
Saurabh M
Cybersecurity Specialist and Penetration Tester
Skills

See my services

Portfolio
Work experience
Senior Information Security Professional
LSE • Full-time
Aug 2020 - Present • 5 yrs 9 mos
• Developing cyber defence capabilities to protect the group from cyber threats which seek to impact the Confidentiality, Integrity, and Availability of the group assets. • Building and developing various attack scenarios using MITRE ATT&CK framework. • Working on Breach and attack simulation (BAS) approach to mimic real-world security threats to help businesses prepare incident response plans and discover potential vulnerabilities in their security systems. • Providing AttackIQ trainings and workshops to various control owners and stakeholders. • Managing PowerBI reporting and producing useful dashboards for senior leadership. • Test assets on Qualys for vulnerabilities and authentication, using methods like Public Key Authentication, SSH, etc. • Advise clients on risk mitigation strategies and security best practices. • Create extensive documentation of build books processes and procedures • Maintain Qualys platform assurance and Exclusion records • Provide security analysis and assessments training. • Collaborate with teams for Cloud Agent deployment on Amazon EC2 and Azure instances. Check for compliance and violations. • Handle Policy Compliance Scanning of hosts against defined controls. Create and maintain policies, and profiles per the Compliance Standards. • Work on Incident Response
System Security Analyst
BT • Full-time
Sep 2019 - Feb 2020 • 5 mos
Information Security Analyst
Tech Mahindra • Full-time
May 2015 - Jul 2018 • 3 yrs 2 mos
As a part of application Security Services offshore delivery team for US’s large telecom client; performing application Penetration Testing,Code reviews and remediation support for all the identified security vulnerabilities Performing Architecture Review for new features and initiatives. Web application Vulnerabilities Assessment, Risk Management and Compliance check Implemented Information Security Policies and Procedures, Implement security checklist Building and continuously improving application security policies and processes. Interacting with different application teams to get functional knowledge of the application for development of security test cases. Attempting to implement SDLC by building security standards, policies for secure coding, secure data handling, secure networking, secure crypto implementation etc for web and mobile applications.