Post Job Free

Resume

Sign in

Executive Office

Location:
Lal Bagh, Uttar Pradesh, India
Salary:
20000-30000
Posted:
November 27, 2020

Contact this candidate

Resume:

SACHIN SHIRISH

+91-700******* adh6dx@r.postjobfree.com Kanpur Nagar, Uttar Pradesh, INDIA

Career Objective: To overcome challenges posed by ever-changing technological advancements with dedication and continuous learning by directing my abilities and experience into values of the organization and my overall development.

EDUCATION

Bachelor of Computer Applications (BCA)

Dr. Virendra Swarup Institute of Computer Studies, Kanpur Chhatrapati Shahu Ji Maharaj University

2018 – 2021

Higher School Secondary Certificate

Patel Saraswati Vidya Mandir Inter College, Kanpur Uttar Pradesh State Board

2016– 2017

Secondary School Certificate

Kendriya Vidyalaya No. 1 A.F.S Chakerì, Kanpur

Central Board of Secondary Education

2014 - 2015

TECHNICAL SKILLS

• Operating System Used Windows 7/8/10 OS and Linux OS

• Software Development Life Cycle (SDLC)

• Software Testing Life Cycle (STLC)

• Burp Suite OWASP Zap Acunetix

• OWASP Top 10 (2017)

• Web Application Vulnerability Assessment

• Core Java Python SQL HTML

• Microsoft Office, Microsoft Word, Microsoft Excel, Google Sheets, Google Docx

PROJECT

AutoScan - The Multi-Tool Web

Vulnerability Scanner

The ultimate goal of this tool is to solve this

problem through automation, running multiple

scanning tools to discover vulnerabilities,

effectively judge false-positives, collectively

correlate results and saves precious time.

• One-step installation.

• Executes a multitude of security

scanning tools, does other custom

coded checks and prints the results

spontaneously.

• Some of the tools include nmap,

dnsrecon, wafw00f, uniscan, fierce,

theharvester, dnswalk, golismero etc

executes under one entity.

• Association with OWASP Top 10 2017

on the list of vulnerabilities discovered.

• Critical, high, medium, low and

informational classification of

vulnerabilities.

• Vulnerability definitions guides you

what the vulnerability actually is and

the threat it can pose.

• Remediations tells you how to plug/fix

the found vulnerability.

• Executive summary gives you an overall

context of the scan performed with

critical, high, low and informational

issues discovered.

• Detailed comprehensive report in a

portable document format (*.pdf) with

complete details of the scans and tools

used.

KEY STRENGTHS

Highly adaptable Quick learner Problem

solver Critical thinking & analysis Optimistic



Contact this candidate