Here are a few things I've done!
Work
Assocaite Consultant, Synopsys/Black Duck/Ultraviolet Cyber June '23 - Present
- Executed 90+ offensive security engagements (Cloud, APIs, Web Apps, Networks) for Fortune 500 clients; identified critical vulnerabilities (HTTP Request Smuggling, SSRF, AuthN/AuthZ bypasses, session flaws, cloud misconfigs) using Burp Suite Pro, Nessus, NMAP, Semgrep SAST with manual code review, automated scanners.
- Transitioned to Cloud Security team; led 30+ AWS-specific pentesting engagements with 100% on-time delivery, uncovering high-severity issues (IAM privilege escalation, service misconfigs, CloudWatch log poisoning), and VPC exposure, via threat modeling, IAM policy/account reviews, source code reviews (Semgrep), and log analysis.
- Led end-to-end penetration testing for 30+ engagements, managing the full lifecycle from scoping calls to client readout sessions with Service Owners, Senior Engineers to explain findings and remediation plans; independently resolved escalations/roadblocks (WAF blocks, API documentation gaps, hardware integration).
- Developed Python automation scripts and internal documentation to streamline deliverable uploads, knowledge transfer, and team processes - saving ~40 minutes per engagement across 50+ engagements.
- Acted as Technical Oversight (TO) on ~12 engagements, ensuring client communication, technical guidance, and quality standards; mentored 10+ assessors on methodologies/tooling/reporting. Contributed to training materials; delivered internal training sessions on HTB boxes, CPTS journey.
- Ranked 1st out of 110 participants in the internal hacking competition, presented a walkthrough to Consultants and Interns.
Security Intern, Synopsys May '22 - August '22
- Performed network penetration testing on a financial company's internal infrastructure manually using tools like NMAP, ldapsearch, Responder and with Nessus for automated testing. Assisted in report writing for the vulnerabilities found.
- Scanned for vulnerabilities on a web application by performing manual testing methods based on the OWASP checklist and automated testing using Netsparker & Burp Suite Pro. Triaged the scan results and found a DNS exfiltration vulnerability.
- Contributed, by finding a null byte vulnerability, in the HTB Business CTF 2022 (Ranked 26th/326).
- Deployed a Jenkins pipeline to integrate various tools - Truffle hog, OWASP dependency checker, SonarQube, OWASP ZAP, in the build process to secure the application with DevSecOps.
- Encrypted S3 buckets using KMS with key rotation and set up CloudTrail to log all data events for the S3 bucket. Setup the AWS secrets engine in hashicorp vault on an EC2 instance to manage keys. Configured Amazon GuardDuty and Lambda to update the AWS WAF WebACLs and VPC Network ACLs in response to GuardDuty findings and alarm with AWS SNS.
New York University
Course Assistant, Operational Technology Security Sept '22 - Dec '22
- Graded assignments based on MATLAB, CODESYS and provided feedback to students for better conceptual understanding.
Course Assistant, Network Security Oct '21 - Dec '21
- Graded assignments based on Wireshark, mitmproxy and provided feedback to students for better conceptual understanding.
Cyber Fellow, Offensive Security, Incident Response, and Internet Security Lab (OSIRIS Lab)
- Monitored the 18th Annual CSAW '21 Capture the Flag competition hosted by OSIRIS and participated in by 1200+ teams.
- Ranked in the top 8% out of 1550+ players by completing OSIRIS web-exploitation CTF track.
Intern, LeadLife
- Analyzed, translated user requirements for the web application & its security to the developers & proposed a cost-time estimate.
- Strategized the process and workflow changes to streamline and reduced the site's accessing time by 20%.
- Content writing and development for go-to-market readiness