Saptarshi Mazumder

DevOps Engineer

New Delhi, Delhi, India0 mo experience

Key Highlights

  • INE-certified across multiple cybersecurity domains
  • Ranked in the top 1% on TryHackMe
  • Passionate about offensive security and vulnerability research
Stackforce AI infers this person is a Cybersecurity Specialist with a focus on offensive security and vulnerability management.

Contact

Skills

Core Skills

Penetration TestingVulnerability ResearchProject ManagementEngineering ConsultingSecurity MonitoringCyber Risk ManagementEthical HackingPower Systems

Other Skills

exploit developmentvulnerability analysisnetwork security implementationWiresharkMetasploitNMAPcontrol systemsCyber DefenseElastic Stack (ELK)Splunk Enterprise SecurityCyber Threat Hunting (CTH)Intrusion DetectionCloud ApplicationsAmazon Web Services (AWS)Cloud Computing

About

I’m a cybersecurity enthusiast with a passion for offensive security, vulnerability research, threat hunting, and penetration testing. My journey began at 19, when curiosity led me to uncover an OAuth misconfiguration that granted administrative access to my college website. That discovery sparked a lifelong fascination with how systems break—and how they can be secured. Since then, I’ve dedicated myself to exploring vulnerabilities, sharpening both offensive and defensive security skills, and learning to think like an attacker and a defender. Highlights: 1) INE-certified across multiple cybersecurity domains 2) Ranked in the top 1% on TryHackMe 3) Experienced in penetration testing, vulnerability research, threat hunting, incident response, and system security I’m always eager to collaborate on cybersecurity research, innovative security projects, and opportunities that push the boundaries of offensive security. If you’re building something exciting in this space, let’s connect—I’m open to contributing and learning together.

Experience

0 mo
Total Experience
--
Average Tenure
--
Current Experience

Protecte technologies

SOC Analyst

Jan 2025Jun 2025 · 5 mos · Delhi NCR · On-site

security monitoringnetwork security implementation

Hackerone

Security Researcher

Oct 2024Present · 1 yr 7 mos · Delhi, India · Remote

  • I work as a security researcher on HackerOne, focusing on discovering new vulnerabilities across diverse platforms and applications. My role involves conducting in-depth penetration testing, analyzing systems for potential weaknesses, and responsibly disclosing findings to help organizations strengthen their security posture. Alongside active research, I continuously develop my skills in exploit development, vulnerability analysis, and emerging security trends to stay ahead in the evolving cybersecurity landscape.
vulnerability researchpenetration testingexploit developmentvulnerability analysis

Family’s tech firm

Business and Operations

Jul 2024Present · 1 yr 10 mos · India · On-site

  • I help lead my family’s consulting firm, advising on large-scale engineering and energy infrastructure projects across the power sector.
  • Working in close partnership with government authorities, we support the planning, optimization, and modernization of critical power systems—from conventional turbine-based plants to utility-scale solar developments.
  • Focused on delivering infrastructure that underpins economic growth, energy security, and long-term system resilience.
engineering consultingproject managementpower systems

Cdac,noida

Cyber Security Analyst

Jan 2024Jun 2024 · 5 mos · Noida, Uttar Pradesh, India · On-site

  • As a Cyber Security Researcher at C-DAC, I played a critical role in developing innovative solutions to
  • enhance the security of critical infrastructure and digital ecosystems. I also conducted advanced research,
  • identified vulnerabilities, and developed tools and methodologies to mitigate security risks. My work
  • contributed to national security initiatives and support the development of robust cybersecurity frameworks. I
  • learned the following skills during my internship period
  • Wireshark (analyzed Modbus/DNP3 packets)
  • Open-source SIEMs like Wazuh, Splunk to practice log correlation and alerts.
  • Metasploit for exploitation, NMAP for network enumeration and various other offensive tools
cyber risk managementethical hackingWiresharkMetasploitNMAP

Ntpc limited

Project Engineer

May 2021Aug 2021 · 3 mos · Noida, Uttar Pradesh, India · On-site

power systemscontrol systems

Education

Indian Institute of Information Technology Ranchi

Bachelor of Technology - BTech — Electronics and Communications Engineering

Dec 2020Jun 2024

Stackforce found 100+ more professionals with Penetration Testing & Vulnerability Research

Explore similar profiles based on matching skills and experience