Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

RAHUL

Summary

Cyber Security Analyst || Cyber Security Corporate Trainer || Certified Ethical Hacker || Vulnerability
Assessment Penetration Tester || Security Researcher || Bug bounty hunter || Cyber/digital Forensics
Analyst || Network Expert || CTF PLAYER || Malware Analyst || Linux Administrator.

• Highly skilled and driven Professional Cyber Security Analyst with extensive experience in network
security, incident response, and vulnerability analysis. 12+ years of experience in cyber security.

• I work as a penetration tester, bug bounty hunter, and CTF participant. I've done web, network, and
Android application penetration testing before. I have extensive knowledge in network and cloud
security. I enjoy CTF events, particularly Hack the Box and TryHackMe. I'm particularly interested in Red
Teaming and Offensive Security, as well as Exploit Development and Malware Analysis.

• An organized professional with demonstrated teaching, advising, and counselling abilities. Capability to
work as part of a team and professionally address challenges and disagreements. Expertise in
establishing and implementing programs to assist new employees advance professionally. Strong
leadership and motivating abilities and an effective communicator.

• At search of a demanding career at a respectable firm where I can put my technological skills to use and
help strengthen the organization's security posture.

Work Experience

❖ Total Experience - 12+ Years


o Jan 2012 - Present - CYBER SECURITY ANALYST, India.

• For the past decade, I've been a professional in cyber security training.

• Conducted training sessions at over 100 different institutes and MNCs.

• Presented 30+ Cyber Security Awareness events for a range of K–12 institutions, tertiary
institutions, NGOs, and private-sector organizations. coached mentors' teaching methods while

Page 1 of 12
working as a freelance instructor.

• Taught the Cyber Security Awareness workshop at the FCI Group in Mohali.

• Gave the Jalandhar CIS Community's Cyber Security Awareness Program.

• Served as a guest professor in many Punjabi colleges and universities.

• Aided PhD candidates with the creation of their theses.

• Trained more than 2,00000 students (offline and online).


• Successfully completed two months of corporate training on application security and bug bounty
at Nokia in 2023.
• Accomplished effectively the six-month Advanced Ethical Hacking Course Training in 2023. which
I have instructed both academics and students at institutions.
• In 2022, I gave a 10-day workshop on cyber security at Guru Nanak Dev Engineering College. At
the GNDEC in Ludhiana, the training practice session was excellent. I have addressed all pertinent
subjects in this presentation, including social engineering, mobile hacking, DOS/DDOS assaults,
and Wi-Fi penetration testing using all available tools.
• In the year 2022, the GNIMT, Model Town, Ldh held a workshop on advanced ethical hacking. I
have covered every assault in these hands-on training courses, as well as how to set up a red and
blue team to assist users and any company in identifying and fixing system vulnerabilities.

• In twenty-two, I gave a 7-day workshop at Guru Nanak Dev Engineering College on cyberthreats
and risk. I discussed every single element of analyzing zero-day threats in this practical
presentation so that organizations may safeguard their systems and data.
• With great success conducted workshops on cyber security and cyber forensics at the engineering
college of Global Institutes Amritsar in 2022. I addressed on topics like IOT and cloud hacking in
those sessions.
• Effectively completed two months of summer cyber security training in 2022. which I've instructed
academics and students from more than 56 institutions.

o Feb 2022 - June 2022 - CYBER SECURITY TRAINER & VAPT EXPERT, ANSHINFOTECH, India.

• Maintained and monitored firewalls, IDS/IPS, and VPNs as well as other network security tools.

• Helped create and put into place secure network designs.

• Performed routine vulnerability checks and made sure that vulnerabilities were promptly fixed.

• Contributed to the creation and delivery of training for staff on security awareness.

• To guarantee adherence to industry norms and laws, I took part in security audits and assessments.

• Setting up, debugging, and fixing issues with firewalls (such as Cisco ASA, Firepower, Palo Alto, and
FortiGate), remote Internet VPNs, and Cisco ISE.
Page 2 of 12
• The installation of patches, hotfixes, and upgrades on the devices.

