Praveen Darshanam

Director of Engineering

Hyderabad, Telangana, India18 yrs 8 mos experience
Most Likely To SwitchHighly Stable

Key Highlights

  • Over 18 years of experience in security.
  • Expert in vulnerability research and malware analysis.
  • Proven track record in cloud and application security.
Stackforce AI infers this person is a Cybersecurity expert specializing in application and cloud security within the Fintech industry.

Contact

Skills

Core Skills

Cloud SecurityApplication SecurityVulnerability ManagementDevsecopsComplianceVulnerability ResearchMalware AnalysisSoftware DevelopmentNetworkingWeb Application SecurityTestingThreat Detection

Other Skills

KubernetesMicroservicesWeb SecurityMobile SecuritySecurity Best PracticesPenetration TestingKubernetes SecuritySecure CodingMicroservices SecurityCI/CDCompliance ProgramsSignature DevelopmentDebuggingDigital SignaturesComputer Forensics

About

Praveen Darshanam has over 18.0 Years of Experience in Application, System and Network Security. Sound understanding of various attack techniques like Buffer Overflows, OWASP Top 10 etc. and their mitigation mechanisms. Found vulnerabilities in Critical Infrastructure (ICS) and Enterprise grade products like Advantech, Samsung, Apple, Adobe, Chrome etc. with multiple CVE's. https://www.linkedin.com/redir/general-malware-page?url=https%3A%2F%2Fwww%2eexploit-db%2ecom%2Fauthor%2F%3Fa%3D2773 https://github.com/praveendhac https://packetstormsecurity.com/search/?q=darshanam Expertise: -- Cloud Security, Kubernetes, Microservices etc. -- Vulnerability Research and Malware Analysis -- Reverse Engineering and Exploit Writing -- Debugging with Windbg, OllyDBG, IDAPro etc. -- Web Application Security, OWASP Top10 -- Traffic Analysis (Anomaly Detection, AppID, Snort Rules) -- Threat Management and Source Code Analysis -- Python, C, Assembly Areas of Interest: Anything bleeding/cutting edge overlapping with Information Security.

Experience

18 yrs 8 mos
Total Experience
2 yrs 3 mos
Average Tenure
6 yrs 5 mos
Current Experience

Zeta suite

2 roles

Director - Product Security

Promoted

Jul 2021Present · 4 yrs 9 mos

  • Zeta (Directi Group) is a FinTech leader offering wide range of digitised solutions for corporates, such as digital employee tax benefits, rewards and recognition and automated cafeteria solutions. Zeta intends to replace many legacy systems in use by banks for processing payments by building large-scale transaction processing systems that can work with many current and future payment networks.
  • Write SOP's, OKR's and KPI's for organization wide Web/Mobile/Cloud Security implementation
  • Own and secure the entire technology stack of Zeta
  • Handling Cloud, Docker Kubernetes Security (EKS).
  • Initiate technical design & product security reviews to ensure product compliance with security best practices and relevant standards
  • Guidance on Hardening Nodes/VMs, Kubernetes security, Cloud Security etc.
  • Decision making on product security, product compliance, architecture reviews etc.
Cloud SecurityKubernetesMicroservicesWeb SecurityMobile SecurityApplication Security

Senior Manager - Product Security

Oct 2019Jun 2021 · 1 yr 8 mos

  • Write SOP's, OKR's and KPI's for organization wide Web/Mobile/Cloud Security implementation
  • Automate Security, Hardware Security Module, Docker etc.
  • Managing enterprise vulnerability program including Code Reviews, Penetration Testing and periodic Vulnerability Assessments. Partner with engineering teams on remediating Vulnerabilities.
  • Collaborate with engineering teams to ensure adherence to secure coding practices and fixing Web/Mobile/Network VAPT findings.
  • Handling Cloud and Kubernetes Security (EKS). Integrated CloudSploit, Trivy in to Continuous Integration (CI)
  • Initiate technical design & product security reviews to ensure product compliance with security best practices and relevant standards
  • Define, track and communicate Security and Privacy metrics to the Business
  • Collaborated with the legal department in review of customers information security, data governance and data privacy agreements for commercial contracts
  • Design and deliver company wide information security trainings
  • Hardware Security Module (HSM) Key management, key plantation etc.
  • Compliances: PCI DSS, PCI 3DS, UPI Payments, ISO 27001, SOC2 etc.
Vulnerability ManagementPenetration TestingCloud SecurityKubernetes Security

