V

Vivek Bhatt

DevOps Engineer

Greater Delhi, Delhi, India1 yr 2 mos experience

Key Highlights

  • Certified eJPT with hands-on VAPT experience
  • Expertise in OWASP Top 10 and CVSS scoring
  • Published content on offensive security methodologies
Stackforce AI infers this person is a Cybersecurity Specialist focused on Penetration Testing and Vulnerability Assessment.

Contact

Skills

Core Skills

Penetration TestingVulnerability AssessmentApplication Security

Other Skills

Burp SuiteOWASP ZAPNmapRustScanSubfinderhttpxNiktoNucleiSQLMapOpenVASPostmanMobSFCorelliumWiresharktcpdump

About

Iโ€™m an ๐—ข๐—ณ๐—ณ๐—ฒ๐—ป๐˜€๐—ถ๐˜ƒ๐—ฒ ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—ฃ๐—ฟ๐—ผ๐—ณ๐—ฒ๐˜€๐˜€๐—ถ๐—ผ๐—ป๐—ฎ๐—น and ๐—ฃ๐—ฒ๐—ป๐—ฒ๐˜๐—ฟ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—ง๐—ฒ๐˜€๐˜๐—ฒ๐—ฟ with ๐Ÿญ.๐Ÿฑ+ ๐˜†๐—ฒ๐—ฎ๐—ฟ๐˜€ of hands-on experience conducting ๐—ฐ๐—ผ๐—บ๐—ฝ๐—ฟ๐—ฒ๐—ต๐—ฒ๐—ป๐˜€๐—ถ๐˜ƒ๐—ฒ ๐—ฉ๐˜‚๐—น๐—ป๐—ฒ๐—ฟ๐—ฎ๐—ฏ๐—ถ๐—น๐—ถ๐˜๐˜† ๐—”๐˜€๐˜€๐—ฒ๐˜€๐˜€๐—บ๐—ฒ๐—ป๐˜ ๐—ฎ๐—ป๐—ฑ ๐—ฃ๐—ฒ๐—ป๐—ฒ๐˜๐—ฟ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—ง๐—ฒ๐˜€๐˜๐—ถ๐—ป๐—ด (๐—ฉ๐—”๐—ฃ๐—ง) ๐—ฎ๐—ฐ๐—ฟ๐—ผ๐˜€๐˜€ ๐˜„๐—ฒ๐—ฏ ๐—ฎ๐—ฝ๐—ฝ๐—น๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป๐˜€, ๐—”๐—ฃ๐—œ๐˜€, ๐—บ๐—ผ๐—ฏ๐—ถ๐—น๐—ฒ, ๐—ฎ๐—ป๐—ฑ ๐—ป๐—ฒ๐˜๐˜„๐—ผ๐—ฟ๐—ธ ๐—ฒ๐—ป๐˜ƒ๐—ถ๐—ฟ๐—ผ๐—ป๐—บ๐—ฒ๐—ป๐˜๐˜€. My approach is guided by structured ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—”๐˜€๐˜€๐—ฒ๐˜€๐˜€๐—บ๐—ฒ๐—ป๐˜ ๐— ๐—ฒ๐˜๐—ต๐—ผ๐—ฑ๐—ผ๐—น๐—ผ๐—ด๐—ถ๐—ฒ๐˜€, focusing on identifying, exploiting, and remediating real-world vulnerabilities through ๐—ช๐—ฒ๐—ฏ ๐—”๐—ฝ๐—ฝ๐—น๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—ง๐—ฒ๐˜€๐˜๐—ถ๐—ป๐—ด, ๐—›๐—ผ๐˜€๐˜-๐—•๐—ฎ๐˜€๐—ฒ๐—ฑ & ๐—ก๐—ฒ๐˜๐˜„๐—ผ๐—ฟ๐—ธ ๐—œ๐—ป๐—ณ๐—ฟ๐—ฎ๐˜€๐˜๐—ฟ๐˜‚๐—ฐ๐˜๐˜‚๐—ฟ๐—ฒ ๐—ฃ๐—ฒ๐—ป๐—ฒ๐˜๐—ฟ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—ง๐—ฒ๐˜€๐˜๐—ถ๐—ป๐—ด, ๐—ฎ๐—ป๐—ฑ ๐—›๐—ผ๐˜€๐˜ & ๐—ก๐—ฒ๐˜๐˜„๐—ผ๐—ฟ๐—ธ ๐—–๐—ผ๐—ป๐—ณ๐—ถ๐—ด๐˜‚๐—ฟ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—”๐˜‚๐—ฑ๐—ถ๐˜๐—ถ๐—ป๐—ด. I follow globally recognized frameworks including ๐—ข๐—ช๐—”๐—ฆ๐—ฃ ๐—ง๐—ผ๐—ฝ ๐Ÿญ๐Ÿฌ, ๐—–๐—ช๐—˜ ๐—ง๐—ผ๐—ฝ ๐Ÿฎ๐Ÿฑ, ๐—ฎ๐—ป๐—ฑ ๐—–๐—ฉ๐—ฆ๐—ฆ ๐˜ƒ๐Ÿฏ.๐Ÿญ ๐˜€๐—ฐ๐—ผ๐—ฟ๐—ถ๐—ป๐—ด, ensuring every finding is validated, reproducible, and risk-prioritized for accurate reporting and remediation. ๐—–๐—ฒ๐—ฟ๐˜๐—ถ๐—ณ๐—ถ๐—ฒ๐—ฑ ๐—ฒ๐—๐—ฃ๐—ง (๐—œ๐—ก๐—˜ ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜†) and currently pursuing ๐—–๐—˜๐—› ๐˜ƒ๐Ÿญ๐Ÿฏ, I combine ๐—บ๐—ฎ๐—ป๐˜‚๐—ฎ๐—น ๐—ฒ๐˜…๐—ฝ๐—น๐—ผ๐—ถ๐˜๐—ฎ๐˜๐—ถ๐—ผ๐—ป with ๐—ฎ๐˜‚๐˜๐—ผ๐—บ๐—ฎ๐˜๐—ฒ๐—ฑ ๐—ฟ๐—ฒ๐—ฐ๐—ผ๐—ป๐—ป๐—ฎ๐—ถ๐˜€๐˜€๐—ฎ๐—ป๐—ฐ๐—ฒ to simulate ๐—ฟ๐—ฒ๐—ฎ๐—น-๐˜„๐—ผ๐—ฟ๐—น๐—ฑ ๐—ฎ๐˜๐˜๐—ฎ๐—ฐ๐—ธ ๐—ฐ๐—ต๐—ฎ๐—ถ๐—ป๐˜€ โ€” from ๐—ฟ๐—ฒ๐—ฐ๐—ผ๐—ป๐—ป๐—ฎ๐—ถ๐˜€๐˜€๐—ฎ๐—ป๐—ฐ๐—ฒ to ๐—ฝ๐—ฟ๐—ถ๐˜ƒ๐—ถ๐—น๐—ฒ๐—ด๐—ฒ ๐—ฒ๐˜€๐—ฐ๐—ฎ๐—น๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—ฎ๐—ป๐—ฑ ๐—ฝ๐—ผ๐˜€๐˜-๐—ฒ๐˜…๐—ฝ๐—น๐—ผ๐—ถ๐˜๐—ฎ๐˜๐—ถ๐—ผ๐—ป. My toolkit includes ๐—•๐˜‚๐—ฟ๐—ฝ ๐—ฆ๐˜‚๐—ถ๐˜๐—ฒ, ๐—ก๐—บ๐—ฎ๐—ฝ, ๐— ๐—ฒ๐˜๐—ฎ๐˜€๐—ฝ๐—น๐—ผ๐—ถ๐˜, ๐—ฆ๐—ค๐—Ÿ๐— ๐—ฎ๐—ฝ, ๐—ข๐—ช๐—”๐—ฆ๐—ฃ ๐—ญ๐—”๐—ฃ, ๐—™๐—™๐—จ๐—™, ๐—ฃ๐—ผ๐˜€๐˜๐—บ๐—ฎ๐—ป, ๐—ฎ๐—ป๐—ฑ ๐— ๐—ผ๐—ฏ๐—ฆ๐—™, primarily operating in ๐—ž๐—ฎ๐—น๐—ถ ๐—Ÿ๐—ถ๐—ป๐˜‚๐˜…, ๐—ฃ๐—ฎ๐—ฟ๐—ฟ๐—ผ๐˜ ๐—ข๐—ฆ, ๐—ฎ๐—ป๐—ฑ ๐—ช๐—ถ๐—ป๐—ฑ๐—ผ๐˜„๐˜€ ๐—ฒ๐—ป๐˜ƒ๐—ถ๐—ฟ๐—ผ๐—ป๐—บ๐—ฒ๐—ป๐˜๐˜€. ๐Ÿ”น ๐—–๐—ผ๐—ฟ๐—ฒ ๐—–๐—ผ๐—บ๐—ฝ๐—ฒ๐˜๐—ฒ๐—ป๐—ฐ๐—ถ๐—ฒ๐˜€: Web, API, Host & Network Penetration Testing | VAPT | Security Assessment Methodologies | OWASP Top 10 | CVSS/CWE-Based Reporting | Exploitation & Privilege Escalation | Vulnerability Analysis | Red Teaming | Python & Bash Automation

Experience

1 yr 2 mos
Total Experience
1 yr 2 mos
Average Tenure
1 yr 2 mos
Current Experience

Medium

Self Blog(Offensive Security Researcher & Writer)

