Vikram Raj Kumar Majji 🛡

DevOps Engineer

Bengaluru, Karnataka, India4 yrs 6 mos experience

Key Highlights

  • Proficient in multiple cybersecurity frameworks.
  • Expert in vulnerability assessment and penetration testing.
  • Strong leadership in incident response and disaster recovery.
Stackforce AI infers this person is a Cybersecurity Specialist with expertise in risk management and cloud security.

Contact

Skills

Core Skills

CybersecurityVulnerability Assessment And Penetration TestingRisk AssessmentIncident ResponseVulnerability Management

Other Skills

Threat AnalysisVulnerability AssessmentCloud SecurityPenetration TestingBurp SuiteCybersecurity Strategy DevelopmentIncident DetectionComplianceCybersecurity StrategiesMonitoring Security ThreatsVulnerability ScanningSecurity Awareness TrainingVulnerability Assessment and Penetration Testing (VAPT)UnixApplication Security

About

┌─────[root㉿root]-[~] └──$ nano profile Vikram Raj Kumar Majji| Cybersecurity Professional | 4+ Years of Experience About Me: I am a seasoned cybersecurity professional with expertise in designing and implementing robust security strategies to safeguard organizational assets against evolving cyber threats. With a strong foundation in various cybersecurity frameworks and a keen understanding of security protocols and technologies, I am committed to ensuring the highest level of protection for digital infrastructures. Experience Highlights: •Cybersecurity Framework Proficiency: Proficient in implementing and adhering to various cybersecurity frameworks such as ISO 27001, NIST and ensuring compliance and alignment with industry best practices. •Security Protocol Mastery: Demonstrated expertise in security protocols and technologies including VPN, SSL, and SSH, leveraging them effectively to establish secure communication channels and safeguard sensitive data. •Penetration Testing and Vulnerability Assessment: Well-versed in penetration testing and vulnerability assessment methodologies, identifying and remedying potential security vulnerabilities to mitigate risks effectively. •Security Incident Response Leadership: Proven track record in security incident response, incident management, and disaster recovery, ensuring swift and effective resolution of security incidents to minimize organizational impact. •Cloud Security Expertise: Experience with cloud security Threat Model STRIDE, implementing robust security controls to mitigate cloud-related risks and ensure the security of cloud environments. •Threat Intelligence Utilization: Familiarity with threat intelligence and security threat management, leveraging threat intelligence to proactively identify and mitigate emerging threats. •Tool Proficiency: Proficient in using security tools such as Nessus, Wireshark, and Metasploit, harnessing their capabilities to conduct thorough security assessments and investigations. •Analytical and Communication Skills: Possess strong analytical and problem-solving skills for identifying and mitigating security threats, coupled with excellent verbal and written communication skills for effectively reporting and communicating with stakeholders. Let's Connect: If you're seeking expertise in cybersecurity strategy development, regulatory compliance, or security incident response, I'm here to collaborate and contribute to your organization's cybersecurity objectives. Let's connect and explore opportunities for mutual growth and success.

Experience

4 yrs 6 mos
Total Experience
1 yr 2 mos
Average Tenure
11 mos
Current Experience

Vendavo

Senior Analyst Technology Security

Jun 2025 – Present · 11 mos · Bengaluru · Remote

  • At Vendavo, I contribute to strengthening the organization's cybersecurity posture by performing continuous threat analysis, vulnerability assessments, and readiness evaluations across hybrid environments.
  • Key Responsibilities:
  • 🔹 Contribute to strengthening Vendavo’s cybersecurity posture through continuous threat analysis, vulnerability assessments, and security readiness evaluations across hybrid (cloud and on-prem) environments
  • 🔹 Conduct Penetration Test Readiness assessments across AWS, Azure, and on-prem infrastructures
  • 🔹 Integrated and optimized Qualys with AWS and Azure for automated vulnerability detection and reporting
  • 🔹 Generate and deliver detailed vulnerability reports for on-prem servers, AWS, and Azure tenants, prioritizing critical issues and remediation
  • 🔹 Monitor and categorize dark web events to identify potential exposure of company assets and credentials
  • 🔹 Create AWS and Azure Configuration Error Reports and Security Findings Reports to improve cloud security posture
  • 🔹 Perform BitsightTech analysis to assess and improve external security ratings
  • 🔹 Use Burp Suite for dynamic web application testing and validation of security fixes
  • Tools & Technologies: Qualys | AWS Security Hub | Azure Security Center | Bitsight | Burp Suite | Microsoft Entra | Power BI | Excel | Jira
Threat AnalysisVulnerability AssessmentCloud SecurityPenetration TestingBurp SuiteCybersecurity+1

