resume

Not in love with this template? Browse our full library of resume templates

boy

Build your resume in 15 minutes

Use professional field-tested resume templates that follow the exact resume rules employers look for.
6

security engineer

  • Securing systems
  • CCTV installation,
  • Bagage scanner programming
  • Ticketing tools: BMC Remedy.
7

security engineer

  • Installation of metal detector doors
  • CCTV installation
  • Repair and installation of astrophysics devices
  • Managing the RADIUS server which is being used for VPN authentication.
8

security engineer

  • Perform security tests on networks, web-based applications, and computer systems. 
  • Create detailed reports on vulnerabilities, to show how they can be performed and exploited.
  • Created tool for monitoring googlebot activity on the servers.
  • Consult developers for the implementations of different methods of encryption and help them build applications using the best security practices.
9

security engineer

  • Working on product cyber security which involves IOT pentesting.
  • Reversing Firmware and Binary
  • Web, Mobile and Cloud pentesting
  • Bluetooth, RF, Modbus and other protocols
  • GSM, 3G and LTE pentesting
  • Inhouse automation
10

security engineer

  •  Perform security reviews and provide insights throughout all phases of software development 
  • Work with IT Groups to define, develop, socialize and execute long-term application security roadmap 
  • Conducted web penetration testing to identify OWASP Top 10 security threats and proficient in remediating application level vulnerabilities like XSS, SQL Injection, CSRF, authentication bypass, cryptographic attacks, authentication flaws developed in different platforms like Microsoft .NET, PHP, Java, React JS, Ruby using Checkmarx and triage the findings with Burpsuite 
  • Threat model web applications and work with development team throughout the agile SDLC 
  • Integration of ISO 27001, NIST Cyber Security Framework, Cloud Security Alliance – CAIQ Consensus Security Risk Assessment to assess new vendors 
  • Running initial, online and onsite risk assessments on systems of the vendors and the third parties with the help of industry standards like CIS, PCI and frameworks like NIST and ISO
  • Collaborated with Business Owners to mitigate true-positive vulnerabilities that requires high urgency to be fixed. Developed technical matrix, diagrams, and data flow mapping to identify process and threats