Jithin D Kurup
Security Consultant
Mob: +1-201-***-****
Email: ************@*****.***
LinkedIn: https://in.linkedin.com/in/jithin-d-kurup-77b616142 Experience Summary
• 6+ years of professional experience in Information Security focusing on Vulnerability Management, Assessment and Penetration Testing, Security Operation Center and SIEM, Threat Modeling and Information Security methodologies, Configuration and management of different types of security management and vulnerability assessment tools, Social Engineering, Network exploitation, Web Application Penetration Testing.
• Experience in Black Box and Gray Box Penetration Testing
• Worked on DevSecOps environment and CI/CD pipeline for SAST, DAST.
• Perform complete incident management framework cycle right from incident identification, Incident containment, performing root cause analysis, suggestion & implementation of preventive and corrective controls & Perform network analysis as needed on a case-to-case basis.
• Experience in working with 24x7 Security Operation Center (SOC) environment.
• Understanding of Web Server hardening and Operating System (OS) hardening.
• Experience in business case scenarios from security perspective to automate security testing.
• Delivered phishing campaigns followed by security awareness training.
• Worked with application developers to validate, assess, understand root cause, mitigate vulnerabilities and performing revalidation to check for closure of reported vulnerabilities.
• Proficient in understanding and executing application-level vulnerability attacks, Session Hijacking, Privilege escalation, Authorization Bypass, Authentication flaws, Design level vulnerabilities etc. Key Skills
• Technical: Recon & Information Intelligence, Vulnerability Management, Assessment and Penetration Testing
(VAPT), Social Engineering, Black Box and Gray Box Penetration Testing, Automated and Manual Security Testing, Mobile Applications (iOS and Android) Penetration Testing, Threat Modeling, Security Operation Center
(SOC), Security Information and Event Management(SIEM), Container Security, CIS Benchmarks, API Security Testing, Cloud Security-Amazon Web Services(AWS), DevSecOps, OWASP-Top10, PCI-DSS, SAST, DAST.
• Hands-on experience: Burp Suite Enterprise/Pro, Net Sparker, Veracode, Acunetix, IBM AppScan, OwaspZap- proxy, Sqlmap, Checkmarxs, Nikto, MobSF, Qualys Guard, Metasploit, Tenable-Nessus, Nmap, OpenVAS, dockscan, Fourtify, W3af, Rapid7- Nexpose, InsightVM-AppsSec, Xanatizer, Kiuwan, White Source, Brakeman Scanner, CloudSploit, trufflehog, Arachni, AWS-Prowler, SonarQube, WPscan, Clair, Dependency Check, Trivy, Aquasecurity, Wazuh-HIDS, Hydra, Kibana-ELK, Splunk, DataDog, Linux.
• Personal: Strategic/Tactical Planning, Business Analysis and Development, Analysis and Design, Creativity, Problem Solving, Communication and Interpretation, Quick Learning, Team Player, Project Management, Team Leader
Experience
Company 1:
Kapstone Technologies LLC - NJ, USA. June 2022 – July 2023
Location: Naperville, IL
Position: Solution Architect (Security)
Description: Kapstone LLC is a leading provider of advanced cybersecurity solutions and offering end-to-end security products, consulting, implementation, and training services. Client 1: Mercedes Benz SOC - November 2022 - June 2023 Position: Lead Security Consultant
• The level 2 analyst is guided by the specifications of a runbook and works through at least the specifications given there. In addition, he can carry out further examinations, which are documented accordingly.
• Perform advanced analysis, e.g., by collecting and incorporating additional available contextual data and information related to a security event.
• If required, contacting of contact persons of the AG defined in the runbook or of a service provider to request context information.
• Eliminate additional false positives; incorporate findings into the continuous improvement process for the use cases as needed.
• Verification of the criticality of the alarm based on the specifications of the runbook and the knowledge gained during the analysis.
• Creation of an incident according to the specifications of a runbook and sending it to the recipient group defined in the runbook.
• If a final classification of the alarm is not possible without analysis with further rights, the alarm is escalated to the responsible MIC Security team for further Level 3 analysis. Client 2: CMS better known as Capital Market Solutions – Jan 2022 - Nov 2022 SOC & SIEM implementation with AWS Security audit. Position: Lead Security Consultant
• Design and set up the SOC infrastructure, including hardware, software, and network components.
• Configure and deploy security monitoring tools, intrusion detection/prevention systems, and log management solutions.
• Develop and document SOC processes, workflows, and standard operating procedures (SOPs).
• Define data collection strategies, log aggregation, and correlation rules within the SIEM.
• Customize and fine-tune alerting mechanisms based on organization-specific threat profiles.
• Monitor SIEM dashboards and reports to identify anomalous activities and potential security breaches.
• Perform a comprehensive review of AWS architecture, configurations, and security groups.
