T

Tarunkant G.

DevOps Manager

Bengaluru, Karnataka, India9 yrs 8 mos experience
Most Likely To SwitchHighly Stable

Key Highlights

  • Over nine years of cybersecurity experience
  • Four CVEs reported to major companies
  • Active contributor to the security community
Stackforce AI infers this person is a Cybersecurity Expert specializing in Web Exploitation and Red Teaming.

Contact

Skills

Core Skills

Security EngineeringSecurity ResearchCtf

Other Skills

AutomationBug HuntingBurp SuiteCHTMLIncident ManagementJavaJavaScriptMySQLPHPPenetration TestingPostgreSQLPython (Programming Language)Red TeamingSQLite

About

Tarunkant has been a cybersecurity enthusiast for over nine years, specializing in Web Exploitation. He is currently a Lead Security Engineer at Disney+ Hotstar (now JioHotstar), focusing on Perimeter Security, Incident Management, SSDLC, Automation, and Red Teaming. Previously, he worked at FireCompass as a Red Team Security Researcher, where he researched emerging attack techniques to enhance the platform’s Continuous Automated Red Teaming (CART) and Attack Surface Management (ASM) capabilities, while also developing automation tools for reconnaissance and exploitation. He also led the Web Security team at Team bi0s, India's #1 CTF team (as per CTFtime), and has four CVEs to his name. He has reported critical security vulnerabilities to major companies, including Quora, Spotify, Dropbox, Slack, and Oppo. Beyond research, he actively contributes to the security community by writing CTF writeups, security research blogs, and vulnerability reports. He also develops open-source exploitation tools to help advance security testing and research.

Experience

Jiohotstar

Lead Security Engineer

Nov 2024Present · 1 yr 4 mos

  • After the merger with Jio, my role expanded, and I am now responsible for the security of Star, Viacom18, JioCinema, and Voot, in addition to Hotstar and ESPNcricinfo
Security Engineering

Disney+ hotstar

Security Engineer

Sep 2021Present · 4 yrs 6 mos · Bengaluru, Karnataka, India

  • Security Engineer I → Security Engineer II → Senior Security Engineer
  • Takes care the security of all public facing services in the landscape of Hotstar and ESPNcricinfo.
  • Started and Manages Hotstar Vulnerability Disclosure Program
  • Lead the Automation pillar and have developed multiple security automation tools over the years as part of Perimeter Security, streamlining vulnerability detection.
  • Leverages CI/CD (GitHub Actions) to automate real-time security scans and implements Shift Left Security by integrating security early in the development lifecycle.
  • Lead and proactively conduct various Red Teaming activities to identify and mitigate security risks across the organization
  • Oversee the security of the Ads component, ensuring a strong AppSec posture
  • Manage security incidents, ensuring quick response and mitigation
  • Performs penetration testing and develops technical solutions to mitigate security vulnerabilities.
  • Conducts security code audits, threat modelling, and design reviews within the SSDLC to identify vulnerabilities before they reach production.
  • Proficient in navigating and operating effectively within the Secure Software Development Life Cycle (SSDLC) environment.
  • 2-Time Rockstar Award Winner (award discontinued)
Security ResearchSecurity Engineering

Firecompass

Red Team Security Researcher

Jul 2020Sep 2021 · 1 yr 2 mos · Bengaluru, Karnataka, India

  • FireCompass - FireCompass is a SaaS platform for Continuous Automated Red Teaming (CART) & Attack Surface Management (ASM). It continuously indexes and monitors the deep, dark & surface web to map out an organization's digital attack surface including Shadow IT blind spots. The platform then automatically launches safe multi-stage attacks, mimicking a real attacker, to help identify attack paths before hackers do.
  • Being in FireCompass I have been actively participating/leading various red teaming activities. Also created many tools over the year which may help the team to automate some of the red teaming recon/exploitation tasks. I also kept myself updated by reading new attack techniques and making a PoC top of it and if possible a tool, so that our product can detect interesting bugs using new attack techniques.
Security ResearchCTF

Team bi0s

Web Security Researcher

Jul 2016Jun 2020 · 3 yrs 11 mos · Quilon Area, India

  • Played CTFs and solved Web category challenges, which were inline with my interest. Regularly wrote security-related blog posts such as CTF writeups, interesting web attacks, reports, bug discovering blogs, etc. Helped the team in organizing international level CTFs.
  • Performed penetration testing on Backdrop CMS, a forked project of Drupal CMS, and received 4 CVEs by reporting them critical vulnerabilities like RCE on the CMS. The testing was done in both White(Code-Review) and Black boxes.
  • Found a critical security bug on Quora while doing bug bounty, the bug impact was Horizontal Privilege escalation.
  • As part of security research I have done multiple things, some interesting ones are:
  • Performed in-depth research on SSRF through Gopher protocols and created an open-source tool named Gopherus, which generates gopher payloads to exploit SSRF vulnerabilities.
  • Created a lazy fuzzer to test all PHP functions and check if they call execve internally, which can be used to bypass PHP disable_functions via LD_PRELOAD.
Security ResearchCTFPenetration TestingWeb Application Security

Education

Amrita Vishwa Vidyapeetham

Bachelor’s Degree — Computer Science

Jan 2016Jan 2020

Resonance Eduventures Limited

IIT-JEE Preparation

Jul 2014Jun 2016

Jawahar Navodaya Vidyalaya - JNV

Schooling

Jan 2009Jan 2014

Stackforce found 100+ more professionals with Security Engineering & Security Research

Explore similar profiles based on matching skills and experience