Akash C.

Akash C.

Web Application Security, Information Security

Howrah , India

Experience: 5 Years

Akash

Howrah , India

Web Application Security, Information Security

15360 USD / Year

  • Immediate: Available

5 Years

Now you can Instantly Chat with Akash!

About Me

5+ years of experience in the IT industry on Software Development along with Security Testing, Performance Testing. with CyberQ Consulting Pvt, Ltd.,Delhi & Nest Innovative Solution Pvt. Ltd., Kol...

Basically I am a cyber security expert,specially working on Web Application Security and Penetration Testing.

Show More

Portfolio Projects

1. GIS application security testing

Company

1. GIS application security testing

Description

Understanding and executing manual test cases.

  • Understand and Check the URL.
  • Check the application like white-box testing.
  • Check the basic and critical link, It’s properly working or not.
  • Check the vulnerabilities which is actually exist.
  • Prepare the security Audit report.
  • Give the vulnerability recommendation to developer.

Show More Show Less

2. State Portal GOA Vulnerability Assessment

Company

2. State Portal GOA Vulnerability Assessment

Description

· Understanding and executing manual test cases.

  • Understand and Check the URL.
  • Check the application like white-box testing.
  • Check the basic and critical link, It’s properly working or not.
  • Check all URLs & web services are working properly or not.
  • Check the vulnerabilities which is actually exist.
  • Prepare the security Audit report.
  • Give the vulnerability recommendation to developer.
  • Take the daily standup meeting.

Show More Show Less

9. Rajyasabha Pension Apllication

Company

9. Rajyasabha Pension Apllication

Description

· Understanding and executing manual test cases.

  • Understand and Check the URL.
  • If URL is HTTPS then provide the certification on Browser.
  • Check the application like white-box testing.
  • Check the basic and critical link, It’s properly working or not.
  • Set the scan configuration according need by BurpSuite.
  • Check the vulnerabilities, which actually exist.
  • Prepare the security Audit report.
  • Give the vulnerability recommendation to developer.
  • Take the daily standup meeting.

Show More Show Less