Experience

1

Information Security Analyst

Jan 2024 - Present

Astra Security

Astra Security-[Saurabh Kumar]

Perform regression testing on web applications, cloud services, APIs, mobile apps, and network systems.

Work in close partnership with clients to address identified vulnerabilities, resulting in enhanced security for their systems and software.

Secured over 500+ websites, mobiles, cloud, APIs and network

2

Information Security Analyst Intern

Apr 2023 - Dec 2023

Astra Security

Internship Certificate

Carried out regression testing on web applications, cloud services, APIs, mobile apps, and network systems.

Collaborated closely with clients to resolve identified vulnerabilities, leading to improved security for their systems and software.

3

Cyber Security Analyst Intern

Dec 2022 - Apr 2023

Digisec360

Internship Certificate

Performed network-focused penetration testing to proactively identify vulnerabilities and security gaps in the organization's infrastructure and systems.

Structure the penetration testing report with a risk-focused summary, detailed vulnerability findings, prioritized remediation roadmap, and technical evidence to compellingly drive security improvements.

Conducted comprehensive security assessments to reveal potential vulnerabilities.

4

Information Security Analyst Intern

Jan 2022 - Sept 2022

Astra Security

Internship Certificate

Carried out regression testing on web applications, cloud services, APIs, mobile apps, and network systems.

Collaborated closely with clients to resolve identified vulnerabilities, leading to improved security for their systems and software.

5

Cyber Security Analyst Intern

Jul 2021 - Dec 2021

Mahen Technologies Private Limited

Internship Certificate

Provided professional safety reports and insightful data analysis on security protocols to building managers

Leveraged vigilant virus activity monitoring, strategic antivirus update timing, and sound judgment to optimize professional management of virus protection.

Conducted enlightening sessions and extensive training programs to educate users about information security policies, protocols, and effective preparation for the CEH