Post Job Free
Sign in

Cyber Security Penetration Testing

Location:
Hyderabad, Telangana, India
Posted:
September 11, 2025

Contact this candidate

Resume:

Tarakesh M

Email ID: ****************@*****.***

Phone No: +1-561-***-****

Professional Summary

5+ years of experience in Penetration Testing for network vulnerability assessment, web application security testing, threa modelling, network penetration testing, red teaming, blue teaming, forensics, security operations and threat hunting.

Experienced in the creation of reports on Cyber Security events and Vulnerabilities found in vulnerability assessment scar using tools such as (Nessus, OpenVAS, Retina CS).

Experience with Pen testing Standard tools including Nessus, Nmap, Qualys, Wireshark Webinspect, AppDetective, Hping.

Metasploit, Burp Suite Pro, Aircrack - ng, john the ripper and Kismet.

Advance working knowledge of Mittre attack model and cyber kill chain to detect advanced persistent threat actors tactics, techniques, and procedures (TTP), and emulate these TTP to assess vulnerability, risk and pen testing.

Investigated and analyzing Cyber Security events found in vulnerability scans and suggest countermeasures to mitigate the threats.

Penetrated tested systems and networks for vulnerabilities and auditing by performing Footprinting and Scanning using tools such as Nmap, Hping3, Whois lookup, Path Analyzer Pro, OpUtils, Google hacking.

Skilled in finding Cyber Security vulnerabilities and risks in computer networks and resolve those vulnerabilities by ensuring patch management, security in-depth, policy implementation and updating systems.

Performed security assessments and audits for compliance with the NIST Risk Management Framework.

Followed Incident Response Plan to mitigate system breach, document findings, and perform post-incident analysis to update the Incident Response Plan.

Performed Access Control Identity Management, Penetration Testing, Vulnerability Assessment, SOC Analysis, Incident

Response, and Threat Mitigation.

Experienced in evaluating systems for Cyber Security best-practices and vulnerabilities by performing systems Footprinting and scanning with tools such as Whois Lookup, DNSstuff, Social Engineering Toolkits.

Experienced in performing log analysis, intrusion detection/prevention, and incident management as SOC Analyst by reviewing alerts from various SIEM tools.

Hands-on experience in using tools such as IDA Pro, ArcSight, Splunk, LogRhythm, AlienVault, Nessus, Wireshark, Q-Radar, ForgeRock, Tepdump, and Nmap

Skilled in collecting network traffic and perform analysis from network devices such as Firewall, IDS/IPS, Antivirus, Switches,customers..

Committed to excellence, self-motivator, fast-learner, team player, ability to deal with people diplomatically and a prudent developer with and Router trattic through Log and Event-based on TCP/IP Technical Skills

Penetration Testing: Cloud (AWS, Azure), Network/Active Directory, Web/API Applications, Compliance-Driven Testing (PCI, FedRAMP)

Scripting & Automation: Python, PowerShell, Bash, Ruby (Basic)

Security Frameworks: PCI DSS, FedRAMP, HIPAA, HITRUST, FISMA

Tools & Platforms: Metasploit, Burp Suite, Nessus, Nmap, Wireshark, Kali Linux, AWS Security Hub, Azure Sentinel

IT Security Auditing: Vulnerability Assessments, Compliance Audits, Risk Analysis

Networking & Systems: TCP/IP, Firewalls, Active Directory, Linux/Windows Servers, Docker

Soft Skills: Client Communication, Technical Presentations, Cross-Functional Collaboration, Report Writing

Professional Experience

Client :PNC bank PA

Cyber security pentester Feb 2024 to till date

Monitored network traffic for security events and perform triage analysis to identify security incidents with respect to Confidentiality, Integrity, and Availability.

Responsible for detecting successful and unsuccessful intrusion attempts through analysis of relevant event logs and supporting data sources by utilizing SIEM tools such as Qradar and Splunk Enterprise.

Experienced in using Splunk phantom as a Security Orchestration, Automation and Response (SOAR) tool for effective and efficient response to incident.

Installed and configured of network security devices such as Firewall Palo Alto (Suite), Routers. Switches, IDS/IPS using McAfee Endpoint, Symantec Endpoint, Carbon Black, and Servers.

Monitored, fine-tuned, creating dashboard, asset inventory and visibility of events using SIEM tools

Skilled in how to collect security logs, application logs, system logs and monitors privileged users to mitigate threats Monitored systems, identifying, studying, and resolving all instances/events reported by various SIEMs alerts (SourceFire,Tipping Point).

1 analyzed and researched large sets of logs on end devices to detect potential malicious activities.

Conducted system security evaluations and assessments, documented and reported security findings using NIST 800 guidance per the continuous monitoring requirements.

Experienced in threat hunting and Advanced Persisted Threat detection using Mitre Attack framework and Cyber kill chain

Monitored systems, detecting, analyzing, and resolving all incidents/events reported by various SIEM tools.

Performed security control assessment of all assigned systems, developed test plans and assessment reports in support of information security policy.

