Chintan Gurjar

CEO

London, England, United Kingdom12 yrs 5 mos experience

Key Highlights

  • Over 13 years of cybersecurity experience.
  • Expert in Cyber Threat Intelligence and Vulnerability Management.
  • Developer of open-source security tools.
Stackforce AI infers this person is a Cybersecurity expert specializing in Threat Intelligence and Vulnerability Management.

Contact

Skills

Core Skills

Cyber Threat Intelligence (cti)Detection EngineeringThreat & Vulnerability ManagementVulnerability AssessmentApplication SecurityCyber Threat Hunting (cth)It Security AssessmentsPenetration Testing

Other Skills

Analytical SkillsCEHChange ManagementCloud SecurityCrowdstrike FalconCyber DefenseCyber-SecurityData SecurityDevSecOpsEndpoint SecurityEthical HackingIncident ResponseInfrastructure SecurityMITREMalware Analysis

About

๐—œ ๐—ฎ๐—ฝ๐—ฝ๐—ฟ๐—ฒ๐—ฐ๐—ถ๐—ฎ๐˜๐—ฒ ๐˜๐—ต๐—ฒ ๐—ฑ๐—ฒ๐—ฑ๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—ผ๐—ณ ๐—ฏ๐˜‚๐˜€๐—ถ๐—ป๐—ฒ๐˜€๐˜€/๐˜€๐—ฎ๐—น๐—ฒ๐˜€/๐—ฎ๐—ฐ๐—ฐ๐—ผ๐˜‚๐—ป๐˜ ๐—ฒ๐˜…๐—ฒ๐—ฐ๐˜‚๐˜๐—ถ๐˜ƒ๐—ฒ๐˜€ ๐—ผ๐—ณ๐—ณ๐—ฒ๐—ฟ๐—ถ๐—ป๐—ด ๐˜€๐—ฒ๐—ฟ๐˜ƒ๐—ถ๐—ฐ๐—ฒ๐˜€/๐˜€๐—ผ๐—น๐˜‚๐˜๐—ถ๐—ผ๐—ป๐˜€ ๐—ผ๐—ฟ ๐—ฐ๐—น๐—ผ๐˜€๐—ฒ๐—ฑ-๐˜€๐—ผ๐˜‚๐—ฟ๐—ฐ๐—ฒ ๐—ฒ๐˜ƒ๐—ฒ๐—ป๐˜๐˜€/๐—ฟ๐—ผ๐˜‚๐—ป๐—ฑ ๐˜๐—ต๐—ฒ ๐˜๐—ฎ๐—ฏ๐—น๐—ฒ ๐—ฑ๐—ถ๐˜€๐—ฐ๐˜‚๐˜€๐˜€๐—ถ๐—ผ๐—ป, ๐—ฝ๐—ฎ๐—ฟ๐˜๐—ป๐—ฒ๐—ฟ ๐—ฒ๐˜ƒ๐—ฒ๐—ป๐˜๐˜€. ๐—”๐˜ ๐˜๐—ต๐—ถ๐˜€ ๐˜๐—ถ๐—บ๐—ฒ, ๐—œ ๐—ฝ๐—ฟ๐—ฒ๐—ณ๐—ฒ๐—ฟ ๐—ป๐—ผ๐˜ ๐˜๐—ผ ๐—ฟ๐—ฒ๐—ฐ๐—ฒ๐—ถ๐˜ƒ๐—ฒ ๐˜‚๐—ป๐˜€๐—ผ๐—น๐—ถ๐—ฐ๐—ถ๐˜๐—ฒ๐—ฑ ๐—ฝ๐—ถ๐˜๐—ฐ๐—ต๐—ฒ๐˜€ ๐—ผ๐—ฟ ๐—ฐ๐—ผ๐—น๐—ฑ ๐—ฒ๐—บ๐—ฎ๐—ถ๐—น๐˜€. ๐—ฅ๐—ฒ๐˜€๐˜ ๐—ฎ๐˜€๐˜€๐˜‚๐—ฟ๐—ฒ๐—ฑ, ๐—ถ๐—ณ ๐—œ ๐—ถ๐—ฑ๐—ฒ๐—ป๐˜๐—ถ๐—ณ๐˜† ๐—ฎ ๐—ฟ๐—ฒ๐—พ๐˜‚๐—ถ๐—ฟ๐—ฒ๐—บ๐—ฒ๐—ป๐˜, ๐—œ ๐˜„๐—ถ๐—น๐—น ๐—ฟ๐—ฒ๐—ฎ๐—ฐ๐—ต ๐—ผ๐˜‚๐˜ ๐˜๐—ผ ๐˜๐—ต๐—ฒ ๐—บ๐—ฎ๐—ฟ๐—ธ๐—ฒ๐˜ ๐—ฎ๐—ป๐—ฑ ๐—ฒ๐—ป๐—ด๐—ฎ๐—ด๐—ฒ ๐˜„๐—ถ๐˜๐—ต ๐˜๐—ต๐—ฒ ๐—ฏ๐—ฒ๐˜€๐˜-๐—ณ๐—ถ๐˜ ๐—ฝ๐—ฎ๐—ฟ๐˜๐—ป๐—ฒ๐—ฟ๐˜€. ๐—ง๐—ต๐—ฎ๐—ป๐—ธ ๐˜†๐—ผ๐˜‚ ๐—ณ๐—ผ๐—ฟ ๐—ฟ๐—ฒ๐˜€๐—ฝ๐—ฒ๐—ฐ๐˜๐—ถ๐—ป๐—ด ๐˜๐—ต๐—ถ๐˜€ ๐—ฎ๐—ฝ๐—ฝ๐—ฟ๐—ผ๐—ฎ๐—ฐ๐—ต ๐—ถ๐˜ ๐—ต๐—ฒ๐—น๐—ฝ๐˜€ ๐—ฐ๐—ฟ๐—ฒ๐—ฎ๐˜๐—ฒ ๐˜€๐—ฝ๐—ฎ๐—ฐ๐—ฒ ๐—ณ๐—ผ๐—ฟ ๐—บ๐—ฒ๐—ฎ๐—ป๐—ถ๐—ป๐—ด๐—ณ๐˜‚๐—น, ๐˜„๐—ฒ๐—น๐—น-๐˜๐—ถ๐—บ๐—ฒ๐—ฑ ๐—ฐ๐—ผ๐—ป๐˜ƒ๐—ฒ๐—ฟ๐˜€๐—ฎ๐˜๐—ถ๐—ผ๐—ป๐˜€. I thrive at the intersection of Cyber Threat Intelligence (CTI), Penetration Testing and Vulnerability Management (VM), backed by over 13 years of experience in cybersecurity. My career is built on combining strategic leadership with hands-on expertise from threat hunting and vulnerability assessments to penetration testing, bug bounty programs, and comprehensive security assessments. This unique blend enables me to transform complex security challenges into actionable, risk-based strategies that bolster business resilience and drive innovation. Key Highlights: Comprehensive Expertise: โ€ข Skilled in CTI, VM, VAPT, penetration testing, and bug bounty program management and hands-on execution. โ€ข Adept at integrating threat intelligence with proactive vulnerability remediation. โ€ข Proven track record of building and maturing security programs across global organizations. โ€ข Experienced in empowering teams, driving cross-functional collaboration, and delivering board-level insights. โ€ข Deep expertise in threat hunting, vulnerability assessments, and leveraging advanced security tools. โ€ข Able to conduct in-depth security assessments that complement my leadership in CTI and VM. Community & Thought Leadership: โ€ข Developer of Frogy 2.0, an open-source attack surface management toolkit. โ€ข EC-Council course author โ€ข Discoverer of critical vulnerabilities (e.g. CVE-2016-7786, CVE-2020-35387) โ€ข Conference workshop facilitator HakCon Norway (2014). Certifications & Continuous Learning: โ€ข Holds advanced credentials including OSCP, CEH, CTIA, CCFA, and CCFH. โ€ข Complements technical expertise with a Masterโ€™s in Computer Security & Forensics. Letโ€™s connect and explore how we can build security solutions that not only defend but also enable business growth.

