Download PDF


CISE-Information Security Expert

Enhanced the experience of CEH

CEH- Certified Ethical Hacker

Hands on experienced on each tool and process used to perform task.

Backend Development

C, C++, Java, SQL, MySQL

Work experience

Nov 2013Apr 2015


  • Hands-on experience in performing security assessments of web-based applications including threat modelling, vulnerability assessments, and penetration testing.
  • Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
  • Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
  • Development and/or vulnerability testing experience with web frameworks.
  • Monitor current reports of computer viruses to determine when to update virus protection systems.
  • Experience with vulnerability scanners, as well as with web application testing tools such as Burp, OWASP Zap, Nessus, Nmap, NeXpose, Metasploit, Wire shark.
  • Continuous focus and contribution in the areas of performance, reliability, and maintainability of the product.
  • Cultivate working relationships with various IT and Business groups acting in a consultative capacity for various projects by helping them understand security vulnerabilities.


Oct 2012Aug 2013


Innobuzz Knowledge Solution.
  • Modify computer security files to incorporate new software, correct errors, or change individual access status.
  • Train users and promote security awareness to ensure system security and to improve server and network efficiency.
  • Document computer security and emergency measures policies, procedures, and tests.
  • Maintain permanent fleet cryptology and carry-on direct support systems required in special land, sea surface and subsurface operations.
  • Ability to work independently with a team of engineers locally and peer teams abroad with minimum guidance.
  • Active participation in customer/partner design meetings and general engagements.
  • Active participation in our ongoing process enhancements and software development practices.
  • Monitor and proactively report on current threats and vulnerabilities to application security.
  • Deliver application Security Trainings and awareness sessions




Arkay College Of Engineering  & Technology

Computer Sciences Engineering


Patience, Hardworking.


Gardening, Cooking


District Level Basket Ball Player.

District Level Volley Ball player.

District Level Table tennis player


Assisted trainings at National Police Academy, AP Police Academy, CCID.

Delivered presentations on Cyber crime and Cyber Security, around colleges of Nizamabad.