BIOGRAPHYProfessional Summary

EDUCATION

A Graduate in Computer Application S.K. University

EXPERIENCE

Penetration Testing & Vulnerability Assessment

He has analyzed components of several new online trading applications, providing design feedback,design review, and suggestions to clients. He has performed Vulnerability Assessments and Penetration Tests for organizations in the Defense, educational, manufacturing, and other industries with an extra ordinary success rate.

Security Design & Architecture

He served as the security lead for many large design, architecture and deployment projects in the financial and manufacturing industries. Managed and provided technical assistance for audits of client information systems by such bodies as RCI (Research Centre Imarat) & RIV (Rajiv Internet Village).

Cyber Crime Investigator

Helped local Cyber-crime, SOT, CCS, SIB, CID departments to solve more than 200+ Cybercrimes. Few eminent cases he handled during this tenure are:

  • Disgruntled employee (7000 cr rupees damage)
  • Bank theft (17 kilos of gold theft)
  • Facebook stalker and abuser (200 girls harassment)
  • Source code theft (3 cr rupees loss)

MY SKILLS

IT Security Services & Solutions

Security Assessment 90%
Penetration Testing 95%
Security Operations Center (SOC) 70%
Malware Analysis 93%
Vulnerability Assessment 96%
Secure SDLC 90%

Knowledge

Information System Security 90%
Windows and Unix Security 80%
Website & Web Application Security 70%
Network security 60%
Wireless Security 79%
Critical Asset Security 90%

Cyber Security Solutions

Network Firewalls 95%
Intrusion Prevention Systems 80%
Internet Traffic Protection Systems 70%
Antivirus Enterprise Systems 60%
Security Event Monitoring Systems 97%
Identity & Access Management Systems 95%

SERVICESWHAT I DO

Web Application Penetration Testing (WAST)

This course provides the knowledge and skills Testers need to detect security vulnerabilities in web applications using a combination of manual and automated methods.

Forensic Investigation

Love to catch a Hacker? That is what computer forensics is all about. You will learn how to; determine potential online criminal activity at its inception, legally gather evidence, search and investigate…

ISMS Auditing

In this course candidate will learn how to plan, execute and report on an audit of an ISMS in an organization assessing its conformance with ISO/IEC 27001:2013 and many other standards.

Malware Analysis

This course covers basic reverse engineering options, basic static, advance static, basis dynamic and advance dynamic analysis of malware.

Mobile Application Penetration testing

This course is intended students/professionals who are intended to make career in mobile penetration testing domain.

SIEM

In this course, you will learn the concepts of a Security Information Event Manager (SIEM) and how and why these are used in a SOC.

PORTFOLIOPORTFOLIO

TESTIMONIALHAPPY CLIENTS

Client Image

He has been appreciated by Minister of Home affairs for his work in the field of Cyber security and has been awarded “Good Citizen of India” by Commissioner of Police.

  • Commissioner of Police
  • Minister of Home affairs
Client Image

BLOG POSTRECENT BLOG POSTS

CONTACTCONTACT WITH ME!

Address

Plot No. 787, 2nd Floor, Apurupa Turbo towers, Jubilee Hills, Hyderabad, Telangana, India.