About
Highly skilled Cybersecurity Analyst with 3 years of experience specializing in vulnerability assessment, penetration testing, and IT service management. Expertly identifies and remediates security weaknesses across networks, applications, and IT systems, ensuring robust security posture and compliance with OWASP Top 10, NIST, and ISO 27001 standards. Proven ability to translate complex technical issues for diverse stakeholders and drive proactive security enhancements.
Work
A.R.M Technologies Ltd (The GIG Search)
|Security Analyst
London, England, United Kingdom of Great Britain and Northern Ireland
→
Summary
Led comprehensive vulnerability assessments and penetration testing efforts across diverse applications and infrastructure, ensuring robust security posture and compliance.
Highlights
Orchestrated end-to-end vulnerability assessments using Tenable and Qualys, identifying and driving remediation for critical issues across applications and infrastructure.
Conducted advanced web and API penetration testing, detecting and mitigating vulnerabilities including XSS, SQL Injection, insecure endpoints, and weak authentication.
Collaborated cross-functionally with DevOps and IT teams to analyze CVEs, prioritize risks, and implement remediation strategies aligned with OWASP Top 10 and SANS 25.
Maintained secure Linux environments and executed security configuration reviews for endpoints, servers, and network devices, ensuring compliance with security baselines and regulatory standards (ISO, NIST).
Authored and delivered clear, executive-level security reports to diverse stakeholders, significantly enhancing organizational visibility into security posture and informing strategic decisions.
CodeGaints
|Cyber Security Analyst
London, England, United Kingdom of Great Britain and Northern Ireland
→
Summary
Managed a structured vulnerability management program, overseeing system scanning, risk reporting, and remediation to enhance organizational security.
Highlights
Managed a comprehensive vulnerability management program, utilizing Qualys and Tenable for system scanning and coordinating remediation efforts with patch teams.
Developed and presented executive-level vulnerability reports, effectively communicating risk impact and strategic remediation plans to leadership.
Achieved over 90% server compliance by creating and enforcing robust security policies and procedures aligned with ISO 27001, strengthening the overall security framework.
Coordinated cross-functional teams to analyze and resolve vulnerabilities across cloud, server, and endpoint environments, improving system resilience and security posture.
Streamlined remediation timelines by prioritizing vulnerabilities based on criticality and business impact, enhancing incident response efficiency and reducing exposure.
Education
Bournemouth University
→
Master of Science
Cyber Security and Human Factors
Vellore Institute of Technology (VIT)
→
Bachelor of Technology
Electronics and Communication Engineering
Languages
English
Skills
Vulnerability Assessment & Management
Qualys, Tenable, OWASP Top 10, SANS Top 25.
Web Application Security Testing
Burp Suite, Nmap, OWASP ZAP, Nikto, Manual Testing.
Penetration Testing & Reporting
Web Penetration Testing, Network Penetration Testing, Vulnerability Exploitation, Technical Reporting, Executive-Level Reporting.
Network & System Security
Firewalls, IDS/IPS, Secure Configuration Reviews, Server Hardening, Network Device Hardening.
Core Protocols & Technologies
TCP/IP, IPSEC, SSL/TLS, VPN, SMTP, FTP, SSH, Ethernet, WAN.
Linux Administration & Hardening
User Management, Permissions, SSH Configuration, Service Management.
Cloud Security - AWS
IAM, EC2, VPC, S3, AWS WAF, AWS Shield, CloudTrail, CloudWatch, VPC Security Groups, Network ACLS.
Scripting & Automation
Python, Bash, PowerShell, C.
Compliance & Security Frameworks
ISO 27001, NIST.
Version Control Systems
Git, GitHub.
Ticketing & Bug Tracking Tools
Jira, ServiceNow.