We provide IT Staff Augmentation Services!

Pen Tester Resume

2.00/5 (Submit Your Rating)

Boston, MA

SUMMARY:

  • Penetration testing based on OWASP Top 10.
  • Analyze the results of penetrations tests, design reviews, source code reviews and other security tests. Decide on what to remediate and what to risk accept based on security requirements.
  • Highly analytical computer security analyst with success both defending and attacking large - scale enterprise networks.
  • Experience using a wide variety of security tools to include Kali-Linux, Metasploit, Burp Suite Pro, Wireshark, L0phtcrack, Snort, Nmap, Nmap-NSE, Cain and Abel, Nitko, Dirbuster, IBM App scan, HP Fortify, HP WebInspect, Nessus, Open Vas, W3AF, BeEF, Etthercap, Maltego, Wifi-Security, SIFT, SOAP UI, FOCA, Havij, Yersinia, Recon-ng, Aircrack-ng suite.
  • Involved in implementing and validating the security principles of minimum attack surface area, least privilege, secure defaults, avoiding security by obscurity, keep security simple, Fixing security issues correctly.
  • Strong knowledge in Manual and Automated Security testing for Web Applications.
  • Analyze the results of penetrations tests, design reviews, source code reviews and other security tests. Decide on what to remediate and what to risk accept based on security requirements.
  • Good Experience in exploiting the recognized vulnerabilities.
  • Experience in Threat Modeling during Requirement gathering and Design phases.
  • Experience with Security Risk Management with TCP-based networking.
  • Experience with TCP/IP, Firewalls, LAN/WAN.
  • Quick Learner, Committed team player with interpersonal skills and enjoy challenging environment with scope to improve self and contribute to the cause of the organization.
  • Excellent problem-solving and leadership abilities.
  • Experience in Web UI Development implementing web development tools like HTML 4.0/5, XHTML, DHTML, CSS/CSS3, JavaScript, jQuery, AJAX, JSON and XML.
  • Knowledgeable about Document Object Model (DOM) and DOM Functions along with experience in Object Oriented Programming Concepts, Object Oriented JavaScript and Implementation.
  • Worked on RWD (Responsive Web Design) and implemented basic level of Twitter Bootstrap and Angular.js

TECHNICAL SKILLS:

Software/Tool/Technology: BurpSuite, DirBuster, OWASP ZAP Proxy, Nmap, Live http header, Tamperdata.

Programming Languages: C, C++, PHP

Scripting Languages: Python, Basic shell Scripting

Web Technologies: HTML 4.0/5, XHTML, DHTML, CSS2/CSS3, JAVASCRIPT, JQUERY, AJAX, JSON and XML

Operating System: Linux/Unix (Red Hat Enterprise Linux, Debian, Ubuntu, Fedora, Backtrack 2/3/4/5, Kali Linux), Windows.

Database: MySQL, Oracle, MSSQL

Network Enumeration: Maletgo, Google Hacking, DNS, SMB, LDAP

Port/Vulnerability Scanning: Nmap/Nmap Scripting Engine (NSE), Netcat, Nessus

Sniffing/ManintheMiddle: Wireshark, Ettercap, Cain

Web Application vulnerability scanning: Acunetix,, HP Fortify,IBM Appscan, Nessus,, Openvas, Qualys guard.Manual SQL Injection, XSS, CSRF, Exploitation using SQLmap

Server/Clientside Exploitation: Metasploit, Social Engineering Toolkit (SET).

Password Cracking: Hydra, Medusa, John the Ripper, Rainbow Crack, Pyrit, Rainbow crack, Ophcrack

Debuggers: Ollydbg, WinDBG

Wireless: Aircrack-NG suite, Kismet

PROFESSIONAL EXPERIENCE:

Penetration Tester

Confidential

Responsibilities:

  • Identifying the critical, High, Medium, Low vulnerabilities in the applications based on OWASP Top 10 and SANS 25 and prioritizing them based on the criticality.
  • Conducted application penetration testing of internal and external business applications
  • Security Code Review and Penetration Testing for all Internal & External Applications of Confidential &T.
  • Follow up with Development teams to get recent functionality changes, their security analysis scheduling and coordinating with my team to sync with the project changes
  • Acquainted with various approaches to Grey & Black box security testing
  • Discovered application level vulnerabilities like Injection flaws (SQL Injection, Command Injection etc), Cross Site Scripting (XSS), CSRF, Authentication bypass, cryptographic attacks, authentication flaws etc.
  • Define the timelines to the given application & Conduct the security assessments and Report out the vulnerability findings with remediation process to the development team.
  • Conducted security assessment of PKI Enabled Applications
  • Used Burp Suite Pro, Acunetix Automatic Scanner, NMAP & NMAP Scripting Engine (NSE), Havij, Dirbuster, IBM Appscan, Nessus, SQLMap for web application penetration tests and infrastructure testing.
  • Performing onsite & remote security consulting including penetration testing, application testing, web application security assessment, onsite internet security assessment, social engineering, wireless assessment, and IDS/IPS hardware deployment.
  • Capturing and analyzing network traffic at all layers of the OSI model using Wireshark.
  • Monitor the Security of Critical System (e.g. e-mail servers, database servers, Web Servers, Application Servers, etc.).
  • Change Management to highly sensitive Computer Security Controls to ensure appropriate system administrative actions, investigate and report on noted irregularities.
  • Conduct network Vulnerability Assessments using tools to evaluate attack vectors, Identify System Vulnerabilities and develop remediation plans and Security Procedures.
  • The experience has enabled me to find and address security issues effectively, implement new technologies and efficiently resolve security problems. With having strong Network Communications, Systems & Application Security (software) background looking forward for implementing, creating, managing and maintaining information security frameworks for large scale challenging environments.

