Dinesh Jain

DevOps Manager

Ireland14 yrs 6 mos experience
Highly Stable

Key Highlights

  • 15 years of experience in application security.
  • Expert in threat modeling and secure SDLC practices.
  • Proven track record in mentoring and training teams.
Stackforce AI infers this person is a seasoned Application Security Engineer with expertise in DevSecOps and secure software development practices.

Contact

Skills

Core Skills

Application SecurityThreat ModelingAgile MethodologiesSecure SdlcInformation SecurityVulnerability Assessment

Other Skills

.NET.NET FrameworkAWS Security AssessmentsAgile Development PipelinesAmazon Web Services (AWS)Application Security AssessmentsApplication Security ReviewsApplication Security programsAutomated security testing workflowsBurp SuiteC#C++CloudCybersecurityDAST

About

Application Security Engineer/Team lead/Manager with 15 years of experience in Application Security Engineer | Threat Modeling | Secure SDLC | Secure Code Review | DevSecOps | Security Automation | Secure Architecture and mentoring teams | Semgrep rule development

Experience

Amazon

Appsec Specalist

Dec 2022Jul 2025 · 2 yrs 7 mos · London, England, United Kingdom · Hybrid

  • Key Responsibilities:
  • Application Security Reviews for critical applications across all phases of SDLC.
  • Threat Modeling & Secure Design Reviews (STRIDE).
  • AWS Security Assessments & Configuration Reviews
  • Secure Code Review (Manual & Automated) using Semgrep, Checkmarx, Fortify
  • Business Logic Testing & Security Testing.
  • Dynamic Application Security Testing (DAST) using Burp Suite, ZAP, AppScan.
  • Additional Contributions:
  • Standardized security testing methodologies for secure SDLC.
  • Developed & standardized security report templates for assessments.
  • Mentored & trained new hires on application security best practices.
  • Technical Interview Panelist for hiring AppSec engineers.
  • Automated AppSec processes using Python, Bash scripting.
  • Created & maintained Semgrep security rules for secure code reviews.
Application Security ReviewsThreat ModelingAWS Security AssessmentsSecure Code ReviewDynamic Application Security TestingApplication Security

Ernst & young

Manager

Mar 2019Dec 2022 · 3 yrs 9 mos · India · Hybrid

  • Led Application Security programs for global clients.
  • Performed Dynamic Application Security Testing (DAST) and Secure Code Reviews.
  • Developed Threat Models & Secure Architecture Designs for applications.
  • Integrated Security Testing into Agile Development Pipelines.
  • Implemented Automation for Security Testing using scripting.
Application Security programsDynamic Application Security TestingSecure Code ReviewsThreat ModelsAgile Development PipelinesApplication Security+1

Cognizant

3 roles

Senior Security Consultant

Apr 2016Feb 2018 · 1 yr 10 mos

  • Key Responsibilities:
  • Performed Secure Code Reviews & Application Security Assessments.
  • Implemented Secure SDLC practices across development teams.
  • Developed Threat Models for enterprise applications.
  • Automated security testing workflows for DevSecOps pipelines.
Secure Code ReviewsApplication Security AssessmentsSecure SDLC practicesThreat ModelsAutomated security testing workflowsApplication Security+1

Senior Consultant

Feb 2014Aug 2018 · 4 yrs 6 mos

Senior Security Consultant

Feb 2014Jan 2016 · 1 yr 11 mos

  • Key Responsibilities:
  • Performed Secure Code Reviews & Application Security Assessments.
  • Implemented Secure SDLC practices across development teams.
  • Developed Threat Models for enterprise applications.
  • Automated security testing workflows for DevSecOps pipelines.
Secure Code ReviewsApplication Security AssessmentsSecure SDLC practicesThreat ModelsAutomated security testing workflowsApplication Security+1

Tata consultancy services

IT Analyst

Apr 2012Jan 2014 · 1 yr 9 mos

  • The security assessment provides a comprehensive security review of application and infrastructure components. The application will undergo a technical and non-technical review. Together these security reviews aim to provide a complete risk picture of the solution/application. Top ten OWSAP vulnerability is checked and assessment is done based on the report to fix. A Vulnerability Scanning tool simulates some of the behavior of an attacker to determine whether vulnerabilities or exposures exist on the serve.
  • Responsibilities:
  •  Manual walkthrough of the application to understand the application functionality
  •  Prepared high risk transactions and functionality matrix
  •  Prepared Risk assessment report and shared with the customer
  •  Identified risk parameters and gathered information specific to parameters
  •  Performed Vulnerability Assessment by using HP web inspect
  •  Analyze the Vulnerability assessment reports
  •  Performing the manual security testing by using Burp Suite Proxy, Paros Proxy to identify False Positives
  •  Prepared comprehensive security report detailing identifications and recommendations for the Vulnerabilities
Security assessmentVulnerability AssessmentRisk assessment reportManual security testingInformation Security

Accenture

software developer

May 2010Apr 2012 · 1 yr 11 mos

  • # Project Name: Wellpoint Security Assessment
  • Tools : SQL Map,Soap UI and Burp Suite proxy,
  • Job Role : Security Consultant
  • Duration : Aug 2010 – Mar 2012
  • Company : Accenture
  • Description:
  • The security assessment provides a comprehensive security review of application and infrastructure components. The application will undergo a technical and non-technical review. Together these security reviews aim to provide a complete risk picture of the solution/application. Top ten OWSAP vulnerability is checked and assessment is done based on the report to fix. A Vulnerability Scanning tool simulates some of the behavior of an attacker to determine whether vulnerabilities or exposures exist on the serve.
  • Responsibilities:
  •  Manual walkthrough of the application to understand the application functionality
  •  Prepared high risk transactions and functionality matrix
  •  Prepared Risk assessment report and shared with the customer
  •  Identified risk parameters and gathered information specific to parameters
  •  Performed Vulnerability Assessment by using HP web inspect
  •  Analyze the Vulnerability assessment reports
  •  Performing the manual security testing by using Burp Suite Proxy
  •  Prepared comprehensive security report detailing identifications and recommendations for the Vulnerabilities
Security reviewVulnerability AssessmentRisk assessment reportManual security testingInformation Security

Education

KCG College of Technology

Bachelor of Engineering (BEng)

Jan 2001Jan 2005

st johns matriculation

Higher secondary school — science

Jan 2000Jan 2001

Stackforce found 100+ more professionals with Application Security & Threat Modeling

Explore similar profiles based on matching skills and experience