We provide IT Staff Augmentation Services!

Security Consultant Resume

4.00/5 (Submit Your Rating)

VirginiA

PROFESSIONAL SUMMARY:

  • A senior web application security professional over 6 years of experience in information technology assurance, web application Penetration Testing, secure coding, application security controls and validation, risk assessment, regulatory compliance and Secure Software Development Life Cycle (secure SDLC).
  • Having experience in SQL Injection protection, Script Injection, XSS Protection and major hacking protection techniques.
  • Having experience in Secure SDLC and Source Code Analysis (Manual & Tools) on WEB based Applications. 
  • Hands - on with DAST, SAST and manual ethical hacking.
  • Expertise in working on Penetration Testing and Vulnerability Scanners. 
  • Vulnerability Assessment includes analysis of bugs in various applications spread across N-tier on various domains by using both manual and Automation tools.
  • Worked with global security teams performing IT infrastructure and application security assessments.
  • Excellent knowledge and industry experience in Vulnerability Assessment and Penetration Testing on Web based Applications.
  • Hands-on experience in developing threat models, security controls, threat analysis, creating risk control matrices and risk mitigation strategies.

TECHNICAL SKILLS:

DAST Tools: IBM Appscan Enterprise (ASE), HP Webinspect, OWASP Zap, Burpsuite,

SAST Tools: HP Fortify (SCA), Checkmarx, Coverty.

Operating Systems: Oracle Solaris UNIX, RedHat LINUX 4/5, Windows Server2003/2008.

Web Servers: Apache Tomcat, Netscape Enterprise Server3.5, Jboss and JRun.

Application Servers: Weblogic Server, iPlanet, Netscape Application Server.

Middleware: TIBCO EMS, IBM WebSphere MQ, JMS

Databases: Oracle, MS SQL Server, Sybase.

Scripting Languages: AngularJS, XML, XSLT, XPath, XQuery, HTML/JavaScript/JQuery, AJAX.

Web Services: REST/SOAP, SOA, UDDI, WSDL.

Audit Tools: Audit Command Language (ACL), Teammate.

PROFESSIONAL EXPERIENCE:

Confidential, VIRGINIA

Security Consultant

Responsibilities:

  • Implemented Application Security program (DAST and SAST) at the enterprise level to identify, report and remediate security vulnerabilities from applications.
  • Used Hp Fortify source code analyzer for analyzing the Static Code, Used Hp Webinspect for Dynamic Code and for eliminating the False Positives.
  • Conducted security assessment to ensure compliance to firm’s security standards (i.e., OWASP Top 10). Specifically, manual testing has been performed to identify Cross-Site Scripting and SQL Injection related attacks during the code review.
  • Security assessment of online applications to identify the vulnerabilities in different categories like Input and data Validation, Authentication, Authorization, Auditing & logging. 
  • Performed security assessment of PKI Enabled Applications. 
  • Worked extensively with software development teams to review the source code, triage the security vulnerabilities generated by HP Fortify and eliminated false positives by manual testing using Burpsuite.
  • Developed secure SDLC guidelines for Web applications.
  • Generated executive summary and plan of action & mile stone (POA & M) reports showing the security assessments results, recommendations and risk mitigation plans and presented them to the respective business sponsors and senior management.

Confidential, Mountain View, California

Penetration Tester

Responsibilities:
  • Performed security assessments for the client-facing apps. The associated IT infrastructure such as database management systems, middleware systems, web services (SOAP) were also included in the security assessments.
  • Experience in using BurpSuite, OWASP ZAP and Nessus for web application penetration tests.
  • Implemented Secure Software Development Life Cycle (S-SDLC) processes; developed secure coding practices for web applications.
  • Reviewed security vulnerability reports for applications and databases, analyzed and worked extensively with the development teams for the implementation of mitigating controls.
  • Implemented QualysGuard vulnerability manage tool for enterprise.
  • Used security tools Metasploit and BurpSuite for manual testing.
  • Black box pen testing on internet and intranet facing applications. 
  • Providing fixes & filtering false findings for the vulnerabilities reported in the scan reports. 
  • Performed Static and Dynamic Analysis and Security Testing (SAST and DAST) for various applications as per firm’s security standards (i.e., OWASP TOP 10 ).
  • Developed security policies and baselines for web applications. Performed compliance audits to ensure security policies and baselines have been adequately implemented.
  • Documented security findings, recommendations and presented to the business users, executive committee and Compliance departments.

Confidential

Security Consultant

Responsibilities:
  • OWASP Top 10 Issues identifications like SQLi, CSRF, XSS.
  • Preparation of risk registry for the various projects in the client.
  • Involved in a major merger activity of the company and provided insights in separation of different client data and securing PII.
  • Performed manual and auto source code reviews using IBM Appscan.
  • Identification of different vulnerabilities of applications by using proxies like Burpsuite to validate the server side validations.
  • Execute and craft different payloads to attack the system to execute XSS and different attacks.
  • Identified issues on sessions management, Input validations, output encoding, Logging, Exceptions, Cookie attributes, Encryption, Privilege escalations.
  • Provided and validated the controls on logging like Authentication logging, profile modification logging, logging details, log retention duration, log location, synchronizing time source, HTTP logging.

Confidential

Penetration Tester

Responsibilities:
  • Perform pen tests on different application a week.
  • Preparation of security testing checklist to the company.
  • OWASP Top 10 Issues identifications like SQLi, CSRF, XSS.
  • Implemented OWASP Zap scanner for indentifying the flaws in Application
  • Ensure all the controls are covered in the checklist.
  • Identified attacks like SQLi, XSS, CSRF, RFI/LFI, logical issues.
  • Updating of the checklist on weekly basis to ensure all the test cases are up to date as per the attacks happening in the market.
  • Information gathering of the application using websites like Shodan, ReverseDNS, Hackertarget.com.
  • Using various Firefox add-ons like Flag fox, Live HTTP Header and Tamper data to perform the pen test.
  • Network scanning using tools like NMap and Nessus.
  • Metasploit to exploit the systems.

We'd love your feedback!