Portfolio
Check out my featured projects
About Me
Protecting Businesses with Proactive Risk Management & Vulnerability Assessments
20+
Happy clients
7+
Years of experience
25+
Projects done
As a Security Consultant and Penetration Tester, I specialize in identifying and mitigating security risks to protect organizations from potential cyber threats. With a deep understanding of network infrastructures and security frameworks, I provide expert guidance on risk management, compliance, and best practices.
As a penetration tester, I simulate cyberattacks to uncover vulnerabilities before malicious actors can exploit them. My approach combines technical expertise with a strategic mindset to ensure businesses remain resilient in an ever-evolving digital landscape. I’m committed to helping organizations build robust security postures and stay ahead of emerging threats through proactive, thorough testing and consultation.
Penetration Tester
Simulates cyberattacks to identify vulnerabilities and weaknesses in systems before malicious actors can exploit them.

Security Architect
Develops and designs the structure of secure systems and networks to ensure they are robust against attacks.

Security Operations Center (SOC)
Monitors security events in real-time, managing incident detection, response, and coordination within a SOC environment.

Compliance Solutions
Ensures that the organization's cybersecurity practices meet regulatory standards and industry-specific compliance requirements.

Resume
Education and practical experience
Educational Background & Hands-On Experience in Cybersecurity :
Building Expertise through Formal Learning and Real-World Application.
My education
Qualys Certified Specialist
Course by Qualys
Qualys Certified Specialist can deploy, operate, and monitor the Qualys Cloud Platform to implement, manage, and protect IT systems, devices and web applications.
Certified Ethical Hacker (CEH)
Course by EC-Council
The Certified Ethical Hacker (CEH) provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures.
Bachelor of Engineering
in Branch Information Technology
A Bachelor of Engineering in Information Technology (BE IT) is a four-year undergraduate degree program that teaches students how to develop, implement, and manage computer systems, software, networks, and information systems.
Work experience
Manager | Senior Consultant
in the Tech Consulting in Big 4, Insurance Sector, Banking Sector & Education Sector
I have worked performing Vulnerability Assessment & Penetration Testing(VAPT), SOC Tools Deployment including DLP, Proxy, EDR/XDR, Disk Encryption(PGP), Security Audits & Third Party Risk Assessment, Goverance Risk & Compliance, Secure Config Review, Source Code Review, Threat Modelling & CMS website development.
My favourite tools
Burp Suite

Netsparker

Acunetix

NMAP
Qualys

Teenable Nessus

MS Threat Modelling Tool

MS Sentinel
Zscaler
Symantec PGP
Postman
Forcepoint
Crowd Strike
Photoshop
HTML5 & CSS3
Testimonials
Clients say about me
Contact
Let's make something awesome together!
Done!
Thanks for your message. I'll get back as soon as possible.