Professional Documents
Culture Documents
Rahul - Profile
Rahul - Profile
Summary
Cyber Security Analyst || Cyber Security Corporate Trainer || Certified Ethical Hacker || Vulnerability
Assessment Penetration Tester || Security Researcher || Bug bounty hunter || Cyber/digital Forensics
Analyst || Network Expert || CTF PLAYER || Malware Analyst || Linux Administrator.
• Highly skilled and driven Professional Cyber Security Analyst with extensive experience in network
security, incident response, and vulnerability analysis. 12+ years of experience in cyber security.
• I work as a penetration tester, bug bounty hunter, and CTF participant. I've done web, network, and
Android application penetration testing before. I have extensive knowledge in network and cloud
security. I enjoy CTF events, particularly Hack the Box and TryHackMe. I'm particularly interested in Red
Teaming and Offensive Security, as well as Exploit Development and Malware Analysis.
• An organized professional with demonstrated teaching, advising, and counselling abilities. Capability to
work as part of a team and professionally address challenges and disagreements. Expertise in
establishing and implementing programs to assist new employees advance professionally. Strong
leadership and motivating abilities and an effective communicator.
• At search of a demanding career at a respectable firm where I can put my technological skills to use and
help strengthen the organization's security posture.
Work Experience
• For the past decade, I've been a professional in cyber security training.
• Presented 30+ Cyber Security Awareness events for a range of K–12 institutions, tertiary
institutions, NGOs, and private-sector organizations. coached mentors' teaching methods while
Page 1 of 12
working as a freelance instructor.
• Taught the Cyber Security Awareness workshop at the FCI Group in Mohali.
• In twenty-two, I gave a 7-day workshop at Guru Nanak Dev Engineering College on cyberthreats
and risk. I discussed every single element of analyzing zero-day threats in this practical
presentation so that organizations may safeguard their systems and data.
• With great success conducted workshops on cyber security and cyber forensics at the engineering
college of Global Institutes Amritsar in 2022. I addressed on topics like IOT and cloud hacking in
those sessions.
• Effectively completed two months of summer cyber security training in 2022. which I've instructed
academics and students from more than 56 institutions.
o Feb 2022 - June 2022 - CYBER SECURITY TRAINER & VAPT EXPERT, ANSHINFOTECH, India.
• Maintained and monitored firewalls, IDS/IPS, and VPNs as well as other network security tools.
• Performed routine vulnerability checks and made sure that vulnerabilities were promptly fixed.
• Contributed to the creation and delivery of training for staff on security awareness.
• To guarantee adherence to industry norms and laws, I took part in security audits and assessments.
• Setting up, debugging, and fixing issues with firewalls (such as Cisco ASA, Firepower, Palo Alto, and
FortiGate), remote Internet VPNs, and Cisco ISE.
Page 2 of 12
• The installation of patches, hotfixes, and upgrades on the devices.
• Looking into and taking necessary action in response to threats found by IPS/IDS.
• Assist with the planning, installation, and configuration of sophisticated L2/L3 switch infrastructure.
o July 2013 - June 2018 - CYBER SECURITY ANALYST, SMARTWAY SOLUTIONS PVT LTD, India.
• Performed network security analysis and monitoring to find and address any security events.
• Conducted penetration testing and vulnerability assessments to find security flaws and suggest fixing
them.
• Helped create and put into effect security policies and procedures.
• Worked with IT teams to coordinate patch management and optimal security setups.
• Took part in forensic investigations and malware analysis as part of security incident response
efforts.
• Organized and gave a variety of training sessions on VAPT, tryhackme, and vulnhub, among other
topics.
• Taught a variety of computer networks and cyber security courses for Exclaim. A+, AWS, AZURE,
CompTIA Security+, and Cybersecurity
• Looking into and taking necessary action in response to threats found by IPS/IDS.
• Contributed to the upkeep of email security, firewalls, web protocols, and virtual private networks.
• Focused on endpoint security, network access controls, perimeter security, and web security
gateway monitoring.
• Worked on maintaining the configuration and security of cloud-based systems while deploying them.
Page 3 of 12
o July 2012 - Present - CTF Player
Since I started playing, it has been around 12 years. I've been working on a variety of problems, including
those involving web, mobile, and network hacking, digital forensics, reverse engineering, cryptography,
OSINT, networking, Linux/Windows issues, and general skills.
o January 2016 - Present - Freelancer CYBER SECURITY ANALYST & TRAINER, InstaDot Analytics.
• Reviewed class and student records to look for areas in need of improvement and implemented
plans of action, which student satisfaction and evaluations.
• Managed and assisted students develop life-long learning skills and good study habits.
• Participated in department meetings to provide input to colleagues about student achievement and
improvement.
Page 4 of 12
Hands On Vulnerabilities
• Brute-force • IDOR
Hands On Tools
Page 5 of 12
Metasploit Wireshark Fluxion MobSF Johntheripper
Skills
o Technical Skills:
• Database Administrator (SQL, MySQL, Oracle, Mongo-dB, Firebase dB) • Cloud Security
• Programming Skills (C, C++, Java, Python, Ruby, C# and Bash Scripting) • Linux Administrator
• Graphics Designing & Editing (Adobe Photoshop & Coral draw) • Cloud Computing
Page 6 of 12
• Threat Modelling • Threat Hunting
o Network Security:
o Incident Response:
o Vulnerability Assessment:
Page 7 of 12
o Network Penetration Testing:
• Exploit Development
o Windows/Linux OS:
• Monitored the servers and Linux scripts regularly and performed troubleshooting
Page 8 of 12
• Managed prominent level web applications and worked with windows
o DevSecOps:
• DevOps Implementations
• Microservices
o Security Tools:
• Familiarity with data privacy laws and regulations (e.g., GDPR, CCPA)
Page 9 of 12
o Soft Skills:
Major Projects
• In 2013, an event to find vulnerabilities and get access to vulnerable systems was completed
successfully. Numerous institutes take part in this event and get awards.
• Completed the development of the Traffic Signal Violation Detection System and presented it at
the 2017 Hackathon Competition.
• Successfully trained students in networking and CCNA at the Cisco Networking Academy.
• Create web apps for diverse companies that are E-commerce protected and have enough
security in place.
• Installed a 4G network infrastructure for MMU Mullana's Super Specialty Hospital, an eight-story
building with more than 1500 data points.
• The 2012 CTF Competition at OIVET was a success. This features participation from several
institutions and skill demonstrations by international cyber security experts.
• Used technical workshops to improve the study and learning performance of students. created
immersive "boot camp"-style settings.
Page 10 of 12
• Expertly established up the news channel data center/server room, a partner company of MMU
University. It has 72 TB of fiber channel SAN storage for servers running Windows and Mac. For
redundancy and WASP 3D playout servers and clients, a dual leased line configuration is used.
Certifications
• CCNA: Switching, Routing, and Wireless Essentials from Cisco Networking Academy.
Page 11 of 12
• NDG Linux from Cisco Networking Academy.
• AWS Academy Graduate - AWS Academy Cloud Foundations from Amazon Web Services (AWS).
• Penetration Testing with KALI and More: All You Need to Know from Udemy.
• The Complete 2021 PHP Full Stack Web Developer Bootcamp from Udemy.
Page 12 of 12