• Looking into and taking necessary action in response to threats found by IPS/IDS.

• Assist with the planning, installation, and configuration of sophisticated L2/L3 switch infrastructure.

• Network configuration to guarantee efficient and dependable operations and procedures.

• Manage networking installation, setup, upkeep, and troubleshooting.

• Create and implement tools for network automation and orchestration.

o July 2013 - June 2018 - CYBER SECURITY ANALYST, SMARTWAY SOLUTIONS PVT LTD, India.

• Performed network security analysis and monitoring to find and address any security events.

• Conducted penetration testing and vulnerability assessments to find security flaws and suggest fixing
them.

• Helped create and put into effect security policies and procedures.

• Worked with IT teams to coordinate patch management and optimal security setups.

• Created thorough incident reports and presented management with results.

• Took part in forensic investigations and malware analysis as part of security incident response
efforts.

• Organized and gave a variety of training sessions on VAPT, tryhackme, and vulnhub, among other
topics.

• Taught a variety of computer networks and cyber security courses for Exclaim. A+, AWS, AZURE,
CompTIA Security+, and Cybersecurity

• Looking into and taking necessary action in response to threats found by IPS/IDS.

• Weekly updating of IPS Signature.

• Recording network modifications and updating schematics as necessary.

• Investigating the underlying causes of network issues.

• Contributed to the upkeep of email security, firewalls, web protocols, and virtual private networks.

• Focused on endpoint security, network access controls, perimeter security, and web security
gateway monitoring.

• Worked on maintaining the configuration and security of cloud-based systems while deploying them.

Page 3 of 12
o July 2012 - Present - CTF Player

Hack The Box | TryHackMe | PentesterLab

Since I started playing, it has been around 12 years. I've been working on a variety of problems, including
those involving web, mobile, and network hacking, digital forensics, reverse engineering, cryptography,
OSINT, networking, Linux/Windows issues, and general skills.

• The current top 100 worldwide on HTB.

• Presently in the Top 90 globally on THM.

• Ten certificates obtained from PentesterLab

o January 2016 - Present - Freelancer CYBER SECURITY ANALYST & TRAINER, InstaDot Analytics.

• Motivated and trained teachers to provide exceptional learning environments.

• Assisted in course development and design.

• Reviewed class and student records to look for areas in need of improvement and implemented
plans of action, which student satisfaction and evaluations.

• Managed and assisted students develop life-long learning skills and good study habits.

• Participated in department meetings to provide input to colleagues about student achievement and
improvement.

• Maintained excellent attendance record, consistently arriving to work on time.

Page 4 of 12
Hands On Vulnerabilities

• Local file inclusion (LFI) • SQL injection

• Remote file inclusion (RFI) • Cross Site Scripting (XSS)

• Server-side request forgery (SSRF) • CSRF (Cross-site request forgery)

• Cross-site request forgery (CSRF) • Clickjacking

• Request smuggling • XML external entity (XXE) injection

• Session Hijacking • HTTP request smuggling

• Buffer Overflow • Log4J

• Remote Code Execution • BAC (Broken Access control)

• Fuzzing Command injection • OS command injection

• Directory traversal • Insecure deserialization

• OAuth Broken authentication • Reverse Engineering

• HTTP Host header attacks • HTTP Host header attacks

• WebSocket’s • Web cache poisoning

• File upload vulnerabilities • Information disclosure

• Business logic vulnerabilities • Parameter Tampering

• Brute-force • IDOR

• Cross-origin resource sharing (CORS)

Hands On Tools

Web Application VAPT Network VAPT Wireless PT Forensic Password Bypass

Burp Suite Nmap Aircrack-ng Volatility Hydra

Splunk Nessus Airgeddon Autopsy Medusa

Page 5 of 12
Metasploit Wireshark Fluxion MobSF Johntheripper

Nikto Netcat Wifite ADB Rainbowcrack

SQL Map Dnsrecon Wifipumpkin3 Ghidra Cupp

Acunetix Recon-ng Kismet FTK Imager Crunch

Netspark Mass Scan Reaver Diskdrill

Uniscan Powersploit Maltego

Wp-Scan Ettercap OSINT

Dirbuster Xerosploit EaseUs

Go Buster Hping Bloodhound

Skills

o Technical Skills:

