| 20,000+ Fresh Resumes Monthly | |
|
|
| | Click here or scroll down to respond to this candidateCandidate's Name
EMAIL AVAILABLEPHONE NUMBER AVAILABLERecruiters Notes:Ravi has 12+ years of IT experience. Working as an Information security professional with around 6 + years of experience in Security Architecture Reviews, Threat Modeling, SAST and DAST & Penetration Testing, for web, mobile, web services and Cloud platforms and 4+ years into Risk and compliance. Expertise in manual exploitation and mitigating security findings not limited to but including OWASP Top 10 and SANS 25.Skill Matrix:SkillExperienceInformation Security10+ YearsOWASP Top 1006+ YearsVeraCode04+ YearsPenetration Testing02+ YearsSAST and DAST06+ YearsVulnerability10+ YearsProfessional Summary:Working as an Information security professional with around 6 + years of experience in Security Architecture Reviews, Threat Modeling, SAST and DAST & Penetration Testing, for web, mobile, web services and Cloud platforms and 4+ years into Risk and compliance. Expertise in manual exploitation and mitigating security findings not limited to but including OWASP Top 10 and SANS 25.Technical Skills:Security Architecture/Threat ModelingMicrosoft Threat Modeling Tool (TMT)Source Code Analysis ToolsHP Fortify, IBM App Scan Source, Veracode, CheckmarkDynamic Analysis ToolsIBM App Scan, HP Web Inspect, Nexpose /Rapid7, App Spider, Imperva Database ScannerNetwork Security Testing ToolsNmap, Metasploit, Nessus, Qualys Guard,Proxy ToolsBurp Suite, ZAPDevOps proficiencyDesigning security controlsDeveloping security plansImplementing security programsSymantec Endpoint ProtectionQualys Cloud PlatformNagios monitoring softwareWireshark softwareData securityCertifications:Certified Information Systems Manager (CISM) ISACANexpose (Rapid7) Certified Administrator.Metasploit Pro Certified Specialist.SASE Level 1 certified from Kato Networks.CEH8 Certified Ethical Hacker (GM).Educational Details:Master in Power Systems Engineering from Osmania University Hyderabad, IndiaBachelor of Engineering in Electrical & Electronics from Andhra University, IndiaProfessional ExperienceE*TRADE From Morgan StanleyAlpharetta, GAPrincipal Cybersecurity May2019 PresentResponsibilities:The overall experience in Web application Security, Mobile application Security, Network VA, Resource Management and Project PlanningPerforming Static source code analysis using HP(Microfocus) Fortify, CheckmarkVarious Databases configuration through Imperva Database Scanning tool. Involved in Weekly Database scan schedules and finding Vulnerabilities to report to Tech Owners. Coordinating with Development team for remediation efforts.Experienced in Qualys security monitoring to continuously discover and secure global IT assets Modules such as Asset view, Cloud Agent, Vulnerability Management, Web Application scanning (WAS).Collaborating with development team to remediate the vulnerabilities identified in web or mobile based applications.Performed security assessments for the applications hosted in AWS, Azure and provided security risk mitigations to the development team.Experience in integrating AWS applications with Jenkins CI/CD pipeline and performed automated security tests.Performing Dynamic vulnerability assessments using HP WebInspect, and Qualys .Having strong knowledge on best security practices centered around AWS cloud.Performing Network Penetration testing using Qualys Guard, Nessus etc.Performing manual testing of OWASP Top 10 Vulnerabilities to exploit and mitigate security threats such as XSS, CSRF, SQL Injection, Buffer Overflows and DOS Attacks etc.,Performing Mobile Application Security Assessment (MGS) including Android & iOS platforms.Performing port/SSL version scans using Nexpose/Rapid7 and Insight VM respectively.Communicating identified vulnerability findings with clients/customers and remediating appropriate mitigations.Assessing and risk classification of identified vulnerabilities based on the security impact, likelihood, and business risks.Preparation of Test Setup, Security Test Area Coverage definition, Test Plan and Test Cases for new features/implementation.Evaluate how the application protects data in use, in transit, and at rest.Acting as a subject matter resource in specific programming languages and web application environments.Propose vulnerability risk level and estimated level of remediation effort.Report trending data of overall Appsec vulnerabilities and reports in Divisional metrics to the Leadership Team.Coordinated with Appsec Owners, Business Owners and Technical owners remediation effort of Appsec Vulnerabilities and Open-Source Vulnerabilities.Created Dashboard Third-party Finding Pen Test Vulnerabilities of E*TRADE and Gradifi Systems.Creation of Business Owner and Technical Owner data for all Linux Assets from different sources in E*TRADE and loading into the Database table. Involved in Integration of CMDB data with TVM portal Data.Get involved with Morgan Stanley/ E*TRADE integration projects with multiple companies Share works and Eaton Vance.EquifaxAlpharetta, GASr. Application Security consultant Aug2018 April 2019Responsibilities:Performed Manual Penetration attack simulations on client products to determine and exploit security flaws.Detailed and thorough Static, Dynamic analysis for Android and