| 20,000+ Fresh Resumes Monthly | |
|
|
| | Click here or scroll down to respond to this candidateCandidate's Name
Freelancer consultant and bugbounty hunterPHONE NUMBER AVAILABLE EMAIL AVAILABLE LINKEDIN LINK AVAILABLE Street Address
EXPERIENCECyber security consultant and bugbounty hunterFreelancer 03/2022 - 05/2024 Orlando, FloridaKept clients' data protected from cyber attacks by identifying problems, evaluating security issues, assessing risk, and implementing solutions Successfully discovered and reported vulnerabilities to companies like Microsoft, Reddit, and HackerOneDigital forensic AnalystKeycyber pvt Ltd 02/2022 - 10/2022 Mumbai, IndiaExamine and analyze digital evidence to understand the scope of an event using Autopsy, Bulk Extractor, Digital Forensics Framework, EnCase, ExifTool, FTK ImagerApplying incident response tools and techniques to detect, contain, and recover from attacksCyber Security Analyst InternGPCSSI (Gurugram Police Cyber Security Summer 08/2021 - 10/2021 Gurugram, HaryanaVarious Types of Cyber Crimes and its preventionsGained hands-on experience in social media crimesMobile crimeEmail CrimeFinancial CrimeThreat IntelligenceBlock ChainCryptographyDigital Forensics And There Case StudiesEthical Hacking InternshipRcpl Pvt ltd 05/2018 - 07/2018 Noida, Utter Pardesh Learned and Gained hands on experience in various types of tools used in Hacking like wireshark, burpsuite, nmap, metasploit and honeypot EDUCATIONBachelor in Computer ApplicationLovely Professional University06/2012 - 07/2021 Punjab, IndiaHigh SchoolNational Institute of Open Schooling01/2016 - 12/2016 Rohtak, HaryanaWhat knowledge or experience did you acquire during your studies there? (e.g. Delivered a comprehensive marketing strategy)MatriculationDelhi Public School Rohtak01/2014 - 12/2014 Rohtak, Haryana,INDIASUMMARYDriven and proactive professional with over two years of expertise as a cyber security consultant, adept at fortifying organizations against cyber threats.Demonstrated proficiency in conducting vulnerability assessments, orchestrating incident responses, and crafting holistic security strategies. Specialized in customizing security solutions to suit the distinct requirements of various industries. Committed tostaying abreast of emerging cyber threats andconsistently improving security protocols.TRAINING/COURSESCertified Ethical Hacker (CEH)EC-CouncilEthical Hacking ConceptKvchCyber Security and Ethical HackingRcplDigital forensic AutopsyBasic technologyLANGUAGESEnglish NativeHindi NativeSKILLSAws Dbms Ec2 Firewall JavaJavascript Linux Metasploit NmapSql |