Home

Haridev Sajikumar - Cyber Security
[email protected]
Location: Dallas, Texas, USA
Relocation:
Visa: h1b
Haridev Sajikumar
Application Security Consultant
Email ID : [email protected]
Phone: +1 (346) 347-1225
LinkedIn: www.linkedin.com/in/haridev-sajikumarsara
SUMMARY
Over 9+ years of professional IT Experience as a Security Engineer in various domains like Penetration testing, Web Application security testing, Vulnerability Assessment, and generating reports using tools.
Excellent knowledge of OWASP Top 10, SIEM, and THREAT CLASSIFICATION methodologies.
Experienced in vulnerability assessment of internet-facing assets and internal assets using tools like Burp Suite, IBM Appscan, Nessus, Live HTTP headers Metasploit, Wire shark, SQL map, OWASP ZAP Proxy, Acunetix, Nmap, checkmarx and HP Fortify.
Updated risk assessments business to reflect regulatory and industry changes and the impact of audit, compliance testing, and regulatory exam results on risk assessments.
Experience in SQL Injection protection, XSS protection, script injection, and primary hacking protection techniques.
Good Knowledge of Network Protocols such as TCP/IP, SNMP, SMTP, NTP, DNS, LDAP, etc.,
Hands-on experience in web application Pen testing.
Installing and configuring servers by standards and operational requirements, including hardening Operating Systems.
Proficient in configuring operating system (Kali Linux, Windows, Backtrack) utilities and programming.
Good Knowledge of Web services using REST, JSON, XML, and SOAP.
Experience in testing security, reverse engineering, and malware analysis.
Managed the cycle of project continuity, reviewed the team's technical work, and ensured the quality of service deliverables.
Excellent programming skills in JavaScript, Python, XML and AJAX.
Risk assessment on the application by identifying and prioritizing the issues based on risk level.
Identity and access management (IAM) with multi-cloud environments (AWS, Azure)
Security configuration and hardening of cloud services.
Cloud security controls and compliance (ISO 27001, NIST, GDPR, HIPAA, PCI)
Security incident response in the cloud and Cloud-native security solutions (WAF, DDoS protection, encryption)
Threat modeling and risk assessment in the cloud and Cloud security monitoring and logging
DevSecOps and secure cloud development practices with automation and orchestration of security controls
Monitor, coordinate and respond to cyber security incident
Cloud security best practices and frameworks according to NIST and CIS Benchmark
Good knowledge of Information Security teams to tune SAST/DAST, SCA, Secrets scanning, container scanning- tools and processes.
Monitor SIEM and SOC feeds to identify possible enterprise threats. Investigate threats to determine the nature of the incident
Generate reports, analyze and make policy/procedure recommendations on employee security policy and procedures to manage security.
Experienced in implementing Firewalls and updating IDS/IPS signatures.
Experience with Internet/Intranet Networking Protocols and Services.
Managed network hardware inventory and Monitoring by syslog, SNMP, and NTP.
Worked on different LAN & and WAN technologies and expertise in implementing L2 technologies, including VLANs, VTP, STP, RSTP, and Trunking and Port Security.
Excellent team player, enthusiastic initiator, and ability to learn fundamental concepts effectively and efficiently.
Successfully mitigated risks, optimized resource utilization, and ensured high availability for AWS-based applications.
Excellent communication, analytical, troubleshooting, customer service, and problem-solving skills; excels in mission-critical environments requiring advanced decision-making.
TECHNICAL SKILLS
Vulnerability Assessment Tools: Burp Suite, Dirbuster, OWASP ZAP Proxy, NMap, Nessus, IBMAppscan, Metasploit, Drozer, HP Web Inspect, HP Fortify, SQL Map, Wire
Shark, Acunetix, Net Sparker, Open VAS, checkmark,
AWS tools, cobalt strike
Languages: C,C++,Javascript,Python
Web Technologies: HTML, XML, AJAX, CSS.
Database: SQL Server, MySQL, Postgres
Operating System: Windows, Linux, Kali Linux

PROFESSIONAL EXPERIENCE
Client: T-Mobile, Dallas, TX Jun 2023 to till date
Role: Senior Application Security Consultant