• Identify potential security vulnerabilities, misconfigurations, and compliance gaps. Company 2:
Kapstone Technologies LLC – India. Jan 2019 – June 2022 Location: Pune, India
Position: Security Consultant
Description: Kapstone LLC is a leading provider of advanced cybersecurity solutions and offering end-to-end security products, consulting, implementation, and training services. Client 1: Big Square, a leading SaaS based company- Security Assessment. Oct 2021 - Jan 2022 Position: Lead Security Consultant
• Identify potential security vulnerabilities, misconfigurations, and compliance gaps.
• Conduct network and infrastructure vulnerability assessments and penetration testing
• Review access controls, authentication mechanisms, and data encryption practices.
• Coordinate with incident response teams to contain and mitigate security breaches.
• Responsible for conducting security tests such as Risk Assessments, Vulnerability Assessments and Penetration Tests on systems/applications/network as per the requirement.
• Responsible for conducting security research, analysis and design for all client computing systems and the network infrastructure.
Client 2: Public Service Electric & Gas co (PSEG-LI & NJ) – Security Assessment. May 2021 - Oct 2021 Position: Lead Security Consultant
• Ensure that system credential storage facilities are correctly utilized for sensitive data storage.
• Monitor and enforce compliance to prevent sensitive data storage outside designated areas.
• Verify that no sensitive data is being written to application logs.
• Validate that no sensitive data is exposed via inter-process communication (IPC) mechanisms.
• Ensure sensitive data, such as passwords, remains undisclosed through the user interface.
• Monitor app behavior to prevent unnecessary retention of sensitive information.
• Ensure consistent use of secure channels throughout the app to maintain data integrity.
• Prioritize and remediate vulnerabilities based on risk assessments and impact analysis.
• Monitor and assess vulnerabilities in systems, applications, and network infrastructure. Client 3: Covanta Waste management company – SOC. June 2019 - May 2021 Position: Security Consultant
• Responsible for working in a 24x7 Security Operation Center (SOC) environment.
• Monitor security alerts and events from various sources, including intrusion detection systems (IDS), security information and event management (SIEM) systems, and other security tools.
• Simulating real-world, advanced cyber-attack scenarios imitating black hat hacking techniques.
• Review logs, alerts, and reports to identify suspicious activities, potential breaches, or unauthorized access attempts.
• Monitor network traffic patterns and behaviors to detect anomalies and potential threats.
• Investigate security alerts to determine the nature and scope of potential security incidents.
• Develop and execute incident response plans based on the severity and nature of security incidents.
• Contain and mitigate security incidents to prevent further damage or data loss.
• Coordinate with cross-functional teams, such as network administrators and system engineers, to address incidents effectively.
Client 4: Sumo Logic – SOC - Security Assessment. Oct 2019 - Feb 2020 Position: Security Consultant
• Collaborate with the consultant to understand the organization's security objectives, data sources, and specific requirements for SMA and parser development.
• Identify and assess various data sources, including logs, events, and network traffic, to determine what information needs to be collected for effective security monitoring.
• Define use cases and security scenarios that the SMA tools should address. These could include threat detection, anomaly detection, incident response, and compliance monitoring.
• Configure the SMA tools to collect, aggregate, and correlate data from different sources, aligning with the defined use cases.
• Fine-tune alerting mechanisms and thresholds to ensure accurate and timely notifications.
• Work with the organization to design a comprehensive SMA solution that aligns with their security goals and operational requirements.
• Identify and recommend suitable SMA tools, platforms, and technologies based on the organization's needs Develop custom parsers to normalize and parse data from different log sources into a format compatible with the SMA tools. Client 5: Oracle SMA – SOC - Jan 2019 - May 2019
Position: Security Consultant
• Design the architecture of the Oracle SMA solution, considering factors such as data sources, log collection, correlation rules, and reporting.
• Work closely with the consultant to implement Oracle SMA, including setting up the necessary infrastructure, agents, and integrations with other security tools.
• Monitor Oracle systems, databases, applications, and network traffic using Oracle SMA to detect and respond to security incidents and anomalies.
• Analyze alerts and events generated by Oracle SMA to identify potential security threats, intrusions, or unauthorized activities.
• Investigate alerts to determine if they pose a real threat and take appropriate action if necessary.
• Monitor for vulnerabilities in Oracle systems and databases and assess their potential impact on security.
• Generate regular reports on security events, incidents, and trends identified through Oracle SMA.
• Integrate Oracle SMA with other security tools and systems within the organization's environment to create a cohesive security ecosystem.
• Conduct testing and validation of the Oracle SMA implementation to ensure its accuracy and reliability in detecting security threats.
• Provide post-implementation support, troubleshooting, and assistance as needed to optimize the performance of Oracle SMA.
Company 3:
Calsys Communication Pvt. Ltd. April 2018 – Dec 2018 Location: Infopark - SEZ Cherthala, India
Position: Information Security Analyst
Description: At calsys, we provide solutions that are innovative and add the definitive technological edge to our client's business processes. Quality and technical expertise are the two key factors in the successful completion of all our projects. Our company is focused on different areas.
Responsibilities:
• Conducting and executing of periodical Vulnerability Assessments
• Gray Box and Black Box Testing on live projects
• Web Application, Android and iOS Pen Testing
• Evaluating new security technology and conducting vulnerability assessments.
