Currently working as a Web Application Penetration Tester at Synopsys Inc. and actively looking for new opportunities!
I’m passionate about a career in Web Application Security and spend my time polishing my skills through Pentester Academy and Pentester Lab. I’ve graduated from The University of North Carolina at Charlotte, with a Master’s degree in Cybersecurity, with a GPA of 3.9/4. My Other Educational qualifications include a Master's and a Bachelor's degree in Computer Science.
I’m an AccessData Certified Forensic Examiner (ACE V6) and my future prospects are to get the CompTIA Security+ and CompTIA PenTest+ Certifications.
-
Experience
SYNOPSYS INC| Web Application Penetration Tester | Bloomington, IN
-->Translating client security requirements & conducting penetration testing and vulnerability assessments of applications, OS and networks.
-->Reporting detailed results of the analysis back to the client as deliverables.
Zscaler Inc | Datapath & Security Intern | San Jose, CA
-->Recreated and resolved customer found security defects based on User and Group Authentication and Advanced Threat Protection. -->Designed RegEX based signatures for Signature Pattern Matching to capture and block malicious content.
-->Automated the system and solution test cases on Key-Encryption-Key and OCSP using Python programming.
Yardi Software | Software Engineer | Pune, MH, India
-->Developed SQL and Crystal reports according to client’s needs. Administered and maintained user access controls as well as procedures to prevent unauthorized access to the systems.
Evonix Technologies | Trainee Software Engineer (Intern) | Pune, MH, India
-->Performed system level database maintenance, implemented security controls and system recovery procedures.
-->Designed the company website using Bootstrap: http://evonix.co/
-
Projects
• HackRF Meets Drone: Utilized HackRF to capture control signals from a custom quadcopter’s controller and replayed the captured signals to control its movements. •
• Improving Resource Utilization of Cloud: Achieved a sense of public cloud data security by encrypting the shared files and ensuring secure transmission of files among users.
• Intrusion Detection Using Log Mining: Mined the unalterable log files in run-time to get the desired transaction traces and used SQL to detect tampering of data.