Implemented Application Security program (DAST and SAST) at the enterprise level to identify, report, and remediate security vulnerabilities from applications deployed in DEV, PRE-PROD.
Rolled out IBM App-Scan products such as App-Scan Enterprise (ASE), Standard, Source, and Developer plug-ins to various development teams across the business lines.
Automated CI/CD pipeline for Fortify on Demand (FOD) for SAST and DAST testing.
Onboarded 300+ Java and .net applications in Fortify on Demand(FOD).
Conducted security assessment to ensure compliance with the firm s security standards (i.e., OWASP Top 10). Specifically, manual testing has been performed to identify Cross-Site Scripting and SQL injection-related attacks during the code review.
Working in SOC to keep an active defense against various threats and working with red team.
Participated in the implementation of AWS Cloud security for applications deployed in the Cloud.
Security assessment of online applications to identify the vulnerabilities in different categories like Input and data Validation, Authentication, Authorization, Auditing and logging.
Performed security assessment of PKI Enabled Applications.
Tools used Qualys WAS, WhiteHat Security services.
Worked on Software Composition Analysis like BLACKDUCK and migration of SNYK.
Developed threat modeling framework (STRIDE, DREAD) for critical applications. Identified potential threats and developed mitigating controls for the applications during the development phase.
Reviewed source code (Java/J2EE/Spring/FTL/JavaScript) and developed security filters within App-Scan for critical applications.
Reviewed Android and iOS mobile code for mobile apps and recommended code fixes.
Worked with the Incident Response team (events from DLP) in reviewing events generated by DLP and provided guidance in identifying the root cause of the event and a possible solution to resolve it.
Participated in the Proof of Concept (POC) to implement Checkmarx (code analysis tool for web apps) and Arxan (application protection software for Mobile apps).
Performed the penetration testing of mobile (Android and iOS) applications, specifically, APK reverse engineering, traffic analysis and manipulation and dynamic runtime analysis.
Worked extensively with software development teams to review the source code, triage the security vulnerabilities generated by IBM App-Scan, Burp-Suite, HP Web-Inspect and eliminated false positives.
Worked with DevOps teams to automate security scanning into the build process.
Developed Secure-SDLC guidelines for Web and Mobile apps.
Ensured that regulatory compliance requirements, such as PCI-DSS, HIPAA, and GDPR, performed cloud penetration testing activities.
Generated executive summary reports showing the security assessments results, recommendations and risk mitigation plans and presented them to the respective business sponsors and senior management.

Client: Home Depot, Atlanta, GA Aug 2021 to May 2023
Role: Cyber/Application Security Engineer
Responsibilities:

Identifying the critical, High, Medium, and Low vulnerabilities in the applications based on OWASP Top 10 and SANS 25 and prioritizing them based on their criticality.
Providing PKI support to users as Registration Authority (RA) and Sole ownership of all PKI-related activities.
Conducted POC for various API security vendors like NoName and Salt Security.
Working with Aws tool for ticket raising, CI/CD pipeline, and automating pipeline security scans.
Found common website security issues (CSRF, XSS, applications logic, SQL injection, information leakage, session fixation, etc.) across various platforms.
Port scanning servers using NMAP and Nessus.
Conducted Vulnerability Assessments on various applications.
Proficient in understanding application-level vulnerabilities like XSS, SQL Injection, CSRF, Authentication bypass, Weak Cryptography, and Authentication flaws.
Conducting Web Application Vulnerability Assessment and threat Modelling, Gap Analysis, and secure code review on the applications concerning guidelines provided by Cisco.
Skilled in using Burp Suite, Acunetix Automatic Scanner, IBM App Scan, N-map, ZAP, and Metasploit for web application penetration tests
Audit application and network usage and perform vulnerability assessment analysis
Generated and presented reports on Security vulnerabilities to internal and external customers.
Security assessment of online applications to identify the vulnerabilities in different categories like Input and data Validation, Authentication, Authorization, Auditing & logging
Monitor Enterprise Security suite including End Point Protection, Splunk Enterprise Security and User Behavior Analysis, FireEye IPS/IDS, Internet Content and Phishing filter systems
Assisting customers in understanding risk and threat levels associated with vulnerability so that customers may or may not accept risk concerning business criticality
Calculates vulnerability risk using NIST CVSS and existing mitigating control considerations.
Integration of SAST and DAST tools with Jenkins in agile development process.
Security testing of APIs using SOAP UI and Postman
Performed on-rotation Red team and Blue team operations.
Good knowledge of network and security technologies such as Firewalls, TCP/IP, LAN/WAN, IDS/IPS, Routing and Switching.
Implemented and maintained security controls, NIST 800-53
Strong understanding of DNS hijacking, DNS spoofing, content spoofing, and wireless security with hands-on Experience using Kismet.
Have assessed vulnerabilities using the Common Vulnerability Scoring System (CVSS) to evaluate their severity and potential impact on systems and data.
Conducted Web Application Vulnerability Assessment and threat Modeling, Gap Analysis, and secure code reviews on the applications
Have a keen awareness of the importance of addressing software security issues. My familiarity with Common Weakness Enumeration (CWE) and my experience in conducting code reviews and vulnerability assessments make me well-equipped to identify and remediate vulnerabilities at both the architectural and code levels.
Performed both defensive and adversarial perspective types of threat modeling of the applications to detect various potential threats.