Bcits pvt ltd

Cyber Security Specialist

Jul 2024 – Jun 2025 · 11 mos · Bengaluru, Karnataka, India · On-site

  • 🔒 Securing OT, Cloud, and Devices: Key Strategies for Cybersecurity Professionals 🔒
  • As organizations increasingly rely on Operational Technology (OT), cloud infrastructures, and endpoint devices, protecting assets, systems, and data from cyber threats has never been more crucial. Here are five essential strategies I focus on in my role:
  • 1️⃣ Cybersecurity Strategy Development: Crafting and implementing robust strategies to safeguard OT environments, cloud infrastructures, and endpoint devices against evolving cyber threats.
  • 2️⃣ Risk Assessment and Vulnerability Management: Conducting comprehensive assessments and penetration testing to identify and mitigate risks specific to OT systems, cloud platforms, and endpoint devices.
  • 3️⃣ Security Tools and Technologies Deployment: Deploying and managing advanced security tools like firewalls, encryption protocols, and endpoint security solutions to prevent unauthorized access and data breaches.
  • 4️⃣ Incident Detection and Response: Vigilantly monitoring network traffic, system logs, and security alerts to detect and respond swiftly to security incidents, with tailored incident response plans for OT, cloud, and device environments.
  • 5️⃣ Compliance and Continuous Improvement: Ensuring adherence to cybersecurity regulations and standards while staying ahead of emerging threats. Constantly evaluating and implementing new technologies to enhance our organization's overall security posture.
  • Securing OT, cloud, and devices requires a proactive approach and collaboration across teams. Let's connect to discuss how we can strengthen cybersecurity strategies and protect digital assets effectively.
Cybersecurity Strategy DevelopmentRisk AssessmentVulnerability ManagementIncident DetectionComplianceCybersecurity

Utthunga

3 roles

Cyber Security Specialist

Promoted

Jun 2023 – Jul 2024 · 1 yr 1 mo

  • Developing and implementing cybersecurity strategies to protect organizational assets, systems, and data from cyber threats.
  • Conducting risk assessments, penetration testing, and vulnerability scanning to identify and assess potential vulnerabilities and risks in systems, networks, and applications.
  • Deploying and managing security tools, technologies, and solutions such as firewalls, intrusion detection systems, encryption protocols, and access controls to safeguard against unauthorized access and data breaches.
  • Monitoring network traffic, system logs, and security event alerts to detect and respond to security incidents, conducting thorough investigations and analysis of security breaches or suspected malicious activities.
  • Developing and implementing incident response plans and procedures to effectively handle and recover from cybersecurity incidents, coordinating with internal teams and external stakeholders to minimize impact.
  • Delivering cybersecurity awareness programs and training sessions to educate employees about best practices, policies, and procedures for maintaining a secure work environment.
  • Staying updated on emerging threats and technologies, continuously monitoring the cybersecurity landscape, and evaluating new technologies, tools, and solutions to enhance the organization's security posture.
  • Ensuring compliance with relevant cybersecurity regulations, industry standards, and legal requirements, conducting security audits, assessments, and collaborating with internal audit teams.
  • Maintaining accurate records of security incidents, investigations, and remediation efforts, preparing reports and documentation for management, stakeholders, and regulatory authorities.
  • Collaborating with cross-functional teams, including IT, operations, and senior management, to align cybersecurity initiatives with business objectives and effectively communicate risks and propose actionable solutions.
Cybersecurity StrategiesRisk AssessmentIncident ResponseComplianceCybersecurity

