Cyber Security Trainer | Information Security Researcher | Vulnerability Assessment & Penetration Testing
• Giving training for cyber security aspirants.
• Performing Internal and external pen-tests.
• Identified application related vulnerabilities based on OWASP areas like SQL Injection, Cross-Site scripting, Improper error Handling etc on the web applications.
• Prepared detailed report depicting the findings and the recommendations for the identified vulnerabilities during testing and reviews.