Client: Ford Motors, Detroit, MI Jun 2019 to Jul 2021
Role: Cyber Security Engineer
Responsibilities:

Conducted penetration testing on cloud-based systems and identified vulnerabilities by industry standards and best practices.
Worked with various cloud service providers, such as AWS, Azure, and Google Cloud, to evaluate security controls and assess risks.
Developed and executed test plans, performed vulnerability assessments, and produced comprehensive reports identifying security weaknesses in cloud infrastructure.
Collaborated with cross-functional teams to implement recommended remediation plans and assisted with validating corrective actions.
Conducted configuration reviews of cloud-based systems, including network devices, servers, and applications, to identify potential security weaknesses.
Identify risks and vulnerability reported in Azure Security center and GCP Security Command Center and remediate them.
Conducted regular audits of IAM policies to ensure compliance with industry regulations and internal security standards.
Performed security compliance assessments for all IT infrastructures (firewalls, routers, IDS/IPs, DLP, Linux/Windows security hardening).
Conducted cloud security assessments, including threat modeling, risk analysis, and security architecture reviews, to recommend improvements.
Used various cloud security tools, such as AWS Inspector, Azure Security Center, and Google Cloud Security Command Center, to identify vulnerabilities and generate reports.
Experience in assessing vendor security controls, evaluating third-party risk, and conducting due diligence.
Proficient in reviewing vendor contracts and agreements to ensure appropriate security and compliance requirements are met.
Expertise in supporting internal and external information security and vendor management audits.
Experience in preparing audit documentation, conducting risk assessments, and ensuring compliance with regulatory standards.
Stayed up to date on industry developments and emerging threats related to cloud security and provided recommendations for improving cloud security posture based on current best practices.
Working with vendors and third-party providers to ensure secure and efficient IAM integration.
Conducting IAM risk assessments and threat modeling to identify and prioritize IAM-related risks and vulnerabilities.
Worked on Azure security center in reviewing Azure secure score to fix the necessary security posture management and review security alerts for key vault activity, Azure user-based high-risk activities and other anomaly-based security alerts to enforce necessary remediations.
Proficient in identifying and addressing security vulnerabilities and weaknesses based on NIST SP800-53 Revision 4 and 5 standards.
Proven track record of providing guidance and recommendations for implementing NIST SP800-53 Revision 4 and 5 controls.
Implementing IAM solutions in cloud environments, including AWS, Azure, and Google Cloud, to ensure secure and scalable management of user identities and access permissions.
Communicated findings and recommendations to technical and non-technical audiences, including management, technical staff, and business stakeholders.

Client: TJX, Boston, USA Feb 2018 to May 2019
Role: Application Security Consultant

