Sharath Iyer

Information Security Consultant at SecurEyes
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
Riyadh, Saudi Arabia, SA
Languages
  • English Professional working proficiency
  • Hindi Professional working proficiency
  • Tamil Elementary proficiency
  • Malayalam Native or bilingual proficiency
  • Spanish Elementary proficiency

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

5.0

/5.0
/ Based on 1 ratings
  • (1)
  • (0)
  • (0)
  • (0)
  • (0)

Filter reviews by:

Umar Siddiqui

A delight to work with. Always pushed to achieve more and more. A colleague who extends to be a friend.

You need to have a working account to view this content.
You need to have a working account to view this content.

Credentials

  • Advent of Cyber 2022
    TryHackMe
    Dec, 2022
    - Nov, 2024
  • Offensive Pentesting
    TryHackMe
    Aug, 2021
    - Nov, 2024
  • CompTIA Security+
    CompTIA
    Mar, 2021
    - Nov, 2024
  • Cyber Threat Intelligence
    Coursera
    Oct, 2020
    - Nov, 2024
  • Cybersecurity Compliance Framework & System Administration
    Coursera
    Oct, 2020
    - Nov, 2024
  • Cybersecurity Roles, Processes & Operating System Security
    Coursera
    Oct, 2020
    - Nov, 2024
  • IBM Cybersecurity Analyst Specialization
    IBM
    Oct, 2020
    - Nov, 2024
  • Introduction to Cybersecurity Tools & Cyber Attacks
    Coursera
    Oct, 2020
    - Nov, 2024
  • Network Security & Database Vulnerabilities
    Coursera
    Oct, 2020
    - Nov, 2024
  • Penetration Testing, Incident Response and Forensics
    Coursera
    Oct, 2020
    - Nov, 2024
  • Communication and Network Security
    Cybrary

Experience

    • India
    • Computer and Network Security
    • 100 - 200 Employee
    • Information Security Consultant
      • Nov 2021 - Present

      VAPT - Network and Application • Assessed threats, risks and vulnerabilities in Applications & Network to advise stakeholders on appropriate measures. • Utilized multiple automated tools like BurpSuite Professional and Nessus, as well as manual methods to discover vulnerabilities in web applications based on OWASP methodology. • Prioritized the findings to correct flaws and discussed in detail the test findings, including mitigation and remediation activities. • Documented security issues and impact identified through assessments in a clear and concise manner to facilitate reporting to impacted stakeholders. • Developed Minimum Baseline Security Standards documents for multiple software. GRC - Supply Chain Risk Assessment • Conducted audits for multiple high-profile clients to ensure compliance with established standards. Show less

    • India
    • IT Services and IT Consulting
    • 700 & Above Employee
    • System Engineer Cyber Security
      • May 2020 - Oct 2021

      Conducted Web Application security assessments and Penetration tests across public and private networks.• Understood and used various open-source penetration testing tools and when appropriate, emulated hacker tactics, techniques, procedures. • Performed static analysis of mobile applications using tools including MobSF, Inspeckage and Virus Total, and utilized BurpSuite for manual testing.• Monitored and modified roles and groups in AWS Identity & Access Management module when necessary.• Verified inbound and outbound traffic rules in AWS EC2 Security Groups. Show less

    • Assistant System Engineer
      • Apr 2018 - Apr 2020

      Packaged, tested, and deployed applications of varying complexity ensuring highest quality.• Developed scripts and strategies to enhance the overall process.• Took responsibility of post package release issues and employed remediation actions.• Deployed applications and patches using SCCM.

    • System Administrator
      • Jul 2016 - Mar 2018

      *Delivered >90% First Call resolution for technical issues in Windows, Linux and Mac systems and applications, Networks, VPN etc.*Proactively identified and secured network weaknesses and made recommendations for upgrades.*Acted as a key member for diagnosing network and system failures, and provided appropriate resolutions.*Established and monitored firewall configurations, monitored and analyzed periodic malware scans.*Reviewed violations of computer security procedures and developed mitigation plan. Show less

Education

  • Nehru Arts and Science College
    Bachelor's degree, Computer Programming, Specific Applications
    2013 - 2016

Community

You need to have a working account to view this content. Click here to join now