0% found this document useful (0 votes)
100 views12 pages

Rahul - Profile

Rahul has over 12 years of experience in cyber security roles including cyber security analyst, corporate trainer, certified ethical hacker, vulnerability assessment and penetration tester, security researcher, bug bounty hunter, and digital forensics analyst. He has extensive experience in network security, incident response, vulnerability analysis, penetration testing, and bug bounty hunting. Rahul enjoys participating in capture the flag events and is interested in red teaming, offensive security, exploit development, and malware analysis. He currently seeks a demanding career where he can apply his technical skills and help strengthen an organization's security posture.

Uploaded by

Rahul Goyal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
100 views12 pages

Rahul - Profile

Rahul has over 12 years of experience in cyber security roles including cyber security analyst, corporate trainer, certified ethical hacker, vulnerability assessment and penetration tester, security researcher, bug bounty hunter, and digital forensics analyst. He has extensive experience in network security, incident response, vulnerability analysis, penetration testing, and bug bounty hunting. Rahul enjoys participating in capture the flag events and is interested in red teaming, offensive security, exploit development, and malware analysis. He currently seeks a demanding career where he can apply his technical skills and help strengthen an organization's security posture.

Uploaded by

Rahul Goyal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

RAHUL

Summary

Cyber Security Analyst || Cyber Security Corporate Trainer || Certified Ethical Hacker || Vulnerability
Assessment Penetration Tester || Security Researcher || Bug bounty hunter || Cyber/digital Forensics
Analyst || Network Expert || CTF PLAYER || Malware Analyst || Linux Administrator.

• Highly skilled and driven Professional Cyber Security Analyst with extensive experience in network
security, incident response, and vulnerability analysis. 12+ years of experience in cyber security.

• I work as a penetration tester, bug bounty hunter, and CTF participant. I've done web, network, and
Android application penetration testing before. I have extensive knowledge in network and cloud
security. I enjoy CTF events, particularly Hack the Box and TryHackMe. I'm particularly interested in Red
Teaming and Offensive Security, as well as Exploit Development and Malware Analysis.

• An organized professional with demonstrated teaching, advising, and counselling abilities. Capability to
work as part of a team and professionally address challenges and disagreements. Expertise in
establishing and implementing programs to assist new employees advance professionally. Strong
leadership and motivating abilities and an effective communicator.

• At search of a demanding career at a respectable firm where I can put my technological skills to use and
help strengthen the organization's security posture.

Work Experience

❖ Total Experience - 12+ Years


o Jan 2012 - Present - CYBER SECURITY ANALYST, India.

• For the past decade, I've been a professional in cyber security training.

• Conducted training sessions at over 100 different institutes and MNCs.

• Presented 30+ Cyber Security Awareness events for a range of K–12 institutions, tertiary
institutions, NGOs, and private-sector organizations. coached mentors' teaching methods while

Page 1 of 12
working as a freelance instructor.

• Taught the Cyber Security Awareness workshop at the FCI Group in Mohali.

• Gave the Jalandhar CIS Community's Cyber Security Awareness Program.

• Served as a guest professor in many Punjabi colleges and universities.

• Aided PhD candidates with the creation of their theses.

• Trained more than 2,00000 students (offline and online).


• Successfully completed two months of corporate training on application security and bug bounty
at Nokia in 2023.
• Accomplished effectively the six-month Advanced Ethical Hacking Course Training in 2023. which
I have instructed both academics and students at institutions.
• In 2022, I gave a 10-day workshop on cyber security at Guru Nanak Dev Engineering College. At
the GNDEC in Ludhiana, the training practice session was excellent. I have addressed all pertinent
subjects in this presentation, including social engineering, mobile hacking, DOS/DDOS assaults,
and Wi-Fi penetration testing using all available tools.
• In the year 2022, the GNIMT, Model Town, Ldh held a workshop on advanced ethical hacking. I
have covered every assault in these hands-on training courses, as well as how to set up a red and
blue team to assist users and any company in identifying and fixing system vulnerabilities.

