Remote Information Security Analyst
Candidate Information
Contact Details
About candidate
This experience pushed me to think creatively, utilize advanced tools, and refine my approach to problem-solving. Ultimately, we successfully identified critical vulnerabilities, which helped the organization enhance its security posture, making it a highly rewarding challenge.
Cover latter
Dear Team,
I am writing to express my keen interest in the Remote Information Security Analyst role. As a cybersecurity professional with over 5.8 years of hands-on experience in penetration testing, red teaming, and comprehensive security assessments across diverse platforms, I am confident in my ability to contribute to safeguarding and enhancing your organization’s security posture.
In my current role as an Information Security Analyst at Amdocs, I have honed my skills in identifying vulnerabilities and securing cutting-edge technologies, including AI-driven features and cloud-native applications. By conducting in-depth penetration testing and leading both manual and automated source code reviews using tools like Checkmarx, I have been able to deliver actionable insights that significantly strengthened product security. My proactive involvement in evaluating OpenShift Container Platforms and cloud security configurations further exemplifies my commitment to adapting to emerging technologies and threats.
Previously, at QSEAP, I spearheaded red team assessments, simulated real-world adversary tactics, and identified security gaps in corporate networks and applications. Through these efforts, I not only mitigated critical risks but also empowered financial organizations by delivering hands-on training in security best practices, elevating their readiness against cyber threats.
Some highlights of my qualifications include:
•
Proficiency in industry-leading tools like Burp Suite, Metasploit, Splunk, and Nessus.
•
Practical expertise in cybersecurity frameworks, including OWASP Top 10, MITRE ATT&CK, and PCI DSS.
•
Recognized contributions to the cybersecurity community, including published Google Dorks in the Exploit Database.
I would welcome the opportunity to discuss how my skills and experiences align with the needs of the team. Thank you for considering my application.
Sincerely,
Sajan Dhakate