Rahul Pawar

Software Engineer

Pune, Maharashtra, India7 yrs experience
Highly Stable

Key Highlights

  • 7+ years of experience in cybersecurity.
  • Expert in anomaly detection and malware analysis.
  • Proficient in developing detection systems using AI/ML.
Stackforce AI infers this person is a Cybersecurity expert with strong skills in anomaly detection and malware analysis.

Contact

Skills

Core Skills

Anomaly DetectionCybersecurityMalware AnalysisCyber Threat Hunting

Other Skills

Backend APIsBitbucketCCVEConfluenceData AnalysisElasticsearchGitHub CopilotHTMLHoneypotsIDA ProIDS IPSJavaJiraKibana

About

Cybersecurity professional with 7+ years of experience in anomaly detection, malware analysis, and threat research. At Volkswagen, developed and contributed to anomaly detection systems leveraging RNN architectures (LSTM, GRU, and Transformer), built backend APIs, and created Streamlit-based dashboards. Hands-on experience in analyzing network traffic, system activities, processes, registry, and ports using tools like Procmon, Regshot, and Cport, as well as writing firewall rules. Previously at Quick Heal, specialized in static/dynamic analysis of malware, network traffic, and phishing emails, creating detections and signatures for Windows executables, IDS/IPS (Snort/Suricata), and YARA rules, covering CVEs and zero-day threats. Experienced in deploying honeypots, leveraging SIEM tools for attack chain analysis, and staying ahead of evolving cyber threats through AI/ML, automation, and continuous research.

Experience

7 yrs
Total Experience
5 yrs
Average Tenure
2 yrs
Current Experience

Hcl guvi

Subject Matter Expert

Jun 2025Jul 2025 · 1 mo · Remote

  • Served as a Subject Matter Expert (SME) for a video-based Malware Analysis course, reviewing technical accuracy of reverse engineering demonstrations and malware behavior walkthroughs

Volkswagen group digital solutions [india]

Senior Software Engineer

May 2024Present · 2 yrs · Pune, Maharashtra, India · Hybrid

  • Developed and contributed to anomaly detection systems leveraging RNN architectures (LSTM, GRU, Transformer), building backend APIs and interactive frontend dashboards using Python and Streamlit.
  • Analyzing network traffic to check system activities and connections.
  • Analyzing processes, registry, and ports using Proc-mon, Regshot, and Cport.
  • Analyzing CVEs.
  • Writing firewall rules.
WiresharkProcess MonitorAnomaly DetectionBackend APIsStreamlitCybersecurity

Quick heal

3 roles

Security Researcher II

Promoted

Apr 2022May 2024 · 2 yrs 1 mo

  • Static and dynamic analysis of PE files using various tools like PE studio, IDAPro, xdbg.
  • Mitre att&ck and Cyber kill chain
  • Writing first-line detection signatures for malicious Windows executables.
  • Writing SML detection for Windows executable.
  • Covering CVEs/Zero-day vulnerability
  • Handling Indicators of Compromise used in Zero-day exploits.
  • Spam analysis to block malware at the email level.
PythonReverse EngineeringMalware AnalysisCybersecurity

Security Researcher l

Promoted

Jun 2020Mar 2022 · 1 yr 9 mos

  • Hunting malware from an open-sources like virus total, malware bazaar, MTA, anyrun.
  • Honeypot: Deployed open-source honeypot (TPOT) on digital ocean and analyze its logs using SIEM tools like Elasticsearch, Logstash, and Kibana to get attack chain details.
  • Wrote signatures for IDS/IPS (Snort, Suricata), and YARA rules to block malware at the network layer.
  • Good knowledge of networking(Wire Shark), OS fundamentals, and Spam Propagation.
  • Performed various Brute-Force attacks and captured network traffic for Network-based detection for UTM.
  • Automating tasks in Python for faster results.
SuricataSnortElasticsearchLogstashKibanaCyber Threat Hunting+1

Associate Security Researcher

Apr 2019Jun 2020 · 1 yr 2 mos

  • Malware analysis of non-PE files like Ole, RTF, Pdf, JS, VBScript, PowerShell, LNK, and document files.
  • Writing first-line detection on malware for ongoing threats.
  • Worked on Bulk samples for generic detections.
  • Understanding non-PE file format and using various static analysis tools like Oledump, Pdfdump, HexEditor, and dynamic analysis tools like process hacker, process monitor, and Wireshark for analysis of samples.
  • Classifying non-PE files into malware, PUA, and clean files.
  • Handling False Positive and False Negative customer escalations.
  • Involved in Manual Testing of different Quick Heal Tools.
  • Preparing test reports, test planning, and test case creation.
PythonCyber Threat HuntingMalware AnalysisCybersecurity

Education

Centre for Development of Advanced Computing (C-DAC)

PG DBDA — Big Data Analytics & Machine Learning

Jan 2018Jan 2019

Rajiv Gandhi Prodyogiki Vishwavidyalaya

BE - Bachelor of Engineering — Computer Science Engineering

Jan 2013Jan 2017

Stackforce found 100+ more professionals with Anomaly Detection & Cybersecurity

Explore similar profiles based on matching skills and experience