Dhruv Shah

Technical Director ( Trainings & Research ) at NotSoSecure | part of Claranet Cyber Security
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
Mumbai, Maharashtra, India, IN

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

5.0

/5.0
/ Based on 2 ratings
  • (2)
  • (0)
  • (0)
  • (0)
  • (0)

Filter reviews by:

Sohail Najar

Dhruv is an ideal team member you want while on pen testing engagement. His willingness to experiment, listen and learn and quickly adapt to the pressure is admirable. He is driven and self motivated and a geek and as a fellow geek my interactions were always pleasurable and humorous and you always need that when pushed hard against deadlines.

Milin Shah, CISSP

Dhruv aka Snypter, I have known him from long and I know for the fact that he is most witty, smart person and too Cool Person to hangout with. He is a person with a target and dedication, he may not take the task until he is confident he will do it, and once he is assured that he can do it, come what may he will do it. Talking about Security / Hacking, he is at best at his work. A perfect Security Geek you can say. I can vouch for him blindly for his work!

You need to have a working account to view this content.
You need to have a working account to view this content.

Credentials

  • Offensive Security Certified Professional (OSCP)
    Offensive Security
    Jun, 2017
    - Nov, 2024
  • EC-Council Certified Security Analyst (ECSA)
    EC-Council
    May, 2012
    - Nov, 2024
  • Cisco Certified Network Associate
    Cisco
    Mar, 2012
    - Nov, 2024
  • Certified Ethical Hacker v6 (C|EH)
    EC-Council
    Nov, 2011
    - Nov, 2024
  • Certified Information Security Expert
    Innobuzz Knowledge Solutions Private Limited
    Sep, 2010
    - Nov, 2024

Experience

    • United Kingdom
    • Information Technology & Services
    • 1 - 100 Employee
    • Technical Director ( Trainings & Research )
      • Oct 2021 - Present

    • Associate Director
      • Oct 2020 - Oct 2021

    • Principal Security Consultant
      • Jan 2019 - Oct 2020

    • Senior Security Consultant
      • Nov 2017 - Jan 2019

    • United States
    • Computer and Network Security
    • 700 & Above Employee
    • Senior Information Security Consultant
      • Apr 2015 - Nov 2017

      1) Vulnerability Assessments and Pen Testing Activities to identify potential patch, configuration and design related issues in networks across the globe 2) Web application Penetration Tests Based on NIC standards and OWASP Standards 3) Mobile Application Pentesting and assisting the Developers with better alternatives towards patching the business logic bypasses 4) Review best practice guides for securing and hardening systems and network devices. 5) Ensuring the… Show more 1) Vulnerability Assessments and Pen Testing Activities to identify potential patch, configuration and design related issues in networks across the globe 2) Web application Penetration Tests Based on NIC standards and OWASP Standards 3) Mobile Application Pentesting and assisting the Developers with better alternatives towards patching the business logic bypasses 4) Review best practice guides for securing and hardening systems and network devices. 5) Ensuring the Gaps identified in third party audits are addressed to the team and as a base sample of understanding the flaws and fixes for across the segment. 6) Acquire and disseminate knowledge of latest security technology developments from tech blogs, Bulletin Boards to the team via communication channels and as Company News Bytes. 7) Assist in creating of testing checklists to ensure efficiency, quality and timely delivery 8) Ensuring the Applications owned by the organization are mitigated from any cyber security attacks. Show less 1) Vulnerability Assessments and Pen Testing Activities to identify potential patch, configuration and design related issues in networks across the globe 2) Web application Penetration Tests Based on NIC standards and OWASP Standards 3) Mobile Application Pentesting and assisting the Developers with better alternatives towards patching the business logic bypasses 4) Review best practice guides for securing and hardening systems and network devices. 5) Ensuring the… Show more 1) Vulnerability Assessments and Pen Testing Activities to identify potential patch, configuration and design related issues in networks across the globe 2) Web application Penetration Tests Based on NIC standards and OWASP Standards 3) Mobile Application Pentesting and assisting the Developers with better alternatives towards patching the business logic bypasses 4) Review best practice guides for securing and hardening systems and network devices. 5) Ensuring the Gaps identified in third party audits are addressed to the team and as a base sample of understanding the flaws and fixes for across the segment. 6) Acquire and disseminate knowledge of latest security technology developments from tech blogs, Bulletin Boards to the team via communication channels and as Company News Bytes. 7) Assist in creating of testing checklists to ensure efficiency, quality and timely delivery 8) Ensuring the Applications owned by the organization are mitigated from any cyber security attacks. Show less

    • India
    • Computer and Network Security
    • 1 - 100 Employee
    • Information Security Consultant
      • Feb 2012 - Apr 2015