• In twenty-two, I gave a 7-day workshop at Guru Nanak Dev Engineering College on cyberthreats
and risk. I discussed every single element of analyzing zero-day threats in this practical
presentation so that organizations may safeguard their systems and data.
• With great success conducted workshops on cyber security and cyber forensics at the engineering
college of Global Institutes Amritsar in 2022. I addressed on topics like IOT and cloud hacking in
those sessions.
• Effectively completed two months of summer cyber security training in 2022. which I've instructed
academics and students from more than 56 institutions.

o Feb 2022 - June 2022 - CYBER SECURITY TRAINER & VAPT EXPERT, ANSHINFOTECH, India.

• Maintained and monitored firewalls, IDS/IPS, and VPNs as well as other network security tools.

• Helped create and put into place secure network designs.

• Performed routine vulnerability checks and made sure that vulnerabilities were promptly fixed.

• Contributed to the creation and delivery of training for staff on security awareness.

• To guarantee adherence to industry norms and laws, I took part in security audits and assessments.

• Setting up, debugging, and fixing issues with firewalls (such as Cisco ASA, Firepower, Palo Alto, and
FortiGate), remote Internet VPNs, and Cisco ISE.
Page 2 of 12
• The installation of patches, hotfixes, and upgrades on the devices.

• Looking into and taking necessary action in response to threats found by IPS/IDS.

• Assist with the planning, installation, and configuration of sophisticated L2/L3 switch infrastructure.

• Network configuration to guarantee efficient and dependable operations and procedures.

• Manage networking installation, setup, upkeep, and troubleshooting.

• Create and implement tools for network automation and orchestration.

o July 2013 - June 2018 - CYBER SECURITY ANALYST, SMARTWAY SOLUTIONS PVT LTD, India.

• Performed network security analysis and monitoring to find and address any security events.

• Conducted penetration testing and vulnerability assessments to find security flaws and suggest fixing
them.

• Helped create and put into effect security policies and procedures.

• Worked with IT teams to coordinate patch management and optimal security setups.

• Created thorough incident reports and presented management with results.

• Took part in forensic investigations and malware analysis as part of security incident response
efforts.

• Organized and gave a variety of training sessions on VAPT, tryhackme, and vulnhub, among other
topics.

• Taught a variety of computer networks and cyber security courses for Exclaim. A+, AWS, AZURE,
CompTIA Security+, and Cybersecurity

• Looking into and taking necessary action in response to threats found by IPS/IDS.

• Weekly updating of IPS Signature.

• Recording network modifications and updating schematics as necessary.

• Investigating the underlying causes of network issues.

• Contributed to the upkeep of email security, firewalls, web protocols, and virtual private networks.

• Focused on endpoint security, network access controls, perimeter security, and web security
gateway monitoring.

• Worked on maintaining the configuration and security of cloud-based systems while deploying them.

Page 3 of 12
o July 2012 - Present - CTF Player

Hack The Box | TryHackMe | PentesterLab

Since I started playing, it has been around 12 years. I've been working on a variety of problems, including
those involving web, mobile, and network hacking, digital forensics, reverse engineering, cryptography,
OSINT, networking, Linux/Windows issues, and general skills.

• The current top 100 worldwide on HTB.

• Presently in the Top 90 globally on THM.

• Ten certificates obtained from PentesterLab

o January 2016 - Present - Freelancer CYBER SECURITY ANALYST & TRAINER, InstaDot Analytics.

• Motivated and trained teachers to provide exceptional learning environments.

• Assisted in course development and design.

• Reviewed class and student records to look for areas in need of improvement and implemented
plans of action, which student satisfaction and evaluations.

• Managed and assisted students develop life-long learning skills and good study habits.

• Participated in department meetings to provide input to colleagues about student achievement and
improvement.

• Maintained excellent attendance record, consistently arriving to work on time.

Page 4 of 12
Hands On Vulnerabilities

• Local file inclusion (LFI) • SQL injection

• Remote file inclusion (RFI) • Cross Site Scripting (XSS)

• Server-side request forgery (SSRF) • CSRF (Cross-site request forgery)

• Cross-site request forgery (CSRF) • Clickjacking

• Request smuggling • XML external entity (XXE) injection

• Session Hijacking • HTTP request smuggling

• Buffer Overflow • Log4J

• Remote Code Execution • BAC (Broken Access control)

• Fuzzing Command injection • OS command injection

• Directory traversal • Insecure deserialization

• OAuth Broken authentication • Reverse Engineering

• HTTP Host header attacks • HTTP Host header attacks

• WebSocket’s • Web cache poisoning

• File upload vulnerabilities • Information disclosure

• Business logic vulnerabilities • Parameter Tampering

• Brute-force • IDOR

• Cross-origin resource sharing (CORS)

