and manually verifying them.
Worked in both Linux and Windows environments.
Adapted and quickly learned a new position and industry to further develop analytical and technical skills.
Exposure to tools and services like AWS Shield, AWS Inspector, Cloud Watch, Cloud Trail, Nessus, OpenVAS
Delivered & consulted a wide range of clientele on cyber security verticals and security information
Actively Campaigning about Cyber Security Awareness
Vulnerability Scanning Tools Nessus, OpenVAS, Acunetix, etc.
Penetration Testing Tools Metasploit, NMap, Burp-suite etc.
Systems Linux (Kali Linux) Windows (all)
Networking: LANs, VPNs, Routers, Firewalls.
Programming languages C, C++, Shell Scripting, Python
Cloud Technologies AWS, OVH, Google Cloud.
Bachelor degree in “Computer Applications”
Certified Ethical Hacker (C|EH)
SOC ANALYST (CSA)
AWS Certified Architect Associate
AWS Certified Security Specialty
Computer Hacking Forensic Investigator (C|HFI)
Certified Network Defense (CND)
Certified Threat Intelligence Analyst (C|TIA)
Web Application Security
Vulnerability Assessment and Pen Test
Network System Security
Web Application Pen Test
AWS Cloud Architect
AWS Cloud Security
C# and Php Developer
SOC ANALYST (CSA)
Cyber Security Analyst
Threat Intelligence & Hunting
Incident Handling & Response
Red Teaming & Blue Teaming
Open Source Intelligence Gathering
Courses on demand Trending Courses
Certified Information Systems Security Professional (CISSP) (ISC)²
Certified Ethical Hacker (CEH v11)
Security Manager (CISM)
Disclaimer: Some of the graphics on our website are from public domains and are freely available. This website may include copyright content, use of which may not have been explicitly authorized by the copyright owner. The names, trademarks, and brands of all products are the property of their respective owners. The certification names are trademarks of the companies that own them. This website's company, product, and service names are solely for identification reasons. We don't own them, don't hold the copyright to them, and haven't sought any kind of permission. The use of these names, logos, and trademarks does not indicate that they are endorsed. Please contact us for additional details.
CISSP® is a registered mark of The International Information Systems Security Certification Consortium ((ISC)2).