Prasanth Elangovan

Prasanth Elangovan

Fibre Optic engineer

Followers of Prasanth Elangovan4000 followers
location of Prasanth ElangovanHyderabad, Telangana, India

Connect with Prasanth Elangovan to Send Message

Connect

Connect with Prasanth Elangovan to Send Message

Connect
  • Timeline

  • About me

    Security Consultant | OSCP | M.Sc cybersecurity Gold medalist | Bug Hunter | AZ-500

  • Education

    • Subbalakshmi Lakshmipathy College of Science

      -
      Bachelor's degree Networking

      Designed network architecture and optimized system hardware for college systems, while also training peers and juniors in security practices. Demonstrated proactive cybersecurity efforts and a commitment to knowledge sharing.

    • Bharathiar University

      -
      M.Sc Cyber Security

      1. I am a gold medalist in M.Sc Cybersecurity, receiving the gold medal from the governor for outstanding academic performance.2. Conducted various security assessments on college systems and trained peers and other juniors for security, demonstrating proactive cybersecurity efforts and a commitment to knowledge sharing.

  • Experience

    • MRKR Communications Pvt

      Apr 2018 - May 2018
      Fibre Optic engineer

      Gained practical experience in fiber optic engineering through supporting network design, implementation, and maintenance processes, and by participating in training and development opportunities.

    • MAVEL Technologies

      Nov 2019 - Mar 2020
      Linux System Administrator

      Experienced Linux Server Administrator with a focus on network security. Proficient in installing, configuring, and maintaining Linux servers to ensure system security and stability. Skilled in configuring pfSense firewall and other open-source security projects, including restricting MAC addresses with iBind and configuring sudoers. Responsibilities also include managing user accounts, performing system backups and restores, monitoring system performance, implementing security measures such as firewalls and intrusion detection systems, and ensuring compliance with security policies and procedures. Additionally, adept at deploying and managing virtualized environments using tools like VMware and managing containerized applications using Docker. Show less

    • Gurugram Cyber Cell

      Jun 2021 - Jul 2021
      Summer Intern

      Analyzed various real-world cybersecurity attacks and their impacts on individuals andmachines, and successfully interpreted and applied insights from cybersecurity labs toimprove my understanding of threat defense strategies.

    • EY

      Feb 2022 - now

      1. Got a double promotion for exceptional performance within one year.2. Created Capture The Flag (CTF) machines in various categories like web, AI, network, and others for one of the big engagements, ranging from very easy to exceptional levels. 3.Conducted advanced cybersecurity training for one of the leading software companies. As part of the engagement, developed several Burp Suite plugins to detect vulnerabilities such as broken access control issues and identify sensitive parameters in Java. 4. Performed incident response for a vehicle manufacturing company. As part of the engagement, hardened the entire system and servers, aiding the industry in business continuity and recovery processes. 5. Created various scripts in Bash, PowerShell, and Python for incident response6. Conducted Network Penetration Testing for various clients. 7. Performed Web Application Penetration Testing (Black Box, Grey Box, and White Box). 8. Conducted Internal and External Vulnerability Assessments. 9. Conducted Advanced Persistent Threat Assessments, including OSINT and Social Profiling. Carried out Mobile Application Security Assessments. 10 . Conducted Thick-Client Application testing. Performed Wireless Penetration Testing for one of the largest Telecommunications companies. 11 . Conducted cloud assessment for one of the leading technology and data analytics firms, identifying various misconfigurations.12. Ensured the quality of deliverables in line with Industry Standards and Best Practices. Interfaced with Top Management of various clients. Show less 1.Conducted advanced cybersecurity training for one of the leading software companies. As part of the engagement, developed several Burp Suite plugins to detect vulnerabilities such as broken access control issues and identify sensitive parameters in Java. 2. Performed incident response for a vehicle manufacturing company. As part of the engagement, hardened the entire system and servers, aiding the industry in business continuity and recovery processes. 3. Created various scripts in Bash, PowerShell, and Python for incident response4. Conducted Network Penetration Testing for various clients. 5. Performed Web Application Penetration Testing (Black Box, Grey Box, and White Box). 6. Conducted Internal and External Vulnerability Assessments. 7.Conducted Advanced Persistent Threat Assessments, including OSINT and Social Profiling. Carried out Mobile Application Security Assessments. 8. Conducted Thick-Client Application testing. Performed Wireless Penetration Testing for one of the largest Telecommunications companies. 9. Conducted cloud assessment for one of the leading technology and data analytics firms, identifying various misconfigurations.10. Ensured the quality of deliverables in line with Industry Standards and Best Practices. Interfaced with Top Management of various clients. Show less 1. Got a Budding Star Award within 6 months for exceptional performance.2. Conducted Network Penetration Testing for various clients. 3. Performed Web Application Penetration Testing (Black Box, Grey Box, and White Box). 4. Conducted Internal and External Vulnerability Assessments. Conducted Advanced Persistent Threat Assessments, including OSINT and Social Profiling. 5. Carried out Mobile Application Security Assessments. 6. Conducted Thick-Client Application testing. 7. Performed Wireless Penetration Testing for one of the largest Telecommunications companies. Conducted cloud assessment for one of the leading technology and data analytics firms, identifying various misconfigurations. 8. Ensured the quality of deliverables in line with Industry Standards and Best Practices. Interfaced with Top Management of various clients. Show less

      • Security Consultant

        Nov 2023 - now
      • Senior Analyst

        Jul 2022 - Nov 2023
      • Red Team Summer Internship

        Feb 2022 - Jul 2022
  • Licenses & Certifications