Balaji.D

Balaji.D

$50/hr
Freelancer | Cybersecurity enthusiastic | professional security engineer
Reply rate:
-
Availability:
Hourly ($/hour)
Location:
Hyderabad, Telangana, India
Experience:
2 years
BALAJI D CEH v12 | EC-Council Information Security Engineer (Application Security, VAPT) Mob: - Email:- Overview: ➔ Certified Ethical Hacker with 1.5 years of experience as a freelancer in Web Application Security, focusing on Vulnerability Assessment and Penetration Testing (VAPT), DAST, OWASP Top 10, Security Hardening, and REST API Security. Skilled in identifying and reporting security flaws and helping teams implement effective remediation. Skill Summary: ➔ Conducted in-depth web application penetration testing using Burp Suite to identify security weaknesses and logic flaws. ➔ Specialized in detecting and exploiting OWASP Top 10 vulnerabilities, including SQL Injection (SQLi), Cross-Site Scripting (XSS), and Broken Authentication. ➔ Performed manual and automated testing to simulate real-world attack scenarios on web applications. ➔ Used tools like Burp Suite Intruder, Repeater, and Scanner to intercept and manipulate HTTP/HTTPS traffic for vulnerability analysis. ➔ Worked closely with developers and DevOps teams to deliver actionable remediation guidance and validate security fixes. ➔ Improved the overall security posture of applications by proactively identifying high-risk ➔ ➔ ➔ ➔ ➔ ➔ ➔ flaws before production release. Conducted thorough vulnerability assessments on web applications and APIs using a combination of manual techniques and automated tools (e.g., Burp Suite, OWASP ZAP, Nmap). Identified and validated critical security vulnerabilities, including those aligned with OWASP Top 10, using structured testing methodologies. Delivered comprehensive security reports detailing risk severity, CVSS scoring, technical impact, exploitability, and prioritized remediation steps. Documented clear and actionable findings tailored for both technical teams and nontechnical stakeholders, enhancing client understanding and response readiness. Provided risk-based recommendations to align remediation efforts with business impact and compliance requirements. Continuously refined testing approaches based on evolving threat landscapes, client feedback, and industry best practices. Assessed system and application configurations to identify security misconfigurations and compliance gaps. ➔ Applied hardening techniques based on Center for Internet Security, OWASP, and other industry best practices. ➔ Reduced attack surface by disabling unused services, ports, and insecure default settings. ➔ Recommended and implemented secure communication protocols (e.g., SSH, TLS) and ➔ ➔ ➔ ➔ ➔ ➔ disabled legacy/insecure protocols. Suggested and enforced access control mechanisms, including least privilege policies, rolebased access, and strong authentication settings. Enhanced system security posture through baseline configuration audits and ongoing policy adjustments. Developed professional-grade security assessment reports with clear technical summaries, impact analysis, and CVSS-based risk ratings. Created detailed proof-of-concepts (PoCs), including annotated screenshots and step-bystep reproduction instructions to validate findings. Provided remediation guidance tailored to the target environment, improving developer response time and reducing recurring vulnerabilities. Delivered reports structured for both technical teams and non-technical stakeholders, ensuring clarity, business relevance, and actionable outcomes. Professional Summary: ➔ 1.5+ years of freelancing hands-on experience in Application Security, Web Application Penetration Testing, and Vulnerability Assessment (VAPT). ➔ Proficient in identifying and exploiting OWASP Top 10 vulnerabilities in web applications and REST APIs. ➔ Skilled in using tools like Burp Suite, OWASP ZAP, Nmap, Nessus, sqlmap, and ➔ ➔ ➔ ➔ ➔ ➔ ➔ Metasploit for both manual and automated testing. Conducted DAST (Dynamic Application Security Testing) to uncover real-time application vulnerabilities. Performed network scanning and service enumeration using Nmap to assess infrastructure-level risks. Delivered professional security assessment reports with detailed PoCs, CVSS scoring, screenshots, and remediation instructions. Knowledge in REST API security testing, identifying issues like IDOR(insecure direct object reference), insecure authentication. Collaborated with cross-functional teams to integrate security into the Secure Software Development Life Cycle (SDLC). Strong documentation, reporting, and communication skills with the ability to explain findings to both technical and non-technical stakeholders. Committed to continuous learning and staying updated on the latest cybersecurity trends and tools. Tools Used: ➔ Burp Suite Professional / OWASP ZAP Conducted DAST for web applications to identify OWASP Top 10 vulnerabilities such as ➔ ➔ ➔ ➔ ➔ ➔ ➔ XSS, SQLi, and Broken Authentication. Used Intruder, Repeater, and Scanner modules for thorough analysis. Tenable Nessus Performed vulnerability assessments of infrastructure and servers; generated risk-based reports with CVSS scores and collaborated with teams for patch management. Sqlmap Utilized Sqlmap for detecting and exploiting SQL injection vulnerabilities in live applications and validating backend database exposures. Metasploit Framework Simulated real-world attack scenarios by exploiting known vulnerabilities; used auxiliary modules for post-exploitation and privilege escalation. Hydra Conducted brute-force testing on authentication mechanisms (FTP, SSH, HTTP login forms) to evaluate password strength and enforce account security. Nmap Executed advanced network scans for port discovery, OS detection, and service enumeration during initial recon and network-level assessments. OSINT Frameworks Leveraged open-source intelligence tools to gather publicly available data for reconnaissance and profiling targets during penetration tests. Kali Linux Knowledge on using Kali Linux distributions for VAPT, including hands-on with tools like Nikto, Dirb, DNSenum, and custom scripts for automation. Certifications: ➔ Certified Ethical Hacker (CEH) v12 – EC-Council Issued: Mar 2024 | Valid Until: Apr 2027 ➔ Pursuing ISC2 Certified in Cybersecurity (CC) Actively completing all domain modules; currently in progress ➔ Application Security Training Certificate – NullClass Completed hands-on VAPT internship and real-world assessment labs Academic Details: ➔ Master of Computer Applications (MCA) Sri Venkateswara University Year of Completion: 2022
Get your freelancer profile up and running. View the step by step guide to set up a freelancer profile so you can land your dream job.