• Cyber Security Analyst • Network Expert

• Cyber Security Trainer • Security Researcher

• Cyber/digital forensics analysis • Ethical Hacking

• Vulnerability Assessment Penetration Testing • Malware analysis

• Bug bounty hunter • Red/Blue Teamer

• Risk Incident Handling Response • CTF PLAYER

• Network Monitoring (Wireshark) • Cryptography

• Database Administrator (SQL, MySQL, Oracle, Mongo-dB, Firebase dB) • Cloud Security

• Programming Skills (C, C++, Java, Python, Ruby, C# and Bash Scripting) • Linux Administrator

• WEB-DEVELOPMENT (HTML, CSS, JAVASCRIPT, JQUERY, PHP, ASP.NET) • Server Designing

• Graphics Designing & Editing (Adobe Photoshop & Coral draw) • Cloud Computing

• Microsoft Office (Word, Excel, PowerPoint) • SOC, SIEM with Tools

Page 6 of 12
• Threat Modelling • Threat Hunting

o Network Security:

• Firewall configuration and management

• Intrusion Detection and Prevention Systems (IDS/IPS)

• Virtual Private Network (VPN) setup and administration

• Secure network architecture design

• Network traffic analysis and packet inspection

o Incident Response:

• Investigating and responding to security incidents

• Malware analysis and removal

• Incident documentation and reporting

• Conducting forensic analysis

o Vulnerability Assessment:

• Conducting regular vulnerability assessments and penetration testing

• Identifying security weaknesses and recommending remediation measures

• Vulnerability scanning tools (e.g., Nessus, OpenVAS)

• Patch management and vulnerability mitigation

o Web Penetration Testing:

• Web application analysis and inspection

• OSINT and information gathering techniques

• Vulnerability assessment of web applications

• OWASP TOP 10 2013 / OWASP Testing guide

• Manual exploitation of XSS, SQLi, web services, HTML5, LFI/RFI

• Exploit development for web environments

Page 7 of 12
o Network Penetration Testing:

• Vulnerability Assessment of Networks

• Advanced Exploitation with Metasploit

• Performing Attacks in Pivoting

• Privilege escalation and Persistence

• Exploit Development

o Android Penetration Testing:

• Reverse engineering Android applications

• Exploit Android vulnerabilities

• Applied security principles

• Encryption and cryptography

o Cloud Computing & Security:

• Cloud Concepts, Architecture and Design

• Cloud Data Security

• Cloud Platform and Infrastructure Security

• Cloud Application Security

• Cloud Security Operations

• Legal, Risk and Compliance

o Windows/Linux OS:

• Provide Linux System Administration

• Linux System Security

• Managed Information security Compliance activities

• Linux server security administration

• Monitored the servers and Linux scripts regularly and performed troubleshooting

Page 8 of 12
• Managed prominent level web applications and worked with windows

o DevSecOps:

• DevOps Implementations

• Continuous Integration & Delivery

• Security & SIEM

• Docker & Containers & Kubernetes

• Alibaba Cloud, AWS, Azure & Google Cloud

• Microservices

• Monitoring & Observability

o Security Tools:

• Security Information and Event Management (SIEM) platforms

• Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)

• Anti-malware and antivirus software

• Vulnerability scanning tools (e.g., Nmap, Nessus, Nigto)

• Network monitoring tools (e.g., Wireshark, Nagios)

o Compliance and Regulations:

• Knowledge of industry standards (e.g., ISO 27001, NIST)

• Familiarity with data privacy laws and regulations (e.g., GDPR, CCPA)

• Conducting security audits and assessments

o Communication and Collaboration:

