You are on page 1of 5

Summary

Amit
Varshneya I am an accomplished Sr. Test Engineer at Deloitte's Advisory Services
practice, boasting over 14 years of expertise in both IT domains. My
Email: professional focus revolves around various facets of Software Testing
amitvarshneya18@gmail.com and cyber security, including application, system, mobile, API, cloud,
Mobile- 408-819-4452 and Automation and Manual application Testing. Throughout my
LinkedIn career, I have partnered with esteemed government agencies and
https://www.linkedin.com/in/a Fortune 500 companies, providing them with top-notch security
mit-varshneya-2621717 solutions.

I hold a bachelor's degree in computer science from a prestigious


university in northern India, as well as a master's degree in computer
science from BITS Palani, India. Among the cutting-edge areas in
Area Of Expertise Cyber Security and Software Testing, I have extensive hands-on
experience in Vulnerability Assessment, Secure Code Analysis, Mobile
• Software Automation and Security Testing, and Software Automation and Manual Testing.
Manual Testing These domains have enabled me to stay at the forefront of
• Static Application Security cybersecurity best practices and contribute significantly to the
Testing (SAST) safeguarding of critical systems and data for my clients.
• Dynamic Application Security
Testing (DAST) Sinor Testing Specialist (8 years) - Deloitte & Touché LLP - July 2015
• Secure code review to Until now – 8 years.
• Mobile Security
• API and Cloud Security
• Patch Management Application Security:
• Conducting Security Trainings • Led the implementation and administration of security measures for
applications and systems.
• Developed and maintained security standards and guidelines for
secure software development.
• Experience with Threat Modeling and Secure Design reviews
Tools • Conducted application security assessments using DAST, SAST, SCA,
IaC, IAST, RASP and Container scanning tools.
HP Fortify, AppScan, CheckMarx
• Triaged scan results and reviewed application source code to confirm
Veracode, OWASP Zap Proxy, findings and eliminate false positives.
DBMS, SQL, HTML, Visual Basic, • Proficient in utilizing a wide range of programming languages,
Selenium, REST API, Serenity-BDD, including Java, C/C++, Python, JavaScript, PHP, Ruby on rail, NodeJS,
JBehave, PhantonJS, Jira JavaScript, .NET,C# and more. Experience in leveraging SAST tools to perform
comprehensive security assessments across diverse codebases,
Burp Suite, Zen map, Mac Nikto, ensuring robust application security across various technologies.
Qualys, Rapid 7, Wireshark, • Collaborated with development teams to integrate application security
into the CI/CD process.
Tenable Nessus, Mobile SF,
• Stayed up to date on industry trends and threats, implementing
Soups, ReadyAPI and Firefox Add-
appropriate measures for asset protection.
ons such as SQL Inject Me, XSS
• Responded to security incidents and led investigations to determine
Me, Web Developer add-on, REST root cause and implement remediation measures.
Client. • Experience with securing enterprise web applications and OWASP Top
10, CVSS, CWE, WASC, and SANS-25
• Provided training and guidance to development teams on secure
coding practices and threat mitigation.

Certification •
Mentored and provided directions to junior members of the team.
Perform threat modeling, conduct security architecture reviews, and
provide training to architects and developers to enhance adoption of
secure coding practice within the product development lifecycle.
• Certified Ethical Hacker • Experience with CI/CD pipeline tools such as GitLab, Jenkins, or Azure
(C|EH) DevOps
• Certified Information • Knowledge of federal compliance standards, including NIST 800-53,
Systems Auditor (CISA) FIPS, or FedRAMP
• AppScan Certified Application Security Tools used:
• Microsoft Azure • SAST: Fortify, Appscan, Checkmarx, SonarQube, Veracode, Coverity
Administrator AZ 104 • DAST: Burp Suite, OWASP ZAP, Acunetix, Web Inspect, Wireshark,
Firefox plugins, Kali Linux
• SCA: Black Duck, WhiteSource, Snyk
• IaC Security: Terraform Security Scanning, AWS CloudFormation
Guardrails, Checkov
• Container Security: Docker Security Scan, Clair, Anchore
Clients & Industries • CI/CD pipeline tools: GitLab, Jenkins, or Azure DevOps

Software Automation and Manual testing:

• 10+ Public Sector States • Demonstrated expertise in ensuring product quality and compliance
with industry standards.
and Local clients
• Extensive experience contributing to the development of high-quality
• Insurance companies products.
• Major Telecom clients • Proficiency in engineering practices relevant to the role.
• Retail • Hands-on experience conducting System Integration Testing,
particularly with BLE solutions and mobile applications.
• Communication • Competency in integrating Embedded Software, Application Software,
• Product and Electromechanical Control Systems into an integrated system.

