Dnyaneshwar Rathod
About Candidate
A cybersecurity analyst with 2 years of professional experience seeking to utilize my technical skills,
analytical abilities, and communication expertise as a cyber-security analyst to safeguard computer
systems and networks from cyber threats, collaborate with cross-functional teams, and stay current
with the latest security technologies and industry trends
Education
Work & Experience
Completed training assigned by Infosys in web development and frontend development training ● Developed and maintained modular, reusable and scalable components using React.js, Contributing to the overall efficiency and maintainability of the codebase
Developed modular and reusable React components, adhering to best practice to enhance code Maintainability. ● Implemented front-end functionalities Using React.js enhancing user experience and improving overall application performance. ● Collaborated with UI/UX designer to translate mockups into interactive user interfaces ● Actively participated in daily stand-up, sprint planning, retrospective meetings to foster a collaborative and agile development environment.
Expertise in conducting penetration testing across various environments including web applications, networks, and systems, utilizing tools such as Metasploit, Nmap, Burp Suite, and Wireshark. ● Experience in performing social engineering assessments to evaluate the effectiveness of security awareness training and policies. ● Skilled in identifying and exploiting vulnerabilities in applications, networks, and infrastructure, providing detailed reports and recommendations for remediation. ● Excellent communication skills, capable of effectively conveying complex technical information to both technical and non-technical stakeholders. ● Familiarity with industry compliance standards such as PCI DSS, ISO 27001, and NIST SP 800- 53, ensuring adherence to regulatory requirements. ● Ability to monitor security events and alerts in real-time, and respond to potential security threats. ● Understanding of networking protocols, TCP/IP stack, and network traffic analysis. ● Conduct analysis to determine the legitimacy of files, domains, and emails using online resources such as VirusTotal, Hybrid Analysis, MX Toolbox, and other OSINT tools. ● Creating a virtual lab environment via VirtualBox with Kali Linux.