SUSHANT SHARMA

Senior Penetration Tester | Product Security Engineer
Bangalore, IN.

About

Highly accomplished and certified Penetration Tester and Product Security Engineer with over 8 years of experience in identifying and mitigating complex security vulnerabilities for leading global firms including Schneider Electric and Siemens Healthineers. Proven expertise in leveraging advanced tools like Kali Linux and developing custom exploit scripts to simulate real-world cyber attacks, significantly reducing organizational risk. Adept at collaborating with cross-functional teams to implement robust security countermeasures and drive comprehensive vulnerability management programs.

Work

Schneider Electric
|

Penetration Tester

Bangalore, Karnataka, India

Summary

Led comprehensive penetration testing initiatives to identify and mitigate critical security risks across diverse systems, enhancing the overall security posture for a global energy management leader.

Highlights

Executed thorough penetration tests on network systems, web applications, containers, and mobile applications, identifying critical vulnerabilities and security risks across the enterprise.

Performed large-scale network penetration testing across an internal network encompassing thousands of endpoints, uncovering systemic weaknesses and advising on remediation strategies.

Developed and deployed custom exploit scripts and specialized tools to simulate real-world cyber attacks, effectively evaluating and strengthening organizational security defenses.

Collaborated cross-functionally with development and operations teams to remediate identified security issues, implementing effective countermeasures to prevent potential breaches.

Authored comprehensive penetration testing reports, detailing findings, actionable recommendations, and remediation steps for clients and senior stakeholders, ensuring clear communication of risk.

Established and managed Standard Operating Procedures (SOPs) for the assessment process, aligning practices with OWASP guidelines and company security policies.

Participated actively in war-room triaging for P1 security incidents, contributing to rapid incident response and resolution efforts.

Siemens Healthineers
|

Product Security Engineer

Erlangen, Bavaria, Germany

Summary

Enhanced product security posture by identifying and resolving critical cyber security gaps, ensuring the integrity and safety of healthcare devices.

Highlights

Identified and remediated critical cyber security gaps within infrastructure, developing and implementing strategic solutions that significantly improved the security posture.

Conducted comprehensive Threat and Risk Assessments for product lines, effectively identifying and mitigating security issues to enhance product resilience.

Performed rigorous Vulnerability Assessment and Penetration Testing on healthcare devices utilizing both automated and manual methodologies to uncover and address vulnerabilities.

Utilized industry-standard scanning tools including Nessus, SCAP DOD, and MBSA to conduct thorough security scans on medical devices, ensuring compliance and identifying weaknesses.

Executed secure code reviews prior to production deployment, preventing the introduction of critical vulnerabilities into live systems.

TCS/Credit Suisse
|

Penetration Tester

Zurich, Zurich, Switzerland

Summary

Conducted diverse penetration testing assessments to secure network, web applications, and APIs for a leading financial institution.

Highlights

Executed comprehensive penetration testing assessments across network infrastructure, web applications, and APIs, identifying critical security flaws.

Leveraged advanced security platforms and tools such as Kali Linux, Metasploit Framework, and Burp Suite to conduct in-depth vulnerability analysis.

Analyzed and secured company network servers, implementing measures that prevented unauthorized access and data loss.

Generated detailed security reports with actionable recommendations, effectively communicating complex findings and solutions to IT professionals and management.

TCS/Credit Suisse
|

Identity and Access Management Consultant

Bangalore, Karnataka, India

Summary

Streamlined application onboarding processes and ensured compliance with regulatory standards through robust Identity and Access Management strategies.

Highlights

Gathered, analyzed, and documented comprehensive business and technical requirements for application onboarding, streamlining integration processes.

Developed and implemented meta-models for applications, integrating them into Role-Based Access Control (RBAC), Policy-Based Access Control (PBAC), and Attribute-Based Access Control (ABAC) frameworks.

Ensured strict compliance with industry standards such as SOX and MAS during application onboarding, mitigating regulatory risks and enhancing security posture.

Education

Georgia Institute of Technology
Atlanta, Georgia, United States of America

Master of Science (M.S.)

Computational Systems

Uttar Pradesh Technical University
Uttar Pradesh, Uttar Pradesh, India

B.Tech

Computer Science

Certificates

CRTO (Certified Red Team Operator)

Issued By

ZeroPoint Security

CRTP (Certified Red Team Professional)

Issued By

Altered Security

CISSP (Certified Information Systems and Security Professional)

Issued By

ISC2

Certified DevSecOps Professional

Issued By

Practical Devsecops

CCSP (Certified Cloud Security Professional)

Issued By

ISC2

AWS Security Speciality

Issued By

Amazon Web Services

OSCP (Offensive Security Certified Professional)

Issued By

Offensive Security

CEH (Certified Ethical Hacker - Practical)

Issued By

EC-Council

Skills

AppSec
Identity and Access Management (IAM)

Identity and Access Management, RBAC, PBAC, ABAC, Application Onboarding.

Cybersecurity & Penetration Testing

Penetration Testing, Application Security, Vulnerability Management, Threat and Risk Assessment, Secure Code Review, Incident Response, OWASP Guidelines, Red Teaming, Exploit Development, Security Auditing, Compliance (SOX, MAS).

Programming & Scripting

C, Python, Java, Custom Exploit Scripts.

Security Tools & Platforms

Kali Linux, Burp Suite, Nmap, Metasploit Framework, Nessus, SCAP DOD, MBSA, AWS.

SUSHANT SHARMA