Use Proofpoint email gateway in addition with MARC. SPF and DKIM to prevent senders and receivers of emails from spam, spoofing, spyware, and phishing.

Applied understanding the function and content of information security policies, standards, procedures, and practices as well as threats, risk and vulnerabilities at a functional level

Experienced in using Identity and Access Management (IAM) tools to manage groups, users, and applications to enforce access control, policies, compliance, and least privilege to protect confidentiality, integrity.

Responded to computer security incidents by collecting, analyzing. providing detailed evidence (network log files), and ensure that incidents are recorded and tracked in accordance with its guideline and requirements.

Participated in the creation of enterprise security documents (policies, procedures, standards, guidelines, and playbooks) under the direction of the Chief Information Security Officer

Experienced in Identity and Access Management (IAM) tools such as AWS IAM. Azure Active directory services, okta ServiceNow.

Conducted vulnerability and risk assessments on cloud resources using Qualys cloud tool and integrate results to SIEM tools for analysis.

Experienced in using SQL, Powershell and Python scripting for automation of task.

Experienced in managing and hardening several company servers such as database, syslog, web, radius, and TACACS for remote authentications.

Performed penetration testing on AWS and Azure cloud environment to check secure configuration, cryptography, validate security controls and assess vulnerabilities.

Perform pen testing and compliance audit using industry standard tools particularly Metasploit, nmap. QualysGuard, IBM Q-radar, Splunk, among other tools use to conduct security assessment.

Monitored controls post authorization to ensure continuous compliance with the security requirements by evaluating vulnerabilities through Nessus scan results and work with the IT staff for mitigation actions,

Proficiencies in cloud resource deployment and cloud security monitoring for laaS, PaaS, SaaS in AWS and Azure Cloud environment

Implemented deep drive analyses on alerts received from Splunk and took actions on remediation process. Client : Wipro

Role Security Eng Aug 2021– Dec 2023

Performed security research, analysis and design for all client computing systems and the network infrastructure.

Security assessment of online applications to identify the vulnerabilities in different categories like Input and data Validation.

Authentication, Authorization, Auditing & logging.

Vulnerability Assessment of various web applications used in the organization using Paros Proxy, Burp Suite, and Web Scarab, YASCA, HP Web Inspect, Qualys.

Coordinate with dev team to ensure closure of reported vulnerabilities by explaining the ease of exploitation and the impact of the issue.

Security testing of APIs using SOAP UI, OWASP Mobile Top Ten vulnerabilities.

Experience in reverse Engineering of Native Mobile Application.

Exploring local Storage and hard coded information and file structure of Native Application.

Experience in using Kali Linux to do web application assessment with tools like Dirbuster, Nikto, and NMap.

Good knowledge on IBM AppScan to enhance the web application security.

Perform security code review of JAVA..Net, PHP code using static code analysis tools e.g. HP Fortify and IBM AppScan. Help team to remediate security issues with sample code.

Good knowledge on Tenable network security

User ID reconciliation on quarterly basis.

Update with the new hackings and latest vulnerabilities to ensure no such loopholes are present in the existing system.

Threat modelling of the Project by involving before development and improving the security at the initial phase.

STRIDE assessment of the applications during the design phase, identifying the threats possible and providing security.

Architected SIEM solutions for real-time threat detection, integrating threat intelligence feeds to enhance proactive, continuous defense measures.

Conducted vulnerability assessments and penetration testing to identify weaknesses and apply rapid remediation, securing critical infrastructure.

Led threat hunting across networks/endpoints, utilizing behavior analytics, network analysis, and intelligence sources to detect APTs and zero-day threats.

Monitored network traffic and alerts, using Splunk and CrowdStrike for log analysis to identify suspicious activity, ensure compliance, and prevent potential breaches.

Analyzed incidents and performed forensic investigations to trace attack vectors and root causes, producing insights to strengthen defense mechanisms. Client : Cap gemini

Application Security Engineer

Feb 2020 to Aug 2021

Integrated secure SDLC in CI/CD, automating SAST, DAST, IAST (SonarQube, ZAP, Veracode), securing deployments with minimal impact on DevOps flow.

Designed ML-driven anomaly models for real-time threat detection; used behavior analysis to improve detection accuracy, reducing false positives.

Led threat modeling for multi-tier apps with STRIDE/DREAD, advising secure architecture for PCI-DSS, SOC 2, and GDPR-compliant risk mitigation.

Created a secure LDAP-based directory infrastructure using Ping Directory and ADLDS to enhance secure user access management.

Built dependency framework for open-source security with OWASP Dependency-Check, Snyk; prioritized third-party risks to secure software supply chain.

Collaborated on DevSecOps automation with Python/Bash scripts, adding security validation, reducing review time in production-ready workflows.

Ensured AWS, Azure, GCP security by enforcing IAM, encryption, VPC best practices, aligning with NIST/CIS, improving multi-cloud application security.

Certifications

● Certified Information Systems Security Professional (CISSP)

● Certified Ethical Hacker (CEH)

● CompTIA Security+

● Offensive Security Certified Professional (OSCP)

● GIAC Penetration Tester (GPEN)



Contact this candidate