top of page

Cyber security professional  with a keen eye for vulnerabilities. Skilled in cyber security,  I leverage comprehensive assessments to identify and address threats, keeping organizations safe. Collaborative team player dedicated to surpassing goals in both cybersecurity and team settings.

1000049420-03_edited.jpg

Hi, I'm Rohan A G

DOWNLOAD RESUME

EXPERIENCE

EXPERIENCE

2022 - 2023

image.png

NATIONAL COLLEGE OF IRELAND

MASTERS IN CYBERSECURITY

Delved into advanced topics including cryptography, network security, threat detection, and incident response while also gaining practical experience through hands-on projects and developing expertise in securing systems and analyzing threats.

2021 - 2022

image.png

ARRIDAE INFOSEC PVT LTD.

INFORMATION SECURITY CONSULTANT

Assisted in conducting vulnerability assessments and penetration tests for various clients, identifying and remediating security weaknesses in their systems and collaborated with team members to analyze emerging threats, implement security best practices, and provide recommendations for improving clients' overall cybersecurity resilience.

Image by Clint Patterson

2020

image.png

EC-COUNCIL

C|EH CERTIFICATION

Acquired practical skills in ethical hacking techniques, including vulnerability assessment, penetration testing, and ethical hacking methodologies. Learned to identify and exploit security vulnerabilities to assess and strengthen the cybersecurity defenses of organizations.

2019 - 2020

image.png

TRIAD SQUARE INFOSEC PVT LTD.

CYBERSECURITY INTERN

Utilized SIEM tools to actively monitor security, analyze incidents, and respond to threats. Performed security assessments to identify and fix vulnerabilities, ensuring compliance with regulations. Collaborated to build strong security policies and controls by following ISO and NIST standards.

2020 - Present

BUG BOUNTY

Participated in Capture The Flag (CTF) challenges to sharpen skills and stay updated on the latest threats and attack vectors. Maintained up-to-date knowledge of cybersecurity trends, threat landscapes, and emerging technologies through continuous learning and professional development

SKILLS

SKILLS

OPERATING SYSYTEM

WINDOWS

LINUX

KALI LINUX

image.png
image.png
image.png

VIRTUALIZATION

VIRTUAL BOX

VMWARE

image.png
image.png

INFORMATION GATHERING AND RECON

image.png

NMAP

image.png

WIRESHARK

 MALTEGO

RECON-NG

image.png

SHODAN

WAPPLYZER

image.png
image.png
image.png

MANUAL PENETRATION TESTING

BASH & SHELL SCRIPTING

METASPLOIT

SEToolkit

image.png
image.png
image.png

SPECIALISE IN NETWORKING PROTOCOLS AND MODELS,MANUAL CODE REVIEW.

image.png
image.png

NETWORK VULNERABILITY ANALYSIS

NESSUS

OPENVAS GVM

OPENSSL

SSLYZE

TESTSSL

TELNET/SSH

FTP

SMTP

REDIS

image.png
image.png
image.png
image.png
image.png
image.png
image.png

WEB APPLICATION VULNERABILITY SCANNING AND PENETRATION TESTING

OWASP top 10 standards

BURPSUITE

HCL APPSCAN

ACCUNETIX

NETSPARKER

image.png
image.png
image.png
image.png

FALSE POSITIVE VERIFICATION AND POST EXPLOITATION.

image.png

SECURITY FRAMEWORKS

image.png

IS027001

image.png

NIST

image.png

MITRE

image.png

PCI DSS

SIEM

ARCSIGHT

SPLUNK

image.png
image.png

WEB APPLICATION FIREWALLS, INTRUSION DETECTION SYSTEMS AND REALTIME APPLICATION SELF-PROTECTION TOOLS

CROWDSTRIKE

API TESTING

image.png

BURPSUITE

POSTMAN API

image.png
image.png

MOBILE TESTING

GENYMOTION EMULATOR

MOBSF

ADB

APKTOOL

JADX-GUI

OSTORLAB

image.png
image.png
image.png
image.png
image.png
image.png

REPORTING

MS EXCEL, WORD

SHELL SCRIPTING

image.png
image.png

EXPERTISE

WEB AND APPLICATION SECURITY TESTING

Expertise in black/white/grey box testing, identifying vulnerabilities like clickjacking, xss (stored & reflected), and sql injection using tools like beef and sqlmap.

MOBILE SECURITY

Tested android applications, identifying weak encryption and vulnerabilities like janus, exploiting them using msfvenom and msfconsole

PENETRATION TESTING

Conducted tests on large-scale networks, identifying trojans (double pulsar), weak credentials (default camera passwords), and vulnerabilities like bluekeep.

NETWORK EXPLOITATION

Proficient in crafting backdoors and utilizing exploitation frameworks like msfconsole for advanced network vulnerabilities.

MY DIECAST COLLECTION

CONTACT

WORK

Penetration testing

Cybersecurity Analyst

Cybersecurity Consultant

SOC analyst

ABOUT

LET'S CONNECT

Get to know more about my work. Let us collaborate to build safer systems

Thanks for submitting!

bottom of page