Gousuddin Mohammed

Gousuddin Mohammed Email and Phone Number

Penetration Tester CEH Cloud Security Terraform SAST DAST SCA Threat Modelling API Security
Gousuddin Mohammed's Location
Hyderabad, Telangana, India, India
About Gousuddin Mohammed

Gousuddin Mohammed is a Penetration Tester CEH Cloud Security Terraform SAST DAST SCA Threat Modelling API Security.

Gousuddin Mohammed's Current Company Details

Penetration Tester CEH Cloud Security Terraform SAST DAST SCA Threat Modelling API Security
Gousuddin Mohammed Work Experience Details
  • Persistent Systems
    Penetration Tester
    Persistent Systems Dec 2022 - Dec 2023
    Hyderabad, Telangana, India
     Maintaining security of products, periodically scanning and coordinating with stakeholders. On receiving alerts, take action on SAST, DAST, SCA dashboard findings in DevSecOps pipeline. Conducted Vulnerability Assessment of Web Applications, red teaming. Identifying the Critical, High, Medium, Low Vulnerabilities based on OWASP Top-10. Used DAST (Invicti, Burp-Suite) and SAST (SonarQube) followed White-Hat. Implementing end-end security for migrating web-apps to AWS AWS IAM to control access to AWS resources Enable AWS CloudTrail to log all API activity across AWS services. Enable AWS GuardDuty to detect potential security threats in AWS. Created Customer Managed keys in AWS KMS for data integrity across resources. writing Terraform files for creating resources in cloud
  • Galaxe.Solutions
    Penetration Tester
    Galaxe.Solutions Nov 2017 - Nov 2022
    Hyderabad, Telangana, India
     Maintaining security of products, periodically scanning and coordinating with stakeholders. Part of team involved in establishing Security Centre Conducted Web-Application Penetration testing of 60+ applications. On receiving alerts , take action on SAST, DAST, SCA dashboard findings in DevSecOps pipeline. Conducted Vulnerability Assessment of Web Applications, red teaming. Identifying the Critical, High, Medium, Low Vulnerabilities based on OWASP Top-10. Communicate technical vulnerabilities and remediation steps to developers and stakeholders Used DAST (Burp-Suite, Acunetix, Netsparker) and SAST (SonarQube) followed White-Hat. Identify API vulnerabilities like Broken-Authorization, Mass-Assignment, SSRF, SQL Injection. Identify SOAP based API Security Vulnerabilities like SQLi, Command Injection, XML Injection, SOAP Action Spoofing, Broken Access and Authorization. Implementing end-end security for migrating web-apps to AWS SG, NACL, Data Encryption, Application Security, Monitoring, Logging and Incident Response. writing Terraform files for creating resources in cloud
  • Tech Mahindra
    Penetration Tester
    Tech Mahindra May 2015 - Jul 2016
    Hyderabad, Telangana, India
  • Wells Fargo India Solutions Private Ltd
    Penetration Tester
    Wells Fargo India Solutions Private Ltd Feb 2013 - Apr 2015
    Hyderabad, Telangana, India
  • Fortech Software Inc.
    Penetration Tester
    Fortech Software Inc. May 2006 - Feb 2013
    Hyderabad, Telangana, India

Gousuddin Mohammed Education Details

Frequently Asked Questions about Gousuddin Mohammed

What is Gousuddin Mohammed's role at the current company?

Gousuddin Mohammed's current role is Penetration Tester CEH Cloud Security Terraform SAST DAST SCA Threat Modelling API Security.

What schools did Gousuddin Mohammed attend?

Gousuddin Mohammed attended Jntuh College Of Engineering Hyderabad.

Not the Gousuddin Mohammed you were looking for?

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.