Akhil sabu
Cyber Security Engineer at Ontinue- Claim this Profile
Click to upgrade to our gold package
for the full feature experience.
Topline Score
Bio
Shane Walker, CISSP, PMP, CEH, CASP, MCCT
We used Akhil's expertise to help our company quickly find and remediate vulnerabilities on our website. Akhil was responsive, communicated professionally, and was happy to help us better understand and patch the vulnerabilities that were found. I recommand Akhil as a resource for your Red Team. Keep up the good work Ahkil!
Daniel Sloan
Akhil is a valued team member and we are very proud that he was recently inducted into Google's Cybersecurity Hall of Fame. I think this award speaks volume to his level of expertise.
Shane Walker, CISSP, PMP, CEH, CASP, MCCT
We used Akhil's expertise to help our company quickly find and remediate vulnerabilities on our website. Akhil was responsive, communicated professionally, and was happy to help us better understand and patch the vulnerabilities that were found. I recommand Akhil as a resource for your Red Team. Keep up the good work Ahkil!
Daniel Sloan
Akhil is a valued team member and we are very proud that he was recently inducted into Google's Cybersecurity Hall of Fame. I think this award speaks volume to his level of expertise.
Shane Walker, CISSP, PMP, CEH, CASP, MCCT
We used Akhil's expertise to help our company quickly find and remediate vulnerabilities on our website. Akhil was responsive, communicated professionally, and was happy to help us better understand and patch the vulnerabilities that were found. I recommand Akhil as a resource for your Red Team. Keep up the good work Ahkil!
Daniel Sloan
Akhil is a valued team member and we are very proud that he was recently inducted into Google's Cybersecurity Hall of Fame. I think this award speaks volume to his level of expertise.
Shane Walker, CISSP, PMP, CEH, CASP, MCCT
We used Akhil's expertise to help our company quickly find and remediate vulnerabilities on our website. Akhil was responsive, communicated professionally, and was happy to help us better understand and patch the vulnerabilities that were found. I recommand Akhil as a resource for your Red Team. Keep up the good work Ahkil!
Daniel Sloan
Akhil is a valued team member and we are very proud that he was recently inducted into Google's Cybersecurity Hall of Fame. I think this award speaks volume to his level of expertise.
Credentials
-
Certified Ethical Hacker (CEH)
EC-CouncilJan, 2014- Nov, 2024 -
Cisco Certified Network Associate Service Provider Operations (CCNA)
CiscoApr, 2013- Nov, 2024 -
Amazon Web Services Cloud Practitioner
Amazon Web Services (AWS) -
Azure Fundamentals
Microsoft -
Cyber security Researcher
K7 Computing Pvt. Ltd. -
Master in Ethical Hacking
Udemy -
Vulnerability Management Detection and Response (VMDR)
Qualys
Experience
-
Ontinue
-
Computer and Network Security
-
100 - 200 Employee
-
Cyber Security Engineer
-
Jul 2021 - Present
● conduct vulnerability assessments and identify potential security vulnerabilities in our systems and network infrastructure using tools - Microsoft Defender, Qualys, and InsightVM ● Analyze vulnerability scan results and security assessment reports from multiple tools to determine the severity and potential impact of identified vulnerabilities. ● Collaborate with cross-functional teams to prioritize and remediate vulnerabilities based on risk levels. ● Develop and maintain vulnerability management processes and procedures to ensure effective vulnerability identification, tracking, and resolution. ● Stay up-to-date with the latest security vulnerabilities, exploits, and industry best practices. ● Provide recommendations for improving the overall security posture of the organization based on vulnerability analysis findings from multiple tools. ● Work closely with the IT and security teams to ensure timely and effective remediation of identified vulnerabilities. ● Conduct regular vulnerability assessments and security audits to proactively identify potential risks and vulnerabilities. ● Participate in incident response activities, including investigating security incidents and providing technical support Show less
-
-
-
Accubits Technologies Inc
-
United States
-
IT Services and IT Consulting
-
200 - 300 Employee
-
Cyber Security Analyst
-
Jun 2020 - Jul 2021
● Collaborate with development, operations, and security teams to integrate security controls and best practices into the software development lifecycle. ● Design, implement, and maintain secure infrastructure and tools for continuous integration, deployment, and delivery (CI/CD) pipelines. ● Automate security testing, vulnerability scanning, and code analysis processes to identify and remediate security issues. ● Conduct security reviews and risk assessments of applications, systems, and infrastructure. ● Implement and monitor security controls and solutions to detect and respond to security threats and incidents. ● Establish and enforce security policies, standards, and guidelines across development and operations teams. ● Provide guidance and support to development teams in secure coding practices and secure architecture design. ● Stay up-to-date with the latest security trends, vulnerabilities, and industry best practices. ● Participate in incident response activities, including investigating security incidents and providing technical support. ● Collaborate with external security vendors and conduct security assessments of third-party services and applications Show less
-
-
-
K7 Computing
-
India
-
Computer and Network Security
-
200 - 300 Employee
-
Cyber Security Researcher
-
Jun 2019 - May 2020
● Performing Penetration Testing of Network and Web Applications, Configuration reviews, Vulnerability Management. ● Performing Penetration Testing of Mobile Application based on IOS and Android mobile platforms. ● Experience of running vulnerability scanner and penetration testing on Devices and analyzing the reports. ● Performing Configuration Review for Operating systems, Web servers , Databases as per CIS benchmark. ● Expertise in designing & executing the test cases is inspired from OWASP –Top 10 for Web application. ● Performed Black box Penetration Testing to identify critical weakness in Client’s Internet facing Infrastructure assets and provided solutions to fix them. ● Conducting malware analysis using the methodology of dynamic analysis ● Analyzing network traffic and various log data to determine the threat/impact on the network ● Implementing essential changes to enhance reporting, communications, and workflow related to VM and patching teams ● Fair Understanding of Windows Servers, Linux, TCP/IP, Network Security,encryption standards Show less
-
-
Education
-
Ahalia School of Engineering and Technology, Palakkad
Bachelor of Technology - BTech