Your browser is outdated!

To ensure you have the best experience and security possible, update your browser. Update now

×

Rahul Singh Patel

Cyber Security Consultants with 7 year of Expereince

Professional Status
Employed
Available
About Me
Experience in Penetration testing, Vulnerability Assessment ,Incident management and Web application security audit with 7 years of experience in cyber security domains in a wide variety of roles.
Resume created on DoYouBuzz
  • Performed Vulnerability Scanning & Penetration Testing.
  • Performed host, network, and web application penetration tests.
  • Performed network security analysis and risk management for designated systems.
  • Created OWASP web application test cases and mapped them to associated security controls.
  • Performed Vulnerability Assessments and Data Classification. Suggested Hardening measures to senior management on analyzed results and worked closely with other Information Technology groups to refine and enhance security controls.
Company Description
Wipro Limited is an Indian multinational Digital Strategy, IT Consulting and System Integration services company headquartered in Bangalore, India.
Company website
  • Conducting Penetration testing & assessment of systems, networks devices like routers, switch & Firewall.
  • Conducted Technical Risk Assessment (Vulnerability Assessment) using NESSUS, NMAP.
  • Documenting conclusions about the Measure of Risk of the systems based on Business Impact Analysis and Threat Likelihood for the systems.
  • Security audit and hardening of technology assets.
  • Defining, building and assessing security policies for windows, UNIX flavours, Firewall, database, Network devices Like switch, router.
  • Created Secure configuration Documents of Network and Security Devices
  • Black Box , White Box Penetration Testing
  • Web application Penetration Testing Configuration Audit
  • Vulnerability Assessment using Nessus ,N map,GFI Languard ,hp web inspect, Burp suite
  • Event Management using GFI Event Manager
  • Defining, building and assessing security policies for windows, UNIX flavours, Firewall, database, Network devices like switches, routers
  • Generate & present summary reports to present to management
  • Determines threat / risk level for prioritization of resolution activities
  • Network and security administration (firewalls, IDPS, routers, VPN, application gateways, etc.)
  • Logs analysis, trends reporting, proactive anomaly detection,
  • Intrusion detection, availability monitoring, incident handling and response within SLAs,
  • Security audit and hardening of technology assets.
  • Vulnerability Management (in relation to PCI DSS standards)
  • Web Application Security audit with Owasp testing guide and Samurai as well burp suite , Hp Web Inspect, Acunetix , W3af and as well as support the Application development team in finding out the vulnerabilities in the Application and resolving of the issue
  • Understanding the business process and functions supported by the information systems
  • Identifying the likelihood of the threats to that the systems are exposed
  • Conducted Technical Risk Assessment (Vulnerability Assessment) using Retina, NESSUS, ,
    NMAP
  • Documenting conclusions about the Measure of Risk of the systems based on Business Impact
    Analysis and Threat Likelihood for the systems
  • Drafting reports on Risk Assessment
  • Conducting Penetration testing & assessment of systems, networks, routers & Firewalls
  • Developed end-user awareness educational materials
  • Network/System Administration Security Network Design/Maintenance
  • Intrusion Detection & Prevention Data Recovery Planning Programming/Databases
  • Attack methodology, and executing these on the various build systems.
  • Creation of audit policy documents for security build compliance and negotiation with various teams for an agreement.
  • Engages in problem solving across business, operations, compliance and IT; often needs to develop new methods to apply to
    the situation
  • Provided guidance for proper implementation of DDoS mitigation at internet facing routers
Detailed Description
  • C P Softechis at the forefront of providing IT services and solutions to customers. The company uses a strategic 'one vendor - complete solutions' approach. Today C P Softech high quality and cost effective solutions span across the practice areas of ERP, CRM, Microsoft Suite and BI&DW. C P Softech technology partners form the critical link to its successful customer relationships. C P Softech successfully partnerships with some of the leading names in the industry.

    C P Softech continues its quest for technology partners who can add the value of their best practices and proven methodologies to help infinite solutions deliver superior services and greater value to its customers.
  • This book is based on current advanced social engineering attacks using SET that help you learn how security
    can be breached and thus avoid it. You will attain a very unique ability to perform a security audit based on
    social engineering attacks.
  • Performing Advance Persist ant Attack like Spear-phishing attack vector, Web jacking, Java Applet Attack and many more
  • Mastering the Art of Different Social Engineering attack
Company Description
Packt is one of the most prolific and fast-growing tech book publishers in the world. Originally focused on open source software, Packt pays a royalty on relevant books directly to open source projects. These projects have received over $400,000 as part of Packt’s Open Source Royalty Scheme to date.

Our books focus on practicality, recognising that readers are ultimately concerned with getting the job done. Packt’s digitally-focused business model allows us to publish up-to-date books in very specific areas.

With over 1000 books published, Packt now offers a subscription service. This app and a PacktLib subscription now makes finding the information you need easier than ever before.