Sasikanth K

Associate Consultant

Hyderabad, Telangana, India9 yrs 10 mos experience

Key Highlights

  • Expert in identifying and managing security vulnerabilities.
  • Strong stakeholder management skills.
  • Proficient in using tools like Nessus and Qualys.
Stackforce AI infers this person is a Cybersecurity expert with a focus on vulnerability management and remediation.

Contact

Skills

Core Skills

Vulnerability ManagementCybersecurity

Other Skills

AS400 AdministrationBMC RemedyBlue PrismComputer HardwareCorporate Social ResponsibilityCyberarkFASFDCHallmarkIT Service ManagementInformation SecurityInformation TechnologyLeadershipMainframeMainframes

About

Identifying, evaluating, treating, and reporting on security vulnerabilities in systems and the software. Strong Stakeholder Management.

Experience

Hcltech

Associate Consultant

Sep 2024Present · 1 yr 6 mos

3m

Sr. Analyst - Vulnerability Remediation

Jul 2022Sep 2024 · 2 yrs 2 mos · Bengaluru, Karnataka, India

Lti - larsen & toubro infotech

Senior Consultant - CyberSecurity

Aug 2021Jul 2022 · 11 mos · Hyderabad, Telangana, India

Atos

Associate Consultant

Jan 2016Apr 2021 · 5 yrs 3 mos · Bengaluru Area, India

  • Identifying critical flaws in applications and systems that cyber attackers could exploit.
  • Conducting vulnerability assessments for networks, applications and operating systems.
  • Conducting network security audits and scanning on a predetermined basis.
  • Using automated tools (e.g. Nessus & Qualys) to pinpoint vulnerabilities and reduce time-consuming tasks
  • Manually validating report findings to reduce false positives
  • Compiling and tracking vulnerabilities over time for metrics purposes
  • Writing and presenting a comprehensive Vulnerability Assessment
  • Reviewing and defining requirements for information security solutions
  • Supply hands-on training for network and systems administrators
  • Develop and maintain a vulnerability assessment database
  • Development and management of Vulnerability Assessments processes and procedures
  • Conducting Internal scans after any significant change in the network (such as new system component installations, changes in network topology, firewall rule modifications, product upgrades)
  • Providing inputs to the Vulnerability Remediation Management process include Technology Risk Assessments, Threat Monitoring, and Vulnerability Assessments.
  • Evaluating the relevance of reported vulnerabilities and identify the associated risk to technology assets.
  • Notifying immediately respective stakeholders when there is reason to believe there has been, or imminently will be, impact to the confidentiality, integrity, and/or availability of production system.
  • Identifying an appropriate response to each technical vulnerability based on risk and the alternatives available, response considers the root cause(s) of the vulnerability. The technical vulnerability resolution may, among other things, include: Software Release & Compensating Control.
Vulnerability AssessmentVulnerability ManagementThreat AnalysisThreat AssessmentQualysNessus+1

Education

Dr. B. R. Ambedkar University Delhi (AUD)

Bachelor's degree — Computer and Information Sciences and Support Services

National Institute of Open Schooling

Associate’s Degree — Senior Secondary School Examination

Jan 2009Jan 2010

Gayatri Model School

High School — High School/Secondary Certificate Programs

Jan 2006Jan 2007

Stackforce found 100+ more professionals with Vulnerability Management & Cybersecurity

Explore similar profiles based on matching skills and experience