Cybersecurity Professional
I am Adharv, a dedicated cybersecurity professional with a robust background in computer science and a proven track record of collaborating with leading industry organizations. With extensive experience in penetration testing, network security, and cybersecurity training, I have partnered with numerous clients and entities to fortify their systems and networks against cyber threats. Passionate about advocating for the significance of cybersecurity, I am committed to delivering top-tier cybersecurity services and training to safeguard clients' data and assets. With an unwavering commitment to excellence, I continually seek new challenges and opportunities to expand my expertise and contribute to the advancement of cybersecurity practices.
contact meintern as experience
satisfied companies
working hours
awards won
Cyber Threat Intelligence Analyst (Feb 2024 - Present)
Contributing to building falconfeeds.io as part of the Threat Analyst Team.
Identifying the Company's Attack Surface, Attack Surface Management, Vulnerability Intelligence, Intelligence on Malicious Software, Deep/Dark Web Monitoring, Monitoring Ransomware Groups, Detecting Source Code Leaks and Breaches, and Identifying Phishing and Impersonation Sites.
Cyber Threat Intelligence Fundamentals, Manual and Automated Monitoring Methods, Utilizing Frameworks, Methodologies, and Tools for CTI, and Monitoring Threat Actors and the Dark Web.
Skills: Open Source Intelligence, Dark Web Monitoring
Engaged in Capture The Flag (CTF) challenges on TryHackMe platform, focusing on Penetration Testing, Web Application Security, Linux System Administration, and more.
Working as a Cybersecurity Researcher at Bugcrowd, specializing in identifying and reporting security vulnerabilities to enhance overall system security.
Interned as a Cyber Security Engineer, acquiring hands-on experience in Malware Analysis, SOC Analyst, Vulnerability Assessment and Penetration Testing (VAPT), Manual Testing, and Log Analysis.
Infosec training: Infosec training is a comprehensive course, we offers you the fundamentals of information security, such as cryptography, network security, web application security, and ethical hacking. We provide Python, Shell SCripting, Linux with complete hands on practices.
Pentesting: PenTesting is a simulated cyberattack on your system or network to identify and exploit any vulnerabilities. Pentesting can help you assess your security posture,and protect your data and assets from malicious hackers.
Web VAPT: Web VAPT is a type of VAPT that focuses on testing the security of your web applications, such as websites, APIs, or mobile apps. Web VAPT can help you discover and exploit any web vulnerabilities, such as SQL injection, cross-site scripting, broken authentication, or insecure file uploads.
Source code review: Source code review is a process of examining the source code of your software applications to detect any flaws, bugs, or security issues. Source code review can help you improve the quality, performance, and security of your software, as well as comply with coding standards and best practices.
Network VAPT: Network VAPT is a type of VAPT that focuses on testing the security of your network infrastructure, such as routers, switches, firewalls, servers, and wireless devices. Network VAPT can help you discover and exploit any network vulnerabilities.
System Analysis, done by experienced security professionals, helps to identify and address network and application-level vulnerabilities before they can be exploited by criminals.
SOC Analysis involves monitoring, analyzing, and responding to security incidents to ensure data and system integrity. It's a proactive cybersecurity approach to identify threats, mitigate risks, and enhance security posture, safeguarding digital assets and maintaining regulatory compliance.
Splunk analysis delves into system or network data to detect and address security threats efficiently. This proactive methodology aids in evaluating security posture, safeguarding data, and strengthening defenses against potential cyber threats, ensuring comprehensive protection for your digital assets..
OSINT, or Open Source Intelligence, is the practice of gathering and analyzing publicly available information to detect security threats. This proactive cybersecurity strategy enhances threat detection, risk mitigation, and compliance efforts, safeguarding digital assets effectively while staying ahead of emerging threats..