Dhruv Shah
Technical Director ( Trainings & Research ) at NotSoSecure | part of Claranet Cyber Security- Claim this Profile
Click to upgrade to our gold package
for the full feature experience.
Topline Score
Bio
Sohail Najar
Dhruv is an ideal team member you want while on pen testing engagement. His willingness to experiment, listen and learn and quickly adapt to the pressure is admirable. He is driven and self motivated and a geek and as a fellow geek my interactions were always pleasurable and humorous and you always need that when pushed hard against deadlines.
Milin Shah, CISSP
Dhruv aka Snypter, I have known him from long and I know for the fact that he is most witty, smart person and too Cool Person to hangout with. He is a person with a target and dedication, he may not take the task until he is confident he will do it, and once he is assured that he can do it, come what may he will do it. Talking about Security / Hacking, he is at best at his work. A perfect Security Geek you can say. I can vouch for him blindly for his work!
Sohail Najar
Dhruv is an ideal team member you want while on pen testing engagement. His willingness to experiment, listen and learn and quickly adapt to the pressure is admirable. He is driven and self motivated and a geek and as a fellow geek my interactions were always pleasurable and humorous and you always need that when pushed hard against deadlines.
Milin Shah, CISSP
Dhruv aka Snypter, I have known him from long and I know for the fact that he is most witty, smart person and too Cool Person to hangout with. He is a person with a target and dedication, he may not take the task until he is confident he will do it, and once he is assured that he can do it, come what may he will do it. Talking about Security / Hacking, he is at best at his work. A perfect Security Geek you can say. I can vouch for him blindly for his work!
Sohail Najar
Dhruv is an ideal team member you want while on pen testing engagement. His willingness to experiment, listen and learn and quickly adapt to the pressure is admirable. He is driven and self motivated and a geek and as a fellow geek my interactions were always pleasurable and humorous and you always need that when pushed hard against deadlines.
Milin Shah, CISSP
Dhruv aka Snypter, I have known him from long and I know for the fact that he is most witty, smart person and too Cool Person to hangout with. He is a person with a target and dedication, he may not take the task until he is confident he will do it, and once he is assured that he can do it, come what may he will do it. Talking about Security / Hacking, he is at best at his work. A perfect Security Geek you can say. I can vouch for him blindly for his work!
Sohail Najar
Dhruv is an ideal team member you want while on pen testing engagement. His willingness to experiment, listen and learn and quickly adapt to the pressure is admirable. He is driven and self motivated and a geek and as a fellow geek my interactions were always pleasurable and humorous and you always need that when pushed hard against deadlines.
Milin Shah, CISSP
Dhruv aka Snypter, I have known him from long and I know for the fact that he is most witty, smart person and too Cool Person to hangout with. He is a person with a target and dedication, he may not take the task until he is confident he will do it, and once he is assured that he can do it, come what may he will do it. Talking about Security / Hacking, he is at best at his work. A perfect Security Geek you can say. I can vouch for him blindly for his work!
Credentials
-
Offensive Security Certified Professional (OSCP)
Offensive SecurityJun, 2017- Nov, 2024 -
EC-Council Certified Security Analyst (ECSA)
EC-CouncilMay, 2012- Nov, 2024 -
Cisco Certified Network Associate
CiscoMar, 2012- Nov, 2024 -
Certified Ethical Hacker v6 (C|EH)
EC-CouncilNov, 2011- Nov, 2024 -
Certified Information Security Expert
Innobuzz Knowledge Solutions Private LimitedSep, 2010- Nov, 2024
Experience
-
NotSoSecure Training part of Claranet Cyber Security
-
United Kingdom
-
Information Technology & Services
-
1 - 100 Employee
-
Technical Director ( Trainings & Research )
-
Oct 2021 - Present
-
-
Associate Director
-
Oct 2020 - Oct 2021
-
-
Principal Security Consultant
-
Jan 2019 - Oct 2020
-
-
Senior Security Consultant
-
Nov 2017 - Jan 2019
-
-
-
Aujas Cybersecurity
-
United States
-
Computer and Network Security
-
700 & Above Employee
-
Senior Information Security Consultant
-
Apr 2015 - Nov 2017
