Technical Skills
Programming languages
Security Tools
Other softwares
JavaScript/TypeScript
Backend API development and maintenance
NodeJS
Backend API development and maintenance (9+ APIs)
Python
Application development using Numpy, Sumy, and Pandas
Git/Github
Version control, collaboration, code review and integrity checks
R
Statistical Interpretations and graphs
Nmap
Conducting network scans and finding open hosts and ports
Nessus / BugTrack Jira / Nexus IQ
Vulnerability analysis for scanned host addresses
Metasploit
Penetration testing and vulnerability exploitation
Burpsuite
Explotation attacks for web applications
Shodan
Reconnaissance for open IP addresses in the web
Sonarqube
SAST web application code review and fixes
CyberArk PAM
Identity and Access management
Dynatrace
User Activity tracking and monitoring, API health analysis
Splunk Enterprise
User logging and SIEM monitoring
Apache Kafka
Real time data streaming and forecasting
Postman
API queries and user testing
Kubernetes
Application container deployment and security
Docker
Image generation and deployment
Jenkins
Container deployment and rollbacks
ServiceNow
User incident response and customer service
JIRA
Scrum Board maintenance and support
Confluence
Data sharing and Collaboration
Other Skills and Areas of Interest
Security Domains
AI Proficiency
Soft Skills
Security Risk Management
Analyzing security risks, performing risk assessments, and implementing mitigation measures
Software Development Security
Web Application Security through Vulnerability Management
Security Operations and Monitoring
Incident Response, Security Monitoring and Certificate Compliance
Cyber Threat Intellgience
Threat Analysis, Threat Modelling, Threat Intelligence Gathering, Threat & Strategic Analysis and Reporting
Operationalizing AI
Understanding end to end flow of AI implementation, identifying the operational risks of AI implementation
AI Security
Understanding of the inherent risks with AI models and emergent technologies
AI Red Teaming
Jailbreaking AI models through various attacks such as prompt injection
Leadership
Project lead and management expert for multiple academic projects
Communication
Strong Professional and Interpersonal communication skills
Critical Thinking
Problem solver after deep critical analysis
Project operations Management
Planning and executing multiple projects from start to end
ISC2 CC
ISC2 CISSP
Certifications
Coursework
Security
AI and ML
Policy and Management
Ethical Penetration Testing
Introduction to Information Security and Management
Introduction to Cyber Intelligence
Information Security Risk Management
Fundamentals of Operationalizing AI
ML with Adversaries in Mind
Policy and Governance
Applied Economics
Professional Speaking
Managing Disruptive Technologies
Organizational Design and Implementation