Ajay Verma

CEO

Delhi, India11 yrs 11 mos experience
Most Likely To Switch

Key Highlights

  • Over 12 years of experience in cybersecurity leadership.
  • Expertise in penetration testing and vulnerability assessments.
  • Proven ability to manage high-performing cybersecurity teams.
Stackforce AI infers this person is a Cybersecurity expert with extensive experience in offensive security and cloud security.

Contact

Skills

Core Skills

Cyber Risk ManagementApplication Security ArchitectureCloud SecurityPenetration TestingThreat AssessmentExploit Development

Other Skills

Network Security ImplementationManaged Security ServicesInformation Security ConsultingVulnerability DisclosureRisk AssessmentRemediationSecurity AssessmentsCompliance AuditsAWS SecuritywizcspmAutomationExploitInformation Security ManagementThreat & Vulnerability Management

About

Senior Manager with more than 12 years of increasing responsibilities in technical leadership, computer technology, business-critical management, Penetration Testing Applications and Network Infra, Comprehensive Security Review & Red Teaming. Expertise in VAPT, WAPT, Red Teaming along with sound networking concepts, TCP/IP protocol, and network security, knowledge of firewall setup and administration, VPN. Proven diagnostic abilities with attention to detail and ability to work effectively in a fast-paced environment. Industry Experience in > Offensive security research, AV/EDR/XDR Bypass and detection > Penetration Testing of Infrastructure Network and servers > Penetration Testing Web/Mobile Application with OWASP standard > Programming for Malware, reverse shell, C&C server etc. > ICS/SCADA and IoT security audit/Penetration testing > DLP security, Malware Analysis, Threat hunting > Compliance Audit PCI DSS > Setting up Infra for Red/Blue Team exercised, Creating vulnerable VM's and monitoring tools. > Comprehensive security review in compliance with OWASP ASVS Knowledge in Tools Commercial Tools : BAS (Cymulate, AttackIQ, SafeBreach) VA (Qualys, Nessus,Tenable) Acunetix, Burp Suite Pro, Wenscan, Netsparker, Cybereason, Cortex, Shodan etc. Open Source Tools : Kali Linux, PentestBox, Metasploit, nmap, OWASP ZAP, etc. Sharing knowledge is way to achieve immortality. I am interested in connecting with the cyber security world to gain and spread knowledge, so feel free if you would like to connect.

Experience

Mobikwik

Senior Manager

Jan 2024Present · 2 yrs 2 mos · On-site

  • As a Senior Manager in Cybersecurity, I lead the planning, execution, and management of cybersecurity initiatives across the organization. My responsibilities include:
  • >Team Leadership & Strategy: Manage a high-performing cybersecurity team and define the organization's security strategy to align with business objectives.
  • >Vulnerability Disclosure & Bug Bounty: Oversee the Vulnerability Disclosure Program (VDP) and Bug Bounty program, managing report triage, risk assessment, and remediation efforts.
  • >Security Assessments & Audits: Conduct regular security assessments (VA, PT, App PT, Infra App) to identify vulnerabilities and ensure compliance with internal policies and industry standards.
  • >Security Audit Support: Provide support for security audits (PCI-DSS, PCI-SSS, CICRA, ISO 27001/27702) to meet cybersecurity compliance requirements.
  • >Security Recommendations: Provide actionable security recommendations for applications, infrastructure, networks, and cloud to strengthen our security posture.
  • >PoC for Security Tools: Lead Proof of Concept (PoC) initiatives to evaluate and integrate new security tools for enhancing security assessments and compliance.
  • >Security Tool Configuration: Hands-on with configuring and optimizing security tools (e.g., WAF) to ensure protection beyond default settings.
  • >Security Training & Awareness: Drive security awareness programs, including phishing simulations and mandatory training to ensure employees are educated on best practices.
  • >Dark/Deep Web Monitoring: Monitor dark and deep web sources to identify and mitigate threats to the organization’s brand, credentials, and sensitive data.
  • >Cross-Department Collaboration: Work with internal teams to conduct Root Cause Analysis (RCA) on security incidents and implement security best practices.
  • >Security Automation: Develop and implement security automation tools to streamline alerting, incident response, and infrastructure protection, ensuring a proactive defense.
Application Security ArchitectureNetwork Security ImplementationManaged Security ServicesCyber Risk ManagementInformation Security Consulting

Bayone solutions

Lead Cyber security Consultant

Sep 2023Jan 2024 · 4 mos · Working as Lead Cyber Security Consultant for HPE (Hewlett Packard Enterprise). · Remote

