Nishant Sharma

Director of Engineering

Singapore, Singapore13 yrs 4 mos experience
Highly Stable

Key Highlights

  • Over a decade of experience in Cybersecurity.
  • Presented research at top conferences globally.
  • Led innovative cybersecurity initiatives across multiple organizations.
Stackforce AI infers this person is a Cybersecurity expert with extensive experience in research and product development.

Contact

Skills

Core Skills

CybersecurityThreat ResearchCybersecurity ResearchBrowser SecurityR&d LeadershipCloud SecurityDevsecopsContent CreationResearchWifi SecurityC Programming

Other Skills

Zero TrustOffensive ResearchMulti-cloud InfrastructureTeam LeadershipTraining DevelopmentCybersecurity ToolsContent DevelopmentCShell ScriptingProduct DevelopmentTeam BuildingComputer SecurityComputer ForensicsCryptographySoftware Development

About

Hi, I'm Nishant! With over a decade of experience in Cybersecurity Research and Product Development, I have dedicated my career to advancing the field through innovation and education. As a seasoned Cybersecurity expert, I have had the privilege of presenting my research at prestigious conferences such as DEFCON, Blackhat, HITB, and RootCon, reaching and impacting thousands of students and professionals across 125+ countries. I currently serve as Director, Threat Researcher at Zscaler, where I am part of the Zero Trust Browser Team and also do threat research in the browser ecosystem. Prior to that I served as Head of Cybersecurity Research at SquareX (acquired by Zscaler), VP of Labs, R&D at INE, Head of R&D at Pentester Academy (acquired by INE) and as MTS at Mojo Networks (acquired by Arista Networks), where I contributed to cutting-edge products and cybersecurity-focused initiatives.

Experience

Zscaler

Director, Threat Research

Feb 2026Present · 2 mos · Singapore

  • Part of Zero Trust Browser Product Team and Threat research focused on Browser ecosystem
CybersecurityThreat ResearchZero Trust

Squarex

Head of Cybersecurity Research

Jun 2025Feb 2026 · 8 mos · Singapore

  • Leading groundbreaking research into browser-native threats
  • Bridging offensive research and defensive innovation to redefine enterprise browsing security
Cybersecurity ResearchBrowser SecurityOffensive Research

Ine

3 roles

Vice President of Lab, Research, and Development

Jan 2025May 2025 · 4 mos

  • Led initiatives in capacity expansion and efficiency improvement for multi-cloud infrastructure.
  • Served as a Cybersecurity Subject Matter Expert and provided leadership in engineering and R&D.
  • Developed/Maintained highly scalable infrastructure and led research projects to drive innovation.
Multi-cloud InfrastructureCybersecurityR&D Leadership

Director, Lab Platform

Promoted

Jun 2022Dec 2024 · 2 yrs 6 mos

  • Led the team in developing, improving, maintaining, and supporting INE's scalable Lab platform that runs labs for Cloud (AWS, GCP, Azure), Networking (Cisco, Juniper, Fortinet), CyberSecurity and Data Science.
  • Led DevSecOps adoption
  • Increased the team size 4x in 4 months
  • Trainings and Presentations:
  • 1 - Attacking and Defending AWS Cloud Environment (Blackhat USA 2022)
  • 2 - Introduction to Azure Security (DEF CON 30, Workshops)
  • 3 - AWSGoat and AzureGoat (Blackhat USA 2022 Arsenal and DEF CON 30 Demolabs)
  • Contribution to the Cybersecurity community by releasing:
  • 1. AWSGoat (https://github.com/ine-labs/AWSGoat)
  • 2. Azuregoat (https://github.com/ine-labs/AzureGoat)
  • 3. GCPGoat (https://github.com/ine-labs/GCPGoat)
DevSecOpsCloud SecurityTeam Leadership

Security Research Manager, Lab Platform

Oct 2021Jun 2022 · 8 mos

Pentester academy

2 roles

Head, R&D

Promoted

Jun 2016Oct 2021 · 5 yrs 4 mos

  • I worked on initiatives like Hacker Arsenal, AttackDefense, CTF.live and PA YouTube Channel.
  • I led a small content creation team to build 2000+ challenges in 125+ infosec sub-topics in 2 years. My team was responsible for research, development, testing, solution manuals/videos, and technical support for AttackDefense.
  • AttackDefense had customers from 125+ countries who could play unlimited labs 24x7x365.
  • Apart from the engineering and content creation work, we delivered the following during this period:
  • 6+ paid training
  • 15+ tools/talks in top conferences (Blackhat, DEF CON, HiTB, RootCon, OWASP NZ)
  • 30+ 4-week live boot camps (in-house)
  • Trainings/Bootcamps detailed list:
  • 1 - Advanced WiFi Exploitation (Blackhat USA 2019, 2021 & BSides Canberra 2021)
  • 2 - Advanced Real-World Penetration Testing
  • a. OWASP NZ Day 2019
  • b. HiTB Amsterdam 2019
  • c. HiTB Singapore 2019
  • d. RootCon Philippines 2019
  • e. BlackHat Aisa 2020
  • 3 - Information Security Awareness (Private clients)
  • 4 - WiFi Pentesting Online Bootcamp (5 Batches)
  • 5 - Container Security Beginners Online Bootcamp (5 Batches)
  • 6 - DevSecOps Online Bootcamp (2 Batches)
  • CVEs: CVE-2020-24263, CVE-2020-24264
Content CreationTraining DevelopmentCybersecurity ToolsCybersecurity