• Strong verbal and written communication skills

• Ability to explain technical concepts to non-technical stakeholders

• Collaborating with cross-functional teams

• Presenting findings and recommendations to management

Page 9 of 12
o Soft Skills:

• Critical thinking skills • Coaching

• Time management skills • Mentoring

• Organizational skills • Leadership

• Establishing work objectives and strategies • Professional development

• Decision-making skills • Performance management

• Communication skills • Presentation software

• Public speaking • Business Interpersonal Skills

Major Projects

• In 2013, an event to find vulnerabilities and get access to vulnerable systems was completed
successfully. Numerous institutes take part in this event and get awards.

• Successfully held international "Cyberthon" hackathons for cyber security at CT University.

• Completed the development of the Traffic Signal Violation Detection System and presented it at
the 2017 Hackathon Competition.

• Successfully trained students in networking and CCNA at the Cisco Networking Academy.

• Create web apps for diverse companies that are E-commerce protected and have enough
security in place.

• Installed a 4G network infrastructure for MMU Mullana's Super Specialty Hospital, an eight-story
building with more than 1500 data points.

• The 2012 CTF Competition at OIVET was a success. This features participation from several
institutions and skill demonstrations by international cyber security experts.

• Used technical workshops to improve the study and learning performance of students. created
immersive "boot camp"-style settings.

• Creating and implementing High-interaction Honeypots to safeguard diverse businesses' systems


and networks against viruses and threats from malicious users.

Page 10 of 12
• Expertly established up the news channel data center/server room, a partner company of MMU
University. It has 72 TB of fiber channel SAN storage for servers running Windows and Mac. For
redundancy and WASP 3D playout servers and clients, a dual leased line configuration is used.

Certifications

• Certified in Cybersecurity from ISC2.

• API Penetration Testing from APISEC UNIVERSITY.

• API Security Fundamentals from APISEC UNIVERSITY.

• ISO/IEC 27001 Information Security Associate from Skill Front.

• Foundations of Business and Entrepreneurship from Skill Front.

• Duolingo English Test from Duolingo.

• Crash Course on Python from Google.

• Technical Support Fundamentals from Google.

• Foundations of Project Management from Google.

• Foundations: Data, Data, everywhere from Google.

• Foundations of User Experience (UX) Design from Google.

• Foundations of Digital Marketing and E-commerce from Google.

• Netflix Clone from Google.

• SQL Injection Attacks from EC-Council.

• Cyber Shiksha for Beginners from Quick Heal Academy.

• Practical Ethical Hacking from TCM Security.

• Certified Ethical Hacking Masterclass: Beginner to Advance from Udemy.

• Digital Forensics for Pen testers from Udemy.

• Cybersecurity Essentials from Cisco Networking Academy.

• Introduction to Cybersecurity from Cisco Networking Academy.

• CCNA: Switching, Routing, and Wireless Essentials from Cisco Networking Academy.

• CCNAv7: Introduction to Networks from Cisco Networking Academy.

Page 11 of 12
• NDG Linux from Cisco Networking Academy.

• PCAP: Programming Essentials Python from Cisco Networking Academy.

• Certified Entrepreneurship Instructor from Cisco Networking Academy.

• AWS Academy Graduate - AWS Academy Cloud Foundations from Amazon Web Services (AWS).

• Mobile App Security from Cybrary.

• Welcome to Cybrary from Cybrary.

• C++ Training Essentials from IIT Bombay.

• C Training from IIT Bombay.

• Penetration Testing with KALI and More: All You Need to Know from Udemy.

• The Complete Python 3 Course: Beginner to Advanced! from Udemy.

• The Complete 2021 PHP Full Stack Web Developer Bootcamp from Udemy.

• Full Stack: Angular and Spring Boot from Udemy.

• Certification in the LibreOffice Suite Calc Training from IIT Bombay.

• Certification in the Introduction to Computers Training from IIT Bombay.

• Certified Secure Computer User (CSCU) v2 (Complete Series) from EC-Council.

Page 12 of 12

You might also like