      Responsibilities: • Vulnerable Assessment of Hosts ,Networks, Mobile Devices , Applications • Penetration Testing of Hosts, Networks, Mobile Devices , Applications • Knowledge and Application of OWASP Top 10 • Performing audits based according to NIC standards. • Take up the Key responsibility of Handling a Project • Closely worked with the development team to help fix vulnerabilities • Provide alternative solutions for remediation of bugs in case of business… Show more Responsibilities: • Vulnerable Assessment of Hosts ,Networks, Mobile Devices , Applications • Penetration Testing of Hosts, Networks, Mobile Devices , Applications • Knowledge and Application of OWASP Top 10 • Performing audits based according to NIC standards. • Take up the Key responsibility of Handling a Project • Closely worked with the development team to help fix vulnerabilities • Provide alternative solutions for remediation of bugs in case of business requirements. AAA Technologies is a Premier Independent Auditing and Consulting Company in the area of IS Audit, Information Security, IT Assurance & compliance, IT Governance and rendering these services since the year 2000.To strengthen the internal processes, AAA Technologies have got ISO 9001:2008 Certified. The Company also got itself ISO 27001:2005 Certified as it deals with confidential information of the clients.AAA Technologies has experienced professionals with International Certifications like CGEIT (Certified in Governance of Enterprise IT), CRISC (Certified in Risk and Information Systems Control), CISA (Certified Information Systems Auditor), CISM (Certified Information Security Manager), CISSP ( Certified Information Systems Security Professional), CEH (Certified Ethical Hacker), ISO 27001 LA, BS 25999, CFE (Certified Fraud Examiner), CA (Chartered Accountant), MBA (Master in Business Administration), ABCI (Associate of Business Continuity Institute), CIA (Certified Internal Auditor). AAA Technologies has been Empaneled in many Government Bodies. Show less Responsibilities: • Vulnerable Assessment of Hosts ,Networks, Mobile Devices , Applications • Penetration Testing of Hosts, Networks, Mobile Devices , Applications • Knowledge and Application of OWASP Top 10 • Performing audits based according to NIC standards. • Take up the Key responsibility of Handling a Project • Closely worked with the development team to help fix vulnerabilities • Provide alternative solutions for remediation of bugs in case of business… Show more Responsibilities: • Vulnerable Assessment of Hosts ,Networks, Mobile Devices , Applications • Penetration Testing of Hosts, Networks, Mobile Devices , Applications • Knowledge and Application of OWASP Top 10 • Performing audits based according to NIC standards. • Take up the Key responsibility of Handling a Project • Closely worked with the development team to help fix vulnerabilities • Provide alternative solutions for remediation of bugs in case of business requirements. AAA Technologies is a Premier Independent Auditing and Consulting Company in the area of IS Audit, Information Security, IT Assurance & compliance, IT Governance and rendering these services since the year 2000.To strengthen the internal processes, AAA Technologies have got ISO 9001:2008 Certified. The Company also got itself ISO 27001:2005 Certified as it deals with confidential information of the clients.AAA Technologies has experienced professionals with International Certifications like CGEIT (Certified in Governance of Enterprise IT), CRISC (Certified in Risk and Information Systems Control), CISA (Certified Information Systems Auditor), CISM (Certified Information Security Manager), CISSP ( Certified Information Systems Security Professional), CEH (Certified Ethical Hacker), ISO 27001 LA, BS 25999, CFE (Certified Fraud Examiner), CA (Chartered Accountant), MBA (Master in Business Administration), ABCI (Associate of Business Continuity Institute), CIA (Certified Internal Auditor). AAA Technologies has been Empaneled in many Government Bodies. Show less

    • Computer and Network Security
    • 1 - 100 Employee
    • Information Security Trainer and Researcher
      • Sep 2010 - Feb 2012

      Worked here as a Trainer and Researcher for more than a Year , Taught 1) Basics of Hacking 2) How to conduct a VAPT 3) Wireless Hacking Etc Innobuzz privately owned Indian company based out of New Delhi, India which has been providing high technology training and knowledge based solutions. The registered office is located in Connaught Place, New Delhi, India. Innobuzz was incorporated in Jan 2010 and has grown from a Information Security Training Startup to a… Show more Worked here as a Trainer and Researcher for more than a Year , Taught 1) Basics of Hacking 2) How to conduct a VAPT 3) Wireless Hacking Etc Innobuzz privately owned Indian company based out of New Delhi, India which has been providing high technology training and knowledge based solutions. The registered office is located in Connaught Place, New Delhi, India. Innobuzz was incorporated in Jan 2010 and has grown from a Information Security Training Startup to a Multi-National IT Training Brand with extensive reach in South East Asia.Innobuzz has a strong presence in Malaysia, Sri Lanka, Nigeria, USA and Canada, apart from many other countries, The flagship offering of Innobuzz is providing training on Information Security, which is delivered to its audience all over the world via Computer Based Training Courses, Onsite Training Programs and Company Owned/Franchise owned learning centers. Show less Worked here as a Trainer and Researcher for more than a Year , Taught 1) Basics of Hacking 2) How to conduct a VAPT 3) Wireless Hacking Etc Innobuzz privately owned Indian company based out of New Delhi, India which has been providing high technology training and knowledge based solutions. The registered office is located in Connaught Place, New Delhi, India. Innobuzz was incorporated in Jan 2010 and has grown from a Information Security Training Startup to a… Show more Worked here as a Trainer and Researcher for more than a Year , Taught 1) Basics of Hacking 2) How to conduct a VAPT 3) Wireless Hacking Etc Innobuzz privately owned Indian company based out of New Delhi, India which has been providing high technology training and knowledge based solutions. The registered office is located in Connaught Place, New Delhi, India. Innobuzz was incorporated in Jan 2010 and has grown from a Information Security Training Startup to a Multi-National IT Training Brand with extensive reach in South East Asia.Innobuzz has a strong presence in Malaysia, Sri Lanka, Nigeria, USA and Canada, apart from many other countries, The flagship offering of Innobuzz is providing training on Information Security, which is delivered to its audience all over the world via Computer Based Training Courses, Onsite Training Programs and Company Owned/Franchise owned learning centers. Show less

Education

  • University of Mumbai
    Master’s Degree, Information Technology
    2010 - 2012
  • University of Mumbai
    Bachelor's Degree, Computers
    2007 - 2010

Community

You need to have a working account to view this content. Click here to join now