Sr. Security Researcher

Nov 2015Jun 2016 · 7 mos

  • Created content and published research/tools in conferences:
  • 1 - WiDy: WiFi 0wnage under $5 (Arsenal, Blackhat Asia 2017 and Demolabs, DEFCON 25)
  • 2 - IIDS: IoT Intrusion Detection System (IoT Village, DEFCON 25)
  • 3 - Wimonitor: OpenWRT package for remote sniffing (Demolabs, DEFCON 25)
  • 4 - Deceptacon: Deception in WiFi (Wireless Village, DEFCON 25)
  • 5 - PA-Toolkit: Wireshark Plugins for Pentesters (Arsenal, Blackhat USA 2018 and Demolabs, DEFCON 26)
  • 6 - BLEMystique: Affordable Custom BLE Target (Arsenal, Blackhat USA 2018 and Demolabs, DEFCON 26)
  • 7 - AD VoIP Toolkit: VoIP Analysis Wireshark Plugins (Arsenal, Blackhat Asia 2019)
  • 8 - WiCy: Monitoring 802.11ac Networks at scale (HiTB Amsterdam, Haxpo 2019)
  • 9 - VoIPShark: Open Source VoIP Analysis Platform (DEFCON China and Demolabs 2019)
  • 10 - Developing Access Point Rootkits (Workshop, Wireless Village, DEF CON 27)
  • 11- Writing Wireshark Plugins for Security Analysis (Workshop, Packet Hacking Village, DEF CON 27 and DEF CON 28)
  • 12 - Hunting Threats with Wireshark Plugins (Research talk, RootCon Philippines 2019)
  • 13 - Introduction to WiFi Security (Workshop, Wireless Village, DEF CON 28)
  • 14 - 1-day workshop for ISEA and IIT Guwahati, 2020
  • 15 - 2-day workshop for 350+ Govt. of India officials, August 2020
  • 16 - ReconPal: Leveraging NLP for Infosec (Research talk, RootCon Philippines 2020)
  • Contributed to:
  • 1. Wi-Bear: Intelligent Autonomous Wi-Fi Honeypot Detection (Research talk, BSides Canberra, 2019)
  • Other initiatives:
  • 1 - Pentester Academy TV: Content creation and review for youtube (https://youtube.com/pentesteracademytv)
  • 2 - Hacker Arsenal: Online pentest gadget store that offered 3 WiFi security gadgets. We also got featured in Cyber Defense Magazine's Cyber Security Leader 2017 list (http://www.cyberdefensemagazine.com/cyber-security-leaders-2017/).
  • I was instrumental in the development of ESP8266/ESP32 and TP-Link 3020/3040 devices.
  • 3 - CTF.live: Open-to-all and hosted CTFs for companies/conferences worldwide
ResearchContent DevelopmentCybersecurity ToolsCybersecurity

Mojo networks, inc. (acquired by arista networks)

Member of Technical Staff

Jun 2014Oct 2015 · 1 yr 4 mos · Pune, Maharashtra, India

  • As a member of the AP-Sensor team, worked on upgrades/patches for WIPS and new features for AP platforms. My work there required me to code in C and shell script.
  • Contributed to the following AP features:
  • IPSec/EoGRE tunnels
  • IPv6 communication and QoS
  • 802.11r Fast BSS Transition Roaming
  • Client reporting feature and NTP time sync
  • Also participated in exploring the WiFi-LTE interoperability process of cellular offloading
CShell ScriptingWiFi SecurityC Programming

Kpmg

Forensics Intern

May 2013Jul 2013 · 2 mos · Gurgaon, India

  • As a member of DER (Data Evidence Recovery) team, recovered various digital pieces of evidence (in the form of files, images, emails) in cases of two MNCs and one local business. My work there consists seizure of evidence, maintaining CoC (Chain of Custody), recover data (deleted), find meaningful information and submit it to lawyers.

Iiit delhi

Teaching Assistant

Aug 2012May 2014 · 1 yr 9 mos · New Delhi Area, India

  • As a teaching assistant, helped instructors in managing labs, assignments, tutorials and exams.

Education

Indraprastha Institute of Information Technology, Delhi

Master of Technology (M.Tech.) — Computer Science (Information Security)

Jan 2012Jan 2014

Himachal Pradesh University

Bachelor of Technology (B.Tech.) — Computer Science

Jan 2008Jan 2012

Jawahar Navodaya Vidyalaya - JNV

Jan 2008Present

Stackforce found 100+ more professionals with Cybersecurity & Threat Research

Explore similar profiles based on matching skills and experience