YASHWANTH – Cyber Security Engineer – [Cybersecurity | Vulnerability Management | Cloud Security | Application Security] – 5 years Exp – Local to Bay Area,CA
Consultant's Details:
Consultant Name: YASHWANTH
Visa: Our Own H1B
Current Location: Bay Area,CA
Employer Details:
Employer:Nextgen Technologies Inc
Contact Person:Kushal
Email:kushal.desai@nextgentechinc.com
Note: Please call between 09:30 AM PST to 06:00 PM PST
Phone: +1 (413) 424-0484
YASHWANTH 's Resume
PROFESSIONAL SUMMARY
Security Engineer with 5 years securing cloud-hosted and distributed applications across application security, product security reviews, threat modeling, vulnerability management, and incident response. Experienced in manual and automated secure code review, adversarial testing, and building security automation tools on AWS. Strong understanding of web protocols (HTTP/HTTPS, DNS, TCP/IP), common attack classes (XSS, CSRF, injection, auth/authz bypass), identity & access controls, and SDLC security practices. Proven partner to engineering teams translating risk into practical mitigations, improving security outcomes using data, and enabling secure-by-default delivery at scale.
TECHNICAL SKILLS
Languages/Scripting: Python, Go, SQL, Bash, PowerShell
Secure Code Review: Python, Go; familiarity reviewing Java/JavaScript patterns and common OWASP issues
Security Domains: Application Security, Product Security Reviews, Threat Modeling, Vulnerability Management, Incident Response, Security Testing
Protocols & Web Security: HTTP/HTTPS, TLS, DNS, TCP/IP, REST APIs, OAuth 2.0, JWT
Common Attacks: XSS, CSRF, IDOR, injection, auth bypass, privilege escalation, service abuse
Frameworks/Standards: OWASP Top 10, MITRE ATT&CK, NIST 800-53, CIS Benchmarks
Cloud/Infra: AWS (IAM, Lambda, EC2, S3, VPC, GuardDuty, CloudTrail), Kubernetes, Linux Security
Tools: Burp Suite, OWASP ZAP, Tenable, Splunk, QRadar, CrowdStrike Falcon, SentinelOne, CyberArk
Automation/DevSecOps: AWS Lambda, Python APIs, SOAR playbooks, CI/CD security checks, security metrics dashboards
PROFESSIONAL EXPERIENCE
Information Security Engineer II — Intuit | Mountain View, CA Mar 2025 – Present
- Own application security reviews and security design/architecture reviews for shared backend services and cloud-hosted applications, reducing post-release security issues by ~30%.
- Perform manual secure code reviews (Python/Go) and identify critical weaknesses in authentication, authorization, input validation, and crypto usage, preventing 15+ high-severity issues from reaching production.
- Create and maintain threat models for new features and service changes; evaluate attack paths including privilege escalation, lateral movement, and abuse of shared services across 8+ engineering teams.
- Execute adversarial security analysis and security testing against APIs and internal services using Burp/ZAP, focusing on OWASP Top 10 classes (XSS/CSRF/IDOR/injection/auth bypass).
- Build security automation tools using Python + AWS Lambda to ingest vulnerability data, correlate findings, and push actionable tickets—cutting manual triage time by ~80%.
- Integrate automated security checks into CI/CD (secrets scanning, baseline API checks, misconfig detection), preventing vulnerable code paths from shipping.
- Provide security architecture guidance (secure-by-default patterns for authN/authZ, token lifecycle, service-to-service trust), balancing risk with delivery needs.
- Support incident response and investigations by analyzing logs/telemetry (CloudTrail/service logs), producing root-cause analysis and long-term mitigations.
- Deliver security metrics and dashboards (risk, SLA adherence, remediation trends) used by engineering leadership to prioritize fixes and improve outcomes by 25–30%.
Cyber Security Engineer — Assurant | USA Aug 2023 – Feb 2025
- Conducted security assessments, security design reviews, and threat modeling for cloud applications and integrations; prioritized risks using OWASP + ATT&CK-aligned methodology.
- Performed penetration testing and security testing of web apps/APIs (auth/authz, input validation, business logic abuse), driving remediation of 40+ vulnerabilities and reducing high-risk exposure by ~35%.
- Built Python-based security automation and SOAR workflows (AWS-integrated) to triage alerts and enrich incidents, automating ~50% of recurring triage and reducing MTTR.
- Partnered with engineering teams to implement mitigations: least-privilege IAM, secure API patterns, logging/monitoring improvements, and guardrails for common web vulnerabilities.
- Investigated incidents using Splunk/QRadar, reconstructing timelines, identifying root cause, and validating containment/eradication actions.
- Strengthened identity and access controls using CyberArk and proxy telemetry (Zscaler), improving detection of anomalous access and credential misuse across 50+ applications.
- Produced security training and documentation (secure coding, API security, threat modeling playbooks) to reduce repeat findings and improve developer security hygiene.
- Used data to drive prioritization: built reporting on vulnerability SLA, severity trends, and remediation effectiveness to influence stakeholder decisions.
Security Operations Engineer — Movate | Chennai, India Jan 2021 – Dec 2022
- Monitored and analyzed 500K+ events/day across SIEM sources (Splunk, QRadar) to detect suspicious activity, intrusions, and abuse patterns across systems and services.
- Led triage and response for OS/network/service-level incidents; improved response execution and reduced MTTR by ~30% through playbooks and investigation workflow improvements.
- Conducted OS-level security reviews and Linux hardening checks; identified misconfigurations, reduced attack surface, and validated secure configuration baselines.
- Supported vulnerability management by validating fixes, confirming remediation effectiveness, and ensuring secure configuration posture across critical services.
- Used command-line tooling and log analysis to troubleshoot protocols, analyze anomalous patterns, and support containment decisions.
- Built Python automation scripts to enrich alerts (context, asset mapping, severity), improving analyst efficiency and investigation quality.
- Administered endpoint and identity security controls (CrowdStrike, CyberArk) to strengthen access governance and endpoint protections.
- Documented runbooks, incident reports, and remediation guidance; trained junior analysts on detection quality and attacker mindset.
EDUCATION
Master of Science (M.S.) in Cyber Security
University of Alabama at Birmingham, USA
CERTIFICATIONS
- CompTIA Security+
- ISC2 Certified in Cybersecurity (CC)
- Google Cybersecurity Certificate
Kushal
| 1735 N 1St ST., Suite 308 |San Jose, CA 95112
NextGen Technologies Inc
Email: kushal.desai@nextgentechinc.com. Website: www.nextgentechinc.com | +1 (413) 424-0484 |
To unsubscribe from future emails or to update your email preferences click here