Security Tools: Kali Linux, IBM Appscan, Burpsuite, HP Webinspect, Nessus, Nmap Scripting Engine etc.

Pen Tester

Confidential,Boston,MA

Responsibilities:

  • Analyze the application for Security Assessment both manual & automation.
  • Perform validation and verification. Recommend process improvements.
  • Define the timelines to the given application & Conduct the security assessments and Report out the vulnerability findings with remediation process to the development team.
  • Conducted application penetration testing of 15+ business applications
  • Proficient in understanding application level vulnerabilities like XSS, SQL Injection, CSRF, authentication bypass, weak cryptography, authentication flaws etc.
  • Skilled using Burp Suite, Acunetix Automatic Scanner, NMAP, Havij, DirBuster for web application penetration tests.
  • Generated and presented reports on Security Vulnerabilities to both internal and external customers.
  • Retesting the application for the found vulnerabilities & Post production support.
  • Security assessment of online applications to identify the vulnerabilities in different categories like Input and data Validation, Authentication, Authorization, Auditing & logging.
  • Vulnerability Assessment of various web applications used in the organization using Paros Proxy, Burp Suite, and Web Scarab, YASCA, HP Web Inspect.
  • Training the development team on the most common vulnerabilities and common code review issues and explaining the remediation.
  • Follow up and ensure the closure of the raised vulnerabilities by revalidating and ensuring 100% Closure.
  • Update with the new hackings and latest vulnerabilities to ensure no such loopholes are present in the existing System

Tools: Acunetix, HP Web Inspect, Yasca, Web scarab, Nessus, Burpsuite etc.

Web Application Penetration Tester

Confidential,Northridge,LA

Responsibilities:
  • Identifying the critical, High, Medium, Low vulnerabilities in the applications based on OWASP Top 10.
  • Perform penetration tests on different applications a week.
  • Preparation of security testing checklist to the company.
  • Ensure all the security controls are covered in the checklist.
  • Identified vulnerabilities such as File upload, Path traversal, SQL Injection and more, and helped the development team to fix the issues.
  • Updating of the checklist on weekly basis to ensure all the test cases are up to date as per the attacks happening in the market.
  • Providing detailed knowledge transfer to Development team for better understanding of Vulnerabilities.
  • Information gathering of the application using websites like Shodan, ReverseDNS, Hackertarget.com
  • Using various Firefox add-ons like Flag fox, Wappalyzer, Live HTTP Header, Tamper data to perform the pen test.
  • Performed network vulnerability assessments using tools to evaluate attack vectors, develop remediation plans, and identify system vulnerabilities and security procedures.
  • Network scanning using tools like NMap and Nessus.
  • Used Metasploit framework to exploit the network based vulnerabilities.
  • Initiative to stream line the access control mechanism of various applications.

Environment: Live HTTP Header, Nmap, Metasploit, Tamper Data, Shodan etc

Jr. Security Engineer

Confidential

Responsibilities:

  • Involved in Web Application Vulnerability Assessment & Threat Modeling, Gap Analysis, and secure code review on the applications.
  • Extensive Interaction with Onsite Coordinator in understanding the business issues, requirements, doing exhaustive analysis and providing end-to-end solutions.
  • Doing multiple level of testing before production to ensure smooth deployment cycle.
  • Helped lead security engineer in writing scripts for automation of network scans.
  • Security Review of all the impacted and non-impacted issues.
  • Prepared report about the findings and action items to fix the identified vulnerabilities
  • Other Adhoc Activities like monthly and weekly report creations. Scheduling meeting with different applications SVP for understanding future pipelines for applications.
  • Assisting customer in understanding risk and threat level associated with vulnerability so that customer may or may not accept risk with respect to business criticality.
  • Assisting in review of business solution architectures from security point of view which helps avoiding security related issues/threats at the early stage of project

Confidential

UI Developer (Internship)

Responsibilities:
  • Worked in Agile and Scrum development environments.
  • Interacted with business system analyst to understand the technical requirements of the project.
  • Coordinated with Photoshop designers to implement mock ups and the layouts of the application.
  • Involved in developing the UI pages using HTML, DHTML, CSS, and JavaScript.
  • Developed web pages with functionalities like login, register, forget password, Email, Filters using Java Script, jQuery and HTML.
  • Used JavaScript to update a portion of a web page thus reducing bandwidth usage and load time in web pages to get user input and requests.
  • Coded JavaScript for page functionality and Pop up Screens and used HTML to make dropdown menus on web pages and display part of a web page upon user request.
  • Involved in writing SQL Queries, Stored Procedures.

Environment: HTML, CSS, JavaScript, DHTML, SQL, PL/SQL, MS Office

We'd love your feedback!