Raj Sharath Gade
Raj Sharath Gade
Raj Sharath Gade
Objective
Seeking an opportunity in an organization in the field of Information Security where I can utilize my
skills and offer professional growth while being innovative and flexible.
Experience Summary
Technical Proficiencies
Tools:
DAST tools: HP Web Inspect, Burp Suite Pro, IBM Appscan, AppSpider, Qualys, Digicert Fiddler,
Paros, SQLmap, Wireshark, Owasp Zap, SSL Scan tools, Kali linux, Metasploit, Dirbuster,
Gobuster, wfuzz
Others: Echomirage, ITR, Decompilers, SOAP UI, WS attacker, Winpmem, Mimikatz, Nmap, JBE,
Genymotion, Android Tamer, APPIE framework, Winhex, Postman, Akamai Web application
Firewall, Alert logic IDS
The Gap, Inc. commonly known as Gap Inc. or Gap, (stylized as GAP) is an American worldwide clothing and
accessories retailer.
• Review and assess the security posture of the GAP products includes generating security
requirements, helping teams in designing secure solutions, assessing vendor security
controls, and performing security advisory tasks
• Conducted threat modelling for on- prem and cloud architectures includes application and
infrastructure level risk assessments.
• Helped project teams in designing solutions to ensure alignment with standard secure
architectural patterns.
• Developed checklist-based security questionnaire for application & infrastructure
components security assessments.
• Created and published security standards and best practices for approved file transfer
patterns, Retail store devices security, client-side scripts security, Azure Virtual Desktop
security, microservices security.
• Worked closely in evaluating and implementation of various security frameworks includes
Brinqa (Vulnerability management), Abnormal Security (DLP), PenTera (Exploitation
framework).
• Involved in Architectural review board (ARB) for Azure cloud architectures and migration
stories to identify security gaps and provide necessary solutions for risk reduction.
• Conducted Third party security reviews prior to intake/renewal/closure of the services that
includes products for SAAS, vendor software inhouse deployments and Third party services.
• Performed security advisory for different ad-hoc tasks and closely interacted with other
security teams
• Verify that product architectures to PCI DSS, GDPR, MLPS, CCPA and other regulatory &
compliance requirements.
• Conducted security trainings and awareness sessions for developer, business leaders and
vendors on GAP security standards and best practices.
• Created security guidelines for Developer best practices for .Net and JAVA technologies and
provided trainings sessions.
Wells Fargo Enterprise Global Services (EGS) is a critical component of the Wells Fargo’s (Wells Fargo Bank N.A.)
strategy to leverage distinct advantages in doing business in a global environment. Wells Fargo EGS – India (Wells
Fargo India Solutions Private Limited and Wells Fargo International Services Private Limited) is primarily an
extension of the technology, operations, knowledge services, and corporate support teams of Wells Fargo.
Senior Security Specialist
• Performed DAST for web, thick client, webservices and APIs and worked and with
development teams to provide suitable mitigations and resolve identified bugs.
• Performed manual and automated source code reviews for applications based on different
technologies.
• Performed Software composition analysis (SCA) using Blackduck and Owasp Dependency
checker tools for open source security.
• Worked as Fortify and Checkmarx static SME resolving queries and issues from development
teams.
• Worked on writing custom rules for Fortify tool.
• Worked on writing secure guidelines for PHP applications.
• Created POCs and guideline documents for Fortify scans involving Build integrations such as
ANT, Maven and Gradle.
• Conducted a POC on writing guidelines for WAF implementation to suite with overall
organization standards and best security practices.
• Conducted POCs on CICD pipeline which includes integration of tools such as checkmarx,
Blackduck and Owasp Zap with Jenkins framework.
About the company: Broadridge Financial Solutions is the leading provider of investor
communications and technology-driven solutions for broker-dealers, banks, mutual funds, and
corporate issuers globally. Broadridge’s investor communications, securities processing, and
business process outsourcing solutions help clients reduce their capital investments in operations
infrastructure, allowing them to increase their focus on core business activities.
• Work with the business to understand the architecture, logic, existing security controls, and
changes implemented to propose applicable Security Assessments.
• Perform manual & automated security assessments and penetration testing for web
applications, Thick clients, Client API’s, and Webservices.
• Perform manual and automated source code review for applications on different platforms.
• Integrate secure code review process with the development phase to catch implementation &
code related bugs in earlier stages of SDLC.
• Conduct Design reviews for the applications against the requirements, security standards &
policies to identify the loopholes before implementation of the design.
• Analyze the existing code base for vulnerable API dependencies in accordance with the CVE
Identifiers.
• Analyze, filter, and classify results of vulnerability scans.
• Accurately document system deficiencies, recommend solutions, and track remediation
activities.
• Worked with the development team to provide API level recommendations for vulnerabilities
identified.
• Conducted training sessions for development teams for secure coding practices.
• Conducted induction sessions for the new hires on Information security management
system.
About the company: HSBC is one of the world’s largest banking and financial services
organizations serving more than 47 million customers through four global businesses: Retail
Banking and Wealth Management, Commercial Banking, Global Banking and Markets, and Global
Private Banking and has its foot hold in 71 countries.
• Perform manual security assessments for HSBC (Internal and public) applications of
particular geographic locations.
• Perform manual and automated source code reviews.
• Perform Vulnerability research and discovery
• Document the artifacts and compilation of final report.
• Adopted role of a Quality lead for a team of 4 members, responsible for reviewing check list,
test plan, test cases and test reports.
• Instrumental in creating checklist for web and thick client applications.
• Key member in conducting organizational level events on Information security awareness
such as “ISR week”.
• Received Q3 R&R Recognition award for the year 2014
Programmer Analyst
• Perform vulnerability assessments and code reviews for applications in banking, financial
and healthcare domains.
• Developed demo vulnerable application in Java for the purpose of Security training.
• Key member in handling end-to-end testing process for different clients.
• Communicated with clients & onshore team to discuss vulnerabilities and recommend
accurate solutions to mitigate them.
• Review test artifacts and deliverables from the team.
Declaration
I, hereby declare that all the information furnished above is true to the best of my knowledge and
belief.
Thanks,
Raj Sharath Gade