IOS platforms.Performed manual and automated static code analysis using HP Fortify & Checkmarx.Designed security test suite for in scope web and mobile-based applications.Performed interception attacks using web proxies such as Burp Suite, ZAPExperienced in Agile/scrum methodology.Training application developers in secure coding techniques and helping to integrate security into the ASDLC.Experience in Using penetration tools and methodologies such as OWASP Top 10, HP Web Inspect, IBM AppScan, Fortify, Nessus, Acunetix, Burp Suite, Firefox Add-ons XSS Me, SQL Inject Me, SoapUI and others, to determine the security of web application developed in different platforms like Microsoft .NET, Java, J2EE, AJAX, PHP.Possess an in-depth understanding of emerging technologies and their commercial applications.Performed Dynamic vulnerability assessments using HP Web Inspect, Qualys.Working to enhance the Software Development Life Cycle (SDLC) by adding security to remove Vulnerabilities and protect business logic.Establishing a security program for the SDLC, capture the current application architecture, lead the overall application review process, identify Application vulnerabilities, propose architectural changes, design, coordinate, and implement these changes at procedural and technological levels.Performing detailed Quality Assurance (QA) review of web-based applications, identify andValidate application vulnerabilities and perform actual remediation at architectural and source code levels.General MotorsRoswell, GAApplication Software Security Lead Jan 2014 July 2018Responsible for reviewing end to end control documentation for Applications, Infrastructures, and Supplier managed-externally hosted applications.Provided control consultation for Identity & Access Management, Change Management, Disaster Recovery, Job scheduling, Data management, Privacy laws, legal and regulatory requirements.Contribution for Datacenters transformation: identified the current pain points and initiated process improvements.Communicated with Senior Management/ IT department and delivered assessment findings/ non- compliance progress/ remediation plans in various governance meetings and forums.Ensured the team and supporting applications in compliance towards organization Information Security Policy and Procedures.Analyzed scan results from Fortify SCA scans and providing a detailed overview on vulnerabilities which includes Definition, Risk, and RemediationExperienced in Qualys security monitoring to continuously discover and secure global IT assets Modules such as Asset view, Cloud Agent, Vulnerability Management, Web Application scanning (WAS).Reviewed the results of penetration tests on high-risk web applications in the firm that deal with critical financial, client information and assessed the likelihood and impact.Provided awareness trainings on Information security policies, standards, and supporting materials to reduce risk with the assistance of the Director of Technology.Validate IT Risk acceptance, policy exceptions, deviations to standards and ensured compensating controls are documented, assessed, and approved by senior management.Co-Ordinated with various suppliers, shared GM IT Control policies/ processes, reviewed the control artifacts, ensured adherence for Supplier managed IT applications.Assisted Code Management integrating Jenkins with HP Fortify Static Code Analysis tool.Initiated requests in conducting the technical audit Vulnerability Assessment and recommend the risks to be remediated.Directed the ownership of project management process from project initiation to closure including planning, scoping, estimation, architectural review, tracking, budgeting, resource allocation, risk mitigation and status reporting to customers and senior management within pre-set deadlines & parameters.Ensured the adherence to Quality norms and SLA.Communicated & coordinated with Development team in various Verticals Global Purchase & Supply chain, Manufacturing, and Customer care Application modules.Worked with development teams (different USA Innovation centers), Project Managers in Europe and USA.Developed Selenium Login and workflow scripts (Qualys) for all Dynamic scan applications.Having valuable experience in Secure SDLC and Source Code Analysis HP Fortify (Manual &Automation Tools) and Jenkins CI/CD on WEB based Applications.Mar 2010 - Dec 2013Lockheed Martin,Atlanta, GA/ Charleston, SCSr. Security Engineer Mar 2010 - Dec 2013Responsibilities:Dynamic and static scans were planned on each sprint for all Projects developed during this period. Example: Supply Chain Design R1 Release and deployed successfully without any security issues.Coordinated and helped to Build the Team and resolved Jenkins and TFS Build ProblemsConducted SAST and DAST with tools like HP Fortify, IBM App-scan, WebInspect, Nmap, Nessus.Mentored all Security processes to Development Team members.Worked on HP Web Inspect to discover and secure global IT assets, Vulnerability Management and Web Application scans (WAS).Knowledge and industry experience in Vulnerability Assessment and Penetration Testing on WEB based Applications, Mobile based application, and Infrastructure penetration testing.Having good experience in Secure SDLC and Source Code Analysis H.P Fortify (Manual & Tools) on WEB based Applications. |