Get C2C/W2 Jobs & hotlist update

YASHWANTH [Cybersecurity | Vulnerability Management | Cloud Security | Application Security] – 5 years Exp – Local to Bay Area,CA

YASHWANTH – Cyber Security Engineer – [Cybersecurity | Vulnerability Management | Cloud Security | Application Security] – 5 years Exp – Local to Bay Area,CA

Consultant's Details: 

Consultant Name: YASHWANTH 

Visa: Our Own H1B

Current Location: Bay Area,CA

 

Employer Details:

Employer:Nextgen Technologies Inc

Contact Person:Kushal

Email:kushal.desai@nextgentechinc.com

Note: Please call between 09:30 AM PST to 06:00 PM PST

Phone: +1 (413) 424-0484

YASHWANTH 's Resume

PROFESSIONAL SUMMARY

Security Engineer with 5 years securing cloud-hosted and distributed applications across application security, product security reviews, threat modeling, vulnerability management, and incident response. Experienced in manual and automated secure code review, adversarial testing, and building security automation tools on AWS. Strong understanding of web protocols (HTTP/HTTPS, DNS, TCP/IP), common attack classes (XSS, CSRF, injection, auth/authz bypass), identity & access controls, and SDLC security practices. Proven partner to engineering teams translating risk into practical mitigations, improving security outcomes using data, and enabling secure-by-default delivery at scale.


TECHNICAL SKILLS

Languages/Scripting: Python, Go, SQL, Bash, PowerShell
Secure Code Review: Python, Go; familiarity reviewing Java/JavaScript patterns and common OWASP issues
Security Domains: Application Security, Product Security Reviews, Threat Modeling, Vulnerability Management, Incident Response, Security Testing
Protocols & Web Security: HTTP/HTTPS, TLS, DNS, TCP/IP, REST APIs, OAuth 2.0, JWT
Common Attacks: XSS, CSRF, IDOR, injection, auth bypass, privilege escalation, service abuse
Frameworks/Standards: OWASP Top 10, MITRE ATT&CK, NIST 800-53, CIS Benchmarks
Cloud/Infra: AWS (IAM, Lambda, EC2, S3, VPC, GuardDuty, CloudTrail), Kubernetes, Linux Security
Tools: Burp Suite, OWASP ZAP, Tenable, Splunk, QRadar, CrowdStrike Falcon, SentinelOne, CyberArk
Automation/DevSecOps: AWS Lambda, Python APIs, SOAR playbooks, CI/CD security checks, security metrics dashboards


PROFESSIONAL EXPERIENCE

Information Security Engineer II — Intuit | Mountain View, CA                                     Mar 2025 – Present

  • Own application security reviews and security design/architecture reviews for shared backend services and cloud-hosted applications, reducing post-release security issues by ~30%.
  • Perform manual secure code reviews (Python/Go) and identify critical weaknesses in authentication, authorization, input validation, and crypto usage, preventing 15+ high-severity issues from reaching production.
  • Create and maintain threat models for new features and service changes; evaluate attack paths including privilege escalation, lateral movement, and abuse of shared services across 8+ engineering teams.
  • Execute adversarial security analysis and security testing against APIs and internal services using Burp/ZAP, focusing on OWASP Top 10 classes (XSS/CSRF/IDOR/injection/auth bypass).
  • Build security automation tools using Python + AWS Lambda to ingest vulnerability data, correlate findings, and push actionable tickets—cutting manual triage time by ~80%.
  • Integrate automated security checks into CI/CD (secrets scanning, baseline API checks, misconfig detection), preventing vulnerable code paths from shipping.
  • Provide security architecture guidance (secure-by-default patterns for authN/authZ, token lifecycle, service-to-service trust), balancing risk with delivery needs.
  • Support incident response and investigations by analyzing logs/telemetry (CloudTrail/service logs), producing root-cause analysis and long-term mitigations.
  • Deliver security metrics and dashboards (risk, SLA adherence, remediation trends) used by engineering leadership to prioritize fixes and improve outcomes by 25–30%.

Cyber Security Engineer — Assurant | USA                                                                      Aug 2023 – Feb 2025

  • Conducted security assessments, security design reviews, and threat modeling for cloud applications and integrations; prioritized risks using OWASP + ATT&CK-aligned methodology.
  • Performed penetration testing and security testing of web apps/APIs (auth/authz, input validation, business logic abuse), driving remediation of 40+ vulnerabilities and reducing high-risk exposure by ~35%.
  • Built Python-based security automation and SOAR workflows (AWS-integrated) to triage alerts and enrich incidents, automating ~50% of recurring triage and reducing MTTR.
  • Partnered with engineering teams to implement mitigations: least-privilege IAM, secure API patterns, logging/monitoring improvements, and guardrails for common web vulnerabilities.
  • Investigated incidents using Splunk/QRadar, reconstructing timelines, identifying root cause, and validating containment/eradication actions.
  • Strengthened identity and access controls using CyberArk and proxy telemetry (Zscaler), improving detection of anomalous access and credential misuse across 50+ applications.
  • Produced security training and documentation (secure coding, API security, threat modeling playbooks) to reduce repeat findings and improve developer security hygiene.
  • Used data to drive prioritization: built reporting on vulnerability SLA, severity trends, and remediation effectiveness to influence stakeholder decisions.

Security Operations Engineer — Movate | Chennai, India                                               Jan 2021 – Dec 2022

  • Monitored and analyzed 500K+ events/day across SIEM sources (Splunk, QRadar) to detect suspicious activity, intrusions, and abuse patterns across systems and services.
  • Led triage and response for OS/network/service-level incidents; improved response execution and reduced MTTR by ~30% through playbooks and investigation workflow improvements.
  • Conducted OS-level security reviews and Linux hardening checks; identified misconfigurations, reduced attack surface, and validated secure configuration baselines.
  • Supported vulnerability management by validating fixes, confirming remediation effectiveness, and ensuring secure configuration posture across critical services.
  • Used command-line tooling and log analysis to troubleshoot protocols, analyze anomalous patterns, and support containment decisions.
  • Built Python automation scripts to enrich alerts (context, asset mapping, severity), improving analyst efficiency and investigation quality.
  • Administered endpoint and identity security controls (CrowdStrike, CyberArk) to strengthen access governance and endpoint protections.
  • Documented runbooks, incident reports, and remediation guidance; trained junior analysts on detection quality and attacker mindset.

EDUCATION

Master of Science (M.S.) in Cyber Security
University of Alabama at Birmingham, USA


CERTIFICATIONS

  • CompTIA Security+
  • ISC2 Certified in Cybersecurity (CC)
  • Google Cybersecurity Certificate

 

Note: Please call between 09:30 AM PST to 06:00 PM PST

Kushal 

| 1735 N 1St ST., Suite 308 |San Jose, CA 95112

NextGen Technologies Inc

Email: kushal.desai@nextgentechinc.com. Website: www.nextgentechinc.com | +1 (413) 424-0484 |

To unsubscribe from future emails or to update your email preferences click here

About Author

I’m Monica Kerry, a passionate SEO and Digital Marketing Specialist with over 9 years of experience helping businesses grow their online presence. From SEO strategy, keyword research, content optimization, and link building to social media marketing and PPC campaigns, I specialize in driving organic traffic, boosting rankings, and increasing conversions. My mission is to empower brands with result-oriented digital marketing solutions that deliver measurable success.

Leave a Reply

Your email address will not be published. Required fields are marked *

×

Post your C2C job instantly

Quick & easy posting in 10 seconds

Keep it concise - you can add details later
Please use your company/professional email address
Simple math question to prevent spam