Hands On Tools

Web Application VAPT Network VAPT Wireless PT Forensic Password Bypass

Burp Suite Nmap Aircrack-ng Volatility Hydra

Splunk Nessus Airgeddon Autopsy Medusa

Page 5 of 12
Metasploit Wireshark Fluxion MobSF Johntheripper

Nikto Netcat Wifite ADB Rainbowcrack

SQL Map Dnsrecon Wifipumpkin3 Ghidra Cupp

Acunetix Recon-ng Kismet FTK Imager Crunch

Netspark Mass Scan Reaver Diskdrill

Uniscan Powersploit Maltego

Wp-Scan Ettercap OSINT

Dirbuster Xerosploit EaseUs

Go Buster Hping Bloodhound

Skills

o Technical Skills:

• Cyber Security Analyst • Network Expert

• Cyber Security Trainer • Security Researcher

• Cyber/digital forensics analysis • Ethical Hacking

• Vulnerability Assessment Penetration Testing • Malware analysis

• Bug bounty hunter • Red/Blue Teamer

• Risk Incident Handling Response • CTF PLAYER

• Network Monitoring (Wireshark) • Cryptography

• Database Administrator (SQL, MySQL, Oracle, Mongo-dB, Firebase dB) • Cloud Security

• Programming Skills (C, C++, Java, Python, Ruby, C# and Bash Scripting) • Linux Administrator

• WEB-DEVELOPMENT (HTML, CSS, JAVASCRIPT, JQUERY, PHP, ASP.NET) • Server Designing

• Graphics Designing & Editing (Adobe Photoshop & Coral draw) • Cloud Computing

• Microsoft Office (Word, Excel, PowerPoint) • SOC, SIEM with Tools

Page 6 of 12
• Threat Modelling • Threat Hunting

o Network Security:

• Firewall configuration and management

• Intrusion Detection and Prevention Systems (IDS/IPS)

• Virtual Private Network (VPN) setup and administration

• Secure network architecture design

• Network traffic analysis and packet inspection

o Incident Response:

• Investigating and responding to security incidents

• Malware analysis and removal

• Incident documentation and reporting

• Conducting forensic analysis

o Vulnerability Assessment:

• Conducting regular vulnerability assessments and penetration testing

• Identifying security weaknesses and recommending remediation measures

• Vulnerability scanning tools (e.g., Nessus, OpenVAS)

• Patch management and vulnerability mitigation

o Web Penetration Testing:

• Web application analysis and inspection

• OSINT and information gathering techniques

• Vulnerability assessment of web applications

• OWASP TOP 10 2013 / OWASP Testing guide

• Manual exploitation of XSS, SQLi, web services, HTML5, LFI/RFI

• Exploit development for web environments

Page 7 of 12
o Network Penetration Testing:

• Vulnerability Assessment of Networks

• Advanced Exploitation with Metasploit

• Performing Attacks in Pivoting

• Privilege escalation and Persistence

• Exploit Development

o Android Penetration Testing:

• Reverse engineering Android applications

• Exploit Android vulnerabilities

• Applied security principles

• Encryption and cryptography

o Cloud Computing & Security:

• Cloud Concepts, Architecture and Design

• Cloud Data Security

• Cloud Platform and Infrastructure Security

• Cloud Application Security

• Cloud Security Operations

• Legal, Risk and Compliance

o Windows/Linux OS:

• Provide Linux System Administration

• Linux System Security

• Managed Information security Compliance activities

• Linux server security administration

• Monitored the servers and Linux scripts regularly and performed troubleshooting

Page 8 of 12
• Managed prominent level web applications and worked with windows

o DevSecOps:

• DevOps Implementations

• Continuous Integration & Delivery

• Security & SIEM

• Docker & Containers & Kubernetes

• Alibaba Cloud, AWS, Azure & Google Cloud

• Microservices

• Monitoring & Observability

o Security Tools:

• Security Information and Event Management (SIEM) platforms

• Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)

• Anti-malware and antivirus software

• Vulnerability scanning tools (e.g., Nmap, Nessus, Nigto)