Responsibilities:
Conducting application and infrastructure penetration tests, Security Consulting, physical security reviews, and Social Engineering tests for our clients.
Perform Penetration Testing by OWASP standards and SANS 25 using manual techniques and Automated Tools.
Experience in Android applications using Drozer security frameworks and some tools.
Application testing Using Burp Suite Pro and Live HTTP Headers for Web and Mobile applications to identify the vulnerabilities and to validate the Server-side validations.
Using NMap, OpenVAS, Security Center, and NESSUS for Network and Port Scanning to close unnecessary ports.
Using DirBuster to brute-force directories and Fierce to scan and brute-force domains (DNS).
Identified security issues on DOM (Document Object Model) based environments.
Using Metasploit to exploit Proof of Concepts and SQL Map to dump the database data to the local folder.
Experience in postman API testing to run requests, test and debug, create automated and mock documents, and monitor an API.
Good knowledge of Red team penetration testing.
Responsible for security testing of web flows using the IBM AppScan tool.
Skilled in using Burp Suite, Acunetix Automatic Scanner, NMAP, Dirbuster, Qualysguard, Nessus, and SQL Map for web application penetration and infrastructure testing.
Conduct network Vulnerability Assessments using tools to evaluate attack vectors, Identify System Vulnerabilities, and develop remediation plans and Security Procedures.
Continually improve the secure SAST/DAST process and environment.
Conduct proactive monitoring, investigation, and mitigation of security incidents.
Analyze security event data from the network (IDS, SIEM) and experience in ArcSight SIEM and encase
Solid working knowledge of networking technology and the OSI Model, including TCP/IP protocols and standards.
Review security logs and violation reports for root cause analysis.
Performing onsite & remote security consulting, including penetration testing, application testing, web application security assessment, onsite internet security assessment, social engineering, wireless assessment, security devices including firewalls, IDS/IPS, and O365 hardware deployment.
Perform live packet data capture with Wire Shark to examine security flaws.
Utilize various Firefox add-ons like Flag Fox, Live HTTP Header, and Tamper data to perform the pen test.
Performed penetration examinations to ascertain the technical weaknesses of the web application systems.
Perform compliance scanning to analyze configurations and facilitate implementation of configurations and hardening settings for web applications running or hosted on the networks, operating systems, applications, and other information system components.
Well-versed in understanding application-level vulnerabilities like SQL Injection, XSS, CSRF, authentication bypass, authentication flaws, cryptographic attacks, etc.
Strong experience in assessing and mitigating OWASP's top 10 critical risks.
Port scanned servers using NMAP and closed all unnecessary ports to reduce the attack surface.
Identified, documented, and communicated vulnerabilities to appropriate members of the management team, prioritizing remediation requirements and increasing focus on secure coding processes and configurations

Client: Goldman Sachs, Bangalore, India Feb 2015 to Jan 2018
Role: Cyber Security Analyst

Responsible for conducting vulnerability assessment scans, assisting with penetration testing, exposing security vulnerabilities and risks, and recommending solutions to mitigate such vulnerabilities
Contributes to building and delivering services, solutions, and processes that enable security defects to be found, fixed, or avoided before applications are released to production
Tracks public and privately released vulnerabilities and assists in the corporate triage process including identification, criticality evaluation, remediation planning, communications, and resolution
Conducts vulnerability assessment scans, exposing security vulnerabilities and risks and recommending solutions to mitigate such vulnerabilities
Guide security strategy through interaction with and direction to, when necessary, other teams in Information Security (e.g., network operations, Cyber)
Threat Operations Center (CTOC), vulnerability management) along with information and liability risk officers and technology management
Aid team members with enhancement and enrichment of security monitoring tools with contextual information
Adhere to all policies and standards, as well as regulatory requirements regarding reporting and escalations
Demonstrated advanced operations with master of two or more of the following: attack surface management, Security Operations Center (SOC) operations, Intrusion
Detection/Intrusion Prevention Systems (IDS/IPS), Security Information and Event
Management (SIEM) use, threats (including Advanced Persistent Threat (APT), insider), vulnerabilities, and exploits; incident response, investigations and remediation.
Excellent experience executing, ethical hacking and penetration testing
Introductory knowledge regarding security vulnerabilities, application analysis, and protocol analysis
Familiarity with classes of vulnerabilities, appropriate remediation, and industry-standard classification schemes (CVE, CVSS, CPE)

Academic Details
Bachelor of Technology in Computer Science and Engineering: Mahatma Gandhi University, India

Certifications:
CEH-Certified Ethical Hacker
Keywords: cprogramm cplusplus continuous integration continuous deployment user interface information technology hewlett packard Georgia Idaho Michigan Texas

To remove this resume please click here or send an email from [email protected] to [email protected] with subject as "delete" (without inverted commas)
[email protected];3520
Enter the captcha code and we will send and email at [email protected]
with a link to edit / delete this resume
Captcha Image: