Alex Devassy

Product Manager

Bengaluru, Karnataka, India8 yrs 1 mo experience
Highly StableAI Enabled

Key Highlights

  • Over 7 years of experience in offensive security.
  • Expert in automating penetration testing workflows.
  • Public speaker at multiple international cybersecurity conferences.
Stackforce AI infers this person is a Cybersecurity expert specializing in offensive security and blockchain technologies.

Contact

Skills

Core Skills

Vulnerability ManagementScaPenetration TestingBlockchain SecurityAppsec

Other Skills

AI SecurityAzure serverless functionsBlockchainBurp SuiteCC++Cascading Style Sheets (CSS)CybersecurityData StructuresDatabase Management System (DBMS)DockerEthereumHTMLHerokuHyperledger Fabric

About

Cybersecurity engineer with over 7 years of experience in offensive security, spanning both consulting and product security. Skilled in penetration testing, vulnerability management, software composition analysis (SCA), DevSecOps, and cybersecurity training. I have a strong background in conducting security assessments across diverse environments, specializing in penetration testing of Web Applications, Networks, Mobile, SAP, Blockchain, AI, and Thick Client applications. My expertise also includes automating penetration testing workflows using AI Agents, Burp APIs, Azure Serverless modules, PowerShell, Node.js, Docker, Python, etc. 🎤 Public Speaking & Knowledge Sharing 1️⃣ 🇮🇳 OWASP AppSec Days Bangalore 2025 — “Unveiling the Risks of MCP Servers: An In-Depth Exploration” 🔗 Link: https://owaspappsecdaysbangaloreoct.sched.com/event/28Z5G/unveiling-the-risks-of-mcp-servers-an-in-depth-exploration 2️⃣ 🇸🇬 OWASP AppSec Days Singapore 2024 — “The Dark Side of AI: Exploring Adversarial Threats” 🔗 Link: https://owaspappsecdayssingapore202.sched.com/event/1ir3T/the-dark-side-of-ai-exploring-adversarial-threats 3️⃣ 🇮🇪 Security BSides Dublin 2024 — “Into The Abyss: Adversarial Tactics In AI Security” 🔗 Link: https://www.bsidesdub.ie/speakers.php 4️⃣ 🇩🇪 Nullcon Berlin 2024 — “Into The Abyss: Adversarial Tactics In AI Security” 🔗 Link: https://nullcon.net/berlin-2024/speaker-into-the-abyss-adversarial-tactics-in-ai-security 5️⃣ 🇮🇳 Seasides Infosec Conference 2023 — “Primer into SAP Penetration Testing & OWASP SAPKiln” 🔗 Link: https://www.bugbountyvillage.com/speakers 6️⃣ 🇮🇳 c0c0n 15th Edition (2022) — “Hyperledger Fabric & Ethereum Apps: Security Deep Dive” 🔗 Link: https://india.c0c0n.org/2022/agenda 7️⃣ 🇹🇳 OWASP Tunisia Chapter (2020) — “Blockchain Security” 🎥 Watch on YouTube: https://www.youtube.com/watch?v=fRQrJttI5vI 8️⃣ 🇮🇳 OWASP Kerala Chapter (2020) — “Pen Testing Blockchain Solutions (Ethereum Nodes & Smart Contracts)” 🎥 Watch on YouTube: https://www.youtube.com/watch?v=ahZ_V6qdBjQ Other achievements include co-authoring the chapter "Safeguarding Blockchains from Adversarial Tactics" in the book "Blockchain for Industry 4.0: Emergence, Challenges, and Opportunities.", winning team at IIT Delhi, Open Innovation Blockchain Hackathon, conducted by Best of Block Inc (http://mdniche.in/viewClipping/234269ce-7d99-4a04-865d-1a520988d59f)