1) Vulnerability Assessments and Pen Testing Activities to identify potential patch, configuration and design related issues in networks across the globe 2) Web application Penetration Tests Based on NIC standards and OWASP Standards 3) Mobile Application Pentesting and assisting the Developers with better alternatives towards patching the business logic bypasses 4) Review best practice guides for securing and hardening systems and network devices. 5) Ensuring the… Show more 1) Vulnerability Assessments and Pen Testing Activities to identify potential patch, configuration and design related issues in networks across the globe 2) Web application Penetration Tests Based on NIC standards and OWASP Standards 3) Mobile Application Pentesting and assisting the Developers with better alternatives towards patching the business logic bypasses 4) Review best practice guides for securing and hardening systems and network devices. 5) Ensuring the Gaps identified in third party audits are addressed to the team and as a base sample of understanding the flaws and fixes for across the segment. 6) Acquire and disseminate knowledge of latest security technology developments from tech blogs, Bulletin Boards to the team via communication channels and as Company News Bytes. 7) Assist in creating of testing checklists to ensure efficiency, quality and timely delivery 8) Ensuring the Applications owned by the organization are mitigated from any cyber security attacks. Show less 1) Vulnerability Assessments and Pen Testing Activities to identify potential patch, configuration and design related issues in networks across the globe 2) Web application Penetration Tests Based on NIC standards and OWASP Standards 3) Mobile Application Pentesting and assisting the Developers with better alternatives towards patching the business logic bypasses 4) Review best practice guides for securing and hardening systems and network devices. 5) Ensuring the… Show more 1) Vulnerability Assessments and Pen Testing Activities to identify potential patch, configuration and design related issues in networks across the globe 2) Web application Penetration Tests Based on NIC standards and OWASP Standards 3) Mobile Application Pentesting and assisting the Developers with better alternatives towards patching the business logic bypasses 4) Review best practice guides for securing and hardening systems and network devices. 5) Ensuring the Gaps identified in third party audits are addressed to the team and as a base sample of understanding the flaws and fixes for across the segment. 6) Acquire and disseminate knowledge of latest security technology developments from tech blogs, Bulletin Boards to the team via communication channels and as Company News Bytes. 7) Assist in creating of testing checklists to ensure efficiency, quality and timely delivery 8) Ensuring the Applications owned by the organization are mitigated from any cyber security attacks. Show less
-
-
-
AAA Technologies Ltd.
-
India
-
Computer and Network Security
-
1 - 100 Employee
-
Information Security Consultant
-
Feb 2012 - Apr 2015
Responsibilities: • Vulnerable Assessment of Hosts ,Networks, Mobile Devices , Applications • Penetration Testing of Hosts, Networks, Mobile Devices , Applications • Knowledge and Application of OWASP Top 10 • Performing audits based according to NIC standards. • Take up the Key responsibility of Handling a Project • Closely worked with the development team to help fix vulnerabilities • Provide alternative solutions for remediation of bugs in case of business… Show more Responsibilities: • Vulnerable Assessment of Hosts ,Networks, Mobile Devices , Applications • Penetration Testing of Hosts, Networks, Mobile Devices , Applications • Knowledge and Application of OWASP Top 10 • Performing audits based according to NIC standards. • Take up the Key responsibility of Handling a Project • Closely worked with the development team to help fix vulnerabilities • Provide alternative solutions for remediation of bugs in case of business requirements. AAA Technologies is a Premier Independent Auditing and Consulting Company in the area of IS Audit, Information Security, IT Assurance & compliance, IT Governance and rendering these services since the year 2000.To strengthen the internal processes, AAA Technologies have got ISO 9001:2008 Certified. The Company also got itself ISO 27001:2005 Certified as it deals with confidential information of the clients.AAA Technologies has experienced professionals with International Certifications like CGEIT (Certified in Governance of Enterprise IT), CRISC (Certified in Risk and Information Systems Control), CISA (Certified Information Systems Auditor), CISM (Certified Information Security Manager), CISSP ( Certified Information Systems Security Professional), CEH (Certified Ethical Hacker), ISO 27001 LA, BS 25999, CFE (Certified Fraud Examiner), CA (Chartered Accountant), MBA (Master in Business Administration), ABCI (Associate of Business Continuity Institute), CIA (Certified Internal Auditor). AAA Technologies has been Empaneled in many Government Bodies. Show less Responsibilities: • Vulnerable Assessment of Hosts ,Networks, Mobile Devices , Applications • Penetration Testing of Hosts, Networks, Mobile Devices , Applications • Knowledge and