Associate Cyber Security Analyst

Promoted

Mar 2022 – May 2023 · 1 yr 2 mos

  • As an experienced System Administrator, I am well-versed in designing, implementing, and maintaining technology solutions that align with business objectives. With a keen eye for detail and a passion for keeping systems secure, I have a proven track record of delivering high-quality results in fast-paced environments.
  • My expertise includes analyzing business requirements, developing technical specifications, testing and quality assurance, implementation and support, documentation, and research and innovation. Additionally, I am proficient in system maintenance, security, user management, backup and recovery, software and hardware upgrades, and user support.
  • As an Associate Cyber Security Analyst, I have a solid understanding of monitoring and analyzing security threats, incident response, vulnerability scanning and assessment, security awareness training, documentation and reporting, and compliance. My ability to stay up-to-date on the latest trends and technologies in the field allows me to make informed decisions and recommend effective solutions.
  • Overall, I am committed to ensuring that technology solutions meet the needs of the organization and contribute to its success. With my strong technical skills, analytical mindset, and ability to work collaboratively with teams, I am confident in my ability to add value to any organization.
Monitoring Security ThreatsVulnerability ScanningSecurity Awareness TrainingCybersecurityVulnerability Management

System Administrator

Dec 2021 – Feb 2022 · 2 mos

  • As an experienced IT System Administrator, I have a proven track record of designing, deploying, and maintaining reliable and secure technology infrastructure that supports business operations. With a deep understanding of system maintenance, security, user management, backup and recovery, software and hardware upgrades, and user support, I am well-equipped to handle the challenges of this role.
  • My expertise includes managing and monitoring servers, networks, and other critical systems, ensuring their performance and availability. I am also adept at identifying potential security threats and taking appropriate steps to mitigate them. Additionally, I have experience managing user accounts and access permissions, ensuring that only authorized users have access to sensitive information and systems.
  • As an IT System Administrator, I am responsible for managing software and hardware upgrades to ensure compatibility with existing systems and minimal disruption to operations. I also maintain documentation on system configurations and setup to facilitate troubleshooting and long-term maintenance.
  • I pride myself on providing exceptional user support, promptly diagnosing and resolving technical issues. With my strong communication skills, I can effectively communicate technical information to both technical and non-technical stakeholders, ensuring a clear understanding of system issues and solutions.
  • Overall, I am committed to ensuring that technology infrastructure is running smoothly and securely. With my experience and expertise, I am confident that I can add value to any organization by maintaining the stability and security of their technology infrastructure.

Iyanar infotech private limited

Social Media Analyst - IT Team

Mar 2021 – Aug 2021 · 5 mos · Chennai, Tamil Nadu, India · Remote

  • As an experienced IT System Analyst, I am dedicated to analyzing and optimizing technology solutions to improve business performance. With a strong technical background and analytical mindset, I have a proven track record of designing, implementing, and maintaining effective technology solutions that align with business objectives.
  • My expertise includes analyzing business requirements, developing technical specifications, testing and quality assurance, implementation and support, documentation, and research and innovation. I work closely with stakeholders to understand their needs and translate them into technical requirements, ensuring that technology solutions are aligned with business objectives.
  • Strong understanding of UI, cross-browser compatibility, general web functions and
  • standards.
  • Experience in planning and delivering software platforms used across multiple products and
  • organizational units.
  • Experience with Web Applications and programming languages such as HTML, CSS,
  • JavaScript, JQuery and API's.
  • Deep functional knowledge or hands on design experience with Web Services is needed to
  • be successful in this position.
  • Strong grasp of security principles and how they apply to e-commerce applications.
  • Development and management of digital marketing campaigns & organization’s website
  • Optimizing content for the website and social networking channels such as Facebook,
  • Twitter, Instagram, Google Plus, etc
  • Track the website traffic flow and providing internal reports regularly
  • Identification new digital marketing trends and ensure that the brand is in front of the
  • industry developments.
  • Working on SEO of the latest CMS website pages.
  • Editing and posting content, videos, podcasts, and audio content on online sites.
  • Promoting company’s product and services in the digital space.
  • Executing social media efforts to improve KPIs, likes, shares, tweets, etc.
  • Creating and executing SMS, and email-based marketing campaigns.

Education

Velagapudi Ramakrishna Siddhartha Engineering College

Master of Technology - MTech — Computer Science

Jan 2018 – Jan 2020

Velagapudi Ramakrishna Siddhartha Engineering College

Bachelor of Engineering (B.Eng.) — Information Technology

Jan 2014 – Jan 2017

Narayana Junior College

Junior High/Intermediate/Middle School Education and Teaching

Jan 2011 – Jan 2013

Sri Chaitanya Techno School

school

Jan 2008 – Jan 2011

Stackforce found 100+ more professionals with Cybersecurity & Vulnerability Assessment And Penetration Testing

Explore similar profiles based on matching skills and experience