BIOGRAPHYProfessional Summary
EDUCATION
A Graduate in Computer Application S.K. University
EXPERIENCE
Penetration Testing & Vulnerability Assessment
He has analyzed components of several new online trading applications, providing design feedback,design review, and suggestions to clients. He has performed Vulnerability Assessments and Penetration Tests for organizations in the Defense, educational, manufacturing, and other industries with an extra ordinary success rate.
Security Design & Architecture
He served as the security lead for many large design, architecture and deployment projects in the financial and manufacturing industries. Managed and provided technical assistance for audits of client information systems by such bodies as RCI (Research Centre Imarat) & RIV (Rajiv Internet Village).
Cyber Crime Investigator
Helped local Cyber-crime, SOT, CCS, SIB, CID departments to solve more than 200+ Cybercrimes. Few eminent cases he handled during this tenure are:
- Disgruntled employee (7000 cr rupees damage)
- Bank theft (17 kilos of gold theft)
- Facebook stalker and abuser (200 girls harassment)
- Source code theft (3 cr rupees loss)
MY SKILLS
SERVICESWHAT I DO
Web Application Penetration Testing (WAST)
This course provides the knowledge and skills Testers need to detect security vulnerabilities in web applications using a combination of manual and automated methods.
Forensic Investigation
Love to catch a Hacker? That is what computer forensics is all about. You will learn how to; determine potential online criminal activity at its inception, legally gather evidence, search and investigate…
ISMS Auditing
In this course candidate will learn how to plan, execute and report on an audit of an ISMS in an organization assessing its conformance with ISO/IEC 27001:2013 and many other standards.
Malware Analysis
This course covers basic reverse engineering options, basic static, advance static, basis dynamic and advance dynamic analysis of malware.
Mobile Application Penetration testing
This course is intended students/professionals who are intended to make career in mobile penetration testing domain.
SIEM
In this course, you will learn the concepts of a Security Information Event Manager (SIEM) and how and why these are used in a SOC.
PORTFOLIOPORTFOLIO
TESTIMONIALHAPPY CLIENTS
BLOG POSTRECENT BLOG POSTS
CONTACTCONTACT WITH ME!
Address
Plot No. 787, 2nd Floor, Apurupa Turbo towers, Jubilee Hills, Hyderabad, Telangana, India.