About
Dedicated cybersecurity professional with over 6 years of experience, specializing in automotive security, risk management, and network solutions. Proven ability to lead Threat Analysis and Risk Assessment (TARA) initiatives, enhance network security, and mitigate critical vulnerabilities, driving compliance with industry standards like ISO 21434 and ISO 26262. Adept at leveraging advanced tools and methodologies to secure complex IT environments and ensure project delivery excellence for high-profile clients.
Work
Trivandrum, Kerala, India
→
Summary
Led comprehensive Threat Analysis and Risk Assessment (TARA) initiatives for automotive systems, ensuring compliance with ISO 21434 standards and enhancing overall security posture.
Highlights
Developed and analyzed Threat Analysis and Risk Assessments (TARA) in compliance with ISO 21434 standards, ensuring robust security frameworks for automotive systems and reducing potential cyber risks.
Conducted detailed risk assessments to identify and prioritize potential threats and vulnerabilities within complex automotive systems, preparing comprehensive reports for stakeholders.
Performed Hazard Analysis and Risk Assessment (HARA) and ASIL rating identification in accordance with ISO/SAE 26262, streamlining risk assessment processes and delivering detailed reports.
Ensured all cybersecurity measures aligned with organizational security policies and objectives, enhancing overall security posture and maintaining continuous monitoring against evolving threats.
New Delhi, Delhi, India
→
Summary
Designed, implemented, and maintained robust network infrastructures, ensuring optimal performance, security, and compliance.
Highlights
Designed and deployed LANs, WANs, VPNs, and wireless networks, configuring routers, switches, and firewalls to optimize network performance, scalability, and redundancy.
Monitored network traffic and bandwidth usage with Wireshark, performing regular health checks, applying patches, and updating firmware to mitigate security threats and enhance network uptime by 20%.
Implemented Checkpoint firewalls, IDS/IPS, and access controls, enforcing security policies (ACLS, VLAN segmentation, VPNs) to ensure robust network security and compliance.
Maintained comprehensive network documentation, including configurations and IP schemes, and generated reports on uptime, performance, and incidents to support operational transparency.
Haryana, Haryana, India
→
Summary
Executed comprehensive white box and black box penetration testing to identify and remediate critical vulnerabilities in systems and networks.
Highlights
Conducted deep-dive white box penetration testing, collaborating with developers and IT teams to identify and resolve system misconfigurations and logic flaws.
Performed black box penetration testing, focusing on external attack surfaces and employing reconnaissance and exploitation techniques to assess system resilience against real-world threats.
Identified and remediated over 50 critical vulnerabilities in systems and networks, significantly enhancing security posture through high-impact penetration testing.
Certificates
Skills
Cybersecurity Frameworks & Standards
TARA (Threat Analysis and Risk Assessment), HARA (Hazard Analysis and Risk Assessment), ISO/SAE 21434, ISO/SAE 26262, UNECE R155, UNECE R156, ISO/IEC 27001, Functional Safety, Cyber Security Management Systems, ASIL Rating.
Network Protocols & Technologies
CAN Protocol, Ethernet, UDS, Service IDs, TCP, Flex-Ray, LIN, DOIP, Some-IP, Routers, Switches, VPNs, Wireless Networks, LAN, WAN, Network Security, Communications Protocols, CLM, ACLS, VLAN Segmentation.
Security Practices & Operations
ECU Secure Access, Secure Boot, Flashing, Script-based Testing, Cyber Security Threats, Attacks and Vulnerabilities Analysis, SQL Injection, Command Injection, Manipulation Input Fields, Penetration Testing (White Box), Penetration Testing (Black Box), IDS/IPS, Access Controls, Endpoint Security, Cyber Threat Management, Security Policies, Risk Prioritization, Countermeasure Development, Continuous Monitoring.
Tools & Software
JIRA, TARA Tools, TRM, Burp Suite, Packet Tracer, Nessus, Caring Caribou, Canoe, Virtual CAN, IPC Simulator, Wireshark, Nmap, MobaXterm, Putty, Aircrack, Visual Studio, VMware, Virtual Box, Network Analyser, Kali Linux, Checkpoint Firewall, Palo Alto, AppViewX.
Cloud & IT Operations
AWS Cloud Practitioner, WAF, Operating Systems, Application Software, Remote Access Support, Troubleshooting, IT Operations Services, IT Support.