Deep Yadav

Consultant

Mumbai, Maharashtra, India9 yrs experience
Most Likely To SwitchHighly Stable

Key Highlights

  • 7+ years of experience in Cyber Security.
  • Expert in Application Security and Vulnerability Management.
  • Proficient in conducting security assessments across various platforms.
Stackforce AI infers this person is a Cyber Security Specialist with expertise in application and network security across diverse industries.

Contact

Skills

Core Skills

Application SecurityVulnerability Management

Other Skills

AWSAcunetixAmazon Web Services (AWS)Burp SuiteC++CSSCloud SecurityCode ReviewComputer ScienceComputer SecurityConsultingCyber-securityCybersecurityFreelancingHTML

About

Experienced Senior Cyber Security Consultant with a demonstrated history of working in the computer and network security industry including BFSI, security services, educational institutes, E-commerce etc. A bug hunter with a strong IT professional background and a computer science graduate. • 7+ years of working experience in Cyber Security. • Application Security (Web, Mobile, Thick Client) • Web Services Security/API's • Network Security & Infrastructure Audit with CIS Benchmark • Source Code Review • Vulnerability and Threat Management • Threat Modeling / Architecture Review (SDLC) • Vendor Risk Assessment/Risk management • Software Composition Analysis Deep is always interested to hear from colleagues, managers or interesting creative folk, so feel free to contact if you’d like to connect.

Experience

Aujas cybersecurity

2 roles

Senior Consultant

Jul 2023Present · 2 yrs 8 mos · Mumbai, Maharashtra, India

  • Working for an International client and a part of their Cyber Security global team. Responsible for performing security assessment of web application, mobile application, web service and thick client application, source code review, static code analysis. Prepared documents like check list, process related task. Help client with their tools and process and how to improve them on a regular basis to save time for the whole team. Conduct interview for the candidate.
  • Skills: Secure Code Review · Code Review · SCA · software composition analysis · client management ·people management
Secure Code ReviewCode ReviewSCAsoftware composition analysisclient managementpeople management+2

Consultant

Jun 2021Present · 4 yrs 9 mos · Mumbai, Maharashtra, India

  • Working for an International client and a part of their Cyber Security global team. Responsible for performing security assessment of web application, mobile application, web service and thick client application, source code review, static code analysis. Prepared documents like check list, process related task. Help client with their tools and process and how to improve them on a regular basis to save time for the whole team.

Network intelligence

2 roles

Cyber Security Specialist

Promoted

Oct 2019Jun 2021 · 1 yr 8 mos · Mumbai Area, India

  • Responsible for performing security assessment of web application, mobile application, web service and thick client application, source code review, VACA of OS, DB, servers and devices. Manage a team at client side.

Sr. Cyber Security Analyst

Jul 2018Sep 2019 · 1 yr 2 mos · Mumbai Area, India

  • Responsible for performing security assessment of web application, mobile application, web service and thick client application, source code review, VACA of OS, DB, servers and devices.

Confidential

Information Security Consultant

Jan 2017Jun 2018 · 1 yr 5 mos

  • Responsible for performing VAPT of web applications, mobile, web service applications. Also performed Network VA and configuration audit of OS, DBs, network devices etc.

Ctg security solutions®️

Freelancer Information Security Consultant

Jan 2016Jan 2017 · 1 yr

  • Conduct vulnerability assessment and penetration testing and configuring review for network, web applications.
  • Ensure timely delivery of status updates and final reports to client.
  • Keep oneself updated on the latest IT Security news, exploits, etc.
  • Contribute technical content, blog posts.
  • Performing penetration attempts both manually and with the aid of tools.
  • Compilation of a detailed report enumerating the findings and remediation’s.
  • Port and vulnerability scanning of the given IP range or devices.
  • Finger printing each device through banner grabbing, OS and service identification using various tools.
  • Ensure timely delivery of status updates and final reports to client.

Education

Medi-Caps Institute of Technology & Management Rau, Indore

Bachelor’s Degree — Computer Science

Jan 2012Jan 2016

Kendriya Vidyalaya, Ujjain

Higher secondary

Jan 2010Jan 2012

Natraj Public School, Ujjain

High School — All subjects

Jan 2006Jan 2010

Stackforce found 100+ more professionals with Application Security & Vulnerability Management

Explore similar profiles based on matching skills and experience