SUSHANT SHARMA
Senior Penetration Tester | Product Security Engineer
Bangalore, IN.About
Highly accomplished and certified Penetration Tester and Product Security Engineer with over 8 years of experience in identifying and mitigating complex security vulnerabilities for leading global firms including Schneider Electric and Siemens Healthineers. Proven expertise in leveraging advanced tools like Kali Linux and developing custom exploit scripts to simulate real-world cyber attacks, significantly reducing organizational risk. Adept at collaborating with cross-functional teams to implement robust security countermeasures and drive comprehensive vulnerability management programs.
Work
Bangalore, Karnataka, India
→
Summary
Led comprehensive penetration testing initiatives to identify and mitigate critical security risks across diverse systems, enhancing the overall security posture for a global energy management leader.
Highlights
Executed thorough penetration tests on network systems, web applications, containers, and mobile applications, identifying critical vulnerabilities and security risks across the enterprise.
Performed large-scale network penetration testing across an internal network encompassing thousands of endpoints, uncovering systemic weaknesses and advising on remediation strategies.
Developed and deployed custom exploit scripts and specialized tools to simulate real-world cyber attacks, effectively evaluating and strengthening organizational security defenses.
Collaborated cross-functionally with development and operations teams to remediate identified security issues, implementing effective countermeasures to prevent potential breaches.
Authored comprehensive penetration testing reports, detailing findings, actionable recommendations, and remediation steps for clients and senior stakeholders, ensuring clear communication of risk.
Established and managed Standard Operating Procedures (SOPs) for the assessment process, aligning practices with OWASP guidelines and company security policies.
Participated actively in war-room triaging for P1 security incidents, contributing to rapid incident response and resolution efforts.
Erlangen, Bavaria, Germany
→
Summary
Enhanced product security posture by identifying and resolving critical cyber security gaps, ensuring the integrity and safety of healthcare devices.
Highlights
Identified and remediated critical cyber security gaps within infrastructure, developing and implementing strategic solutions that significantly improved the security posture.
Conducted comprehensive Threat and Risk Assessments for product lines, effectively identifying and mitigating security issues to enhance product resilience.
Performed rigorous Vulnerability Assessment and Penetration Testing on healthcare devices utilizing both automated and manual methodologies to uncover and address vulnerabilities.
Utilized industry-standard scanning tools including Nessus, SCAP DOD, and MBSA to conduct thorough security scans on medical devices, ensuring compliance and identifying weaknesses.
Executed secure code reviews prior to production deployment, preventing the introduction of critical vulnerabilities into live systems.
Zurich, Zurich, Switzerland
→
Summary
Conducted diverse penetration testing assessments to secure network, web applications, and APIs for a leading financial institution.
Highlights
Executed comprehensive penetration testing assessments across network infrastructure, web applications, and APIs, identifying critical security flaws.
Leveraged advanced security platforms and tools such as Kali Linux, Metasploit Framework, and Burp Suite to conduct in-depth vulnerability analysis.
Analyzed and secured company network servers, implementing measures that prevented unauthorized access and data loss.
Generated detailed security reports with actionable recommendations, effectively communicating complex findings and solutions to IT professionals and management.
Bangalore, Karnataka, India
→
Summary
Streamlined application onboarding processes and ensured compliance with regulatory standards through robust Identity and Access Management strategies.
Highlights
Gathered, analyzed, and documented comprehensive business and technical requirements for application onboarding, streamlining integration processes.
Developed and implemented meta-models for applications, integrating them into Role-Based Access Control (RBAC), Policy-Based Access Control (PBAC), and Attribute-Based Access Control (ABAC) frameworks.
Ensured strict compliance with industry standards such as SOX and MAS during application onboarding, mitigating regulatory risks and enhancing security posture.
Certificates
CRTO (Certified Red Team Operator)
Issued By
ZeroPoint Security
Skills
AppSec
Identity and Access Management (IAM)
Identity and Access Management, RBAC, PBAC, ABAC, Application Onboarding.
Cybersecurity & Penetration Testing
Penetration Testing, Application Security, Vulnerability Management, Threat and Risk Assessment, Secure Code Review, Incident Response, OWASP Guidelines, Red Teaming, Exploit Development, Security Auditing, Compliance (SOX, MAS).
Programming & Scripting
C, Python, Java, Custom Exploit Scripts.
Security Tools & Platforms
Kali Linux, Burp Suite, Nmap, Metasploit Framework, Nessus, SCAP DOD, MBSA, AWS.