2
• Experience in managing system and software configurations
• Media & entertainments effectively.
• In-depth knowledge and application of all phases of the Software
• Apple Inc Development Lifecycle.
• Blue shield California • Proficient in conducting requirements reviews and management using
• Major Banking tools such as DOORs and/or PTC Windchill.
• Experience in defect tracking and change management using tools like
JIRA.
• Demonstrated ability to analyze complex issues and provide effective
solutions.
• Excellent written and verbal communication skills.
• Proficiency in automated testing, particularly using Python, C, or C#.
• Knowledge and adherence to industry standards such as IEC-60601,
Education 62304 and 62366.
Software Testing Tools used:
• Software Environment: DBMS, SQL, HTML, Visual Basic, Selenium, REST
• Master of Science (MS) in API, Serenity-BDD, JBehave, PhantonJS, JavaScript.
Software Systems from • Operating Systems: Windows, Linux
BITS Palani India. • Testing Methodologies: RTM Test requirement and test data analysis,
test implementation and execution, Defect reporting and tracking.
• Bachelor of Engineering in
• Tools used: Zephyr, GitLab, GitHub, TFS, JIRA, Test Rail, TOAD
Information Technology
• ALM (Application lifecycle management), Confluence, Bitbucket,
from India
Bamboo, Load Runner.
• Power point, Excel, Word, Windows OS.
• Selenium IDE, Selenium Webdriver, JBehave Framework, Java Basics,
TestNG, Junit, SILK test, QTP/UFT, SOUP UI, REST API Testing,

Location •
POSTMAN.
E-commerce Experience, Dynamic Web application testing, SDLC, STLC,
Agile and Waterfall Methodology.  Cloud Computing – AWS, MS Azur

Fort Lauderdale Florida, USA


API Security Testing:


Work Permit In-depth understanding of API security principles and best practices,
including authentication, authorization, encryption, and input
validation.
• Proficient in identifying and mitigating common API security
• US H1-B Visa vulnerabilities, such as SQL injection, XML external entity (XXE) attacks,
• Canadian Open Work and cross-site request forgery (CSRF).
Permit • Experience in implementing secure API design patterns, such as OAuth,
JWT, and API keys.

3
• Strong knowledge of API security standards, including OAuth 2.0,
OpenID Connect, and TLS.
• Ability to conduct API security assessments and threat modeling to
identify potential risks and weaknesses.
API Security Tools used:
• OWASP API Security Top 10 tools, Postman, SoapUI, etc.
• Apigee, Kong, Amazon API Gateway, etc.

Mobile Security Testing Tools:

• Comprehensive knowledge of mobile security principles and best


practices for both Android and iOS platforms.
• Proficient in identifying and mitigating common mobile security
vulnerabilities, including insecure data storage, weak authentication,
and insecure communication.
• Experience in conducting mobile security assessments, penetration
testing, and code reviews to identify security flaws in mobile
applications.
• Strong understanding of mobile application security standards,
guidelines, and industry frameworks.
• Ability to analyze mobile application binaries to detect and address
potential security risks.
• Familiarity with secure mobile development practices and the ability to
guide developers in writing secure code.
• Knowledge of mobile device management (MDM) and mobile
application management (MAM) solutions to enforce security policies
on mobile devices.
Mobile Security Testing Tools:
• Mobile security testing tools: AppScan Mobile Analyzer, MobSF,
AndroBugs, iNalyzer, Frida, etc.
• Mobile application scanning tools: MaaS360, AirWatch, MobileIron,
etc.

Security Consultant – Agreeya Solutions – Verizon Wireless


Nov 2014-July 2015 – 9 months
• Secure Code Analysis is performed using HP Fortify.
• Vulnerability Assessment performed using IBM AppScan and
manual testing.
• Penetration Testing is performed manually using tools like
OWASP ZapProxy, BurpSuite, Zenmap, Mac Nikto, Firefox
Add-ons, and Nessus.

4
Security Consultant – Infosys Ltd: June 2012- Nov 2014 – 2 years
• Secure Code Analysis is performed using HP Fortify and IBM Appscan for
various clients.
• Penetration Testing is performed manually using tools like
OWASP Zap Proxy, Burp Suite, Zen map, Mac Nikto,
Firefox Add-ons, and Nessus.
• Automated Penetration testing was performed using HP’s
Web Inspect tool.
• Vulnerability Assessment performed using IBM AppScan and
manual testing
Team Lead – Tata Consultancy Services: September 2010 – June
2012 – 2 years
• Functional regression testing, maintenance and development and the
testing for client internal tool
• Scheduling, understanding of the system, software development, and
unit testing are the main responsibilities.
• Technologies and Tools: Linux, Java Struts 1.2, JSP 2.0, JDBC, HTML, CSS,
JavaScript, PostgreSQL 8.1, and Servlets.
Software Developer – DiviNet Access Technology Ltd.
Pune: September 2007 – September 2010 – 3 Years
• As a developer I was involved in analysis, design and development,
Implementation, testing and Maintenance of Client /Server
applications.
• Experience with coding, debugging, and maintenance of production
systems.
• Technology and Tools: C/C++, Linux,C#, ASP Java Struts 1.2, JSP 2.0,
JDBC, Servlets, JavaScript, PostgreSQL 8.1, HTML, CSS

You might also like