Experience

Sap

Product Security Specialist

May 2025Present · 10 mos · Bengaluru, Karnataka, India · Hybrid

Appviewx

Senior Security Engineer

Dec 2023May 2025 · 1 yr 5 mos · Coimbatore, Tamil Nadu, India · Hybrid

  • ● Leading vulnerability management & SCA teams, responsible for ensuring the product is free from security risks associated with the software supply chain, and end-of-life components, reviewing user stories, and ensuring security controls are implemented in them.
  • ● Automate the end to end vulnerability management process via Jenkins pipelines such that vulnerability scan/component upgrade recommendations can be generated ondemand with minimum effort.
  • ● Evaluating compliance of new as well as existing components (images/libraries/binaries etc) being added to the product. Compliance evaluation also includes generating SBOMs(maven, CycloneDX), and evaluating their vulnerability posture, operational risk, and license compatibility with the product.
  • ● Hands-on experience with Docker and Kubernetes (K8s & K3s) from both security and developer perspectives.
  • ● Responsible for conducting compliance scans (CIS) of OVAs, and Kubernetes clusters using various tools including Rapid7, trivy, kubebench, Nessus, CISCAT, etc.
  • ● Triaging critical supply chain vulnerabilities such as the xz supply chain incident (2024), leaked access tokens from Python, PyPI’s (2024).
vulnerability managementSCADockerKubernetescompliance evaluationautomation

Ey

3 roles

Senior Security Consultant

Promoted

Sep 2022Dec 2023 · 1 yr 3 mos

  • ● Proficient in engaging with clients to propose and execute penetration testing assessments, involving the preparation of proposal decks/RFPs, effort estimation, resource allocation, and scoping.
  • ● Served as a Subject Matter Expert, providing guidance and support to the penetration testing team, ensuring Quality Assurance for application security assessments.
  • ● Collaborated with stakeholders across diverse sectors, including Life Sciences, Manufacturing, Banking, Insurance, etc., spanning regions such as APAC, EMEIA, and the Americas.
  • ● Led blockchain security assessments and audits for public, private, and proprietary blockchain platforms.
  • ● Spearheaded the identification of automation opportunities, guiding the development team in implementing identified automation scenarios.
  • ● Utilized Azure serverless functions to fulfill on-demand user requirements related to various aspects of penetration testing.
  • ● Conducted in-house training sessions on penetration testing and blockchain security assessments, contributing to the development and mentoring of new talent.
penetration testingblockchain securityAzure serverless functionstraining

Security Analyst

Jun 2018Aug 2022 · 4 yrs 2 mos

  • ● Conducted penetration testing for a range of web applications, encompassing Single Sign-On (SSO) and Kerberos integrated apps, API's, thick clients (including Electron JS applications), network assessments (internal and external), SAP applications, Salesforce, and iOS applications.
  • ● Generated comprehensive penetration testing reports.
  • ● Engaged actively in online security platforms, notably Hack The Box (HTB).
  • ● Developed internal automations, including scripts and GUIs, to streamline various activities related to penetration testing.
  • ● Conducted extensive research on performing blockchain security assessments using a combination of open-source and proprietary tools
penetration testingreport generationresearchautomationAppSec

IoT Security Intern

Dec 2017Apr 2018 · 4 mos · Thiruvananthapuram, Kerala, India

  • ● Engineered a Proof of Concept (POC) for a decentralized power grid utilizing Hyperledger Fabric. The project drew inspiration from the innovative solutions presented at https://www.brooklyn.energy.
Proof of ConceptHyperledger Fabric

Kerala blockchain academy

Core-Member

Jan 2018Jan 2019 · 1 yr · India

  • ● Contributed as a member of the victorious team during the IIT Delhi Open Innovation Blockchain Hackathon organized by Best of Block Inc (http://mdniche.in/viewClipping/234269ce-7d99-4a04-865d-1a520988d59f).
blockchain hackathonteam collaboration

Ust global

Blockchain Intern

Aug 2017Dec 2017 · 4 mos · Techno park Trivandram

  • ● Created a Proof of Concept (POC) for smart locks that were governed by smart contracts deployed on the Ethereum blockchain, drawing inspiration from the insights shared on https://blog.slock.it/.
Proof of Conceptsmart contractsEthereum

Education

Indian Institute of Information Technology and Management-Kerala(IIITM-K)

Master of Science — Computer Science with specialization in Cyber Security

Jan 2016Jan 2018

ST. THOMAS COLLEGE, THRISSUR

BSc Computer Science — Computer Science

Jan 2013Jan 2015

Stackforce found 100+ more professionals with Vulnerability Management & Sca

Explore similar profiles based on matching skills and experience