Anil P.

Anil P.

Professional experienced certified ethical hacker and security architect-penetration tester.

Pune , India

Experience: 13 Years

Anil

Pune , India

Professional experienced certified ethical hacker and security architect-penetration tester.

42846.1 USD / Year

  • Immediate: Available

13 Years

Now you can Instantly Chat with Anil!

About Me

Total IT Experience 13+ Years. Cyber Security BFSI Domain, IT Security professional with hands-on experience in Vulnerability Assessment and Penetration Testing, 9+ Years. Lead Vulnerability Assessment and Penetration Testing team on the client s...

Show More

Portfolio Projects

Description

Role & Responsibility:

  • Analysed Source Code scan reports and suggest remediation / mitigation plan.
  • Experience with Web Application Architecture Security Review, Static Code Review, Penetration Testing.
  • Performed IoT Network Devices Penetration Testing.
  • JAMA/JIRA security user stories task review and fixed.
  • Experience in the areas of Network Security Review, Network Architecture .Source Code Review.
  • Prepare hardening security documents for OS, Network Device and Security Testing.
  • DevOps team member working on Security related issues in Healthcare department.

Show More Show Less

Description

Role & Responsibility:

  • Performed Vulnerability Assessments of Network and Security Devices using various open source and commercial tools Map out a network, discover ports and services running on the different exposed network and security devices.
  • Performed penetration test and launch exploits using Metasploit, Burp Suite, Kali Linux penetration testing distribution tools sets.
  • Analysed scan reports and suggest remediation / mitigation plan.
  • Keep track of new vulnerabilities on various network and security devices for different vendors.
  • Audit configuration of Network and Security devices Performed Penetration testing based on NIST 800-115, SANS-25 and OWASP Top 10 standards.

Show More Show Less

Description

  • Performed Vulnerability Assessments of Network and Security Devices using various open source and commercial tools Map out a network, discover ports and services running on the different exposed network and security devices.
  • Keep track of new vulnerabilities on various network and security devices for different vendors.
  • Ensure the coverage and track new assets & applications which are going live and ensure that the VA/PT and CA, Security Configuration Assessment are conducted before going live and periodically after going live.
  • Maintained up-to-date inventory of assets and applications covered for VA/PT and CA and secure configuration assessment.

Show More Show Less

Description

  • Performed Vulnerability Assessments of Network and Security Devices using various open source and commercial tools Map out a network, discover ports and services running on the different exposed network and security devices.
  • Research and maintain proficiency in computer network exploitation, tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding, network security, and encryption.
  • Analysed scan reports and suggest remediation / mitigation plan.
  • Keep track of new vulnerabilities on various network and security devices for different vendors.
  • Audit configuration of Network and Security devices.
  • Established customized security configuration and hardening baseline documents for various systems, devices and platforms (Configuration Audit) based on CIS-Standard Benchmark.
  • Publish periodic dashboard to track vulnerability posture considering with and without implemented compensatory controls including exceptions.

Show More Show Less

Description

  • Performed Vulnerability Assessments of Network and Security Devices using various open source and commercial tools Map out a network, discover ports and services running on the different exposed network and security devices.
  • Performed scanning on networks using QualysGuard Consultant & Nessus Vulnerability Scanner and submitted an executive the summary that outlined the details of any issues discovered.
  • Performed scanning on networks using Metasploit Penetration Testing Tool and submitted an executive summary that

outlined the details of any issues discovered.

  • Analysed scan reports and suggest remediation / mitigation plan.
  • Advanced technical analysis on intrusions.
  • Research and maintain proficiency in computer network exploitation, tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding, network security, and encryption.
  • Performed Penetration testing based on PCI DSS, NIST 800-115, SANS-25, etc. standards.

Show More Show Less