  • >Security Automation: Developed and implemented automation solutions to streamline security operations and improve response times in cloud environments.
  • >Vulnerability Assessments & Penetration Testing: Led VA and PT efforts within cloud infrastructure using tools like Wiz, proactively identifying and remediating security vulnerabilities.
  • >Cloud Security: Ensured robust security of cloud platforms by integrating automated security tools and reducing risk exposure through continuous monitoring.
  • >Tool Integration & Optimization: Optimized Wiz and other cloud security tools, configuring them for comprehensive security visibility and real-time monitoring.
  • >Incident Response & Remediation: Managed incident response and quickly remediated vulnerabilities identified in VA/PT assessments, coordinating with relevant teams.
  • >Security Best Practices: Developed and enforced cloud security policies and best practices to integrate security into the development and deployment process.
  • >Cross-Functional Collaboration: Collaborated with DevOps, engineering, and operations teams to implement security measures and automate security workflows within CI/CD pipelines.
  • >Threat Intelligence: Applied threat intelligence to enhance security assessments, proactively adapting to emerging threats and improving cloud security posture.
Cloud SecurityAWS SecuritywizcspmPenetration Testing

Virsec

Lead Security Research Engineer

Nov 2021Aug 2023 · 1 yr 9 mos

  • > Writing rules to feed into the Engineer to protect from LOLBIN attacks mapped to MITRE ATT&CK
  • > Setup and assessments creation based on different scenario (MITRE ATT&CK) with different BAS(Breach Attack and Simulations) Tools like Cymulate SafeBreach and opensource.
  • > Working on 0day exploits creating POC findings gaps and solution
  • > Writing different exploits to demonstrate protection capability and gaps
  • > Penetration Testing of different components to find gap and fix
  • > Evaluate different security tools Antivirus/EDR/XDR with automation scripts based on IOCs and behavior
  • > Analyzing and writing different Payloads for OWASP top 10 attacks
ExploitThreat AssessmentInformation Security ManagementThreat & Vulnerability ManagementExploit Development

Paytm

Senior Security Engineer

Aug 2019Nov 2021 · 2 yrs 3 mos

  • > Critical/Scaled infra(servers and networking devices) Vulnerability Assessment/Management with Nessus, tenable(io/sc), Qualys
  • > Public/Private Cloud Penetration Testing with Metasploit, Canvas, custom exploits and payloads
  • > Setup of Malware lab to evaluate/ bypass EDR/XDR tools
  • > Threat hunting setup and configuration of Cortex, Cybereason on endpoints and servers.
  • > Red Teaming with sophisticated attack techniques along with shodan, censys etc.
  • > Security Assessment of Mobile Apps(IOS/Android) manual and automated
  • > SAST of Web, Mobile and other applications with Checkmarx and SonarCube
  • > VA/PT to meet the PCI-DSS compliance Audits (internal/external)
  • > Automation of VA/VM integration with JIRA tickets, DAST tools, DLP and POC of exploits

Vayam technologies ltd.

Security Researcher

Jun 2016Jul 2019 · 3 yrs 1 mo · Working as Security Researcher for MOD (Ministry of Defence).

  • > Creating Sophisticated Red Teaming strategies and executing them to find security Gaps
  • > Penetration Testing/Auditing large and complex infrastructure(network/devices & servers)
  • > Programming for Malware, reverse shell, C&C server etc for POC in a controlled environment.
  • > ICS/SCADA and IoT security audit/Penetration testing
  • > Setting up Infra for Red/Blue Team Security drills/exercises, Creating vulnerable VM's and monitoring tools.
  • > Analyzing and proposing solution for Network/system-based Security threads and exploiting techniques
  • > Automation for threat detection/malware analysis (static and dynamic) with FireEye and other tools.
  • > Encountering and providing training to mitigate sophisticated spear phishing attacks with live POC

Caremytrip and group (sstravelhouse, mughalholiday, thesunnsea,deshvideshtrip)

Security Engineer

Aug 2013Dec 2015 · 2 yrs 4 mos

  • > Web Security Assessment with OWASP Top 10 standard
  • > Automated and manual Web VA with Acunetix, Burpsuite and ZAP
  • > VPS, Hosting server and mail server hardening
  • > Red Teaming, security tools and and framework Development
  • Incidents and security alert monitoring and investigation

Education

Kurukshetra University

Bachelor’s Degree — Computer Science

Jan 2009Jan 2013

JNV

High School — Science with CS

Jan 2002Jan 2008

Stackforce found 100+ more professionals with Cyber Risk Management & Application Security Architecture

Explore similar profiles based on matching skills and experience