Mar 2025 โ€“ Present ยท 1 yr 1 mo ยท Remote

  • Publish educational content and tool walkthroughs focused on ethical offensive security, web and API testing, and vulnerability awareness. Contribute to the cybersecurity community by translating complex attack methodologies into practical learning material for professionals and students.
  • Researched and authored detailed articles on tools like Burp Suite, Nmap, FFUF, httpx, Nikto, Nuclei, and MobSF, explaining their setup, usage, and integration in penetration testing workflows.
  • Created content around OWASP Top 10 and CWE Top 25 vulnerabilities, providing real-world examples, lab demonstrations, and mitigation insights.
  • Designed step-by-step tool walkthroughs to help readers understand manual exploitation, input validation testing, and enumeration logic in web and API environments.
  • Analyzed vulnerabilities and misconfigurations from a researcherโ€™s perspective to explain root causes and demonstrate secure coding practices.
  • Simplified advanced topics such as API abuse, insecure deserialization, and mobile security testing into accessible, beginner-friendly tutorials.
  • Maintained ethical and educational integrity in all publications, ensuring no client or confidential data was exposed.
  • Promoted community learning by documenting real testing approaches and automation ideas to improve workflow efficiency.
Burp SuiteNmapFFUFhttpxNiktoNuclei+2

Startup

2 roles

Penetration Tester (VAPT | Web, API, Network & Mobile Application Security)

Feb 2025 โ€“ Present ยท 1 yr 2 mos ยท Remote

  • Perform end-to-end Vulnerability Assessment and Penetration Testing (VAPT) across web apps, APIs, mobile apps, and network infrastructures, combining manual exploitation and automated scanning to identify and validate security weaknesses.
  • Executed black-box and gray-box assessments using Burp Suite (Community), OWASP ZAP, Nmap, RustScan, and Subfinder to map exposed assets and services, improving reconnaissance accuracy.
  • Leveraged Nmap (NSE) and OpenVAS for port scanning, service fingerprinting, and vulnerability detection, reducing false positives through manual verification.
  • Fingerprinted technologies using httpx, WhatWeb, and Wappalyzer to identify outdated components and misconfigurations for risk-based prioritization.
  • Conducted API testing via Postman and Burp Suite, identifying authorization and input validation flaws that improved API resilience.
  • Executed web vulnerability checks using Nikto, Nuclei, and SQLMap, validating exploitable issues aligned with OWASP Top 10 and CWE Top 25.
  • Performed static and dynamic mobile app testing using MobSF, Corellium, JADX, and APKTool to detect insecure storage and SSL misconfigurations.
  • Analyzed network traffic and DNS behavior using Wireshark, tcpdump, dnsrecon, and nslookup to strengthen segmentation and visibility.
  • Delivered CVSS v3.1 / CWE-mapped reports with reproducible PoCs and remediation guidance, achieving ~90% closure rate across projects.
  • Ensured ethical and professional testing practices, maintaining client data confidentiality and scope compliance.
  • Tools: Burp Suite, ZAP, Nmap, RustScan, Subfinder, httpx, Nikto, Nuclei, SQLMap, OpenVAS, Postman, MobSF, Corellium, Wireshark, tcpdump, CVSS v3.1, CWE, OWASP Top 10, Linux (Kali, Parrot, Ubuntu), Windows
Burp SuiteOWASP ZAPNmapRustScanSubfinderhttpx+16

VAPT Analyst Trainee

Mar 2024 โ€“ Jan 2025 ยท 10 mos ยท Remote

  • Supported senior penetration testers in performing web, API, and network vulnerability assessments, gaining hands-on experience with reconnaissance, validation, and structured reporting across diverse client environments.
  • Assisted in black-box and gray-box testing using Burp Suite, OWASP ZAP, Nmap, RustScan, Subfinder, and httpx to enumerate assets and detect common vulnerabilities.
  • Conducted web and API testing with Burp Suite, Postman, and Nikto to identify authentication, input validation, and misconfiguration issues.
  • Performed technology fingerprinting using WhatWeb and Wappalyzer to analyze web stacks and discover outdated components for targeted testing.
  • Supported network reconnaissance and analysis using dnsrecon, nslookup, and Wireshark to inspect DNS behavior, open ports, and service banners.
  • Participated in vulnerability verification by cross-referencing results from automated scans with manual validation to reduce false positives.
  • Drafted CWE-classified findings and CVSS-scored reports with proof-of-concept details under the supervision of senior testers.
  • Contributed to remediation retesting and client follow-ups, ensuring timely validation of security fixes.
  • Strengthened understanding of OWASP Top 10, CWE Top 25, and professional VAPT methodologies, building a solid foundation for advanced pentesting responsibilities.
  • Tools & Technologies:
  • Burp Suite, OWASP ZAP, Nmap, RustScan, Subfinder, httpx, WhatWeb, Wappalyzer, Nikto, Postman, dnsrecon, nslookup, Wireshark, CVSS v3.1, CWE, OWASP Top 10, CWE Top 25, Linux (Kali, Parrot, Ubuntu), Windows
Burp SuiteOWASP ZAPNmapRustScanSubfinderhttpx+13

Education

Uttrakhand Technical University, Dehradun

Bachelor of Technology - BTech โ€” Computer Science

Sep 2020 โ€“ Jun 2024

Zero To Mastery Academy

Complete Ethical Hacking Bootcamp

Jan 2025 โ€“ Present

Stackforce found 100+ more professionals with Penetration Testing & Vulnerability Assessment

Explore similar profiles based on matching skills and experience