Badges

55 Points
8 Years

User Activity

Over 8 years ago
Secure SDLC, start with security Requirements (ASVS) - Design (Threat Modeling) - Devlopment (Coding best practices & SCA) - Testing (VA/PT) - Deployment (configuration, network appliances)

About me

Information Security Architect - Safeguard the information across the Software Development Life Cycle (Secure SDLC). Reconnaissance to Remediation

Key Areas: (SAST & DAST)
SCR (Secure Code Review) - Code review of application source code against known vulnerabilities and industry best practices. It is generally conducted along with the development cycle to uncover coding flaws and non compliance to guidelines and standards (OWASP, NIST, SANS, etc.)
RAS (Robust Application Security) - Comprehensive validation or manual analysis to eliminate the false positives at the real time
WAS (Web Application Security) - Combination of manual and automated scans, analysis on final results to conclude the actual
VA (Vulnerability Assessment) - Scanning and analysis of infrastructure ( network, systems, servers ) to identify vulnerabilities and check the resilience against targeted attacks
MAS (Mobile Application Security) - Scanning of mobile application for presence of threats, malware and malicious intent. Mobile apps shall be scanned against known security risks for mobile apps
CAS (Cloud Application Security) - Assess the cloud applications against the threat to protect from the cyber attacks.

Specialties: Information Security Management, Secure Architecture Review, Architecture Risk Analysis, Security in Cloud Computing and Internet of Things (IoT)