Ptc

Senior DevOps Security Engineer (DevSecOps)

Nov 2017Sep 2019 · 1 yr 10 mos · Greater Dublin

  • Securing various PTC products like ThingWorx Internet of Things (IoT) Platform, Vuforia, Windchill etc.
  • Securing Microservices, Kubernetes clusters and applications running in Dockers/Containers
  • Familiar with different Python SDK's like boto3, kubernetes and azure for automation and analysis
  • Azure IAM, AKS, az cli, Azure Policies
  • Terraform, Jenkins, Chef, CI/CD, helm/helmsman, Vault
  • OpenID Connect/OAuth2. Kubernetes-AzureAD integration and RBACs
  • Writing Chef cookbooks for configuration management.
  • Web Application Security using Burp Suite, OWASP ZAP, Veracode, Sonatype etc.
  • Creating Kibana (ELK) dashboards from scratch for Security Analysis
Microservices SecurityKubernetesCI/CDWeb Application SecurityDevSecOpsApplication Security

Zeta suite

Security Architect

Jan 2017Oct 2017 · 9 mos · Bangalore, India

  • Zeta India is a Directi company, an m-commerce player going to disrupt Corporate benefits and mobile payments space. Responsible for overseeing company-wide Security, Compliance, Privacy & data protection program, sales enablement, and enterprise risk management.
  • Interacting with Legal, HR, Dev, DevOps teams, Customers etc
  • Helping Banks, Corporates to on-board using Zeta App, from Security point of view.
  • Web Application Security and Mobile Security Research
  • Handling bug bounty programme
  • API Testing, REST, JSON, Burp Suite, ZAP, nikto, Nessus, Kali OS
  • Developed and implemented compliance program covering SOC 2 Type 2. Scoped, planned and managed PCI DSS and ISO 27001
  • Writing IT & Cyber Security Policies.
  • Amazon VPC, ELB, EC2, Elasticsearch, Logstash, Kibana (ELK) etc.
Web Application SecurityMobile SecurityCompliance ProgramsApplication SecurityCompliance

Versa networks

Technical Lead - Security Research

Oct 2014Jan 2017 · 2 yrs 3 mos · Bangalore, India

  • Vulnerability Research and Malware Analysis, Yara Rules, Sandboxes, Web Application Security, Advanced Evasion Techniques detection, Threat Coverage of recent Vulnerabilities, Suricata IDS/IPS, Python. Shell code detection signatures. NSS Coverage (Signature writing, FP/FN testing, fine tuning signatures to reduce performance issues)
  • Vulnerability Research, Exploit Writing
  • Malware Analysis
  • Web Application Security, OWASP Top10
  • Penetration Testing and Hardening
  • Python (exploit writing, tooling and automation)
  • Tools: IDA Pro, WinDBG, OpenVAS, Nessus, Nexpose/Metasploit, ZAP, Burp Suite, Wireshark
Vulnerability ResearchMalware AnalysisWeb Application Security

Cisco systems

Software Engineer III

Oct 2012Oct 2014 · 2 yrs · Bangalore, India

  • Involved in sustenance work, fixing bugs in different Cisco Products like Cisco's flagship Deep Packet Inspection (DPI) Solution Network Based Application Recognition(NBAR) and Session Aware NETworks (SANET).
  • Worked on Software Defined Networking (SDN) technologies like Opendaylight (ODL) Controller, OpenFlow and Mininet for creating Proof of Concepts.
  • C, Java, Python
  • Tools:
  • Cisco IOS, gdb, Wireshark
Software DevelopmentNetworkingDebugging

Cem solutions pvt. ltd

Security Research

May 2012Sep 2012 · 4 mos

  • Was the first Security Researcher at CEM. Worked on Vulnerability Research and AppID to come up with Signatures to protect/detect/cover various threats at Network level using UTM (Unified Threat Management) appliance.Worked on different Application Security Vulnerabilities like Buffer Overflows and OWASP Top 10 like Cross Site Scripting(XSS), SQL Injection etc.
  • Web Application Security, OWASP Top10
  • Device Hardening
  • Penetration Testing
  • Writing Snort Signatures for P2P, AppID and File Type Detection
  • C
  • Tools:
  • Backtrack, Metasploit, Snort, nmap, nc, hping3, Nessus, WebScarab
Vulnerability ResearchWeb Application Security

Growmind solutions

Information Security Trainer - Freelancer

Aug 2011Aug 2012 · 1 yr

  • Was teaching CEH v7.1 in my free time. Teaching was done out of passion towards Information Security and to educate people from various Attacks, Hacks, Malware etc.
  • Tools:
  • nmap, nc, Backtrack, Metasploit, Snort, hping3, Nessus, WebScarab, Wireless/Wi-Fi Hacking, Cryptography, Malware Analysis, Vulnerability Research, Network/Application/System Security, Wireshark/tcpdump

Adept technology pvt ltd

Information Security Trainer - Freelancer

Aug 2011Aug 2012 · 1 yr

  • Was teaching CEH v7.1 in my free time. Teaching was done out of passion towards Information Security and to educate people from various Attacks, Hacks, Malware etc.
  • Tools:
  • nmap, nc, Backtrack, Metasploit, Snort, hping3, Nessus, WebScarab, Wireless/Wi-Fi Hacking, Cryptography, Malware Analysis, Vulnerability Research, Network/Application/System Security, Wireshark/tcpdump

Mcafee

2 roles

Sr. Software Development Engineer

Nov 2010May 2012 · 1 yr 6 mos · Bangalore, India

  • Development of different features/functionality for McAfee IPS (Intrushield) using C Language on UNIX/LINUX Platform. Used different Inter Process Communication (IPC) concepts, Threads etc.
  • Unit Testing and Integration Testing of developed Code.
  • Socket Programming
  • POSIX Threads
  • Tools:
  • Coverity, CVS, gdb
Software DevelopmentTesting

Security Testing Engineer

Dec 2008Oct 2010 · 1 yr 10 mos · Bangalore, India

  • Worked on coverage of recent threat detection for McAfee IPS (Intrushield). Involved in solving detection issues in McAfee IPS due to evasion for NSS Certification and ICSA Labs Certification. Worked on different Application Security Vulnerabilities like Buffer Overflows, Cross Site Scripting(XSS), SQL Injection etc.
  • Roles Included:
  • IPS Automation using Python/Perl
  • Exploit Writing (Debugging with Ollydbg,Windbg etc.)
  • Threat Coverage Testing for IPS
  • Testing for NSS/ICSA Certifications
  • False Positive and False Negative Testing
  • Snort IDS Configuration and Rule Writing
  • Tools:
  • Metasploit, CoreImpact, OllyDBG, WinDBG, tcpreplay/tcpdump, tomahawk, nmap, hping, Wireshark etc.,
Threat DetectionTesting

Ipolicy networks

Security Research (Vulnerability & Malware)

Mar 2007Nov 2008 · 1 yr 8 mos · Noida, Uttar Pradesh, India

  • Worked as Vulnerability Researcher and Malware Analyst developing Signatures/Filters for iPolicy IPF (Intrusion Prevention Firewall), a UTM appliance. Involved in researching various Vulnerabilities and Malware to come up with protection mechanisms. Worked on different Application Security Vulnerabilities like Buffer Overflows, Cross Site Scripting(XSS), SQL Injection etc.
  • Roles included:
  • Vulnerability Research
  • Malware Analysis(dynamic)
  • Security Advisory write-ups
  • Web Application Signatures, OWASP Top10
  • Snort IDS/IPS and Protocol Anomaly Detection Signatures
  • Knowledge of Penetration Testing.
  • Tools:
  • nmap, nc, Metasploit, SAINT, Blade Karalon, Wireshark
Vulnerability ResearchMalware Analysis

Education

National Institute of Technology, Kurukshetra, Haryana

Bachelor of Technology (B.Tech) — Electrical Engineering

Jan 1999Jan 2003

Delhi College of Engineering

Master of Engineering (M.Tech/ ME/ MS) — Control and Instrumentation

Jan 2004Jan 2006

Bishop Beretta High School, Hanamkonda, Warangal

Stackforce found 100+ more professionals with Cloud Security & Application Security

Explore similar profiles based on matching skills and experience