I have nearly a decade of experience providing propitious Cyber security services to corporates with a Cent percent job success. My expertise in Vulnerability assessment and penetration testing is helping the corporates to build secure cyberspace in the digital arena. Quality of work is something I can never compromise with.
I opt for Manual testing than Automation makes me stand out from the crowd in the market. I Create my parameters and custom scripts for testing an application is my unique value proposition.
The standards I follow:
(i) OWASP Top 10
(ii) SANS Top 25
The crux of my expertise in different digital platforms are:
(i) Web application: Finding business logic flaws, Server based and client-based vulnerabilities to find an apt solution for the same
(ii) Network: Evaluation of Network and application through manual devices like Nmap, recon-ng, sslyze, sslscan, msfconsole, and so on. Expertise in bypassing the firewall and WAF from manual devices utilizing Null queries. I can likewise cater to Buffer overflow weakness.
(iii) Mobile Application: I follow penetration testing methodology in light of OWASP mobile application security standards. We focus on-device application security, device-level security, storage security & transport layer security.
(iv) Cloud Infra Assessment: Focus on user-owned assets, IAM user permissions configuration, and the utilization of the cloud APIs incorporated into the ecosystem.
My Certificates across different Accreditations
Certified Ethical Hacker (CEH)
Red-hat Certified Engineer (RHCE)
Red Hat Certified System Administrator (RHCSA) from Redhat
Access Data Certified Investigator (ADCI)
Certified Network Security Specialist (CNSS) From ICSI
Network + from CompTIA Certified Cloud Security Professional (CCSP)
Bug Bounty Certified Hacker
I am a perfect fit for your requirement since
(i) Candid updates on the projects
(ii) A cent percent Job Success
(iii) Utmost focus on the Quality of the work
(iv) Competitive price