Experience

Gkn automotive

Cyber Threat Detection Manager

Sep 2025 โ€“ Present ยท 6 mos ยท London Area, United Kingdom

  • As Cyber Threat Detection Manager (UK/Europe), I lead an intelligence-driven program that turns threat intel into practical detections and proactive hunts. I build and tune high-quality rules in SIEM/EDR (aligned to MITRE ATT&CK), investigate suspicious activity, and share clear insights and KPIs with stakeholders. Working with internal teams and vendors, I manage use cases end-to-end and step in during major incidents, continually improving coverage, reducing false positives, and protecting our assets and reputation.
MITRESIEMCyber Threat Hunting (CTH)Cyber Threat Intelligence (CTI)Detection Engineering

Marks and spencer

Threat and Vulnerability Manager

Oct 2023 โ€“ Jun 2025 ยท 1 yr 8 mos ยท Greater London, England, United Kingdom ยท Hybrid

  • Developed and integrated a comprehensive cyber threat intelligence and vulnerability management program for a major retail organization, enhancing incident response, threat detection, and risk remediation. This involved pioneering intelligence processes within the SOC, conducting in-depth threat actor research, and proactively monitoring diverse data sources to alert stakeholders, while also establishing robust vulnerability scanning, risk prioritization, and compliance processes across complex retail and corporate infrastructures.
Problem SolvingCyber Threat Intelligence (CTI)Threat & Vulnerability ManagementAnalytical Skillsthreat huntingChange Management

Tiktok

Global Vulnerability Management Senior Analyst

Nov 2022 โ€“ Sep 2023 ยท 10 mos ยท Greater London, England, United Kingdom ยท Hybrid

  • Served as a senior technical analyst at TikTok, spearheading the design and implementation of robust vulnerability management processes across cloud-native, mobile, and CDN environments. By integrating custom scanning policies, automated workflows, and security testing within CI/CD pipelines, the role ensured early detection and remediation of critical vulnerabilities, while leveraging enriched threat intelligence to drive prioritized patch management and enterprise-wide risk reduction initiatives.
Problem SolvingThreat & Vulnerability ManagementAnalytical SkillsNetwork SecurityVulnerability Assessment

Tesco

Security Engineering Manager

Jan 2021 โ€“ Nov 2022 ยท 1 yr 10 mos ยท Welwyn Garden City, England, United Kingdom ยท Hybrid

  • I led a team managing an end-to-end vulnerability and attack surface program across an expansive retail and digital infrastructureโ€”supporting over global stores and endpoints. Developed robust scanning and remediation processes, including HackerOne bug bounty initiative. Collaborated with SOC, Red-Team functions to enhance detection, drive continuous exposure monitoring, and ensure PCI DSS compliance with zero vulnerability-related audit findings.
Problem SolvingApplication SecurityThreat & Vulnerability ManagementAnalytical SkillsPenetration TestingVulnerability Management+2

Kpmg new zealand

2 roles

Manager - Cyber Security

Promoted

Oct 2018 โ€“ Dec 2020 ยท 2 yrs 2 mos

  • I managed a diverse portfolio of client-focused cybersecurity projects by delivering comprehensive vulnerability management initiatives, ranging from risk-based VM, patch management, and security assessments to penetration testing for global infrastructures, resulting in measurable improvements in security posture and operational efficiency. Simultaneously, led the design and execution of bespoke Cyber Threat Intelligence and threat hunting programs across multiple sectors, leveraging frameworks like MITRE ATT&CK to provide strategic threat assessments, proactive detection, and executive-level insights that drove informed risk-based decisions.
Problem SolvingIT Security AssessmentsCyber Threat Hunting (CTH)Web Application Security AssessmentPenetration TestingManaged Security Services+1

Assistant Manager - Cyber Security

Jul 2017 โ€“ Dec 2020 ยท 3 yrs 5 mos

Secure Code ReviewRed TeamingPenetration TestingPhysical Security

Notsosecure

Security Consultant

Nov 2016 โ€“ Jun 2017 ยท 7 mos ยท Ahmedabad Area, India ยท Remote

  • Conducted web, network penetration testing and red teaming exercises.
Red TeamPenetration TestingInfrastructure Security

Zebpay

Security Engineer

Jun 2016 โ€“ Nov 2016 ยท 5 mos ยท Ahmedabad, Gujarat, India

  • I was responsible for playing the role of a DevSecOps engineer and collaborating closely with the DevOps team to enhance the security of the crypto wallet. My main duties comprised conducting security tests for iOS and Android apps, and imparting training to developers on secure coding best practices.

Safe security

Security Analyst ECS

Sep 2014 โ€“ May 2016 ยท 1 yr 8 mos ยท Greater Ahmedabad Area ยท On-site

  • I am performed various cybersecurity maturity assessments. I have conducted various types of penetration testing including network, web, thick client, and mobile application testing. Additionally, I have conducted physical security reviews for data centers.
Network Security

Indusface

Associate Information Security Consultant

Sep 2014 โ€“ Oct 2014 ยท 1 mo ยท Mumbai Metropolitan Region

Letsnurture pvt ltd.

Security Analyst

Jul 2011 โ€“ Dec 2012 ยท 1 yr 5 mos ยท Greater Ahmedabad Area

  • Performed security testing for in-house web applications and internal infrastructure.

Education

University of Bedfordshire

Master of Science (MSc) | Post Graduate โ€” Computer Security & Forensics

Jan 2012 โ€“ Jan 2014

Gandhinagar Institute of Technology

Bachelor of Engineering (BE) โ€” Computer Engineering

Jan 2008 โ€“ Jan 2011

Stackforce found 100+ more professionals with Cyber Threat Intelligence (cti) & Detection Engineering

Explore similar profiles based on matching skills and experience