• Regular analysis of security of various Client network and IT infrastructure and suggest remediation plan and managing in-house application security.
• Managing to Protect the internal network from malicious entities such as hackers, viruses and spyware.
• Ensuring projects and Linux supported applications are in compliance with technical architectural standards & policies.
• Investigating and creating case for the security threats and forwarding it to Onsite SOC team for further investigation and action.
• Analyzing suspicious emails (phishing, Spoofed, spam, or other) and finding the legitimacy of those emails to determine the impact to the users. Block and quarantine messages with malicious attachments or malicious URLs in Proof point.
• Created and managed security guidelines document for the development team
• Monitoring Windows & Unix logs and raising cases for login failures & lockouts based on defined thresholds. Company 4:
Alephix Consulting Pvt Ltd Aug 2017 - Feb 2018
Location: Infopark - SEZ Cherthala, India
Positions: Information Security Intern
Description: Alephix is a technology services and professional consulting firm based in India. Alephix is currently expanding its presence to Middle East, Canada, United States and other global locations. Responsibilities:
• Responsible for conducting security tests such as Risk Assessments, Vulnerability Assessments and Penetration Tests on systems/applications/network as per the requirement.
• Responsible for conducting security research, analysis and design for all client computing systems and the network infrastructure.
• Performed Android, iOS, Web Application and Wi-Fi Pen Testing
• Internal and External Pen Testing
• Gray Box and Black Box testing on live projects
• SOC & WAF Monitoring
• Keeping track of latest vulnerabilities and exploits and research on emerging security threats.
• Hands on exposure to information Security tools and assessment techniques
• Hands on exposure to vulnerability assessment and penetration testing of network and web applications.
• Hands on exposure to Security standards and ISMS tools
• Research on new vulnerability & Remediation consulting.
• Building and managing Computer Emergency Response Team / Computer Security Incident Response Team and managing Disaster recovery and business continuity management
• Analyze information security issues and maintain efficient security controls on same and prepare appropriate responses for all client issues and perform security assessments.
• Ensured compliance with internal and external safety standards by performing audits.
• Plan and conduct attacks on internally or externally hosted applications and infrastructure on a global scale with an emphasis on critical functions targeted by adversaries. Company 5: (Volunteer / Freelance Work)
Kerala Police Cyber Dome (Public-private partnership) Aug 2016 - May 2018 Location: Kerala, India
Position: Elite Member (Volunteer) ID Card Number: CYB539 (Valid up to - 31-05-2018) Description: Cyberdome is a technological research and development Centre of Kerala Police Department conceived as a Cyber Centre of excellence in cyber security as well as technology augmentation for effective policing. It envisages as a high-tech public-private partnership Centre of collaboration for different stakeholders in the domain of cyber security and handling of cybercrimes, in a proactive manner. Responsibilities:
• Performed Vulnerability Assessment and Penetration Testing for Kerala Government Websites, Public-Private Banks, Educational Sector etc.
• Responsible for preventing, combat, investigate and mitigate cybercrimes.
• Social media and analyze the same, for effective policing.
• Responsible for preventing technology-related violence against women and children, by creating safe and secure online space.
• Performed to understand, prevent and mitigate ransomwares.
• Responsible to create cyber security aware citizens and organizations who are safe from ransomware threats. Training, Certifications & Affiliations
• AWS Certified Security – Specialty, Certificate Validation Number - 267258QB31RQQTGM
• Certified Ethical Hacker v9 (C EH), Certificate Number - ECC27996735618 Awards & Recognitions
• Elite Membership from Kerala Police Cyber Dome
• Listed in Apple Bug Bounty Hall of Fame – June 2021
• Listed in AT&T Bug Bounty Hall of Fame Twice – October 2018 & January 2019
• Listed in Sony Hall of Thanks - August 2017
• Listed in Nokia Hall of Fame Twice - September & October 2017
• Listed in Trend Micro – April 2018
• Listed in eBay Hall of Fame – December 2017
• Listed in SAP Hall of Fame – November 2017
• Listed in EC Council - Hall of Fame – July 2018
• Listed in Conceptboard Hall of Fame – October 2017
• Intel.com Certificate of Appreciation Twice – January & March 2017
• Bug bounty from Jotfrom Inc and Private Programs.
• Certificate of appreciation from National Cyber Safety and Security Standards (NCSSS) Indian Govt.
• Winners of Lovely Professional University Techathon Capture the Flag 2018 – First Price
• Received CVE 2017-12943 on DLink-600 Authentication Bypass (Absolute Path Traversal) and published on Exploit-DB (42581)
• Certificate of Participation – C0C0N International Cyber Security & Police Hacking Conference 2016
• Reported Critical Vulnerability on Top 3 Indian Banks (Private & Public) and got featured in News Papers Higher Education
• Bachelor of Science (3 years Bachelor Degree), Fire & Safety Hazard Management (First Division) - Punjab Technical University (PTU), Jalandhar - India