Application of OWASP Top 10 • Performing audits based according to NIC standards. • Take up the Key responsibility of Handling a Project • Closely worked with the development team to help fix vulnerabilities • Provide alternative solutions for remediation of bugs in case of business… Show more Responsibilities: • Vulnerable Assessment of Hosts ,Networks, Mobile Devices , Applications • Penetration Testing of Hosts, Networks, Mobile Devices , Applications • Knowledge and Application of OWASP Top 10 • Performing audits based according to NIC standards. • Take up the Key responsibility of Handling a Project • Closely worked with the development team to help fix vulnerabilities • Provide alternative solutions for remediation of bugs in case of business requirements. AAA Technologies is a Premier Independent Auditing and Consulting Company in the area of IS Audit, Information Security, IT Assurance & compliance, IT Governance and rendering these services since the year 2000.To strengthen the internal processes, AAA Technologies have got ISO 9001:2008 Certified. The Company also got itself ISO 27001:2005 Certified as it deals with confidential information of the clients.AAA Technologies has experienced professionals with International Certifications like CGEIT (Certified in Governance of Enterprise IT), CRISC (Certified in Risk and Information Systems Control), CISA (Certified Information Systems Auditor), CISM (Certified Information Security Manager), CISSP ( Certified Information Systems Security Professional), CEH (Certified Ethical Hacker), ISO 27001 LA, BS 25999, CFE (Certified Fraud Examiner), CA (Chartered Accountant), MBA (Master in Business Administration), ABCI (Associate of Business Continuity Institute), CIA (Certified Internal Auditor). AAA Technologies has been Empaneled in many Government Bodies. Show less
-
-
-
Innobuzz Knowledge Solutions Private Limited
-
Computer and Network Security
-
1 - 100 Employee
-
Information Security Trainer and Researcher
-
Sep 2010 - Feb 2012
Worked here as a Trainer and Researcher for more than a Year , Taught 1) Basics of Hacking 2) How to conduct a VAPT 3) Wireless Hacking Etc Innobuzz privately owned Indian company based out of New Delhi, India which has been providing high technology training and knowledge based solutions. The registered office is located in Connaught Place, New Delhi, India. Innobuzz was incorporated in Jan 2010 and has grown from a Information Security Training Startup to a… Show more Worked here as a Trainer and Researcher for more than a Year , Taught 1) Basics of Hacking 2) How to conduct a VAPT 3) Wireless Hacking Etc Innobuzz privately owned Indian company based out of New Delhi, India which has been providing high technology training and knowledge based solutions. The registered office is located in Connaught Place, New Delhi, India. Innobuzz was incorporated in Jan 2010 and has grown from a Information Security Training Startup to a Multi-National IT Training Brand with extensive reach in South East Asia.Innobuzz has a strong presence in Malaysia, Sri Lanka, Nigeria, USA and Canada, apart from many other countries, The flagship offering of Innobuzz is providing training on Information Security, which is delivered to its audience all over the world via Computer Based Training Courses, Onsite Training Programs and Company Owned/Franchise owned learning centers. Show less Worked here as a Trainer and Researcher for more than a Year , Taught 1) Basics of Hacking 2) How to conduct a VAPT 3) Wireless Hacking Etc Innobuzz privately owned Indian company based out of New Delhi, India which has been providing high technology training and knowledge based solutions. The registered office is located in Connaught Place, New Delhi, India. Innobuzz was incorporated in Jan 2010 and has grown from a Information Security Training Startup to a… Show more Worked here as a Trainer and Researcher for more than a Year , Taught 1) Basics of Hacking 2) How to conduct a VAPT 3) Wireless Hacking Etc Innobuzz privately owned Indian company based out of New Delhi, India which has been providing high technology training and knowledge based solutions. The registered office is located in Connaught Place, New Delhi, India. Innobuzz was incorporated in Jan 2010 and has grown from a Information Security Training Startup to a Multi-National IT Training Brand with extensive reach in South East Asia.Innobuzz has a strong presence in Malaysia, Sri Lanka, Nigeria, USA and Canada, apart from many other countries, The flagship offering of Innobuzz is providing training on Information Security, which is delivered to its audience all over the world via Computer Based Training Courses, Onsite Training Programs and Company Owned/Franchise owned learning centers. Show less
-
-
Education
-
University of Mumbai
Master’s Degree, Information Technology -
University of Mumbai
Bachelor's Degree, Computers