• Network monitoring tools (e.g., Wireshark, Nagios)

o Compliance and Regulations:

• Knowledge of industry standards (e.g., ISO 27001, NIST)

• Familiarity with data privacy laws and regulations (e.g., GDPR, CCPA)

• Conducting security audits and assessments

o Communication and Collaboration:

• Strong verbal and written communication skills

• Ability to explain technical concepts to non-technical stakeholders

• Collaborating with cross-functional teams

• Presenting findings and recommendations to management

Page 9 of 12
o Soft Skills:

• Critical thinking skills • Coaching

• Time management skills • Mentoring

• Organizational skills • Leadership

• Establishing work objectives and strategies • Professional development

• Decision-making skills • Performance management

• Communication skills • Presentation software

• Public speaking • Business Interpersonal Skills

Major Projects

• In 2013, an event to find vulnerabilities and get access to vulnerable systems was completed
successfully. Numerous institutes take part in this event and get awards.

• Successfully held international "Cyberthon" hackathons for cyber security at CT University.

• Completed the development of the Traffic Signal Violation Detection System and presented it at
the 2017 Hackathon Competition.

• Successfully trained students in networking and CCNA at the Cisco Networking Academy.

• Create web apps for diverse companies that are E-commerce protected and have enough
security in place.

• Installed a 4G network infrastructure for MMU Mullana's Super Specialty Hospital, an eight-story
building with more than 1500 data points.

• The 2012 CTF Competition at OIVET was a success. This features participation from several
institutions and skill demonstrations by international cyber security experts.

• Used technical workshops to improve the study and learning performance of students. created
immersive "boot camp"-style settings.

• Creating and implementing High-interaction Honeypots to safeguard diverse businesses' systems


and networks against viruses and threats from malicious users.

Page 10 of 12
• Expertly established up the news channel data center/server room, a partner company of MMU
University. It has 72 TB of fiber channel SAN storage for servers running Windows and Mac. For
redundancy and WASP 3D playout servers and clients, a dual leased line configuration is used.

Certifications

• Certified in Cybersecurity from ISC2.

• API Penetration Testing from APISEC UNIVERSITY.

• API Security Fundamentals from APISEC UNIVERSITY.

• ISO/IEC 27001 Information Security Associate from Skill Front.

• Foundations of Business and Entrepreneurship from Skill Front.

• Duolingo English Test from Duolingo.

• Crash Course on Python from Google.

• Technical Support Fundamentals from Google.

• Foundations of Project Management from Google.

• Foundations: Data, Data, everywhere from Google.

• Foundations of User Experience (UX) Design from Google.

• Foundations of Digital Marketing and E-commerce from Google.

• Netflix Clone from Google.

• SQL Injection Attacks from EC-Council.

• Cyber Shiksha for Beginners from Quick Heal Academy.

• Practical Ethical Hacking from TCM Security.

• Certified Ethical Hacking Masterclass: Beginner to Advance from Udemy.

• Digital Forensics for Pen testers from Udemy.

• Cybersecurity Essentials from Cisco Networking Academy.

• Introduction to Cybersecurity from Cisco Networking Academy.

• CCNA: Switching, Routing, and Wireless Essentials from Cisco Networking Academy.

• CCNAv7: Introduction to Networks from Cisco Networking Academy.

Page 11 of 12
• NDG Linux from Cisco Networking Academy.

• PCAP: Programming Essentials Python from Cisco Networking Academy.

• Certified Entrepreneurship Instructor from Cisco Networking Academy.

• AWS Academy Graduate - AWS Academy Cloud Foundations from Amazon Web Services (AWS).

• Mobile App Security from Cybrary.

• Welcome to Cybrary from Cybrary.

• C++ Training Essentials from IIT Bombay.

• C Training from IIT Bombay.

• Penetration Testing with KALI and More: All You Need to Know from Udemy.

• The Complete Python 3 Course: Beginner to Advanced! from Udemy.

• The Complete 2021 PHP Full Stack Web Developer Bootcamp from Udemy.

• Full Stack: Angular and Spring Boot from Udemy.

• Certification in the LibreOffice Suite Calc Training from IIT Bombay.

• Certification in the Introduction to Computers Training from IIT Bombay.

• Certified Secure Computer User (CSCU) v2 (Complete Series) from EC-Council.

Page 12 of 12

You might also like